Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UiF5hKi5o7.exe

Overview

General Information

Sample name:UiF5hKi5o7.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:D14972C18F26FD101DF4502B6D1DA4C36EA30679AE0E9BD12D6148E99F3C5652
Analysis ID:1546646
MD5:e54e6d6f9a6e2abac7563407294cb9ee
SHA1:cb0853fd275bd4fc1354742fb2bb8b98095b39fa
SHA256:d14972c18f26fd101df4502b6d1da4c36ea30679ae0e9bd12d6148e99f3c5652
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Found pyInstaller with non standard icon
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • UiF5hKi5o7.exe (PID: 5516 cmdline: "C:\Users\user\Desktop\UiF5hKi5o7.exe" MD5: E54E6D6F9A6E2ABAC7563407294CB9EE)
    • conhost.exe (PID: 4764 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • UiF5hKi5o7.exe (PID: 6364 cmdline: "C:\Users\user\Desktop\UiF5hKi5o7.exe" MD5: E54E6D6F9A6E2ABAC7563407294CB9EE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-11-01T11:19:24.625945+010020229301A Network Trojan was detected4.175.87.197443192.168.2.564384TCP
2024-11-01T11:20:02.498429+010020229301A Network Trojan was detected4.175.87.197443192.168.2.564593TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 83.4% probability
Source: UiF5hKi5o7.exeJoe Sandbox ML: detected
Source: UiF5hKi5o7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1m 14 Dec 2021built on: Sun Dec 19 14:27:21 2021 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: libcrypto-1_1.dll.1.dr
Source: Binary string: d:\a01\_work\4\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2222800542.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\unicodedata.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr
Source: Binary string: C:\A\39\b\libcrypto-1_1.pdb source: libcrypto-1_1.dll.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_socket.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _socket.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_decimal.pdb## source: _decimal.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_lzma.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.1.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: libcrypto-1_1.dll.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_lzma.pdbMM source: UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_decimal.pdb source: _decimal.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_hashlib.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\python310.pdb source: UiF5hKi5o7.exe, 00000004.00000002.2246833194.00007FF8A8E1E000.00000002.00000001.01000000.00000005.sdmp, python310.dll.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\select.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, select.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_bz2.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _bz2.pyd.1.dr
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772628080 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_00007FF772628080
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772617BB0 FindFirstFileExW,FindClose,1_2_00007FF772617BB0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772628080 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_00007FF772628080
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772632044 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF772632044
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:64384
Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:64593
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE208E000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, libcrypto-1_1.dll.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE208E000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digi
Source: UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, libcrypto-1_1.dll.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE208E000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE208E000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, libcrypto-1_1.dll.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl0
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE208E000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, libcrypto-1_1.dll.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://ocsp.digicert.com0
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE208E000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://ocsp.digicert.com0A
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE208E000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://ocsp.digicert.com0C
Source: UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, libcrypto-1_1.dll.1.drString found in binary or memory: http://ocsp.digicert.com0N
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://ocsp.digicert.com0O
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: http://www.digicert.com/CPS0
Source: UiF5hKi5o7.exe, 00000004.00000003.2234325231.000002294585C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2239835637.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232628185.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233510649.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2234043245.00000229457E6000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233121913.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2230956092.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233736541.00000229457D5000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000002.2245337210.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231541657.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233712095.0000022945858000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231283061.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232290616.0000022945832000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
Source: UiF5hKi5o7.exe, 00000004.00000002.2245359860.0000022947158000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
Source: UiF5hKi5o7.exe, 00000004.00000003.2232290616.0000022945832000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
Source: UiF5hKi5o7.exe, 00000004.00000003.2234325231.000002294585C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2239835637.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232628185.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233510649.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2234043245.00000229457E6000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233121913.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2230956092.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233736541.00000229457D5000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000002.2245337210.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231541657.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233712095.0000022945858000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231283061.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232290616.0000022945832000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
Source: UiF5hKi5o7.exe, 00000004.00000003.2234325231.000002294585C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2239835637.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232628185.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233510649.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2234043245.00000229457E6000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233121913.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2230956092.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233736541.00000229457D5000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000002.2245337210.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231541657.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233712095.0000022945858000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231283061.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232290616.0000022945832000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
Source: UiF5hKi5o7.exe, 00000004.00000002.2246833194.00007FF8A8E1E000.00000002.00000001.01000000.00000005.sdmp, python310.dll.1.drString found in binary or memory: https://python.org/dev/peps/pep-0263/
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE208E000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2226385108.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr, _lzma.pyd.1.dr, _decimal.pyd.1.dr, _hashlib.pyd.1.dr, _socket.pyd.1.dr, libcrypto-1_1.dll.1.dr, python310.dll.1.dr, select.pyd.1.dr, _bz2.pyd.1.drString found in binary or memory: https://www.digicert.com/CPS0
Source: libcrypto-1_1.dll.1.drString found in binary or memory: https://www.openssl.org/H
Source: UiF5hKi5o7.exe, 00000001.00000003.2224391384.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, base_library.zip.1.drString found in binary or memory: https://www.python.org/dev/peps/pep-0205/
Source: UiF5hKi5o7.exe, 00000004.00000002.2245359860.00000229470D0000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.1.drString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772616B801_2_00007FF772616B80
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77263741C1_2_00007FF77263741C
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726364D01_2_00007FF7726364D0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726280801_2_00007FF772628080
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726310981_2_00007FF772631098
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726214041_2_00007FF772621404
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726310981_2_00007FF772631098
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726223DC1_2_00007FF7726223DC
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726343E01_2_00007FF7726343E0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726184D01_2_00007FF7726184D0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77263A1581_2_00007FF77263A158
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726212001_2_00007FF772621200
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726280801_2_00007FF772628080
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77262328C1_2_00007FF77262328C
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77262E24C1_2_00007FF77262E24C
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772623AC81_2_00007FF772623AC8
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726227741_2_00007FF772622774
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77263674C1_2_00007FF77263674C
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726218141_2_00007FF772621814
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772620FF41_2_00007FF772620FF4
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77263487C1_2_00007FF77263487C
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726320441_2_00007FF772632044
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726289041_2_00007FF772628904
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726260F01_2_00007FF7726260F0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77262ED601_2_00007FF77262ED60
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726216101_2_00007FF772621610
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772620DF01_2_00007FF772620DF0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77262A6601_2_00007FF77262A660
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77262E6E01_2_00007FF77262E6E0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772627ECC1_2_00007FF772627ECC
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772636ED01_2_00007FF772636ED0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726236C41_2_00007FF7726236C4
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 4_2_00007FF8BFB975084_2_00007FF8BFB97508
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: String function: 00007FF772611F60 appears 52 times
Source: unicodedata.pyd.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000001.00000003.2223280999.000001AFE2082000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000001.00000003.2222800542.000001AFE2082000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2082000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exeBinary or memory string: OriginalFilename vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000004.00000002.2247277820.00007FF8A8F37000.00000002.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamepython310.dll. vs UiF5hKi5o7.exe
Source: UiF5hKi5o7.exe, 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs UiF5hKi5o7.exe
Source: classification engineClassification label: mal52.winEXE@4/11@0/0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726177F0 GetLastError,FormatMessageW,WideCharToMultiByte,1_2_00007FF7726177F0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4764:120:WilError_03
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162Jump to behavior
Source: UiF5hKi5o7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile read: C:\Users\user\Desktop\UiF5hKi5o7.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\UiF5hKi5o7.exe "C:\Users\user\Desktop\UiF5hKi5o7.exe"
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeProcess created: C:\Users\user\Desktop\UiF5hKi5o7.exe "C:\Users\user\Desktop\UiF5hKi5o7.exe"
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeProcess created: C:\Users\user\Desktop\UiF5hKi5o7.exe "C:\Users\user\Desktop\UiF5hKi5o7.exe"Jump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile opened: C:\Users\user\Desktop\pyvenv.cfgJump to behavior
Source: UiF5hKi5o7.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: UiF5hKi5o7.exeStatic file information: File size 5462278 > 1048576
Source: UiF5hKi5o7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: UiF5hKi5o7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: UiF5hKi5o7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: UiF5hKi5o7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: UiF5hKi5o7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: UiF5hKi5o7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: UiF5hKi5o7.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: UiF5hKi5o7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1m 14 Dec 2021built on: Sun Dec 19 14:27:21 2021 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: libcrypto-1_1.dll.1.dr
Source: Binary string: d:\a01\_work\4\s\\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2222800542.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmp, VCRUNTIME140.dll.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\unicodedata.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2228333608.000001AFE2088000.00000004.00000020.00020000.00000000.sdmp, unicodedata.pyd.1.dr
Source: Binary string: C:\A\39\b\libcrypto-1_1.pdb source: libcrypto-1_1.dll.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_socket.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2224157401.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _socket.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_decimal.pdb## source: _decimal.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_lzma.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.1.dr
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: libcrypto-1_1.dll.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_lzma.pdbMM source: UiF5hKi5o7.exe, 00000001.00000003.2223955958.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _lzma.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_decimal.pdb source: _decimal.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_hashlib.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2223547985.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _hashlib.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\python310.pdb source: UiF5hKi5o7.exe, 00000004.00000002.2246833194.00007FF8A8E1E000.00000002.00000001.01000000.00000005.sdmp, python310.dll.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\select.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2228136199.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, select.pyd.1.dr
Source: Binary string: C:\A\35\b\bin\amd64\_bz2.pdb source: UiF5hKi5o7.exe, 00000001.00000003.2222960947.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, _bz2.pyd.1.dr
Source: UiF5hKi5o7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: UiF5hKi5o7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: UiF5hKi5o7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: UiF5hKi5o7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: UiF5hKi5o7.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: UiF5hKi5o7.exeStatic PE information: section name: _RDATA
Source: VCRUNTIME140.dll.1.drStatic PE information: section name: _RDATA
Source: libcrypto-1_1.dll.1.drStatic PE information: section name: .00cfg
Source: python310.dll.1.drStatic PE information: section name: PyRuntim
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772655078 push rcx; ret 1_2_00007FF772655079
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772655048 push rcx; retn 0000h1_2_00007FF772655049

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeProcess created: "C:\Users\user\Desktop\UiF5hKi5o7.exe"
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\python310.dllJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\VCRUNTIME140.dllJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\libcrypto-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI55162\select.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726143E0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00007FF7726143E0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI55162\python310.dllJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI55162\unicodedata.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI55162\_decimal.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI55162\_socket.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI55162\_lzma.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI55162\libcrypto-1_1.dllJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI55162\_hashlib.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI55162\select.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI55162\_bz2.pydJump to dropped file
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-17334
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772628080 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_00007FF772628080
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772617BB0 FindFirstFileExW,FindClose,1_2_00007FF772617BB0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772628080 _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,1_2_00007FF772628080
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772632044 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF772632044
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77261BADC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF77261BADC
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772633C50 GetProcessHeap,1_2_00007FF772633C50
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77261BC84 SetUnhandledExceptionFilter,1_2_00007FF77261BC84
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77261B230 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF77261B230
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77261BADC IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF77261BADC
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77262AE08 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF77262AE08
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 4_2_00007FF8BFBA004C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF8BFBA004C
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeProcess created: C:\Users\user\Desktop\UiF5hKi5o7.exe "C:\Users\user\Desktop\UiF5hKi5o7.exe"Jump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF772639FA0 cpuid 1_2_00007FF772639FA0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\libcrypto-1_1.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\select.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\unicodedata.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\_bz2.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\_decimal.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\_socket.pyd VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\Desktop\UiF5hKi5o7.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162\base_library.zip VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI55162 VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF77261B9C0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00007FF77261B9C0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeCode function: 1_2_00007FF7726364D0 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,1_2_00007FF7726364D0
Source: C:\Users\user\Desktop\UiF5hKi5o7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
11
Process Injection
11
Process Injection
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS23
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
UiF5hKi5o7.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\_MEI55162\VCRUNTIME140.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI55162\_bz2.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI55162\_decimal.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI55162\_hashlib.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI55162\_lzma.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI55162\_socket.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI55162\libcrypto-1_1.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI55162\python310.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI55162\select.pyd0%ReversingLabs
C:\Users\user\AppData\Local\Temp\_MEI55162\unicodedata.pyd0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.openssl.org/H0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688UiF5hKi5o7.exe, 00000004.00000002.2245359860.0000022947158000.00000004.00001000.00020000.00000000.sdmpfalse
    unknown
    https://www.python.org/dev/peps/pep-0205/UiF5hKi5o7.exe, 00000001.00000003.2224391384.000001AFE2082000.00000004.00000020.00020000.00000000.sdmp, base_library.zip.1.drfalse
      unknown
      https://python.org/dev/peps/pep-0263/UiF5hKi5o7.exe, 00000004.00000002.2246833194.00007FF8A8E1E000.00000002.00000001.01000000.00000005.sdmp, python310.dll.1.drfalse
        unknown
        https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#UiF5hKi5o7.exe, 00000004.00000003.2234325231.000002294585C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2239835637.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232628185.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233510649.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2234043245.00000229457E6000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233121913.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2230956092.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233736541.00000229457D5000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000002.2245337210.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231541657.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233712095.0000022945858000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231283061.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232290616.0000022945832000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.pyUiF5hKi5o7.exe, 00000004.00000003.2232290616.0000022945832000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            http://crl3.digiUiF5hKi5o7.exe, 00000001.00000003.2224982798.000001AFE208C000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              https://www.python.org/download/releases/2.3/mro/.UiF5hKi5o7.exe, 00000004.00000002.2245359860.00000229470D0000.00000004.00001000.00020000.00000000.sdmp, base_library.zip.1.drfalse
                unknown
                https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_syUiF5hKi5o7.exe, 00000004.00000003.2234325231.000002294585C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2239835637.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232628185.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233510649.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2234043245.00000229457E6000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233121913.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2230956092.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233736541.00000229457D5000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000002.2245337210.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231541657.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233712095.0000022945858000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231283061.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232290616.0000022945832000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerUiF5hKi5o7.exe, 00000004.00000003.2234325231.000002294585C000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2239835637.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232628185.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233510649.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2234043245.00000229457E6000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233121913.0000022945852000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2230956092.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233736541.00000229457D5000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000002.2245337210.000002294585D000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231541657.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2233712095.0000022945858000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2231283061.0000022945855000.00000004.00000020.00020000.00000000.sdmp, UiF5hKi5o7.exe, 00000004.00000003.2232290616.0000022945832000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://www.openssl.org/Hlibcrypto-1_1.dll.1.drfalse
                    • URL Reputation: safe
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1546646
                    Start date and time:2024-11-01 11:18:14 +01:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 32s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:UiF5hKi5o7.exe
                    (renamed file extension from none to exe, renamed because original name is a hash value)
                    Original Sample Name:D14972C18F26FD101DF4502B6D1DA4C36EA30679AE0E9BD12D6148E99F3C5652
                    Detection:MAL
                    Classification:mal52.winEXE@4/11@0/0
                    EGA Information:
                    • Successful, ratio: 50%
                    HCA Information:Failed
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded IPs from analysis (whitelisted): 20.190.160.17, 40.126.32.76, 40.126.32.136, 40.126.32.133, 40.126.32.140, 20.190.160.20, 40.126.32.74, 40.126.32.72, 52.182.143.212
                    • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, otelrules.azureedge.net, slscr.update.microsoft.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                    • Execution Graph export aborted for target UiF5hKi5o7.exe, PID 6364 because there are no executed function
                    • Not all processes where analyzed, report is missing behavior information
                    • VT rate limit hit for: UiF5hKi5o7.exe
                    No simulations
                    No context
                    No context
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    C:\Users\user\AppData\Local\Temp\_MEI55162\VCRUNTIME140.dllX4KSeQkYJT.exeGet hashmaliciousUnknownBrowse
                      https://on-combine-data.s3.us-west-2.amazonaws.com/dealer-data/Share+Point/NTAS_MS3000X_Installer_v2.8.25_October2024_NO_UPS.exeGet hashmaliciousUnknownBrowse
                        main.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.FileRepMalware.22561.28030.exeGet hashmaliciousPython Stealer, Exela StealerBrowse
                            file.exeGet hashmaliciousUnknownBrowse
                              SolaraV4.exeGet hashmaliciousBlank GrabberBrowse
                                SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win64.Remsim.gen.13211.29605.exeGet hashmaliciousUnknownBrowse
                                  SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win64.Remsim.gen.13211.29605.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.BScope.Trojan.Wacatac.4653.13746.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.BScope.Trojan.Wacatac.4653.13746.exeGet hashmaliciousUnknownBrowse
                                        C:\Users\user\AppData\Local\Temp\_MEI55162\_bz2.pydX4KSeQkYJT.exeGet hashmaliciousUnknownBrowse
                                          file.exeGet hashmaliciousUnknownBrowse
                                            SecuriteInfo.com.MacOS.ReverseShell-C.28203.22681.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
                                              auto.exeGet hashmaliciousUnknownBrowse
                                                auto.exeGet hashmaliciousDiscord Token StealerBrowse
                                                  log.exeGet hashmaliciousUnknownBrowse
                                                    rcm.exeGet hashmaliciousUnknownBrowse
                                                      KuponcuBaba.exeGet hashmaliciousUnknownBrowse
                                                        qv81R5O5Cd.exeGet hashmaliciousBazaLoader, NjratBrowse
                                                          laZagne.exeGet hashmaliciousLaZagne, MimikatzBrowse
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):97168
                                                            Entropy (8bit):6.424686954579329
                                                            Encrypted:false
                                                            SSDEEP:1536:yKHLG4SsAzAvadZw+1Hcx8uIYNUzU6Ha4aecbK/zJZ0/b:yKrfZ+jPYNz6Ha4aecbK/FZK
                                                            MD5:A87575E7CF8967E481241F13940EE4F7
                                                            SHA1:879098B8A353A39E16C79E6479195D43CE98629E
                                                            SHA-256:DED5ADAA94341E6C62AEA03845762591666381DCA30EB7C17261DD154121B83E
                                                            SHA-512:E112F267AE4C9A592D0DD2A19B50187EB13E25F23DED74C2E6CCDE458BCDAEE99F4E3E0A00BAF0E3362167AE7B7FE4F96ECBCD265CC584C1C3A4D1AC316E92F0
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: X4KSeQkYJT.exe, Detection: malicious, Browse
                                                            • Filename: , Detection: malicious, Browse
                                                            • Filename: main.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.FileRepMalware.22561.28030.exe, Detection: malicious, Browse
                                                            • Filename: file.exe, Detection: malicious, Browse
                                                            • Filename: SolaraV4.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win64.Remsim.gen.13211.29605.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.not-a-virus.HEUR.RemoteAdmin.Win64.Remsim.gen.13211.29605.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.BScope.Trojan.Wacatac.4653.13746.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.BScope.Trojan.Wacatac.4653.13746.exe, Detection: malicious, Browse
                                                            Reputation:moderate, very likely benign file
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...Y.-a.........." .........`......p.....................................................`A.........................................B..4....J...............p..X....X...#..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):80784
                                                            Entropy (8bit):6.45456109441925
                                                            Encrypted:false
                                                            SSDEEP:1536:hwz7h8B7BjhJCZePYgl/5S8Gh2Nv0DFIGtVQ7Sygj:hwz18BrJCJglhlGINv0RIGtVQej
                                                            MD5:BCF0D58A4C415072DAE95DB0C5CC7DB3
                                                            SHA1:8CE298B7729C3771391A0DECD82AB4AE8028C057
                                                            SHA-256:D7FAF016EF85FDBB6636F74FC17AFC245530B1676EC56FC2CC756FE41CD7BF5A
                                                            SHA-512:C54D76E50F49249C4E80FC6CE03A5FDEC0A79D2FF0880C2FC57D43227A1388869E8F7C3F133EF8760441964DA0BF3FC23EF8D3C3E72CE1659D40E8912CB3E9BC
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Joe Sandbox View:
                                                            • Filename: X4KSeQkYJT.exe, Detection: malicious, Browse
                                                            • Filename: file.exe, Detection: malicious, Browse
                                                            • Filename: SecuriteInfo.com.MacOS.ReverseShell-C.28203.22681.exe, Detection: malicious, Browse
                                                            • Filename: auto.exe, Detection: malicious, Browse
                                                            • Filename: auto.exe, Detection: malicious, Browse
                                                            • Filename: log.exe, Detection: malicious, Browse
                                                            • Filename: rcm.exe, Detection: malicious, Browse
                                                            • Filename: KuponcuBaba.exe, Detection: malicious, Browse
                                                            • Filename: qv81R5O5Cd.exe, Detection: malicious, Browse
                                                            • Filename: laZagne.exe, Detection: malicious, Browse
                                                            Reputation:moderate, very likely benign file
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........>E.mE.mE.mL.=mO.m...lG.m#.SmF.m...lI.m...lM.m...lA.m...lF.m...lG.mE.m..m...lM.m...lD.m..QmD.m...lD.mRichE.m........PE..d....y.a.........." .........^...............................................P......S7....`.........................................@...H............0....... ..,............@......`...T...............................8............................................text...U........................... ..`.rdata...>.......@..................@..@.data...............................@....pdata..,.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):250768
                                                            Entropy (8bit):6.527857952800466
                                                            Encrypted:false
                                                            SSDEEP:6144:MJFPEV3nLF0eMMCtGzohEgCmUQjYK9qWMa3pLW1AtSrYB4BRWr8k:cPgXLF035tVZCRBQC06nWr8k
                                                            MD5:D976C5F77A6370CF6F28A5714BF49AE3
                                                            SHA1:79273EB123A68BA5CB91FF37EE0A82CEE880C2CC
                                                            SHA-256:FE2BCCB2E204A736ED86A8D16EFFEAFE83B30B44F809349E172142665DE8458A
                                                            SHA-512:57DF90F9FAF31F81F245A39A14C0784A3FACE4F76F00430DE8CFF2E86B55FA3269CD595119FD093E03709DEBF0888618917CAE5EA5E68F43A8E928861CAA01C5
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Reputation:moderate, very likely benign file
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t!=.0@S.0@S.0@S.98..>@S.b5R.2@S.b5V.<@S.b5W.8@S.b5P.4@S..5R.3@S..2R.2@S.0@R..@S..5P.1@S..5^.?@S..5S.1@S..5..1@S..5Q.1@S.Rich0@S.................PE..d....y.a.........." .....|...:......l...............................................-.....`..........................................T..P....T...................'..............<... ...T...............................8............................................text....{.......|.................. ..`.rdata..............................@..@.data....)...p...$...X..............@....pdata...'.......(...|..............@..@.rsrc...............................@..@.reloc..<...........................@..B................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):60304
                                                            Entropy (8bit):6.093275200649072
                                                            Encrypted:false
                                                            SSDEEP:768:JV/wp93dN0yIITgu/w521DxBjWO/Z1bbr1IG5ItYiSyvJhKy:GNdeyIaVww1TjWMr1IG5It7Syf
                                                            MD5:F63DA7F9A4E64148255E9D3885E7A008
                                                            SHA1:756DC192E7B2932DF147C48F05EC5E38E9AA06E6
                                                            SHA-256:FA0BB4BF93A6739CE5ADE6A7A69272BBC1227D09C7AFC1C027D6CEA41141BCC6
                                                            SHA-512:23D06DEF20C3668613392A02832777B27AD5353E1DC246316043B606890445D195A1066FCA65300A5D429319AA2AE2505F9FA3A5AB0F97ABA2717B64AAA07E8D
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Reputation:moderate, very likely benign file
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......bGq.&&..&&..&&../^.."&..tS..$&..tS..-&..tS...&..tS..%&..S..$&...T..$&...Q..%&..&&..&..S..'&..S..'&..S..'&..S..'&..Rich&&..........................PE..d....y.a.........." .....P...~.......<...................................................`.............................................P......................................T....k..T............................k..8............`...............................text....N.......P.................. ..`.rdata...O...`...P...T..............@..@.data...H...........................@....pdata..............................@..@.rsrc...............................@..@.reloc..T...........................@..B........................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):154000
                                                            Entropy (8bit):6.8078458773005055
                                                            Encrypted:false
                                                            SSDEEP:3072:GD6xBrqs+vs0H0q8bnpbVZbXsAIPznfo9mNoK5vSpxpRIGe1y2:GD63rcRLCV+7wYOK50P2
                                                            MD5:BA3797D77B4B1F3B089A73C39277B343
                                                            SHA1:364A052731CFE40994C6FEF4C51519F7546CD0B1
                                                            SHA-256:F904B02720B6498634FC045E3CC2A21C04505C6BE81626FE99BDB7C12CC26DC6
                                                            SHA-512:5688AE25405AE8C5491898C678402C7A62EC966A8EC77891D9FD397805A5CFCF02D7AE8E2AA27377D65E6CE05B34A7FFDEDF3942A091741AF0D5BCE41628BF7D
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Reputation:moderate, very likely benign file
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........l............................................Z......3.............Z......Z......Z......Z......Rich............PE..d....y.a.........." .....^...........2....................................................`.............................................L...,...x....`.......@.......:.......p..D...H{..T............................{..8............p...............................text....].......^.................. ..`.rdata.......p.......b..............@..@.data........0......................@....pdata.......@......................@..@.rsrc........`......................@..@.reloc..D....p.......8..............@..B................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):75152
                                                            Entropy (8bit):6.147254943521508
                                                            Encrypted:false
                                                            SSDEEP:1536:z1XB7kEDATyhAZ9/s+S+pxyXc/+lf7PdIGQwP7Syr:ZXB4EDXhAZ9/sT+px8c/Sz1IGQwP9
                                                            MD5:79C2FF05157EF4BA0A940D1C427C404E
                                                            SHA1:17DA75D598DEAA480CDD43E282398E860763297B
                                                            SHA-256:F3E0E2F3E70AB142E7CE1A4D551C5623A3317FB398D359E3BD8E26D21847F707
                                                            SHA-512:F91FC9C65818E74DDC08BBE1CCEA49F5F60D6979BC27E1CDB2EF40C2C8A957BD3BE7AEA5036394ABAB52D51895290D245FD5C9F84CC3CC554597AE6F85C149E1
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........w...............nk......c.......c.......c.......c......xc..........t....d......xc......xc......xc......xc......Rich....................PE..d....y.a.........." .....l.......... &.......................................P......v7....`.............................................P............0....... ..<............@..........T..............................8............................................text...Fj.......l.................. ..`.rdata..Ts.......t...p..............@..@.data...............................@....pdata..<.... ......................@..@.rsrc........0......................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                            Category:dropped
                                                            Size (bytes):879571
                                                            Entropy (8bit):5.683502245340345
                                                            Encrypted:false
                                                            SSDEEP:12288:8VghgApCWymC6Shc1tBA4a2YcsduVwOsfJEw4W0SaMNc:8VghoVmrLa2PLVwOsfJEw4vMNc
                                                            MD5:1C7BFA4919E119BA94287BEBF03555B7
                                                            SHA1:815C8ADB9115A2F97E31502C149BE857DE74F27D
                                                            SHA-256:23980D83F8AF04F1E5AF8BB3F82E71E76D5730622B39831847BA5E725256B8B0
                                                            SHA-512:A5B7690E9201D8F5B2062AC2C5F967777FAB34D7156B0AEEE34A9701F6814759277BDC2F1890DE67CA1B3C16EA689D7A64924C5A7F3BDB3D8712126BFF116408
                                                            Malicious:false
                                                            Preview:PK..........!.0.~E............_collections_abc.pyco....................................@.......d.Z.d.d.l.m.Z.m.Z...d.d.l.Z.e.e.e.....Z.e.d...Z.d.d...Z.e.e...Z.[.g.d...Z.d.Z.e.e.d.....Z.e.e.e.......Z.e.e.i.........Z.e.e.i.........Z.e.e.i.........Z.e.e.g.....Z.e.e.e.g.......Z.e.e.e.d.......Z.e.e.e.d.d.>.......Z.e.e.e.......Z.e.e.d.....Z e.e.d.....Z!e.e.e"......Z#e.i.......Z$e.i.......Z%e.i.......Z&e.e.j'..Z(e.d.d.......Z)d.d...Z*e*..Z*e.e*..Z+e*.,....[*d.d...Z-e-..Z-e.e-..Z.[-d.d...Z/G.d.d...d.e.d...Z0G.d.d...d.e.d...Z1G.d.d...d.e1..Z2e2.3e+....G.d.d...d.e.d...Z4G.d.d ..d e4..Z5G.d!d"..d"e5..Z6e6.3e.....G.d#d$..d$e.d...Z7G.d%d&..d&e7..Z8e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e.....e8.3e ....e8.3e!....e8.3e#....G.d'd(..d(e7..Z9G.d)d*..d*e8..Z:e:.3e)....G.d+d,..d,e.d...Z;G.d-d...d.e.d...Z<G.d/d0..d0e;e7e<..Z=G.d1d2..d2e...Z>d3d4..Z?d5d6..Z@d7d8..ZAG.d9d:..d:e.d...ZBG.d;d<..d<e=..ZCeC.3eD....G.d=d>..d>eC..ZEeE.3e.....G.d?d@..d@e=..ZFeF
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):3438840
                                                            Entropy (8bit):6.094542623790425
                                                            Encrypted:false
                                                            SSDEEP:49152:DTKuk2HvIU6iwpOjPWBdwQN+5X2uyWsrV4+OGyu1BYGx6KCIrA9NPe0Cs5Z1CPwE:Pg+Hb5Wt+2BoBIcU0CsD1CPwDv3uFfJZ
                                                            MD5:63C756D74C729D6D24DA2B8EF596A391
                                                            SHA1:7610BB1CBF7A7FDB2246BE55D8601AF5F1E28A00
                                                            SHA-256:17D0F4C13C213D261427EE186545B13EF0C67A99FE7AD12CD4D7C9EC83034AC8
                                                            SHA-512:D9CF045BB1B6379DD44F49405CB34ACF8570AED88B684D0AB83AF571D43A0D8DF46D43460D3229098BD767DD6E0EF1D8D48BC90B9040A43B5469CEF7177416A2
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................0.........................3........^....^.....^....^.\...^....Rich............................PE..d....A.a.........." ......$...................................................5.......4...`..........................................h/..h...:4.@....p4.|....`2.h....\4.......4..O..,.,.8...........................p.,.8............04..............................text.....$.......$................. ..`.rdata........$.......$.............@..@.data...!z....1..,....1.............@....pdata..8....`2.......1.............@..@.idata..^#...04..$....3.............@..@.00cfg..c....`4.......3.............@..@.rsrc...|....p4.......3.............@..@.reloc...x....4..z....3.............@..B................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):4453776
                                                            Entropy (8bit):6.4554098557218
                                                            Encrypted:false
                                                            SSDEEP:49152:wplyWz2QcN6iPdzYjz0AMs9Kt2KnX0OCpFLoFnAcECdNCsugztL0DD9fIysVHkDx:sximj29G5H+ywH+MWqlgdMW
                                                            MD5:C6C37B848273E2509A7B25ABE8BF2410
                                                            SHA1:B27CFBD31336DA1E9B1F90E8F649A27154411D03
                                                            SHA-256:B7A7F3707BEAB109B66DE3E340E3022DD83C3A18F444FEB9E982C29CF23C29B8
                                                            SHA-512:222AD791304963A4B8C1C6055E02C0C4C47FCE2BB404BD4F89C022FF9706E29CA6FA36C72350FBF296C8A0E3E48E3756F969C003DD1EB056CD026EFE0B7EBA40
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........U...4...4...4...A...4...[n..4...A...4...A...4...A...4...L...4..zF...4...4...5...A..i4...A...4...Al..4...A...4..Rich.4..................PE..d....y.a.........." .....j#..^!.....l.........................................E......ND...`...........................................<.....X.=.|....pD......PB.......C.......D..t....$.T...........................0.$.8.............#.(............................text...>h#......j#................. ..`.rdata...+....#..,...n#.............@..@.data.........=.......=.............@....pdata.......PB......DA.............@..@PyRuntim`....`D......RC.............@....rsrc........pD......VC.............@..@.reloc...t....D..v...`C.............@..B................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):26000
                                                            Entropy (8bit):6.339693503329678
                                                            Encrypted:false
                                                            SSDEEP:384:NUTqPjk/7e12hwheCPHqqYBsVRXPdIG7GxIYiSy1pCQFC67hEQ:iTgUC2hwh7HqbYVPdIG7GmYiSyvD7hF
                                                            MD5:431464C4813ED60FBF15A8BF77B0E0CE
                                                            SHA1:9825F6A8898E38C7A7DDC6F0D4B017449FB54794
                                                            SHA-256:1F56DF23A36132F1E5BE4484582C73081516BEE67C25EF79BEEE01180C04C7F0
                                                            SHA-512:53175384699A7BB3B93467065992753B73D8F3A09E95E301A1A0386C6A1224FA9ED8FA42C99C1FFBCFA6377B6129E3DB96E23750E7F23B4130AF77D14AC504A0
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......... ...N...N...N......N...O...N...K...N...J...N...M...N.t.O...N...O...N...O...N.t.C...N.t.N...N.t.....N.t.L...N.Rich..N.................PE..d....y.a.........." .........0............................................................`.........................................`@..L....@..x....p.......`.......F..........H....2..T............................2..8............0...............................text............................... ..`.rdata.......0......................@..@.data........P.......4..............@....pdata.......`.......6..............@..@.rsrc........p.......:..............@..@.reloc..H............D..............@..B........................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):1118608
                                                            Entropy (8bit):5.375765997910847
                                                            Encrypted:false
                                                            SSDEEP:12288:ArlBMmuZ63NNQCb5Pfhnzr0ql8L8kdM7IRG5eeme6VZyrIBHdQLhfFE+uOVg:mlBuqZV0m81MMREtV6Vo4uYOVg
                                                            MD5:D1182BA27939104010B6313C466D49FF
                                                            SHA1:7870134F41BA5333294C927DBD77D3F740AC87E7
                                                            SHA-256:1AC171F51CC87F268617B4A635B2331D5991D987D32BB206DD4E38033449C052
                                                            SHA-512:EF26A2C8B0094792E10CEABBF4D11724A9368D96F888240581A15D7A551754C1484F6B2ED1B963A73B686495C7952D9CB940021028D4F230B0B47D0794607D0F
                                                            Malicious:false
                                                            Antivirus:
                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|.$z8OJ)8OJ)8OJ)17.)>OJ)j:K(:OJ)j:O(4OJ)j:N(0OJ)j:I(;OJ).:K(;OJ).=K(:OJ)8OK)iOJ).:G(9OJ).:J(9OJ).:.)9OJ).:H(9OJ)Rich8OJ)........................PE..d....y.a.........." .....B..........`*.......................................@......5.....`.............................................X...(........ .......................0......0L..T............................L..8............`..x............................text....A.......B.................. ..`.rdata......`.......F..............@..@.data...............................@....pdata..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................
                                                            File type:PE32+ executable (console) x86-64, for MS Windows
                                                            Entropy (8bit):7.984672345389008
                                                            TrID:
                                                            • Win64 Executable Console (202006/5) 77.37%
                                                            • InstallShield setup (43055/19) 16.49%
                                                            • Win64 Executable (generic) (12005/4) 4.60%
                                                            • Generic Win/DOS Executable (2004/3) 0.77%
                                                            • DOS Executable Generic (2002/1) 0.77%
                                                            File name:UiF5hKi5o7.exe
                                                            File size:5'462'278 bytes
                                                            MD5:e54e6d6f9a6e2abac7563407294cb9ee
                                                            SHA1:cb0853fd275bd4fc1354742fb2bb8b98095b39fa
                                                            SHA256:d14972c18f26fd101df4502b6d1da4c36ea30679ae0e9bd12d6148e99f3c5652
                                                            SHA512:8f2c911ae0cf1aca5220ae7a17b954f37018f4ee45099179bbe520103893404251ac341247f0cf162986d17a065d4c59beaf68fd966c9a37badaa7fe88a659ac
                                                            SSDEEP:98304:daB8yIFqR4awNNdtehF4423GjQ/ggIDyWbP6Hz08M7kOZJ7tzhVT:daBiFqRmvds44njQthsiHzy7kOZJ7tzh
                                                            TLSH:21463341B39008F9E83B527E8452C525D6B67C615366C28B07F8C7B73F536E2AE7EA40
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........o4N..Z...Z...Z..vY...Z..v_.y.Z..v^...Z.|r....Z.|r_...Z.|r^...Z.|rY...Z..v[...Z...[...Z..s^...Z..sX...Z.Rich..Z................
                                                            Icon Hash:2e1e7c4c4c61e979
                                                            Entrypoint:0x14000b750
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x140000000
                                                            Subsystem:windows cui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x651F2180 [Thu Oct 5 20:50:08 2023 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:2
                                                            File Version Major:5
                                                            File Version Minor:2
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:2
                                                            Import Hash:380d2cbec5e800eecb6612f15b9ac012
                                                            Instruction
                                                            dec eax
                                                            sub esp, 28h
                                                            call 00007F0BD8B189BCh
                                                            dec eax
                                                            add esp, 28h
                                                            jmp 00007F0BD8B185BFh
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            int3
                                                            dec eax
                                                            sub esp, 28h
                                                            call 00007F0BD8B18F04h
                                                            test eax, eax
                                                            je 00007F0BD8B18773h
                                                            dec eax
                                                            mov eax, dword ptr [00000030h]
                                                            dec eax
                                                            mov ecx, dword ptr [eax+08h]
                                                            jmp 00007F0BD8B18757h
                                                            dec eax
                                                            cmp ecx, eax
                                                            je 00007F0BD8B18766h
                                                            xor eax, eax
                                                            dec eax
                                                            cmpxchg dword ptr [00034D1Ch], ecx
                                                            jne 00007F0BD8B18740h
                                                            xor al, al
                                                            dec eax
                                                            add esp, 28h
                                                            ret
                                                            mov al, 01h
                                                            jmp 00007F0BD8B18749h
                                                            int3
                                                            int3
                                                            int3
                                                            inc eax
                                                            push ebx
                                                            dec eax
                                                            sub esp, 20h
                                                            movzx eax, byte ptr [00034D07h]
                                                            test ecx, ecx
                                                            mov ebx, 00000001h
                                                            cmove eax, ebx
                                                            mov byte ptr [00034CF7h], al
                                                            call 00007F0BD8B18D03h
                                                            call 00007F0BD8B19E32h
                                                            test al, al
                                                            jne 00007F0BD8B18756h
                                                            xor al, al
                                                            jmp 00007F0BD8B18766h
                                                            call 00007F0BD8B27AC1h
                                                            test al, al
                                                            jne 00007F0BD8B1875Bh
                                                            xor ecx, ecx
                                                            call 00007F0BD8B19E42h
                                                            jmp 00007F0BD8B1873Ch
                                                            mov al, bl
                                                            dec eax
                                                            add esp, 20h
                                                            pop ebx
                                                            ret
                                                            int3
                                                            int3
                                                            int3
                                                            inc eax
                                                            push ebx
                                                            dec eax
                                                            sub esp, 20h
                                                            cmp byte ptr [00034CBCh], 00000000h
                                                            mov ebx, ecx
                                                            jne 00007F0BD8B187B9h
                                                            cmp ecx, 01h
                                                            jnbe 00007F0BD8B187BCh
                                                            call 00007F0BD8B18E6Ah
                                                            test eax, eax
                                                            je 00007F0BD8B1877Ah
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3ccfc0x50.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000xef8c.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x420000x22ec.pdata
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x550000x758.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x3a2000x1c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3a0c00x140.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x378.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x29e000x29e004560a34980afcc6c96a0e1538e10dcd9False0.5518540111940299zlib compressed data6.498392514737246IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x2b0000x129220x12a002c78f2e40293d0591db0378f28624dd2False0.5167654152684564data5.840225867607813IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x3e0000x33380xe0038f62c5805a3d737d7c4520a894b61aeFalse0.1328125Matlab v4 mat-file (little endian) f\324\377\3772\242\337-\231+, text, rows 4294967295, columns 01.8272739996700293IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .pdata0x420000x22ec0x2400f4f2fe5d7c81c6dcaac1f618fb2ee585False0.4762369791666667data5.3405110610033875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            _RDATA0x450000x15c0x200171e51bf695b9b302bcee9e943d7cc0cFalse0.388671875data2.791276042982855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .rsrc0x460000xef8c0xf000dab73f09c5e5ae20da7ffd060277f4e9False0.8010091145833333data7.350140723239741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x550000x7580x80085a4012cedcf8819905028c517f9e06bFalse0.54638671875data5.23959939901847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_ICON0x462080xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.56636460554371
                                                            RT_ICON0x470b00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.7287906137184116
                                                            RT_ICON0x479580x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.7471098265895953
                                                            RT_ICON0x47ec00x909bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9971636186822983
                                                            RT_ICON0x50f5c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.38309128630705397
                                                            RT_ICON0x535040x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.4826454033771107
                                                            RT_ICON0x545ac0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.699468085106383
                                                            RT_GROUP_ICON0x54a140x68data0.7019230769230769
                                                            RT_MANIFEST0x54a7c0x50dXML 1.0 document, ASCII text0.4694508894044857
                                                            DLLImport
                                                            USER32.dllGetWindowThreadProcessId, ShowWindow
                                                            KERNEL32.dllGetModuleFileNameW, CreateSymbolicLinkW, GetProcAddress, GetCommandLineW, GetEnvironmentVariableW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, CreateDirectoryW, GetTempPathW, WaitForSingleObject, Sleep, GetExitCodeProcess, CreateProcessW, SetDllDirectoryW, FreeLibrary, LoadLibraryExW, SetConsoleCtrlHandler, FindClose, FindFirstFileExW, CloseHandle, GetCurrentProcess, GetCurrentProcessId, LocalFree, FormatMessageW, MultiByteToWideChar, WideCharToMultiByte, GetConsoleWindow, GetTimeZoneInformation, GetLastError, HeapSize, WriteConsoleW, GetStartupInfoW, TlsSetValue, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, RtlUnwindEx, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, SetEndOfFile, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, CreateFileW, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetFullPathNameW, RemoveDirectoryW, FindNextFileW, SetStdHandle, DeleteFileW, ReadFile, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW, GetCurrentDirectoryW, FlushFileBuffers, HeapReAlloc, GetFileAttributesExW, GetStringTypeW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap
                                                            ADVAPI32.dllConvertSidToStringSidW, GetTokenInformation, OpenProcessToken, ConvertStringSecurityDescriptorToSecurityDescriptorW
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Nov 1, 2024 11:19:22.412256002 CET53511301.1.1.1192.168.2.5

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Target ID:1
                                                            Start time:06:19:23
                                                            Start date:01/11/2024
                                                            Path:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\Desktop\UiF5hKi5o7.exe"
                                                            Imagebase:0x7ff772610000
                                                            File size:5'462'278 bytes
                                                            MD5 hash:E54E6D6F9A6E2ABAC7563407294CB9EE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:06:19:23
                                                            Start date:01/11/2024
                                                            Path:C:\Windows\System32\conhost.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            Imagebase:0x7ff6d64d0000
                                                            File size:862'208 bytes
                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:high
                                                            Has exited:true

                                                            Target ID:4
                                                            Start time:06:19:23
                                                            Start date:01/11/2024
                                                            Path:C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                            Wow64 process (32bit):false
                                                            Commandline:"C:\Users\user\Desktop\UiF5hKi5o7.exe"
                                                            Imagebase:0x7ff772610000
                                                            File size:5'462'278 bytes
                                                            MD5 hash:E54E6D6F9A6E2ABAC7563407294CB9EE
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Reputation:low
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:11.3%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:15.4%
                                                              Total number of Nodes:2000
                                                              Total number of Limit Nodes:34
                                                              execution_graph 19774 7ff77262a510 19777 7ff77262a48c 19774->19777 19784 7ff772630e18 EnterCriticalSection 19777->19784 19143 7ff772628080 19144 7ff7726280e7 19143->19144 19145 7ff7726280ae 19143->19145 19144->19145 19147 7ff7726280ec FindFirstFileExW 19144->19147 19146 7ff772627bb8 _get_daylight 11 API calls 19145->19146 19148 7ff7726280b3 19146->19148 19149 7ff77262810e GetLastError 19147->19149 19150 7ff772628155 19147->19150 19151 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 19148->19151 19153 7ff772628119 19149->19153 19154 7ff772628145 19149->19154 19203 7ff7726282f0 19150->19203 19155 7ff7726280be 19151->19155 19153->19154 19159 7ff772628135 19153->19159 19160 7ff772628123 19153->19160 19156 7ff772627bb8 _get_daylight 11 API calls 19154->19156 19163 7ff77261b210 _wfindfirst32i64 8 API calls 19155->19163 19156->19155 19158 7ff7726282f0 _wfindfirst32i64 10 API calls 19164 7ff77262817b 19158->19164 19162 7ff772627bb8 _get_daylight 11 API calls 19159->19162 19160->19154 19161 7ff772628128 19160->19161 19165 7ff772627bb8 _get_daylight 11 API calls 19161->19165 19162->19155 19166 7ff7726280d2 19163->19166 19167 7ff7726282f0 _wfindfirst32i64 10 API calls 19164->19167 19165->19155 19168 7ff772628189 19167->19168 19169 7ff772630fb4 _wfindfirst32i64 37 API calls 19168->19169 19170 7ff7726281a7 19169->19170 19170->19155 19171 7ff7726281b3 19170->19171 19172 7ff77262b0f4 _wfindfirst32i64 17 API calls 19171->19172 19173 7ff7726281c7 19172->19173 19174 7ff7726281f1 19173->19174 19176 7ff772628230 FindNextFileW 19173->19176 19175 7ff772627bb8 _get_daylight 11 API calls 19174->19175 19177 7ff7726281f6 19175->19177 19178 7ff77262823f GetLastError 19176->19178 19179 7ff772628280 19176->19179 19180 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 19177->19180 19181 7ff77262824a 19178->19181 19182 7ff772628273 19178->19182 19183 7ff7726282f0 _wfindfirst32i64 10 API calls 19179->19183 19196 7ff772628201 19180->19196 19181->19182 19187 7ff772628266 19181->19187 19188 7ff772628254 19181->19188 19185 7ff772627bb8 _get_daylight 11 API calls 19182->19185 19184 7ff772628298 19183->19184 19186 7ff7726282f0 _wfindfirst32i64 10 API calls 19184->19186 19185->19196 19190 7ff7726282a6 19186->19190 19192 7ff772627bb8 _get_daylight 11 API calls 19187->19192 19188->19182 19191 7ff772628259 19188->19191 19189 7ff77261b210 _wfindfirst32i64 8 API calls 19193 7ff772628214 19189->19193 19194 7ff7726282f0 _wfindfirst32i64 10 API calls 19190->19194 19195 7ff772627bb8 _get_daylight 11 API calls 19191->19195 19192->19196 19197 7ff7726282b4 19194->19197 19195->19196 19196->19189 19198 7ff772630fb4 _wfindfirst32i64 37 API calls 19197->19198 19199 7ff7726282d2 19198->19199 19199->19196 19200 7ff7726282da 19199->19200 19201 7ff77262b0f4 _wfindfirst32i64 17 API calls 19200->19201 19202 7ff7726282ee 19201->19202 19204 7ff772628308 19203->19204 19205 7ff77262830e FileTimeToSystemTime 19203->19205 19204->19205 19207 7ff772628333 19204->19207 19206 7ff77262831d SystemTimeToTzSpecificLocalTime 19205->19206 19205->19207 19206->19207 19208 7ff77261b210 _wfindfirst32i64 8 API calls 19207->19208 19209 7ff77262816d 19208->19209 19209->19158 19797 7ff77263ad02 19798 7ff77263ad1b 19797->19798 19799 7ff77263ad11 19797->19799 19801 7ff772630e78 LeaveCriticalSection 19799->19801 19265 7ff772631e80 19276 7ff772637e14 19265->19276 19278 7ff772637e21 19276->19278 19277 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19277->19278 19278->19277 19279 7ff772637e3d 19278->19279 19280 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19279->19280 19281 7ff772631e89 19279->19281 19280->19279 19282 7ff772630e18 EnterCriticalSection 19281->19282 19805 7ff77263aae7 19806 7ff77263aaf7 19805->19806 19809 7ff772625448 LeaveCriticalSection 19806->19809 19283 7ff77263ac6d 19286 7ff772625448 LeaveCriticalSection 19283->19286 19833 7ff7726253e0 19834 7ff7726253eb 19833->19834 19842 7ff77262f9b4 19834->19842 19855 7ff772630e18 EnterCriticalSection 19842->19855 19856 7ff77261b4e0 19857 7ff77261b4f0 19856->19857 19873 7ff77262a368 19857->19873 19859 7ff77261b4fc 19879 7ff77261b7f8 19859->19879 19861 7ff77261b569 19862 7ff77261badc 7 API calls 19861->19862 19872 7ff77261b585 19861->19872 19864 7ff77261b595 19862->19864 19863 7ff77261b514 _RTC_Initialize 19863->19861 19884 7ff77261b9a8 19863->19884 19866 7ff77261b529 19887 7ff7726297d8 19866->19887 19874 7ff77262a379 19873->19874 19875 7ff772627bb8 _get_daylight 11 API calls 19874->19875 19878 7ff77262a381 19874->19878 19876 7ff77262a390 19875->19876 19877 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 19876->19877 19877->19878 19878->19859 19880 7ff77261b809 19879->19880 19883 7ff77261b80e __scrt_acquire_startup_lock 19879->19883 19881 7ff77261badc 7 API calls 19880->19881 19880->19883 19882 7ff77261b882 19881->19882 19883->19863 19912 7ff77261b96c 19884->19912 19886 7ff77261b9b1 19886->19866 19888 7ff77261b535 19887->19888 19889 7ff7726297f8 19887->19889 19888->19861 19911 7ff77261ba7c InitializeSListHead 19888->19911 19890 7ff772629800 19889->19890 19891 7ff772629816 GetModuleFileNameW 19889->19891 19892 7ff772627bb8 _get_daylight 11 API calls 19890->19892 19895 7ff772629841 19891->19895 19893 7ff772629805 19892->19893 19894 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 19893->19894 19894->19888 19896 7ff772629778 11 API calls 19895->19896 19897 7ff772629881 19896->19897 19898 7ff772629889 19897->19898 19901 7ff7726298a1 19897->19901 19899 7ff772627bb8 _get_daylight 11 API calls 19898->19899 19900 7ff77262988e 19899->19900 19903 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19900->19903 19902 7ff7726298c3 19901->19902 19905 7ff772629908 19901->19905 19906 7ff7726298ef 19901->19906 19904 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19902->19904 19903->19888 19904->19888 19909 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19905->19909 19907 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19906->19907 19908 7ff7726298f8 19907->19908 19910 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19908->19910 19909->19902 19910->19888 19913 7ff77261b986 19912->19913 19915 7ff77261b97f 19912->19915 19916 7ff77262a9ac 19913->19916 19915->19886 19919 7ff77262a5e8 19916->19919 19926 7ff772630e18 EnterCriticalSection 19919->19926 16342 7ff77261b5cc 16363 7ff77261b7ac 16342->16363 16345 7ff77261b5ed __scrt_acquire_startup_lock 16348 7ff77261b72d 16345->16348 16354 7ff77261b60b __scrt_release_startup_lock 16345->16354 16346 7ff77261b723 16485 7ff77261badc IsProcessorFeaturePresent 16346->16485 16349 7ff77261badc 7 API calls 16348->16349 16351 7ff77261b738 _CallSETranslator 16349->16351 16350 7ff77261b630 16352 7ff77261b6b6 16371 7ff772629f40 16352->16371 16354->16350 16354->16352 16474 7ff77262a2ec 16354->16474 16356 7ff77261b6bb 16377 7ff772611000 16356->16377 16360 7ff77261b6df 16360->16351 16481 7ff77261b940 16360->16481 16492 7ff77261bd7c 16363->16492 16366 7ff77261b7db 16494 7ff77262ab4c 16366->16494 16370 7ff77261b5e5 16370->16345 16370->16346 16372 7ff772629f50 16371->16372 16376 7ff772629f65 16371->16376 16372->16376 16537 7ff7726299d0 16372->16537 16376->16356 16378 7ff772611011 16377->16378 16593 7ff772617940 16378->16593 16380 7ff772611023 16600 7ff77262602c 16380->16600 16382 7ff772612ad0 16607 7ff772611e00 16382->16607 16385 7ff772612bc6 16387 7ff77261b210 _wfindfirst32i64 8 API calls 16385->16387 16388 7ff772612bda 16387->16388 16479 7ff77261bc30 GetModuleHandleW 16388->16479 16389 7ff772612aef 16389->16385 16623 7ff772616d90 16389->16623 16391 7ff772612b1c 16392 7ff772612b67 16391->16392 16394 7ff772616d90 92 API calls 16391->16394 16638 7ff772617270 16392->16638 16398 7ff772612b3c __std_exception_copy 16394->16398 16395 7ff772612b7c 16642 7ff772611c50 16395->16642 16398->16392 16401 7ff772617270 89 API calls 16398->16401 16399 7ff772611c50 121 API calls 16400 7ff772612baa 16399->16400 16402 7ff772612bae 16400->16402 16403 7ff772612bf5 16400->16403 16401->16392 16743 7ff772611f60 16402->16743 16404 7ff772612c6e 16403->16404 16749 7ff7726131a0 16403->16749 16408 7ff772612c98 16404->16408 16409 7ff772612c9f 16404->16409 16411 7ff772612cb7 16404->16411 16772 7ff772617ae0 GetConsoleWindow 16408->16772 16409->16411 16421 7ff772612cb2 16409->16421 16410 7ff772612ce0 16410->16385 16414 7ff772612d36 16410->16414 16668 7ff772617fe0 16410->16668 16411->16410 16661 7ff7726114f0 16411->16661 16412 7ff772612c13 16422 7ff772611f60 86 API calls 16412->16422 16682 7ff772616010 16414->16682 16419 7ff772612c41 16419->16404 16424 7ff772612c46 16419->16424 16420 7ff772612d13 16425 7ff772612d18 16420->16425 16426 7ff772612d29 SetDllDirectoryW 16420->16426 16777 7ff772617c30 GetConsoleWindow 16421->16777 16422->16385 16768 7ff77261f6bc 16424->16768 16430 7ff772611f60 86 API calls 16425->16430 16426->16414 16430->16385 16431 7ff772612d82 16434 7ff772612e7d 16431->16434 16438 7ff772612da1 16431->16438 16433 7ff772612d50 16433->16431 16791 7ff772615820 16433->16791 16686 7ff772612650 16434->16686 16447 7ff772612de5 16438->16447 16826 7ff772611e40 16438->16826 16440 7ff772612d84 16445 7ff772615a70 FreeLibrary 16440->16445 16444 7ff772612e48 16830 7ff7726125f0 16444->16830 16445->16431 16446 7ff772612eb5 16449 7ff772616d90 92 API calls 16446->16449 16447->16385 16447->16444 16453 7ff772612e29 16447->16453 16454 7ff772612e30 16447->16454 16461 7ff772612ec1 16449->16461 16450 7ff772612d73 16820 7ff772615e60 16450->16820 16456 7ff772617ae0 4 API calls 16453->16456 16454->16444 16458 7ff772612e43 16454->16458 16455 7ff772612e58 16460 7ff772615a70 FreeLibrary 16455->16460 16457 7ff772612e2e 16456->16457 16457->16444 16459 7ff772617c30 4 API calls 16458->16459 16459->16444 16460->16385 16461->16385 16462 7ff772612f0e 16461->16462 16466 7ff772612eef 16461->16466 16467 7ff772612ef6 16461->16467 16700 7ff7726172b0 16462->16700 16468 7ff772617ae0 4 API calls 16466->16468 16467->16462 16470 7ff772612f09 16467->16470 16469 7ff772612ef4 16468->16469 16469->16462 16471 7ff772617c30 4 API calls 16470->16471 16471->16462 16475 7ff77262a303 16474->16475 16476 7ff77262a324 16474->16476 16475->16352 19083 7ff77262ab98 16476->19083 16480 7ff77261bc41 16479->16480 16480->16360 16483 7ff77261b951 16481->16483 16482 7ff77261b6f6 16482->16350 16483->16482 16484 7ff77261ced8 __scrt_initialize_crt 7 API calls 16483->16484 16484->16482 16486 7ff77261bb02 _wfindfirst32i64 memcpy_s 16485->16486 16487 7ff77261bb21 RtlCaptureContext RtlLookupFunctionEntry 16486->16487 16488 7ff77261bb4a RtlVirtualUnwind 16487->16488 16489 7ff77261bb86 memcpy_s 16487->16489 16488->16489 16490 7ff77261bbb8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16489->16490 16491 7ff77261bc0a _wfindfirst32i64 16490->16491 16491->16348 16493 7ff77261b7ce __scrt_dllmain_crt_thread_attach 16492->16493 16493->16366 16493->16370 16495 7ff772633c7c 16494->16495 16496 7ff77261b7e0 16495->16496 16504 7ff77262cd10 16495->16504 16496->16370 16498 7ff77261ced8 16496->16498 16499 7ff77261ceea 16498->16499 16500 7ff77261cee0 16498->16500 16499->16370 16516 7ff77261d254 16500->16516 16515 7ff772630e18 EnterCriticalSection 16504->16515 16517 7ff77261cee5 16516->16517 16518 7ff77261d263 16516->16518 16520 7ff77261d2c0 16517->16520 16524 7ff77261d490 16518->16524 16521 7ff77261d2eb 16520->16521 16522 7ff77261d2ce DeleteCriticalSection 16521->16522 16523 7ff77261d2ef 16521->16523 16522->16521 16523->16499 16528 7ff77261d2f8 16524->16528 16529 7ff77261d412 TlsFree 16528->16529 16530 7ff77261d33c __vcrt_FlsAlloc 16528->16530 16530->16529 16531 7ff77261d36a LoadLibraryExW 16530->16531 16532 7ff77261d401 GetProcAddress 16530->16532 16536 7ff77261d3ad LoadLibraryExW 16530->16536 16533 7ff77261d38b GetLastError 16531->16533 16534 7ff77261d3e1 16531->16534 16532->16529 16533->16530 16534->16532 16535 7ff77261d3f8 FreeLibrary 16534->16535 16535->16532 16536->16530 16536->16534 16538 7ff7726299e9 16537->16538 16539 7ff7726299e5 16537->16539 16558 7ff77263320c GetEnvironmentStringsW 16538->16558 16539->16376 16550 7ff772629d90 16539->16550 16542 7ff772629a02 16565 7ff772629b50 16542->16565 16543 7ff7726299f6 16544 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16543->16544 16544->16539 16547 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16548 7ff772629a29 16547->16548 16549 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16548->16549 16549->16539 16551 7ff772629db3 16550->16551 16556 7ff772629dca 16550->16556 16551->16376 16552 7ff77262f3a0 _get_daylight 11 API calls 16552->16556 16553 7ff772629e3e 16555 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16553->16555 16554 7ff77262fd60 MultiByteToWideChar _fread_nolock 16554->16556 16555->16551 16556->16551 16556->16552 16556->16553 16556->16554 16557 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16556->16557 16557->16556 16559 7ff772633230 16558->16559 16560 7ff7726299ee 16558->16560 16561 7ff77262ddec _fread_nolock 12 API calls 16559->16561 16560->16542 16560->16543 16562 7ff772633267 memcpy_s 16561->16562 16563 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16562->16563 16564 7ff772633287 FreeEnvironmentStringsW 16563->16564 16564->16560 16566 7ff772629b78 16565->16566 16567 7ff77262f3a0 _get_daylight 11 API calls 16566->16567 16578 7ff772629bb3 16567->16578 16568 7ff772629bbb 16569 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16568->16569 16570 7ff772629a0a 16569->16570 16570->16547 16571 7ff772629c35 16572 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16571->16572 16572->16570 16573 7ff77262f3a0 _get_daylight 11 API calls 16573->16578 16574 7ff772629c24 16575 7ff772629c6c 11 API calls 16574->16575 16577 7ff772629c2c 16575->16577 16579 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16577->16579 16578->16568 16578->16571 16578->16573 16578->16574 16580 7ff772629c58 16578->16580 16582 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16578->16582 16584 7ff772630fb4 16578->16584 16579->16568 16581 7ff77262b0f4 _wfindfirst32i64 17 API calls 16580->16581 16583 7ff772629c6a 16581->16583 16582->16578 16585 7ff772630fcb 16584->16585 16586 7ff772630fc1 16584->16586 16587 7ff772627bb8 _get_daylight 11 API calls 16585->16587 16586->16585 16590 7ff772630fe7 16586->16590 16592 7ff772630fd3 16587->16592 16588 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 16589 7ff772630fdf 16588->16589 16589->16578 16590->16589 16591 7ff772627bb8 _get_daylight 11 API calls 16590->16591 16591->16592 16592->16588 16595 7ff77261795f 16593->16595 16594 7ff7726179b0 WideCharToMultiByte 16594->16595 16597 7ff772617a58 16594->16597 16595->16594 16595->16597 16598 7ff772617a06 WideCharToMultiByte 16595->16598 16599 7ff772617967 __std_exception_copy 16595->16599 16857 7ff772611fc0 16597->16857 16598->16595 16598->16597 16599->16380 16602 7ff7726301b0 16600->16602 16601 7ff772630203 16603 7ff77262b008 _invalid_parameter_noinfo 37 API calls 16601->16603 16602->16601 16604 7ff772630256 16602->16604 16606 7ff77263022c 16603->16606 17157 7ff772630088 16604->17157 16606->16382 16608 7ff772611e15 16607->16608 16609 7ff772611e30 16608->16609 17165 7ff772611f20 16608->17165 16609->16385 16611 7ff772613090 16609->16611 17188 7ff77261b1b0 16611->17188 16614 7ff7726130cb 16616 7ff772611fc0 86 API calls 16614->16616 16615 7ff7726130e2 17190 7ff7726180f0 16615->17190 16618 7ff7726130de 16616->16618 16621 7ff77261b210 _wfindfirst32i64 8 API calls 16618->16621 16620 7ff772611f60 86 API calls 16620->16618 16622 7ff77261311f 16621->16622 16622->16389 16624 7ff772616d9a 16623->16624 16625 7ff772617fe0 88 API calls 16624->16625 16626 7ff772616dbc GetEnvironmentVariableW 16625->16626 16627 7ff772616dd4 ExpandEnvironmentStringsW 16626->16627 16628 7ff772616e26 16626->16628 16630 7ff7726180f0 88 API calls 16627->16630 16629 7ff77261b210 _wfindfirst32i64 8 API calls 16628->16629 16631 7ff772616e38 16629->16631 16632 7ff772616dfc 16630->16632 16631->16391 16632->16628 16633 7ff772616e06 16632->16633 17201 7ff77262abcc 16633->17201 16636 7ff77261b210 _wfindfirst32i64 8 API calls 16637 7ff772616e1e 16636->16637 16637->16391 16639 7ff772617fe0 88 API calls 16638->16639 16640 7ff772617287 SetEnvironmentVariableW 16639->16640 16641 7ff77261729f __std_exception_copy 16640->16641 16641->16395 16643 7ff772611c5e 16642->16643 16644 7ff772611e40 49 API calls 16643->16644 16645 7ff772611c94 16644->16645 16646 7ff772611e40 49 API calls 16645->16646 16656 7ff772611d2f 16645->16656 16647 7ff772611cba 16646->16647 16647->16656 17208 7ff772611a40 16647->17208 16648 7ff77261b210 _wfindfirst32i64 8 API calls 16649 7ff772611d49 16648->16649 16649->16399 16649->16404 16653 7ff772611d23 16654 7ff772611f60 86 API calls 16653->16654 16654->16656 16655 7ff772611ced 16655->16653 16657 7ff772611d67 16655->16657 16656->16648 16658 7ff772613010 49 API calls 16657->16658 16659 7ff772611d74 16658->16659 17244 7ff772613220 16659->17244 16662 7ff772611506 16661->16662 16665 7ff77261157f 16661->16665 17286 7ff772616b80 16662->17286 16665->16410 16666 7ff772611f60 86 API calls 16667 7ff772611564 16666->16667 16667->16410 16669 7ff772618087 MultiByteToWideChar 16668->16669 16670 7ff772618001 MultiByteToWideChar 16668->16670 16673 7ff7726180aa 16669->16673 16674 7ff7726180cf 16669->16674 16671 7ff772618027 16670->16671 16672 7ff77261804c 16670->16672 16675 7ff772611fc0 86 API calls 16671->16675 16672->16669 16679 7ff772618062 16672->16679 16676 7ff772611fc0 86 API calls 16673->16676 16674->16420 16677 7ff77261803a 16675->16677 16678 7ff7726180bd 16676->16678 16677->16420 16678->16420 16680 7ff772611fc0 86 API calls 16679->16680 16681 7ff772618075 16680->16681 16681->16420 16683 7ff772616025 16682->16683 16684 7ff772612d3b 16683->16684 16685 7ff772611f20 86 API calls 16683->16685 16684->16431 16782 7ff772615cc0 16684->16782 16685->16684 16690 7ff7726126c3 16686->16690 16692 7ff772612704 16686->16692 16687 7ff77261b210 _wfindfirst32i64 8 API calls 16688 7ff772612755 16687->16688 16688->16385 16693 7ff772617200 16688->16693 16690->16692 17812 7ff772611710 16690->17812 17854 7ff7726120d0 16690->17854 16692->16687 16694 7ff772617fe0 88 API calls 16693->16694 16695 7ff77261721f 16694->16695 16696 7ff772617fe0 88 API calls 16695->16696 16697 7ff77261722f 16696->16697 16698 7ff772628020 38 API calls 16697->16698 16699 7ff77261723d __std_exception_copy 16698->16699 16699->16446 16701 7ff7726172c0 16700->16701 16702 7ff772617fe0 88 API calls 16701->16702 16703 7ff7726172f1 SetConsoleCtrlHandler GetStartupInfoW 16702->16703 16704 7ff772617352 16703->16704 18264 7ff77262ac44 16704->18264 16744 7ff772611f7e 16743->16744 16745 7ff772611ea0 78 API calls 16744->16745 16746 7ff772611f9c 16745->16746 16747 7ff772612010 86 API calls 16746->16747 16748 7ff772611fab 16747->16748 16748->16385 16750 7ff7726131ac 16749->16750 16751 7ff772617fe0 88 API calls 16750->16751 16752 7ff7726131d7 16751->16752 16753 7ff772617fe0 88 API calls 16752->16753 16754 7ff7726131ea 16753->16754 18320 7ff772626668 16754->18320 16757 7ff77261b210 _wfindfirst32i64 8 API calls 16758 7ff772612c0b 16757->16758 16758->16412 16759 7ff7726174e0 16758->16759 16760 7ff772617504 16759->16760 16761 7ff77261fd44 73 API calls 16760->16761 16766 7ff7726175db __std_exception_copy 16760->16766 16762 7ff77261751e 16761->16762 16762->16766 18699 7ff7726292a4 16762->18699 16764 7ff77261fd44 73 API calls 16767 7ff772617533 16764->16767 16766->16419 16767->16764 16767->16766 16769 7ff77261f6ec 16768->16769 18714 7ff77261f498 16769->18714 16771 7ff77261f705 16771->16412 16773 7ff772612c9d 16772->16773 16774 7ff772617af4 GetCurrentProcessId GetWindowThreadProcessId 16772->16774 16773->16411 16774->16773 16775 7ff772617b13 16774->16775 16775->16773 16776 7ff772617b19 ShowWindow 16775->16776 16776->16773 16778 7ff772617c44 GetCurrentProcessId GetWindowThreadProcessId 16777->16778 16779 7ff772617c77 16777->16779 16778->16779 16780 7ff772617c63 16778->16780 16779->16411 16780->16779 16781 7ff772617c69 ShowWindow 16780->16781 16781->16779 16783 7ff772615cfa 16782->16783 16784 7ff772615ce3 16782->16784 16783->16433 16784->16783 18725 7ff7726115a0 16784->18725 16786 7ff772615d04 16786->16783 16787 7ff772613220 49 API calls 16786->16787 16788 7ff772615d65 16787->16788 16789 7ff772611f60 86 API calls 16788->16789 16790 7ff772615dd5 __std_exception_copy memcpy_s 16788->16790 16789->16783 16790->16433 16796 7ff77261583a memcpy_s 16791->16796 16792 7ff77261595f 16794 7ff772613220 49 API calls 16792->16794 16793 7ff77261597b 16795 7ff772611f60 86 API calls 16793->16795 16797 7ff7726159d8 16794->16797 16799 7ff772615971 __std_exception_copy 16795->16799 16796->16792 16796->16793 16796->16796 16798 7ff772613220 49 API calls 16796->16798 16800 7ff772615940 16796->16800 16807 7ff772611710 140 API calls 16796->16807 16808 7ff772615961 16796->16808 16801 7ff772613220 49 API calls 16797->16801 16798->16796 16804 7ff77261b210 _wfindfirst32i64 8 API calls 16799->16804 16800->16792 16802 7ff772613220 49 API calls 16800->16802 16803 7ff772615a08 16801->16803 16802->16792 16806 7ff772613220 49 API calls 16803->16806 16805 7ff772612d61 16804->16805 16805->16440 16810 7ff7726157a0 16805->16810 16806->16799 16807->16796 16809 7ff772611f60 86 API calls 16808->16809 16809->16799 18749 7ff772617490 16810->18749 16812 7ff7726157bc 16813 7ff772617490 89 API calls 16812->16813 16814 7ff7726157cf 16813->16814 16815 7ff772615805 16814->16815 16816 7ff7726157e7 16814->16816 16817 7ff772611f60 86 API calls 16815->16817 18753 7ff772616120 GetProcAddress 16816->18753 16818 7ff772612d6f 16817->16818 16818->16440 16818->16450 16827 7ff772611e65 16826->16827 16828 7ff772624d30 49 API calls 16827->16828 16829 7ff772611e88 16828->16829 16829->16447 18812 7ff772614df0 16830->18812 16833 7ff77261263d 16833->16455 16835 7ff772612614 16835->16833 16864 7ff772612010 16857->16864 16865 7ff772612020 16864->16865 16889 7ff772624d30 16865->16889 16869 7ff772612080 16922 7ff772611ea0 16869->16922 16872 7ff77261b210 _wfindfirst32i64 8 API calls 16873 7ff772611fe7 GetLastError 16872->16873 16874 7ff7726177f0 16873->16874 16875 7ff7726177fc 16874->16875 16876 7ff772617817 GetLastError 16875->16876 16877 7ff77261781d FormatMessageW 16875->16877 16876->16877 16878 7ff77261786c WideCharToMultiByte 16877->16878 16879 7ff772617850 16877->16879 16881 7ff772617863 16878->16881 16882 7ff7726178a6 16878->16882 16880 7ff772611fc0 83 API calls 16879->16880 16880->16881 16884 7ff77261b210 _wfindfirst32i64 8 API calls 16881->16884 16883 7ff772611fc0 83 API calls 16882->16883 16883->16881 16885 7ff772611ff4 16884->16885 16886 7ff772611ef0 16885->16886 16887 7ff772612010 86 API calls 16886->16887 16888 7ff772611f12 16887->16888 16888->16599 16891 7ff772624d8a 16889->16891 16890 7ff772624daf 16892 7ff77262b008 _invalid_parameter_noinfo 37 API calls 16890->16892 16891->16890 16893 7ff772624deb 16891->16893 16895 7ff772624dd9 16892->16895 16926 7ff772622774 16893->16926 16897 7ff77261b210 _wfindfirst32i64 8 API calls 16895->16897 16896 7ff772624ec8 16898 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16896->16898 16899 7ff772612068 16897->16899 16898->16895 16907 7ff772617e20 MultiByteToWideChar 16899->16907 16901 7ff772624eec 16901->16896 16903 7ff772624ef6 16901->16903 16902 7ff772624e9d 16904 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16902->16904 16906 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16903->16906 16904->16895 16905 7ff772624e94 16905->16896 16905->16902 16906->16895 16908 7ff772617e69 16907->16908 16909 7ff772617e83 16907->16909 16910 7ff772611fc0 82 API calls 16908->16910 16911 7ff772617e99 16909->16911 16912 7ff772617eb3 MultiByteToWideChar 16909->16912 16921 7ff772617e7c __std_exception_copy 16910->16921 16915 7ff772611fc0 82 API calls 16911->16915 16913 7ff772617ef0 WideCharToMultiByte 16912->16913 16914 7ff772617ed6 16912->16914 16917 7ff772617f26 16913->16917 16919 7ff772617f1d 16913->16919 16916 7ff772611fc0 82 API calls 16914->16916 16915->16921 16916->16921 16918 7ff772617f4b WideCharToMultiByte 16917->16918 16917->16919 16918->16919 16918->16921 16920 7ff772611fc0 82 API calls 16919->16920 16920->16921 16921->16869 16923 7ff772611ec6 16922->16923 17142 7ff772624c0c 16923->17142 16925 7ff772611edc 16925->16872 16927 7ff7726227b2 16926->16927 16928 7ff7726227a2 16926->16928 16929 7ff7726227e9 16927->16929 16930 7ff7726227bb 16927->16930 16931 7ff77262b008 _invalid_parameter_noinfo 37 API calls 16928->16931 16929->16928 16933 7ff7726227e1 16929->16933 16936 7ff772622a98 16929->16936 16940 7ff7726236c4 16929->16940 16966 7ff772622f54 16929->16966 16996 7ff7726222bc 16929->16996 16999 7ff7726248e0 16929->16999 16932 7ff77262b008 _invalid_parameter_noinfo 37 API calls 16930->16932 16931->16933 16932->16933 16933->16896 16933->16901 16933->16902 16933->16905 16938 7ff77262b008 _invalid_parameter_noinfo 37 API calls 16936->16938 16938->16928 16941 7ff772623779 16940->16941 16942 7ff772623706 16940->16942 16945 7ff77262377e 16941->16945 16946 7ff7726237d3 16941->16946 16943 7ff77262370c 16942->16943 16944 7ff7726237a3 16942->16944 16952 7ff772623711 16943->16952 16955 7ff7726237e2 16943->16955 17023 7ff772621200 16944->17023 16947 7ff772623780 16945->16947 16948 7ff7726237b3 16945->16948 16946->16944 16946->16955 16964 7ff77262373c 16946->16964 16950 7ff772623721 16947->16950 16954 7ff77262378f 16947->16954 17030 7ff772620df0 16948->17030 16965 7ff772623811 16950->16965 17005 7ff772624028 16950->17005 16952->16950 16956 7ff772623754 16952->16956 16952->16964 16954->16944 16958 7ff772623794 16954->16958 16955->16965 17037 7ff772621610 16955->17037 16956->16965 17015 7ff7726244e4 16956->17015 16958->16965 17019 7ff77262467c 16958->17019 16960 7ff77261b210 _wfindfirst32i64 8 API calls 16962 7ff772623aa7 16960->16962 16962->16929 16964->16965 17044 7ff77262f048 16964->17044 16965->16960 16967 7ff772622f5f 16966->16967 16968 7ff772622f75 16966->16968 16969 7ff772622fb3 16967->16969 16970 7ff772623779 16967->16970 16971 7ff772623706 16967->16971 16968->16969 16972 7ff77262b008 _invalid_parameter_noinfo 37 API calls 16968->16972 16969->16929 16975 7ff77262377e 16970->16975 16976 7ff7726237d3 16970->16976 16973 7ff77262370c 16971->16973 16974 7ff7726237a3 16971->16974 16972->16969 16981 7ff772623711 16973->16981 16983 7ff7726237e2 16973->16983 16979 7ff772621200 38 API calls 16974->16979 16977 7ff772623780 16975->16977 16978 7ff7726237b3 16975->16978 16976->16974 16976->16983 16995 7ff77262373c 16976->16995 16986 7ff77262378f 16977->16986 16987 7ff772623721 16977->16987 16982 7ff772620df0 38 API calls 16978->16982 16979->16995 16980 7ff772624028 47 API calls 16980->16995 16984 7ff772623754 16981->16984 16981->16987 16981->16995 16982->16995 16985 7ff772621610 38 API calls 16983->16985 16994 7ff772623811 16983->16994 16988 7ff7726244e4 47 API calls 16984->16988 16984->16994 16985->16995 16986->16974 16989 7ff772623794 16986->16989 16987->16980 16987->16994 16988->16995 16991 7ff77262467c 37 API calls 16989->16991 16989->16994 16990 7ff77261b210 _wfindfirst32i64 8 API calls 16992 7ff772623aa7 16990->16992 16991->16995 16992->16929 16993 7ff77262f048 47 API calls 16993->16995 16994->16990 16995->16993 16995->16994 17117 7ff7726203c4 16996->17117 17000 7ff7726248f7 16999->17000 17134 7ff77262e1a8 17000->17134 17006 7ff77262404a 17005->17006 17054 7ff772620230 17006->17054 17010 7ff772624187 17013 7ff7726248e0 45 API calls 17010->17013 17014 7ff772624210 17010->17014 17012 7ff7726248e0 45 API calls 17012->17010 17013->17014 17014->16964 17016 7ff7726244fc 17015->17016 17018 7ff772624564 17015->17018 17017 7ff77262f048 47 API calls 17016->17017 17016->17018 17017->17018 17018->16964 17021 7ff77262469d 17019->17021 17020 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17022 7ff7726246ce 17020->17022 17021->17020 17021->17022 17022->16964 17024 7ff772621233 17023->17024 17025 7ff772621262 17024->17025 17027 7ff77262131f 17024->17027 17026 7ff772620230 12 API calls 17025->17026 17029 7ff77262129f 17025->17029 17026->17029 17028 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17027->17028 17028->17029 17029->16964 17031 7ff772620e23 17030->17031 17032 7ff772620e52 17031->17032 17034 7ff772620f0f 17031->17034 17033 7ff772620230 12 API calls 17032->17033 17036 7ff772620e8f 17032->17036 17033->17036 17035 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17034->17035 17035->17036 17036->16964 17038 7ff772621643 17037->17038 17039 7ff772621672 17038->17039 17041 7ff77262172f 17038->17041 17040 7ff772620230 12 API calls 17039->17040 17043 7ff7726216af 17039->17043 17040->17043 17042 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17041->17042 17042->17043 17043->16964 17045 7ff77262f070 17044->17045 17046 7ff77262f0b5 17045->17046 17047 7ff7726248e0 45 API calls 17045->17047 17050 7ff77262f075 memcpy_s 17045->17050 17053 7ff77262f09e memcpy_s 17045->17053 17049 7ff772630628 WideCharToMultiByte 17046->17049 17046->17050 17046->17053 17047->17046 17048 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17048->17050 17051 7ff77262f191 17049->17051 17050->16964 17051->17050 17052 7ff77262f1a6 GetLastError 17051->17052 17052->17050 17052->17053 17053->17048 17053->17050 17055 7ff772620267 17054->17055 17061 7ff772620256 17054->17061 17056 7ff77262ddec _fread_nolock 12 API calls 17055->17056 17055->17061 17057 7ff772620294 17056->17057 17058 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17057->17058 17060 7ff7726202a8 17057->17060 17058->17060 17059 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17059->17061 17060->17059 17062 7ff77262ed60 17061->17062 17063 7ff77262ed7d 17062->17063 17064 7ff77262edb0 17062->17064 17065 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17063->17065 17064->17063 17066 7ff77262ede2 17064->17066 17081 7ff772624165 17065->17081 17071 7ff77262eef5 17066->17071 17075 7ff77262ee2a 17066->17075 17067 7ff77262efe7 17108 7ff77262e24c 17067->17108 17069 7ff77262efad 17101 7ff77262e5e4 17069->17101 17071->17067 17071->17069 17072 7ff77262ef7c 17071->17072 17073 7ff77262ef3f 17071->17073 17076 7ff77262ef35 17071->17076 17094 7ff77262e8c4 17072->17094 17084 7ff77262eaf4 17073->17084 17079 7ff77262ac6c __std_exception_copy 37 API calls 17075->17079 17075->17081 17076->17069 17078 7ff77262ef3a 17076->17078 17078->17072 17078->17073 17080 7ff77262eee2 17079->17080 17080->17081 17082 7ff77262b0f4 _wfindfirst32i64 17 API calls 17080->17082 17081->17010 17081->17012 17083 7ff77262f044 17082->17083 17085 7ff77263487c 38 API calls 17084->17085 17086 7ff77262eb41 17085->17086 17087 7ff7726342c4 37 API calls 17086->17087 17090 7ff77262eb9c 17087->17090 17088 7ff77262eba0 17088->17081 17089 7ff77262ebf1 17092 7ff77262e6e0 45 API calls 17089->17092 17090->17088 17090->17089 17091 7ff77262ebbc 17090->17091 17093 7ff77262e99c 45 API calls 17091->17093 17092->17088 17093->17088 17095 7ff77263487c 38 API calls 17094->17095 17096 7ff77262e90e 17095->17096 17097 7ff7726342c4 37 API calls 17096->17097 17098 7ff77262e95e 17097->17098 17099 7ff77262e962 17098->17099 17100 7ff77262e99c 45 API calls 17098->17100 17099->17081 17100->17099 17102 7ff77263487c 38 API calls 17101->17102 17103 7ff77262e62f 17102->17103 17104 7ff7726342c4 37 API calls 17103->17104 17105 7ff77262e687 17104->17105 17106 7ff77262e68b 17105->17106 17107 7ff77262e6e0 45 API calls 17105->17107 17106->17081 17107->17106 17109 7ff77262e291 17108->17109 17110 7ff77262e2c4 17108->17110 17111 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17109->17111 17112 7ff77262e2dc 17110->17112 17114 7ff77262e35d 17110->17114 17116 7ff77262e2bd memcpy_s 17111->17116 17113 7ff77262e5e4 46 API calls 17112->17113 17113->17116 17115 7ff7726248e0 45 API calls 17114->17115 17114->17116 17115->17116 17116->17081 17118 7ff7726203f1 17117->17118 17119 7ff772620403 17117->17119 17120 7ff772627bb8 _get_daylight 11 API calls 17118->17120 17122 7ff772620410 17119->17122 17125 7ff77262044d 17119->17125 17121 7ff7726203f6 17120->17121 17123 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17121->17123 17124 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17122->17124 17131 7ff772620401 17123->17131 17124->17131 17127 7ff772627bb8 _get_daylight 11 API calls 17125->17127 17133 7ff7726204f6 17125->17133 17126 7ff772627bb8 _get_daylight 11 API calls 17128 7ff7726205a0 17126->17128 17129 7ff7726204eb 17127->17129 17130 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17128->17130 17132 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17129->17132 17130->17131 17131->16929 17132->17133 17133->17126 17133->17131 17135 7ff77262491f 17134->17135 17136 7ff77262e1c1 17134->17136 17138 7ff77262e214 17135->17138 17136->17135 17137 7ff772633ad4 45 API calls 17136->17137 17137->17135 17139 7ff77262e22d 17138->17139 17140 7ff77262492f 17138->17140 17139->17140 17141 7ff772632e20 45 API calls 17139->17141 17140->16929 17141->17140 17143 7ff772624c36 17142->17143 17144 7ff772624c6e 17143->17144 17146 7ff772624ca1 17143->17146 17145 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17144->17145 17148 7ff772624c97 17145->17148 17149 7ff7726201f0 17146->17149 17148->16925 17156 7ff77262543c EnterCriticalSection 17149->17156 17164 7ff77262543c EnterCriticalSection 17157->17164 17166 7ff772612010 86 API calls 17165->17166 17167 7ff772611f47 17166->17167 17170 7ff772625590 17167->17170 17171 7ff7726255bb 17170->17171 17174 7ff772625454 17171->17174 17187 7ff772628558 EnterCriticalSection 17174->17187 17189 7ff77261309c GetModuleFileNameW 17188->17189 17189->16614 17189->16615 17191 7ff772618182 WideCharToMultiByte 17190->17191 17192 7ff772618114 WideCharToMultiByte 17190->17192 17194 7ff7726181af 17191->17194 17198 7ff7726130f5 17191->17198 17193 7ff77261813e 17192->17193 17197 7ff772618155 17192->17197 17195 7ff772611fc0 86 API calls 17193->17195 17196 7ff772611fc0 86 API calls 17194->17196 17195->17198 17196->17198 17197->17191 17199 7ff77261816b 17197->17199 17198->16618 17198->16620 17200 7ff772611fc0 86 API calls 17199->17200 17200->17198 17202 7ff772616e0e 17201->17202 17203 7ff77262abe3 17201->17203 17202->16636 17203->17202 17204 7ff77262ac6c __std_exception_copy 37 API calls 17203->17204 17205 7ff77262ac10 17204->17205 17205->17202 17206 7ff77262b0f4 _wfindfirst32i64 17 API calls 17205->17206 17207 7ff77262ac40 17206->17207 17209 7ff7726131a0 120 API calls 17208->17209 17210 7ff772611a76 17209->17210 17211 7ff772611c24 17210->17211 17213 7ff7726174e0 83 API calls 17210->17213 17212 7ff77261b210 _wfindfirst32i64 8 API calls 17211->17212 17214 7ff772611c38 17212->17214 17215 7ff772611aae 17213->17215 17214->16656 17241 7ff772613010 17214->17241 17239 7ff772611adf 17215->17239 17247 7ff77261fd44 17215->17247 17217 7ff77261f6bc 74 API calls 17217->17211 17218 7ff772611ac8 17219 7ff772611acc 17218->17219 17220 7ff772611ae4 17218->17220 17221 7ff772611f20 86 API calls 17219->17221 17251 7ff77261fa0c 17220->17251 17221->17239 17224 7ff772611b17 17227 7ff77261fd44 73 API calls 17224->17227 17225 7ff772611aff 17226 7ff772611f20 86 API calls 17225->17226 17226->17239 17228 7ff772611b64 17227->17228 17229 7ff772611b8e 17228->17229 17230 7ff772611b76 17228->17230 17232 7ff77261fa0c _fread_nolock 53 API calls 17229->17232 17231 7ff772611f20 86 API calls 17230->17231 17231->17239 17233 7ff772611ba3 17232->17233 17234 7ff772611ba9 17233->17234 17235 7ff772611bbe 17233->17235 17236 7ff772611f20 86 API calls 17234->17236 17254 7ff77261f780 17235->17254 17236->17239 17239->17217 17240 7ff772611f60 86 API calls 17240->17239 17242 7ff772611e40 49 API calls 17241->17242 17243 7ff77261302d 17242->17243 17243->16655 17245 7ff772611e40 49 API calls 17244->17245 17246 7ff772613250 17245->17246 17246->16656 17246->17246 17248 7ff77261fd74 17247->17248 17260 7ff77261fad4 17248->17260 17250 7ff77261fd8d 17250->17218 17272 7ff77261fa2c 17251->17272 17255 7ff77261f789 17254->17255 17256 7ff772611bd2 17254->17256 17257 7ff772627bb8 _get_daylight 11 API calls 17255->17257 17256->17239 17256->17240 17258 7ff77261f78e 17257->17258 17259 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17258->17259 17259->17256 17261 7ff77261fb3e 17260->17261 17262 7ff77261fafe 17260->17262 17261->17262 17264 7ff77261fb4a 17261->17264 17263 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17262->17263 17265 7ff77261fb25 17263->17265 17271 7ff77262543c EnterCriticalSection 17264->17271 17265->17250 17273 7ff77261fa56 17272->17273 17284 7ff772611af9 17272->17284 17274 7ff77261faa2 17273->17274 17275 7ff77261fa65 memcpy_s 17273->17275 17273->17284 17285 7ff77262543c EnterCriticalSection 17274->17285 17278 7ff772627bb8 _get_daylight 11 API calls 17275->17278 17280 7ff77261fa7a 17278->17280 17282 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17280->17282 17282->17284 17284->17224 17284->17225 17287 7ff772616b96 17286->17287 17288 7ff772616bba 17287->17288 17289 7ff772616c0d GetTempPathW GetCurrentProcessId 17287->17289 17291 7ff772616d90 92 API calls 17288->17291 17324 7ff772617790 17289->17324 17292 7ff772616bc6 17291->17292 17348 7ff772616650 17292->17348 17298 7ff772616bec __std_exception_copy 17298->17289 17304 7ff772616bfa 17298->17304 17299 7ff77261b210 _wfindfirst32i64 8 API calls 17302 7ff77261154f 17299->17302 17300 7ff772616c3b __std_exception_copy 17301 7ff772616ce6 17300->17301 17305 7ff772616c71 17300->17305 17328 7ff772628cd8 17300->17328 17331 7ff772617c90 17300->17331 17303 7ff7726180f0 88 API calls 17301->17303 17302->16665 17302->16666 17309 7ff772616cf7 __std_exception_copy 17303->17309 17306 7ff772611f60 86 API calls 17304->17306 17308 7ff772617fe0 88 API calls 17305->17308 17318 7ff772616caa __std_exception_copy 17305->17318 17307 7ff772616c06 17306->17307 17307->17318 17310 7ff772616c87 17308->17310 17311 7ff772617fe0 88 API calls 17309->17311 17309->17318 17312 7ff772616cc9 SetEnvironmentVariableW 17310->17312 17313 7ff772616c8c 17310->17313 17314 7ff772616d15 17311->17314 17312->17318 17315 7ff772617fe0 88 API calls 17313->17315 17316 7ff772616d1a 17314->17316 17317 7ff772616d4d SetEnvironmentVariableW 17314->17317 17319 7ff772616c9c 17315->17319 17320 7ff772617fe0 88 API calls 17316->17320 17317->17318 17318->17299 17322 7ff772628020 38 API calls 17319->17322 17321 7ff772616d2a 17320->17321 17323 7ff772628020 38 API calls 17321->17323 17322->17318 17323->17318 17325 7ff7726177b5 17324->17325 17382 7ff772624f84 17325->17382 17573 7ff772628904 17328->17573 17332 7ff77261b1b0 17331->17332 17333 7ff772617ca0 GetCurrentProcess OpenProcessToken 17332->17333 17334 7ff772617ceb GetTokenInformation 17333->17334 17335 7ff772617d61 __std_exception_copy 17333->17335 17336 7ff772617d18 17334->17336 17337 7ff772617d0d GetLastError 17334->17337 17338 7ff772617d7a 17335->17338 17339 7ff772617d74 CloseHandle 17335->17339 17336->17335 17341 7ff772617d2e GetTokenInformation 17336->17341 17337->17335 17337->17336 17699 7ff7726178e0 17338->17699 17339->17338 17341->17335 17343 7ff772617d54 ConvertSidToStringSidW 17341->17343 17343->17335 17344 7ff772617dee 17346 7ff77261b210 _wfindfirst32i64 8 API calls 17344->17346 17345 7ff772617dd6 CreateDirectoryW 17345->17344 17347 7ff772617e03 17346->17347 17347->17300 17349 7ff77261665c 17348->17349 17350 7ff772617fe0 88 API calls 17349->17350 17351 7ff77261667e 17350->17351 17352 7ff772616699 ExpandEnvironmentStringsW 17351->17352 17353 7ff772616686 17351->17353 17355 7ff7726166bf __std_exception_copy 17352->17355 17354 7ff772611f60 86 API calls 17353->17354 17356 7ff772616692 17354->17356 17357 7ff7726166c3 17355->17357 17358 7ff7726166d6 17355->17358 17360 7ff77261b210 _wfindfirst32i64 8 API calls 17356->17360 17359 7ff772611f60 86 API calls 17357->17359 17362 7ff7726166f0 17358->17362 17363 7ff7726166e4 17358->17363 17359->17356 17361 7ff7726167b8 17360->17361 17361->17318 17372 7ff772628020 17361->17372 17710 7ff7726264e8 17362->17710 17703 7ff772627bd8 17363->17703 17366 7ff7726166ee 17367 7ff77261670a 17366->17367 17370 7ff77261671d memcpy_s 17366->17370 17368 7ff772611f60 86 API calls 17367->17368 17368->17356 17369 7ff772616792 CreateDirectoryW 17369->17356 17370->17369 17371 7ff77261676c CreateDirectoryW 17370->17371 17371->17370 17373 7ff77262802d 17372->17373 17374 7ff772628040 17372->17374 17375 7ff772627bb8 _get_daylight 11 API calls 17373->17375 17804 7ff772627ca4 17374->17804 17377 7ff772628032 17375->17377 17378 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17377->17378 17380 7ff77262803e 17378->17380 17380->17298 17384 7ff772624fde 17382->17384 17383 7ff772625003 17385 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17383->17385 17384->17383 17386 7ff77262503f 17384->17386 17399 7ff77262502d 17385->17399 17400 7ff772622af4 17386->17400 17388 7ff772625120 17391 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17388->17391 17390 7ff77261b210 _wfindfirst32i64 8 API calls 17392 7ff7726177d4 17390->17392 17391->17399 17392->17300 17393 7ff772625146 17393->17388 17395 7ff772625150 17393->17395 17394 7ff7726250f5 17396 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17394->17396 17398 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17395->17398 17396->17399 17397 7ff7726250ec 17397->17388 17397->17394 17398->17399 17399->17390 17401 7ff772622b32 17400->17401 17402 7ff772622b22 17400->17402 17403 7ff772622b3b 17401->17403 17408 7ff772622b69 17401->17408 17405 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17402->17405 17406 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17403->17406 17404 7ff772622b61 17404->17388 17404->17393 17404->17394 17404->17397 17405->17404 17406->17404 17408->17402 17408->17404 17411 7ff772623ac8 17408->17411 17444 7ff7726230dc 17408->17444 17481 7ff77262234c 17408->17481 17412 7ff772623b0a 17411->17412 17413 7ff772623b7b 17411->17413 17416 7ff772623b10 17412->17416 17417 7ff772623ba5 17412->17417 17414 7ff772623b80 17413->17414 17415 7ff772623bd4 17413->17415 17418 7ff772623b82 17414->17418 17419 7ff772623bb5 17414->17419 17423 7ff772623beb 17415->17423 17424 7ff772623bde 17415->17424 17429 7ff772623be3 17415->17429 17420 7ff772623b44 17416->17420 17421 7ff772623b15 17416->17421 17500 7ff772621404 17417->17500 17422 7ff772623b24 17418->17422 17432 7ff772623b91 17418->17432 17507 7ff772620ff4 17419->17507 17426 7ff772623b1b 17420->17426 17420->17429 17421->17423 17421->17426 17442 7ff772623c14 17422->17442 17484 7ff77262427c 17422->17484 17514 7ff7726247d0 17423->17514 17424->17417 17424->17429 17426->17422 17431 7ff772623b56 17426->17431 17440 7ff772623b3f 17426->17440 17429->17442 17518 7ff772621814 17429->17518 17431->17442 17494 7ff7726245b8 17431->17494 17432->17417 17434 7ff772623b96 17432->17434 17438 7ff77262467c 37 API calls 17434->17438 17434->17442 17436 7ff77261b210 _wfindfirst32i64 8 API calls 17437 7ff772623f0e 17436->17437 17437->17408 17438->17440 17439 7ff7726248e0 45 API calls 17443 7ff772623e00 17439->17443 17440->17439 17440->17442 17440->17443 17442->17436 17443->17442 17525 7ff77262f1f8 17443->17525 17445 7ff7726230ea 17444->17445 17446 7ff772623100 17444->17446 17448 7ff772623140 17445->17448 17449 7ff772623b0a 17445->17449 17450 7ff772623b7b 17445->17450 17447 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17446->17447 17446->17448 17447->17448 17448->17408 17453 7ff772623b10 17449->17453 17454 7ff772623ba5 17449->17454 17451 7ff772623b80 17450->17451 17452 7ff772623bd4 17450->17452 17455 7ff772623b82 17451->17455 17456 7ff772623bb5 17451->17456 17460 7ff772623beb 17452->17460 17461 7ff772623bde 17452->17461 17466 7ff772623be3 17452->17466 17457 7ff772623b44 17453->17457 17458 7ff772623b15 17453->17458 17462 7ff772621404 38 API calls 17454->17462 17459 7ff772623b24 17455->17459 17468 7ff772623b91 17455->17468 17464 7ff772620ff4 38 API calls 17456->17464 17463 7ff772623b1b 17457->17463 17457->17466 17458->17460 17458->17463 17465 7ff77262427c 47 API calls 17459->17465 17479 7ff772623c14 17459->17479 17467 7ff7726247d0 45 API calls 17460->17467 17461->17454 17461->17466 17476 7ff772623b3f 17462->17476 17463->17459 17469 7ff772623b56 17463->17469 17463->17476 17464->17476 17465->17476 17470 7ff772621814 38 API calls 17466->17470 17466->17479 17467->17476 17468->17454 17471 7ff772623b96 17468->17471 17472 7ff7726245b8 46 API calls 17469->17472 17469->17479 17470->17476 17474 7ff77262467c 37 API calls 17471->17474 17471->17479 17472->17476 17473 7ff77261b210 _wfindfirst32i64 8 API calls 17475 7ff772623f0e 17473->17475 17474->17476 17475->17408 17477 7ff7726248e0 45 API calls 17476->17477 17476->17479 17480 7ff772623e00 17476->17480 17477->17480 17478 7ff77262f1f8 46 API calls 17478->17480 17479->17473 17480->17478 17480->17479 17556 7ff772620678 17481->17556 17485 7ff7726242a2 17484->17485 17486 7ff772620230 12 API calls 17485->17486 17487 7ff7726242f2 17486->17487 17488 7ff77262ed60 46 API calls 17487->17488 17489 7ff7726243c5 17488->17489 17490 7ff7726248e0 45 API calls 17489->17490 17492 7ff7726243e7 17489->17492 17490->17492 17491 7ff7726248e0 45 API calls 17493 7ff772624475 17491->17493 17492->17491 17492->17492 17492->17493 17493->17440 17497 7ff7726245ed 17494->17497 17495 7ff772624632 17495->17440 17496 7ff77262460b 17499 7ff77262f1f8 46 API calls 17496->17499 17497->17495 17497->17496 17498 7ff7726248e0 45 API calls 17497->17498 17498->17496 17499->17495 17501 7ff772621437 17500->17501 17502 7ff772621466 17501->17502 17504 7ff772621523 17501->17504 17506 7ff7726214a3 17502->17506 17537 7ff7726202d8 17502->17537 17505 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17504->17505 17505->17506 17506->17440 17508 7ff772621027 17507->17508 17509 7ff772621056 17508->17509 17511 7ff772621113 17508->17511 17510 7ff7726202d8 12 API calls 17509->17510 17513 7ff772621093 17509->17513 17510->17513 17512 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17511->17512 17512->17513 17513->17440 17515 7ff772624813 17514->17515 17516 7ff772624817 __crtLCMapStringW 17515->17516 17545 7ff77262486c 17515->17545 17516->17440 17519 7ff772621847 17518->17519 17520 7ff772621876 17519->17520 17522 7ff772621933 17519->17522 17521 7ff7726202d8 12 API calls 17520->17521 17524 7ff7726218b3 17520->17524 17521->17524 17523 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17522->17523 17523->17524 17524->17440 17527 7ff77262f229 17525->17527 17534 7ff77262f237 17525->17534 17526 7ff77262f257 17529 7ff77262f268 17526->17529 17530 7ff77262f28f 17526->17530 17527->17526 17528 7ff7726248e0 45 API calls 17527->17528 17527->17534 17528->17526 17549 7ff772630be0 17529->17549 17532 7ff77262f2b9 17530->17532 17533 7ff77262f31a 17530->17533 17530->17534 17532->17534 17536 7ff77262fd60 _fread_nolock MultiByteToWideChar 17532->17536 17535 7ff77262fd60 _fread_nolock MultiByteToWideChar 17533->17535 17534->17443 17535->17534 17536->17534 17538 7ff7726202fe 17537->17538 17539 7ff77262030f 17537->17539 17538->17506 17539->17538 17540 7ff77262ddec _fread_nolock 12 API calls 17539->17540 17541 7ff772620340 17540->17541 17542 7ff772620354 17541->17542 17543 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17541->17543 17544 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 17542->17544 17543->17542 17544->17538 17546 7ff77262488a 17545->17546 17547 7ff772624892 17545->17547 17548 7ff7726248e0 45 API calls 17546->17548 17547->17516 17548->17547 17552 7ff772637840 17549->17552 17555 7ff7726378a4 17552->17555 17553 7ff77261b210 _wfindfirst32i64 8 API calls 17555->17553 17557 7ff7726206ad 17556->17557 17558 7ff7726206bf 17556->17558 17559 7ff772627bb8 _get_daylight 11 API calls 17557->17559 17560 7ff7726206cd 17558->17560 17565 7ff772620709 17558->17565 17561 7ff7726206b2 17559->17561 17562 7ff77262b008 _invalid_parameter_noinfo 37 API calls 17560->17562 17563 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17561->17563 17570 7ff7726206bd 17562->17570 17563->17570 17564 7ff772620a85 17566 7ff772627bb8 _get_daylight 11 API calls 17564->17566 17564->17570 17565->17564 17567 7ff772627bb8 _get_daylight 11 API calls 17565->17567 17568 7ff772620d19 17566->17568 17569 7ff772620a7a 17567->17569 17571 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17568->17571 17572 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17569->17572 17570->17408 17571->17570 17572->17564 17614 7ff772631d28 17573->17614 17673 7ff772631aa0 17614->17673 17694 7ff772630e18 EnterCriticalSection 17673->17694 17700 7ff772617905 17699->17700 17701 7ff772624f84 48 API calls 17700->17701 17702 7ff772617928 LocalFree ConvertStringSecurityDescriptorToSecurityDescriptorW 17701->17702 17702->17344 17702->17345 17704 7ff772627bf6 17703->17704 17707 7ff772627c29 17703->17707 17705 7ff772630fb4 _wfindfirst32i64 37 API calls 17704->17705 17704->17707 17706 7ff772627c25 17705->17706 17706->17707 17708 7ff77262b0f4 _wfindfirst32i64 17 API calls 17706->17708 17707->17366 17709 7ff772627c59 17708->17709 17711 7ff772626572 17710->17711 17712 7ff772626504 17710->17712 17747 7ff772630600 17711->17747 17712->17711 17714 7ff772626509 17712->17714 17715 7ff77262653e 17714->17715 17716 7ff772626521 17714->17716 17730 7ff77262632c GetFullPathNameW 17715->17730 17722 7ff7726262b8 GetFullPathNameW 17716->17722 17721 7ff772626536 __std_exception_copy 17721->17366 17723 7ff7726262de GetLastError 17722->17723 17724 7ff7726262f4 17722->17724 17725 7ff772627b2c _fread_nolock 11 API calls 17723->17725 17726 7ff7726262f0 17724->17726 17728 7ff772627bb8 _get_daylight 11 API calls 17724->17728 17727 7ff7726262eb 17725->17727 17726->17721 17729 7ff772627bb8 _get_daylight 11 API calls 17727->17729 17728->17726 17729->17726 17731 7ff77262635f GetLastError 17730->17731 17735 7ff772626375 __std_exception_copy 17730->17735 17732 7ff772627b2c _fread_nolock 11 API calls 17731->17732 17733 7ff77262636c 17732->17733 17734 7ff772627bb8 _get_daylight 11 API calls 17733->17734 17736 7ff772626371 17734->17736 17735->17736 17737 7ff7726263cf GetFullPathNameW 17735->17737 17738 7ff772626404 17736->17738 17737->17731 17737->17736 17742 7ff772626478 memcpy_s 17738->17742 17743 7ff77262642d memcpy_s 17738->17743 17739 7ff772626461 17740 7ff772627bb8 _get_daylight 11 API calls 17739->17740 17741 7ff772626466 17740->17741 17745 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17741->17745 17742->17721 17743->17739 17743->17742 17744 7ff77262649a 17743->17744 17744->17742 17746 7ff772627bb8 _get_daylight 11 API calls 17744->17746 17745->17742 17746->17741 17750 7ff772630410 17747->17750 17751 7ff77263043b 17750->17751 17752 7ff772630452 17750->17752 17753 7ff772627bb8 _get_daylight 11 API calls 17751->17753 17754 7ff772630477 17752->17754 17755 7ff772630456 17752->17755 17770 7ff772630440 17753->17770 17788 7ff77262fa78 17754->17788 17776 7ff77263057c 17755->17776 17758 7ff77263047c 17763 7ff772630521 17758->17763 17771 7ff7726304a3 17758->17771 17760 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17775 7ff77263044b __std_exception_copy 17760->17775 17761 7ff77263045f 17762 7ff772627b98 _fread_nolock 11 API calls 17761->17762 17763->17751 17766 7ff77261b210 _wfindfirst32i64 8 API calls 17769 7ff772630571 17766->17769 17769->17721 17770->17760 17775->17766 17777 7ff7726305c6 17776->17777 17778 7ff772630596 17776->17778 17779 7ff7726305b1 17777->17779 17780 7ff7726305d1 GetDriveTypeW 17777->17780 17781 7ff772627b98 _fread_nolock 11 API calls 17778->17781 17784 7ff77261b210 _wfindfirst32i64 8 API calls 17779->17784 17780->17779 17782 7ff77263059b 17781->17782 17783 7ff772627bb8 _get_daylight 11 API calls 17782->17783 17786 7ff7726305a6 17783->17786 17785 7ff77263045b 17784->17785 17785->17758 17785->17761 17787 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 17786->17787 17787->17779 17802 7ff77261c930 17788->17802 17791 7ff77262faec 17792 7ff77262f3a0 _get_daylight 11 API calls 17791->17792 17793 7ff77262fafb 17792->17793 17796 7ff77262fb05 GetCurrentDirectoryW 17793->17796 17797 7ff77262fb14 17793->17797 17794 7ff77261b210 _wfindfirst32i64 8 API calls 17798 7ff77262fb59 17794->17798 17795 7ff77262fac5 17795->17794 17796->17797 17798->17758 17803 7ff77261c910 GetCurrentDirectoryW 17802->17803 17803->17791 17803->17795 17811 7ff772630e18 EnterCriticalSection 17804->17811 17813 7ff77261173e 17812->17813 17814 7ff772611726 17812->17814 17816 7ff772611768 17813->17816 17817 7ff772611744 17813->17817 17815 7ff772611f60 86 API calls 17814->17815 17819 7ff772611732 17815->17819 17904 7ff772616e40 17816->17904 17941 7ff7726112b0 17817->17941 17819->16690 17823 7ff77261175f 17823->16690 17824 7ff7726117b9 17828 7ff7726131a0 120 API calls 17824->17828 17825 7ff77261178d 17827 7ff772611f20 86 API calls 17825->17827 17826 7ff772611f60 86 API calls 17826->17823 17829 7ff7726117a3 17827->17829 17830 7ff7726117ce 17828->17830 17829->16690 17831 7ff7726117ee 17830->17831 17832 7ff7726117d6 17830->17832 17833 7ff77261fd44 73 API calls 17831->17833 17834 7ff772611f60 86 API calls 17832->17834 17835 7ff7726117ff 17833->17835 17836 7ff7726117e5 17834->17836 17837 7ff772611823 17835->17837 17838 7ff772611803 17835->17838 17840 7ff77261f6bc 74 API calls 17836->17840 17841 7ff772611829 17837->17841 17842 7ff772611841 17837->17842 17839 7ff772611f20 86 API calls 17838->17839 17853 7ff772611819 __std_exception_copy 17839->17853 17843 7ff772611937 17840->17843 17923 7ff772611050 17841->17923 17846 7ff772611882 17842->17846 17847 7ff772611863 17842->17847 17843->16690 17846->17853 17855 7ff7726120e6 17854->17855 17856 7ff772611e40 49 API calls 17855->17856 17857 7ff77261211b 17856->17857 17858 7ff772613010 49 API calls 17857->17858 17903 7ff77261248a 17857->17903 17859 7ff77261218f 17858->17859 17860 7ff772613010 49 API calls 17859->17860 17861 7ff7726121a2 17860->17861 17862 7ff7726121b9 17861->17862 17863 7ff7726121ca 17861->17863 17864 7ff772611f60 86 API calls 17862->17864 18063 7ff772612550 17863->18063 17875 7ff7726121c5 17864->17875 17867 7ff77261223a 17870 7ff772612550 75 API calls 17867->17870 17868 7ff772612220 18071 7ff7726167d0 17868->18071 17873 7ff77261227e 17870->17873 17871 7ff77261b210 _wfindfirst32i64 8 API calls 17874 7ff7726122d0 17871->17874 17874->16690 17875->17871 17905 7ff772616e50 17904->17905 17906 7ff772611e40 49 API calls 17905->17906 17907 7ff772616e91 17906->17907 17921 7ff772616f11 17907->17921 17984 7ff772613130 17907->17984 17909 7ff77261b210 _wfindfirst32i64 8 API calls 17912 7ff772611785 17909->17912 17911 7ff772616f4b 17990 7ff7726169f0 17911->17990 17912->17824 17912->17825 17914 7ff772616d90 92 API calls 17922 7ff772616ec2 __std_exception_copy 17914->17922 17916 7ff772616f00 17918 7ff772611f60 86 API calls 17916->17918 17917 7ff772611f60 86 API calls 17917->17911 17918->17921 17919 7ff772616f34 17919->17917 17921->17909 17922->17916 17922->17919 17942 7ff7726112c2 17941->17942 17943 7ff7726131a0 120 API calls 17942->17943 17944 7ff7726112f2 17943->17944 17945 7ff7726112fa 17944->17945 17946 7ff772611311 17944->17946 17947 7ff772611f60 86 API calls 17945->17947 17948 7ff77261fd44 73 API calls 17946->17948 17977 7ff77261130a __std_exception_copy 17947->17977 17949 7ff772611323 17948->17949 17950 7ff772611327 17949->17950 17951 7ff77261134d 17949->17951 17952 7ff772611f20 86 API calls 17950->17952 17955 7ff772611368 17951->17955 17956 7ff772611390 17951->17956 17953 7ff77261133e 17952->17953 17954 7ff77261f6bc 74 API calls 17953->17954 17954->17977 17958 7ff772611f20 86 API calls 17955->17958 17959 7ff7726113aa 17956->17959 17971 7ff772611463 17956->17971 17957 7ff77261b210 _wfindfirst32i64 8 API calls 17960 7ff772611454 17957->17960 17962 7ff772611383 17958->17962 17963 7ff772611050 94 API calls 17959->17963 17960->17823 17960->17826 17961 7ff7726113c3 17966 7ff77261f6bc 74 API calls 17961->17966 17964 7ff77261f6bc 74 API calls 17962->17964 17965 7ff7726113bb 17963->17965 17964->17977 17965->17961 17969 7ff7726114d2 __std_exception_copy 17965->17969 17967 7ff7726113cf 17966->17967 17970 7ff7726169f0 102 API calls 17967->17970 17968 7ff77261fa0c _fread_nolock 53 API calls 17968->17971 17975 7ff77261f6bc 74 API calls 17969->17975 17972 7ff7726113de 17970->17972 17971->17961 17971->17968 17973 7ff7726114bb 17971->17973 17976 7ff772611e40 49 API calls 17972->17976 17972->17977 17974 7ff772611f20 86 API calls 17973->17974 17974->17969 17975->17977 17977->17957 17985 7ff77261313a 17984->17985 17986 7ff772617fe0 88 API calls 17985->17986 17987 7ff772613162 17986->17987 17988 7ff77261b210 _wfindfirst32i64 8 API calls 17987->17988 17989 7ff77261318a 17988->17989 17989->17911 17989->17914 17989->17922 17991 7ff772616a00 17990->17991 17992 7ff772611e40 49 API calls 17991->17992 17993 7ff772616a31 17992->17993 17994 7ff772616b49 17993->17994 17995 7ff772611e40 49 API calls 17993->17995 18064 7ff772612584 18063->18064 18065 7ff772624d30 49 API calls 18064->18065 18066 7ff7726125aa 18065->18066 18067 7ff7726125bb 18066->18067 18108 7ff772625f20 18066->18108 18069 7ff77261b210 _wfindfirst32i64 8 API calls 18067->18069 18070 7ff772612215 18069->18070 18070->17867 18070->17868 18072 7ff7726167de 18071->18072 18109 7ff772625f49 18108->18109 18110 7ff772625f3d 18108->18110 18111 7ff772625b34 45 API calls 18109->18111 18125 7ff772625798 18110->18125 18113 7ff772625f71 18111->18113 18114 7ff77262f62c 5 API calls 18113->18114 18119 7ff772625f81 18113->18119 18114->18119 18115 7ff77262561c 14 API calls 18119->18115 18126 7ff7726257cf 18125->18126 18127 7ff7726257b2 18125->18127 18126->18127 18128 7ff7726257e2 CreateFileW 18126->18128 18129 7ff772627b98 _fread_nolock 11 API calls 18127->18129 18130 7ff77262584c 18128->18130 18131 7ff772625816 18128->18131 18132 7ff7726257b7 18129->18132 18321 7ff77262659c 18320->18321 18322 7ff7726265c2 18321->18322 18325 7ff7726265f5 18321->18325 18323 7ff772627bb8 _get_daylight 11 API calls 18322->18323 18324 7ff7726265c7 18323->18324 18326 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 18324->18326 18327 7ff772626608 18325->18327 18328 7ff7726265fb 18325->18328 18330 7ff7726131f9 18326->18330 18339 7ff77262b41c 18327->18339 18331 7ff772627bb8 _get_daylight 11 API calls 18328->18331 18330->16757 18331->18330 18352 7ff772630e18 EnterCriticalSection 18339->18352 18700 7ff7726292d4 18699->18700 18703 7ff772628db0 18700->18703 18702 7ff7726292ed 18702->16767 18704 7ff772628dfa 18703->18704 18705 7ff772628dcb 18703->18705 18713 7ff77262543c EnterCriticalSection 18704->18713 18707 7ff77262b008 _invalid_parameter_noinfo 37 API calls 18705->18707 18709 7ff772628deb 18707->18709 18709->18702 18715 7ff77261f4e1 18714->18715 18716 7ff77261f4b3 18714->18716 18719 7ff77261f4d3 18715->18719 18724 7ff77262543c EnterCriticalSection 18715->18724 18717 7ff77262b008 _invalid_parameter_noinfo 37 API calls 18716->18717 18717->18719 18719->16771 18726 7ff7726131a0 120 API calls 18725->18726 18727 7ff7726115c7 18726->18727 18728 7ff7726115cf 18727->18728 18729 7ff7726115f0 18727->18729 18731 7ff772611f60 86 API calls 18728->18731 18730 7ff77261fd44 73 API calls 18729->18730 18733 7ff772611601 18730->18733 18732 7ff7726115df 18731->18732 18732->16786 18734 7ff772611621 18733->18734 18735 7ff772611605 18733->18735 18737 7ff772611651 18734->18737 18738 7ff772611631 18734->18738 18736 7ff772611f20 86 API calls 18735->18736 18746 7ff77261161c __std_exception_copy 18736->18746 18741 7ff772611666 18737->18741 18744 7ff77261167d 18737->18744 18740 7ff772611f20 86 API calls 18738->18740 18739 7ff77261f6bc 74 API calls 18742 7ff7726116f7 18739->18742 18740->18746 18743 7ff772611050 94 API calls 18741->18743 18742->16786 18743->18746 18745 7ff77261fa0c _fread_nolock 53 API calls 18744->18745 18744->18746 18747 7ff7726116be 18744->18747 18745->18744 18746->18739 18748 7ff772611f20 86 API calls 18747->18748 18748->18746 18750 7ff772617fe0 88 API calls 18749->18750 18751 7ff7726174a7 LoadLibraryExW 18750->18751 18752 7ff7726174c4 __std_exception_copy 18751->18752 18752->16812 18754 7ff772616149 18753->18754 18755 7ff77261616c GetProcAddress 18753->18755 18758 7ff772611fc0 86 API calls 18754->18758 18755->18754 18756 7ff772616191 GetProcAddress 18755->18756 18756->18754 18757 7ff7726161b6 GetProcAddress 18756->18757 18757->18754 18760 7ff77261615c 18758->18760 18760->16818 18813 7ff772614e00 18812->18813 18814 7ff772611e40 49 API calls 18813->18814 18815 7ff772614e32 18814->18815 18816 7ff772614e5b 18815->18816 18817 7ff772614e3b 18815->18817 18819 7ff772614eb2 18816->18819 18821 7ff772613220 49 API calls 18816->18821 18818 7ff772611f60 86 API calls 18817->18818 18839 7ff772614e51 18818->18839 18820 7ff772613220 49 API calls 18819->18820 18822 7ff772614ecb 18820->18822 18823 7ff772614e7c 18821->18823 18824 7ff772614ee9 18822->18824 18827 7ff772611f60 86 API calls 18822->18827 18825 7ff772614e9a 18823->18825 18829 7ff772611f60 86 API calls 18823->18829 18828 7ff772617490 89 API calls 18824->18828 18830 7ff772613130 88 API calls 18825->18830 18826 7ff77261b210 _wfindfirst32i64 8 API calls 18831 7ff7726125fe 18826->18831 18827->18824 18832 7ff772614ef6 18828->18832 18829->18825 18833 7ff772614ea4 18830->18833 18831->16833 18840 7ff772614f50 18831->18840 18834 7ff772614efb 18832->18834 18835 7ff772614f1d 18832->18835 18833->18819 18838 7ff772617490 89 API calls 18833->18838 18836 7ff772611fc0 86 API calls 18834->18836 18896 7ff7726143e0 GetProcAddress 18835->18896 18836->18839 18838->18819 18839->18826 18980 7ff772613fe0 18840->18980 18842 7ff772614f74 18843 7ff772614f7c 18842->18843 18844 7ff772614f8d 18842->18844 18846 7ff772611f60 86 API calls 18843->18846 18987 7ff772613700 18844->18987 18851 7ff772614f88 18846->18851 18851->16835 18897 7ff772614420 GetProcAddress 18896->18897 18898 7ff772614402 18896->18898 18897->18898 18899 7ff772614445 GetProcAddress 18897->18899 18900 7ff772611fc0 86 API calls 18898->18900 18899->18898 18901 7ff77261446a GetProcAddress 18899->18901 18903 7ff772614415 18900->18903 18901->18898 18902 7ff772614492 GetProcAddress 18901->18902 18902->18898 18904 7ff7726144ba GetProcAddress 18902->18904 18903->18839 18904->18898 18982 7ff772614005 18980->18982 18981 7ff77261400d 18981->18842 18982->18981 18985 7ff77261419f 18982->18985 19018 7ff772627178 18982->19018 18983 7ff77261434a __std_exception_copy 18983->18842 18984 7ff772613420 47 API calls 18984->18985 18985->18983 18985->18984 18988 7ff772613730 18987->18988 18989 7ff77261b210 _wfindfirst32i64 8 API calls 18988->18989 19019 7ff7726271a8 19018->19019 19022 7ff772626674 19019->19022 19023 7ff7726266a5 19022->19023 19025 7ff7726266b7 19022->19025 19024 7ff772627bb8 _get_daylight 11 API calls 19023->19024 19027 7ff7726266aa 19024->19027 19026 7ff772626701 19025->19026 19028 7ff7726266c4 19025->19028 19029 7ff77262671c 19026->19029 19033 7ff7726248e0 45 API calls 19026->19033 19032 7ff77262b008 _invalid_parameter_noinfo 37 API calls 19028->19032 19033->19029 19084 7ff77262b940 _CallSETranslator 45 API calls 19083->19084 19085 7ff77262aba1 19084->19085 19086 7ff77262accc _CallSETranslator 45 API calls 19085->19086 19087 7ff77262abc1 19086->19087 19088 7ff77262fe4c 19089 7ff77263003e 19088->19089 19091 7ff77262fe8e _isindst 19088->19091 19090 7ff772627bb8 _get_daylight 11 API calls 19089->19090 19108 7ff77263002e 19090->19108 19091->19089 19094 7ff77262ff0e _isindst 19091->19094 19092 7ff77261b210 _wfindfirst32i64 8 API calls 19093 7ff772630059 19092->19093 19109 7ff772636a64 19094->19109 19099 7ff77263006a 19100 7ff77262b0f4 _wfindfirst32i64 17 API calls 19099->19100 19103 7ff77263007e 19100->19103 19106 7ff77262ff6b 19106->19108 19134 7ff772636aa8 19106->19134 19108->19092 19110 7ff77262ff2c 19109->19110 19111 7ff772636a73 19109->19111 19116 7ff772635e68 19110->19116 19141 7ff772630e18 EnterCriticalSection 19111->19141 19117 7ff772635e71 19116->19117 19119 7ff77262ff41 19116->19119 19118 7ff772627bb8 _get_daylight 11 API calls 19117->19118 19120 7ff772635e76 19118->19120 19119->19099 19122 7ff772635e98 19119->19122 19121 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 19120->19121 19121->19119 19123 7ff77262ff52 19122->19123 19124 7ff772635ea1 19122->19124 19123->19099 19128 7ff772635ec8 19123->19128 19125 7ff772627bb8 _get_daylight 11 API calls 19124->19125 19126 7ff772635ea6 19125->19126 19127 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 19126->19127 19127->19123 19129 7ff77262ff63 19128->19129 19130 7ff772635ed1 19128->19130 19129->19099 19129->19106 19131 7ff772627bb8 _get_daylight 11 API calls 19130->19131 19132 7ff772635ed6 19131->19132 19133 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 19132->19133 19133->19129 19142 7ff772630e18 EnterCriticalSection 19134->19142 19210 7ff77261aa50 19211 7ff77261aa73 19210->19211 19212 7ff77261aa8f memcpy_s 19210->19212 19213 7ff77262ddec 12 API calls 19211->19213 19213->19212 19948 7ff77262b7c0 19949 7ff77262b7c5 19948->19949 19953 7ff77262b7da 19948->19953 19954 7ff77262b7e0 19949->19954 19955 7ff77262b822 19954->19955 19958 7ff77262b82a 19954->19958 19956 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19955->19956 19956->19958 19957 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19959 7ff77262b837 19957->19959 19958->19957 19960 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19959->19960 19961 7ff77262b844 19960->19961 19962 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19961->19962 19963 7ff77262b851 19962->19963 19964 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19963->19964 19965 7ff77262b85e 19964->19965 19966 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19965->19966 19967 7ff77262b86b 19966->19967 19968 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19967->19968 19969 7ff77262b878 19968->19969 19970 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19969->19970 19971 7ff77262b885 19970->19971 19972 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19971->19972 19973 7ff77262b895 19972->19973 19974 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19973->19974 19975 7ff77262b8a5 19974->19975 19980 7ff77262b688 19975->19980 19994 7ff772630e18 EnterCriticalSection 19980->19994 19744 7ff772631c30 19762 7ff772630e18 EnterCriticalSection 19744->19762 15533 7ff772631098 15534 7ff7726310bc 15533->15534 15537 7ff7726310cc 15533->15537 15684 7ff772627bb8 15534->15684 15536 7ff7726313ac 15538 7ff772627bb8 _get_daylight 11 API calls 15536->15538 15537->15536 15539 7ff7726310ee 15537->15539 15540 7ff7726313b1 15538->15540 15541 7ff77263110f 15539->15541 15687 7ff772631754 15539->15687 15542 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15540->15542 15544 7ff772631181 15541->15544 15546 7ff772631135 15541->15546 15550 7ff772631175 15541->15550 15558 7ff7726310c1 15542->15558 15548 7ff77262f3a0 _get_daylight 11 API calls 15544->15548 15563 7ff772631144 15544->15563 15545 7ff77263122e 15557 7ff77263124b 15545->15557 15564 7ff77263129d 15545->15564 15702 7ff772629e84 15546->15702 15551 7ff772631197 15548->15551 15550->15545 15550->15563 15714 7ff772637b5c 15550->15714 15554 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15551->15554 15559 7ff7726311a5 15554->15559 15555 7ff77263115d 15555->15550 15562 7ff772631754 45 API calls 15555->15562 15556 7ff77263113f 15560 7ff772627bb8 _get_daylight 11 API calls 15556->15560 15561 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15557->15561 15559->15550 15559->15563 15567 7ff77262f3a0 _get_daylight 11 API calls 15559->15567 15560->15563 15565 7ff772631254 15561->15565 15562->15550 15708 7ff77262b13c 15563->15708 15564->15563 15566 7ff772633bac 40 API calls 15564->15566 15573 7ff772631259 15565->15573 15750 7ff772633bac 15565->15750 15568 7ff7726312da 15566->15568 15570 7ff7726311c7 15567->15570 15571 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15568->15571 15576 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15570->15576 15572 7ff7726312e4 15571->15572 15572->15563 15572->15573 15574 7ff7726313a0 15573->15574 15664 7ff77262f3a0 15573->15664 15578 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15574->15578 15575 7ff772631285 15577 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15575->15577 15576->15550 15577->15573 15578->15558 15581 7ff772631339 15671 7ff77262ac6c 15581->15671 15582 7ff772631330 15583 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15582->15583 15585 7ff772631337 15583->15585 15591 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15585->15591 15587 7ff7726313db 15680 7ff77262b0f4 IsProcessorFeaturePresent 15587->15680 15588 7ff772631350 15759 7ff772637c74 15588->15759 15591->15558 15594 7ff772631377 15597 7ff772627bb8 _get_daylight 11 API calls 15594->15597 15595 7ff772631398 15599 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15595->15599 15600 7ff77263137c 15597->15600 15599->15574 15602 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15600->15602 15602->15585 15667 7ff77262f3b1 _get_daylight 15664->15667 15665 7ff77262f402 15669 7ff772627bb8 _get_daylight 10 API calls 15665->15669 15666 7ff77262f3e6 HeapAlloc 15666->15667 15668 7ff77262f400 15666->15668 15667->15665 15667->15666 15778 7ff772633d60 15667->15778 15668->15581 15668->15582 15669->15668 15672 7ff77262ac79 15671->15672 15673 7ff77262ac83 15671->15673 15672->15673 15678 7ff77262ac9e 15672->15678 15674 7ff772627bb8 _get_daylight 11 API calls 15673->15674 15675 7ff77262ac8a 15674->15675 15787 7ff77262b0d4 15675->15787 15677 7ff77262ac96 15677->15587 15677->15588 15678->15677 15679 7ff772627bb8 _get_daylight 11 API calls 15678->15679 15679->15675 15681 7ff77262b107 15680->15681 15846 7ff77262ae08 15681->15846 15868 7ff77262bab8 GetLastError 15684->15868 15686 7ff772627bc1 15686->15558 15688 7ff772631789 15687->15688 15689 7ff772631771 15687->15689 15690 7ff77262f3a0 _get_daylight 11 API calls 15688->15690 15689->15541 15696 7ff7726317ad 15690->15696 15692 7ff77263180e 15694 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15692->15694 15694->15689 15695 7ff77262f3a0 _get_daylight 11 API calls 15695->15696 15696->15692 15696->15695 15697 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15696->15697 15698 7ff77262ac6c __std_exception_copy 37 API calls 15696->15698 15699 7ff77263181d 15696->15699 15701 7ff772631832 15696->15701 15697->15696 15698->15696 15700 7ff77262b0f4 _wfindfirst32i64 17 API calls 15699->15700 15700->15701 15885 7ff77262accc 15701->15885 15703 7ff772629e9d 15702->15703 15704 7ff772629e94 15702->15704 15703->15555 15703->15556 15704->15703 15951 7ff77262995c 15704->15951 15709 7ff77262b170 15708->15709 15710 7ff77262b141 RtlFreeHeap 15708->15710 15709->15558 15710->15709 15711 7ff77262b15c GetLastError 15710->15711 15712 7ff77262b169 Concurrency::details::SchedulerProxy::DeleteThis 15711->15712 15713 7ff772627bb8 _get_daylight 9 API calls 15712->15713 15713->15709 15715 7ff772637b69 15714->15715 15716 7ff772636d0c 15714->15716 15719 7ff772625b34 45 API calls 15715->15719 15717 7ff772636d19 15716->15717 15718 7ff772636d4f 15716->15718 15721 7ff772627bb8 _get_daylight 11 API calls 15717->15721 15738 7ff772636cc0 15717->15738 15720 7ff772636d79 15718->15720 15729 7ff772636d9e 15718->15729 15722 7ff772637b9d 15719->15722 15723 7ff772627bb8 _get_daylight 11 API calls 15720->15723 15724 7ff772636d23 15721->15724 15725 7ff772637ba2 15722->15725 15726 7ff772637bb3 15722->15726 15730 7ff772637bca 15722->15730 15727 7ff772636d7e 15723->15727 15728 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 15724->15728 15725->15550 15731 7ff772627bb8 _get_daylight 11 API calls 15726->15731 15732 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 15727->15732 15733 7ff772636d2e 15728->15733 15737 7ff772625b34 45 API calls 15729->15737 15741 7ff772636d89 15729->15741 15735 7ff772637be6 15730->15735 15736 7ff772637bd4 15730->15736 15734 7ff772637bb8 15731->15734 15732->15741 15733->15550 15739 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 15734->15739 15742 7ff772637bf7 15735->15742 15743 7ff772637c0e 15735->15743 15740 7ff772627bb8 _get_daylight 11 API calls 15736->15740 15737->15741 15738->15550 15739->15725 15745 7ff772637bd9 15740->15745 15741->15550 16244 7ff772636d5c 15742->16244 16253 7ff772639984 15743->16253 15748 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 15745->15748 15748->15725 15749 7ff772627bb8 _get_daylight 11 API calls 15749->15725 15751 7ff772633bce 15750->15751 15752 7ff772633beb 15750->15752 15751->15752 15753 7ff772633bdc 15751->15753 15756 7ff772633bf5 15752->15756 16293 7ff772638668 15752->16293 15754 7ff772627bb8 _get_daylight 11 API calls 15753->15754 15758 7ff772633be1 memcpy_s 15754->15758 16300 7ff77263101c 15756->16300 15758->15575 15760 7ff772625b34 45 API calls 15759->15760 15761 7ff772637cda 15760->15761 15762 7ff772637ce8 15761->15762 16312 7ff77262f62c 15761->16312 16315 7ff77262561c 15762->16315 15766 7ff772637dd4 15769 7ff772637de5 15766->15769 15770 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15766->15770 15767 7ff772625b34 45 API calls 15768 7ff772637d57 15767->15768 15772 7ff77262f62c 5 API calls 15768->15772 15774 7ff772637d60 15768->15774 15771 7ff772631373 15769->15771 15773 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15769->15773 15770->15769 15771->15594 15771->15595 15772->15774 15773->15771 15775 7ff77262561c 14 API calls 15774->15775 15776 7ff772637dbb 15775->15776 15776->15766 15777 7ff772637dc3 SetEnvironmentVariableW 15776->15777 15777->15766 15781 7ff772633da0 15778->15781 15786 7ff772630e18 EnterCriticalSection 15781->15786 15789 7ff77262af6c 15787->15789 15790 7ff77262af97 15789->15790 15793 7ff77262b008 15790->15793 15792 7ff77262afbe 15801 7ff77262ad50 15793->15801 15798 7ff77262b043 15798->15792 15799 7ff77262b0f4 _wfindfirst32i64 17 API calls 15800 7ff77262b0d3 15799->15800 15802 7ff77262ada7 15801->15802 15803 7ff77262ad6c GetLastError 15801->15803 15802->15798 15807 7ff77262adbc 15802->15807 15804 7ff77262ad7c 15803->15804 15810 7ff77262bb80 15804->15810 15808 7ff77262add8 GetLastError SetLastError 15807->15808 15809 7ff77262adf0 15807->15809 15808->15809 15809->15798 15809->15799 15811 7ff77262bbba FlsSetValue 15810->15811 15812 7ff77262bb9f FlsGetValue 15810->15812 15814 7ff77262bbc7 15811->15814 15815 7ff77262ad97 SetLastError 15811->15815 15813 7ff77262bbb4 15812->15813 15812->15815 15813->15811 15816 7ff77262f3a0 _get_daylight 11 API calls 15814->15816 15815->15802 15817 7ff77262bbd6 15816->15817 15818 7ff77262bbf4 FlsSetValue 15817->15818 15819 7ff77262bbe4 FlsSetValue 15817->15819 15820 7ff77262bc12 15818->15820 15821 7ff77262bc00 FlsSetValue 15818->15821 15822 7ff77262bbed 15819->15822 15827 7ff77262b6e8 15820->15827 15821->15822 15824 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15822->15824 15824->15815 15832 7ff77262b5c0 15827->15832 15844 7ff772630e18 EnterCriticalSection 15832->15844 15847 7ff77262ae42 _wfindfirst32i64 memcpy_s 15846->15847 15848 7ff77262ae6a RtlCaptureContext RtlLookupFunctionEntry 15847->15848 15849 7ff77262aeda IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15848->15849 15850 7ff77262aea4 RtlVirtualUnwind 15848->15850 15851 7ff77262af2c _wfindfirst32i64 15849->15851 15850->15849 15854 7ff77261b210 15851->15854 15855 7ff77261b219 15854->15855 15856 7ff77261b224 GetCurrentProcess TerminateProcess 15855->15856 15857 7ff77261b270 IsProcessorFeaturePresent 15855->15857 15858 7ff77261b288 15857->15858 15863 7ff77261b464 RtlCaptureContext 15858->15863 15864 7ff77261b47e RtlLookupFunctionEntry 15863->15864 15865 7ff77261b29b 15864->15865 15866 7ff77261b494 RtlVirtualUnwind 15864->15866 15867 7ff77261b230 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15865->15867 15866->15864 15866->15865 15869 7ff77262baf9 FlsSetValue 15868->15869 15875 7ff77262badc 15868->15875 15870 7ff77262bb0b 15869->15870 15874 7ff77262bae9 15869->15874 15872 7ff77262f3a0 _get_daylight 5 API calls 15870->15872 15871 7ff77262bb65 SetLastError 15871->15686 15873 7ff77262bb1a 15872->15873 15876 7ff77262bb38 FlsSetValue 15873->15876 15877 7ff77262bb28 FlsSetValue 15873->15877 15874->15871 15875->15869 15875->15874 15879 7ff77262bb56 15876->15879 15880 7ff77262bb44 FlsSetValue 15876->15880 15878 7ff77262bb31 15877->15878 15881 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15878->15881 15882 7ff77262b6e8 _get_daylight 5 API calls 15879->15882 15880->15878 15881->15874 15883 7ff77262bb5e 15882->15883 15884 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 5 API calls 15883->15884 15884->15871 15894 7ff772633e20 15885->15894 15920 7ff772633dd8 15894->15920 15925 7ff772630e18 EnterCriticalSection 15920->15925 15952 7ff772629975 15951->15952 15961 7ff772629971 15951->15961 15974 7ff772632dc0 15952->15974 15957 7ff772629987 15959 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15957->15959 15958 7ff772629993 16000 7ff772629a40 15958->16000 15959->15961 15961->15703 15966 7ff772629cb0 15961->15966 15963 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15964 7ff7726299ba 15963->15964 15965 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15964->15965 15965->15961 15967 7ff772629cd9 15966->15967 15969 7ff772629cf2 15966->15969 15967->15703 15968 7ff772630628 WideCharToMultiByte 15968->15969 15969->15967 15969->15968 15970 7ff77262f3a0 _get_daylight 11 API calls 15969->15970 15971 7ff772629d82 15969->15971 15973 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15969->15973 15970->15969 15972 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15971->15972 15972->15967 15973->15969 15975 7ff77262997a 15974->15975 15976 7ff772632dcd 15974->15976 15980 7ff7726330fc GetEnvironmentStringsW 15975->15980 16019 7ff77262ba14 15976->16019 15981 7ff77263312c 15980->15981 15982 7ff77262997f 15980->15982 15983 7ff772630628 WideCharToMultiByte 15981->15983 15982->15957 15982->15958 15984 7ff77263317d 15983->15984 15985 7ff772633184 FreeEnvironmentStringsW 15984->15985 15986 7ff77262ddec _fread_nolock 12 API calls 15984->15986 15985->15982 15987 7ff772633197 15986->15987 15988 7ff7726331a8 15987->15988 15989 7ff77263319f 15987->15989 15991 7ff772630628 WideCharToMultiByte 15988->15991 15990 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15989->15990 15992 7ff7726331a6 15990->15992 15993 7ff7726331cb 15991->15993 15992->15985 15994 7ff7726331d9 15993->15994 15995 7ff7726331cf 15993->15995 15997 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15994->15997 15996 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 15995->15996 15998 7ff7726331d7 FreeEnvironmentStringsW 15996->15998 15997->15998 15998->15982 16001 7ff772629a65 16000->16001 16002 7ff77262f3a0 _get_daylight 11 API calls 16001->16002 16015 7ff772629a9b 16002->16015 16003 7ff772629aa3 16004 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16003->16004 16005 7ff77262999b 16004->16005 16005->15963 16006 7ff772629b16 16007 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16006->16007 16007->16005 16008 7ff77262f3a0 _get_daylight 11 API calls 16008->16015 16009 7ff772629b05 16238 7ff772629c6c 16009->16238 16011 7ff77262ac6c __std_exception_copy 37 API calls 16011->16015 16013 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16013->16003 16014 7ff772629b3b 16017 7ff77262b0f4 _wfindfirst32i64 17 API calls 16014->16017 16015->16003 16015->16006 16015->16008 16015->16009 16015->16011 16015->16014 16016 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16015->16016 16016->16015 16018 7ff772629b4e 16017->16018 16020 7ff77262ba40 FlsSetValue 16019->16020 16021 7ff77262ba25 FlsGetValue 16019->16021 16023 7ff77262ba32 16020->16023 16024 7ff77262ba4d 16020->16024 16022 7ff77262ba3a 16021->16022 16021->16023 16022->16020 16025 7ff77262ba38 16023->16025 16026 7ff77262accc _CallSETranslator 45 API calls 16023->16026 16027 7ff77262f3a0 _get_daylight 11 API calls 16024->16027 16039 7ff772632a94 16025->16039 16028 7ff77262bab5 16026->16028 16029 7ff77262ba5c 16027->16029 16030 7ff77262ba7a FlsSetValue 16029->16030 16031 7ff77262ba6a FlsSetValue 16029->16031 16033 7ff77262ba98 16030->16033 16034 7ff77262ba86 FlsSetValue 16030->16034 16032 7ff77262ba73 16031->16032 16035 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16032->16035 16036 7ff77262b6e8 _get_daylight 11 API calls 16033->16036 16034->16032 16035->16023 16037 7ff77262baa0 16036->16037 16038 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16037->16038 16038->16025 16062 7ff772632d04 16039->16062 16041 7ff772632ac9 16077 7ff772632794 16041->16077 16046 7ff772632aff 16047 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16046->16047 16061 7ff772632ae6 16047->16061 16048 7ff772632b0e 16048->16048 16091 7ff772632e3c 16048->16091 16051 7ff772632c0a 16053 7ff772627bb8 _get_daylight 11 API calls 16051->16053 16052 7ff772632c24 16055 7ff772632c65 16052->16055 16058 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16052->16058 16054 7ff772632c0f 16053->16054 16057 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16054->16057 16056 7ff772632ccc 16055->16056 16102 7ff7726325c4 16055->16102 16060 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16056->16060 16057->16061 16058->16055 16060->16061 16061->15975 16063 7ff772632d27 16062->16063 16065 7ff772632d31 16063->16065 16117 7ff772630e18 EnterCriticalSection 16063->16117 16068 7ff772632da3 16065->16068 16070 7ff77262accc _CallSETranslator 45 API calls 16065->16070 16068->16041 16071 7ff772632dbb 16070->16071 16072 7ff772632e12 16071->16072 16074 7ff77262ba14 50 API calls 16071->16074 16072->16041 16075 7ff772632dfc 16074->16075 16076 7ff772632a94 65 API calls 16075->16076 16076->16072 16118 7ff772625b34 16077->16118 16080 7ff7726327c6 16082 7ff7726327db 16080->16082 16083 7ff7726327cb GetACP 16080->16083 16081 7ff7726327b4 GetOEMCP 16081->16082 16082->16061 16084 7ff77262ddec 16082->16084 16083->16082 16085 7ff77262de37 16084->16085 16086 7ff77262ddfb _get_daylight 16084->16086 16088 7ff772627bb8 _get_daylight 11 API calls 16085->16088 16086->16085 16087 7ff77262de1e HeapAlloc 16086->16087 16090 7ff772633d60 _get_daylight 2 API calls 16086->16090 16087->16086 16089 7ff77262de35 16087->16089 16088->16089 16089->16046 16089->16048 16090->16086 16092 7ff772632794 47 API calls 16091->16092 16094 7ff772632e69 16092->16094 16093 7ff772632fbf 16096 7ff77261b210 _wfindfirst32i64 8 API calls 16093->16096 16094->16093 16095 7ff772632ec0 memcpy_s 16094->16095 16097 7ff772632ea6 IsValidCodePage 16094->16097 16150 7ff7726328ac 16095->16150 16098 7ff772632c01 16096->16098 16097->16093 16099 7ff772632eb7 16097->16099 16098->16051 16098->16052 16099->16095 16100 7ff772632ee6 GetCPInfo 16099->16100 16100->16093 16100->16095 16237 7ff772630e18 EnterCriticalSection 16102->16237 16119 7ff772625b58 16118->16119 16125 7ff772625b53 16118->16125 16120 7ff77262b940 _CallSETranslator 45 API calls 16119->16120 16119->16125 16121 7ff772625b73 16120->16121 16126 7ff77262e174 16121->16126 16125->16080 16125->16081 16127 7ff77262e189 16126->16127 16128 7ff772625b96 16126->16128 16127->16128 16134 7ff772633ad4 16127->16134 16130 7ff77262e1e0 16128->16130 16131 7ff77262e208 16130->16131 16132 7ff77262e1f5 16130->16132 16131->16125 16132->16131 16147 7ff772632e20 16132->16147 16135 7ff77262b940 _CallSETranslator 45 API calls 16134->16135 16136 7ff772633ae3 16135->16136 16137 7ff772633b2e 16136->16137 16146 7ff772630e18 EnterCriticalSection 16136->16146 16137->16128 16148 7ff77262b940 _CallSETranslator 45 API calls 16147->16148 16149 7ff772632e29 16148->16149 16151 7ff7726328e9 GetCPInfo 16150->16151 16152 7ff7726329df 16150->16152 16151->16152 16158 7ff7726328fc 16151->16158 16153 7ff77261b210 _wfindfirst32i64 8 API calls 16152->16153 16154 7ff772632a7e 16153->16154 16154->16093 16161 7ff772633610 16158->16161 16162 7ff772625b34 45 API calls 16161->16162 16163 7ff772633652 16162->16163 16181 7ff77262fd60 16163->16181 16183 7ff77262fd69 MultiByteToWideChar 16181->16183 16242 7ff772629c71 16238->16242 16243 7ff772629b0d 16238->16243 16239 7ff772629c9a 16241 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16239->16241 16240 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16240->16242 16241->16243 16242->16239 16242->16240 16243->16013 16245 7ff772636d79 16244->16245 16246 7ff772636d90 16244->16246 16247 7ff772627bb8 _get_daylight 11 API calls 16245->16247 16246->16245 16250 7ff772636d9e 16246->16250 16248 7ff772636d7e 16247->16248 16249 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 16248->16249 16252 7ff772636d89 16249->16252 16251 7ff772625b34 45 API calls 16250->16251 16250->16252 16251->16252 16252->15725 16254 7ff772625b34 45 API calls 16253->16254 16255 7ff7726399a9 16254->16255 16258 7ff772639600 16255->16258 16259 7ff77263964e 16258->16259 16262 7ff7726396d5 16259->16262 16264 7ff7726396c0 GetCPInfo 16259->16264 16265 7ff7726396d9 16259->16265 16260 7ff77261b210 _wfindfirst32i64 8 API calls 16261 7ff772637c35 16260->16261 16261->15725 16261->15749 16263 7ff77262fd60 _fread_nolock MultiByteToWideChar 16262->16263 16262->16265 16266 7ff77263976d 16263->16266 16264->16262 16264->16265 16265->16260 16266->16265 16267 7ff77262ddec _fread_nolock 12 API calls 16266->16267 16268 7ff7726397a4 16266->16268 16267->16268 16268->16265 16269 7ff77262fd60 _fread_nolock MultiByteToWideChar 16268->16269 16270 7ff772639812 16269->16270 16271 7ff7726398f4 16270->16271 16272 7ff77262fd60 _fread_nolock MultiByteToWideChar 16270->16272 16271->16265 16273 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16271->16273 16274 7ff772639838 16272->16274 16273->16265 16274->16271 16275 7ff77262ddec _fread_nolock 12 API calls 16274->16275 16276 7ff772639865 16274->16276 16275->16276 16276->16271 16277 7ff77262fd60 _fread_nolock MultiByteToWideChar 16276->16277 16278 7ff7726398dc 16277->16278 16279 7ff7726398fc 16278->16279 16280 7ff7726398e2 16278->16280 16287 7ff77262f670 16279->16287 16280->16271 16282 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16280->16282 16282->16271 16284 7ff77263993b 16284->16265 16286 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16284->16286 16285 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16285->16284 16286->16265 16288 7ff77262f418 __crtLCMapStringW 5 API calls 16287->16288 16289 7ff77262f6ae 16288->16289 16290 7ff77262f6b6 16289->16290 16291 7ff77262f8d8 __crtLCMapStringW 5 API calls 16289->16291 16290->16284 16290->16285 16292 7ff77262f71f CompareStringW 16291->16292 16292->16290 16294 7ff77263868a HeapSize 16293->16294 16295 7ff772638671 16293->16295 16296 7ff772627bb8 _get_daylight 11 API calls 16295->16296 16297 7ff772638676 16296->16297 16298 7ff77262b0d4 _invalid_parameter_noinfo 37 API calls 16297->16298 16299 7ff772638681 16298->16299 16299->15756 16301 7ff77263103b 16300->16301 16302 7ff772631031 16300->16302 16303 7ff772631040 16301->16303 16310 7ff772631047 _get_daylight 16301->16310 16304 7ff77262ddec _fread_nolock 12 API calls 16302->16304 16305 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16303->16305 16308 7ff772631039 16304->16308 16305->16308 16306 7ff77263107a HeapReAlloc 16306->16308 16306->16310 16307 7ff77263104d 16309 7ff772627bb8 _get_daylight 11 API calls 16307->16309 16308->15758 16309->16308 16310->16306 16310->16307 16311 7ff772633d60 _get_daylight 2 API calls 16310->16311 16311->16310 16313 7ff77262f418 __crtLCMapStringW 5 API calls 16312->16313 16314 7ff77262f64c 16313->16314 16314->15762 16316 7ff77262566a 16315->16316 16317 7ff772625646 16315->16317 16318 7ff77262566f 16316->16318 16319 7ff7726256c4 16316->16319 16321 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16317->16321 16322 7ff772625655 16317->16322 16318->16322 16324 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16318->16324 16329 7ff772625684 16318->16329 16320 7ff77262fd60 _fread_nolock MultiByteToWideChar 16319->16320 16328 7ff7726256e0 16320->16328 16321->16322 16322->15766 16322->15767 16323 7ff7726256e7 GetLastError 16337 7ff772627b2c 16323->16337 16324->16329 16325 7ff77262ddec _fread_nolock 12 API calls 16325->16322 16327 7ff772625722 16327->16322 16332 7ff77262fd60 _fread_nolock MultiByteToWideChar 16327->16332 16328->16323 16328->16327 16331 7ff772625715 16328->16331 16334 7ff77262b13c Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16328->16334 16329->16325 16335 7ff77262ddec _fread_nolock 12 API calls 16331->16335 16336 7ff772625766 16332->16336 16333 7ff772627bb8 _get_daylight 11 API calls 16333->16322 16334->16331 16335->16327 16336->16322 16336->16323 16338 7ff77262bab8 _get_daylight 11 API calls 16337->16338 16339 7ff772627b39 Concurrency::details::SchedulerProxy::DeleteThis 16338->16339 16340 7ff77262bab8 _get_daylight 11 API calls 16339->16340 16341 7ff7726256f4 16340->16341 16341->16333 19214 7ff77262a121 19215 7ff77262ab98 45 API calls 19214->19215 19216 7ff77262a126 19215->19216 19217 7ff77262a197 19216->19217 19218 7ff77262a14d GetModuleHandleW 19216->19218 19226 7ff77262a024 19217->19226 19218->19217 19224 7ff77262a15a 19218->19224 19224->19217 19240 7ff77262a248 GetModuleHandleExW 19224->19240 19246 7ff772630e18 EnterCriticalSection 19226->19246 19241 7ff77262a27c GetProcAddress 19240->19241 19242 7ff77262a2a5 19240->19242 19243 7ff77262a28e 19241->19243 19244 7ff77262a2aa FreeLibrary 19242->19244 19245 7ff77262a2b1 19242->19245 19243->19242 19244->19245 19245->19217 19257 7ff77261a7a0 19258 7ff77261a7ce 19257->19258 19259 7ff77261a7b5 19257->19259 19259->19258 19261 7ff77262ddec 12 API calls 19259->19261 19260 7ff77261a82c 19261->19260

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 315 7ff7726364d0-7ff77263650b call 7ff772635e58 call 7ff772635e60 call 7ff772635ec8 322 7ff772636511-7ff77263651c call 7ff772635e68 315->322 323 7ff772636735-7ff772636781 call 7ff77262b0f4 call 7ff772635e58 call 7ff772635e60 call 7ff772635ec8 315->323 322->323 328 7ff772636522-7ff77263652c 322->328 348 7ff772636787-7ff772636792 call 7ff772635e68 323->348 349 7ff7726368bf-7ff77263692d call 7ff77262b0f4 call 7ff772631d48 323->349 330 7ff77263654e-7ff772636552 328->330 331 7ff77263652e-7ff772636531 328->331 334 7ff772636555-7ff77263655d 330->334 333 7ff772636534-7ff77263653f 331->333 337 7ff77263654a-7ff77263654c 333->337 338 7ff772636541-7ff772636548 333->338 334->334 339 7ff77263655f-7ff772636572 call 7ff77262ddec 334->339 337->330 341 7ff77263657b-7ff772636589 337->341 338->333 338->337 346 7ff77263658a-7ff772636596 call 7ff77262b13c 339->346 347 7ff772636574-7ff772636576 call 7ff77262b13c 339->347 356 7ff77263659d-7ff7726365a5 346->356 347->341 348->349 358 7ff772636798-7ff7726367a3 call 7ff772635e98 348->358 369 7ff77263693b-7ff77263693e 349->369 370 7ff77263692f-7ff772636936 349->370 356->356 359 7ff7726365a7-7ff7726365b8 call 7ff772630fb4 356->359 358->349 367 7ff7726367a9-7ff7726367cc call 7ff77262b13c GetTimeZoneInformation 358->367 359->323 368 7ff7726365be-7ff772636614 call 7ff77261c930 * 4 call 7ff7726363ec 359->368 383 7ff7726367d2-7ff7726367f3 367->383 384 7ff772636894-7ff7726368be call 7ff772635e50 call 7ff772635e40 call 7ff772635e48 367->384 427 7ff772636616-7ff77263661a 368->427 373 7ff772636940 369->373 374 7ff772636975-7ff772636988 call 7ff77262ddec 369->374 375 7ff7726369cb-7ff7726369ce 370->375 377 7ff772636943 373->377 391 7ff77263698a 374->391 392 7ff772636993-7ff7726369ae call 7ff772631d48 374->392 375->377 378 7ff7726369d4-7ff7726369dc call 7ff7726364d0 375->378 385 7ff772636948-7ff772636974 call 7ff77262b13c call 7ff77261b210 377->385 386 7ff772636943 call 7ff77263674c 377->386 378->385 394 7ff7726367fe-7ff772636805 383->394 395 7ff7726367f5-7ff7726367fb 383->395 386->385 401 7ff77263698c-7ff772636991 call 7ff77262b13c 391->401 415 7ff7726369b0-7ff7726369b3 392->415 416 7ff7726369b5-7ff7726369c7 call 7ff77262b13c 392->416 396 7ff772636819 394->396 397 7ff772636807-7ff77263680f 394->397 395->394 406 7ff77263681b-7ff77263688f call 7ff77261c930 * 4 call 7ff77263332c call 7ff7726369e4 * 2 396->406 397->396 403 7ff772636811-7ff772636817 397->403 401->373 403->406 406->384 415->401 416->375 429 7ff77263661c 427->429 430 7ff772636620-7ff772636624 427->430 429->430 430->427 432 7ff772636626-7ff77263664b call 7ff77262722c 430->432 438 7ff77263664e-7ff772636652 432->438 440 7ff772636661-7ff772636665 438->440 441 7ff772636654-7ff77263665f 438->441 440->438 441->440 443 7ff772636667-7ff77263666b 441->443 446 7ff77263666d-7ff772636695 call 7ff77262722c 443->446 447 7ff7726366ec-7ff7726366f0 443->447 455 7ff772636697 446->455 456 7ff7726366b3-7ff7726366b7 446->456 449 7ff7726366f7-7ff772636704 447->449 450 7ff7726366f2-7ff7726366f4 447->450 451 7ff77263671f-7ff77263672e call 7ff772635e50 call 7ff772635e40 449->451 452 7ff772636706-7ff77263671c call 7ff7726363ec 449->452 450->449 451->323 452->451 459 7ff77263669a-7ff7726366a1 455->459 456->447 461 7ff7726366b9-7ff7726366d7 call 7ff77262722c 456->461 459->456 462 7ff7726366a3-7ff7726366b1 459->462 467 7ff7726366e3-7ff7726366ea 461->467 462->456 462->459 467->447 468 7ff7726366d9-7ff7726366dd 467->468 468->447 469 7ff7726366df 468->469 469->467
                                                              APIs
                                                              • _get_daylight.LIBCMT ref: 00007FF772636515
                                                                • Part of subcall function 00007FF772635E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF772635E7C
                                                                • Part of subcall function 00007FF77262B13C: RtlFreeHeap.NTDLL(?,?,?,00007FF7726334F2,?,?,?,00007FF77263352F,?,?,00000000,00007FF7726339F5,?,?,00000000,00007FF772633927), ref: 00007FF77262B152
                                                                • Part of subcall function 00007FF77262B13C: GetLastError.KERNEL32(?,?,?,00007FF7726334F2,?,?,?,00007FF77263352F,?,?,00000000,00007FF7726339F5,?,?,00000000,00007FF772633927), ref: 00007FF77262B15C
                                                                • Part of subcall function 00007FF77262B0F4: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF77262B0D3,?,?,?,?,?,00007FF772622AF0), ref: 00007FF77262B0FD
                                                                • Part of subcall function 00007FF77262B0F4: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF77262B0D3,?,?,?,?,?,00007FF772622AF0), ref: 00007FF77262B122
                                                              • _get_daylight.LIBCMT ref: 00007FF772636504
                                                                • Part of subcall function 00007FF772635EC8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF772635EDC
                                                              • _get_daylight.LIBCMT ref: 00007FF77263677A
                                                              • _get_daylight.LIBCMT ref: 00007FF77263678B
                                                              • _get_daylight.LIBCMT ref: 00007FF77263679C
                                                              • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7726369DC), ref: 00007FF7726367C3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                                              • String ID: Eastern Standard Time$Eastern Summer Time
                                                              • API String ID: 4070488512-239921721
                                                              • Opcode ID: e4fcdda70528d111a94e6187a193c53f750ddbf87f1d0e9bbf468a5a64d13a2e
                                                              • Instruction ID: 0fc04d027aeb82c63f042585d02bad07d82200a62b736a36c70e797f9961d67d
                                                              • Opcode Fuzzy Hash: e4fcdda70528d111a94e6187a193c53f750ddbf87f1d0e9bbf468a5a64d13a2e
                                                              • Instruction Fuzzy Hash: 24D1A363A3C24245E710BF2298901BAA692EB44794FC1513BDA6DC7E86DFBCE441CF64

                                                              Control-flow Graph

                                                              APIs
                                                              • GetTempPathW.KERNEL32(00000000,00000000,00000000,00000000,?,00007FF77261154F), ref: 00007FF772616C17
                                                              • GetCurrentProcessId.KERNEL32 ref: 00007FF772616C1D
                                                                • Part of subcall function 00007FF772616D90: GetEnvironmentVariableW.KERNEL32(00007FF772612B1C), ref: 00007FF772616DCA
                                                                • Part of subcall function 00007FF772616D90: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF772616DE7
                                                                • Part of subcall function 00007FF772628020: _invalid_parameter_noinfo.LIBCMT ref: 00007FF772628039
                                                              • SetEnvironmentVariableW.KERNEL32 ref: 00007FF772616CD1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Environment$Variable$CurrentExpandPathProcessStringsTemp_invalid_parameter_noinfo
                                                              • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                              • API String ID: 1556224225-1116378104
                                                              • Opcode ID: be57af591ebd5ef04cd6d0e77894d8857e47ad694bebd0a6f081fcddcfe9fc4a
                                                              • Instruction ID: 20517c24c6866948c0ce5556bc3a852eee6b8ff886eb716dfcb908f1cb2d4611
                                                              • Opcode Fuzzy Hash: be57af591ebd5ef04cd6d0e77894d8857e47ad694bebd0a6f081fcddcfe9fc4a
                                                              • Instruction Fuzzy Hash: 0E514F17B3D25251FA24B72299152BBD2939F45BC0FC44436ED2EC7E96DDACF501CA20

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 569 7ff77263741c-7ff77263748f call 7ff772637150 572 7ff7726374a9-7ff7726374b3 call 7ff772628668 569->572 573 7ff772637491-7ff77263749a call 7ff772627b98 569->573 578 7ff7726374ce-7ff772637537 CreateFileW 572->578 579 7ff7726374b5-7ff7726374cc call 7ff772627b98 call 7ff772627bb8 572->579 580 7ff77263749d-7ff7726374a4 call 7ff772627bb8 573->580 583 7ff772637539-7ff77263753f 578->583 584 7ff7726375b4-7ff7726375bf GetFileType 578->584 579->580 591 7ff7726377ea-7ff77263780a 580->591 589 7ff772637581-7ff7726375af GetLastError call 7ff772627b2c 583->589 590 7ff772637541-7ff772637545 583->590 586 7ff7726375c1-7ff7726375fc GetLastError call 7ff772627b2c CloseHandle 584->586 587 7ff772637612-7ff772637619 584->587 586->580 603 7ff772637602-7ff77263760d call 7ff772627bb8 586->603 594 7ff77263761b-7ff77263761f 587->594 595 7ff772637621-7ff772637624 587->595 589->580 590->589 596 7ff772637547-7ff77263757f CreateFileW 590->596 601 7ff77263762a-7ff77263767f call 7ff772628580 594->601 595->601 602 7ff772637626 595->602 596->584 596->589 608 7ff77263769e-7ff7726376cf call 7ff772636ed0 601->608 609 7ff772637681-7ff77263768d call 7ff772637358 601->609 602->601 603->580 615 7ff7726376d1-7ff7726376d3 608->615 616 7ff7726376d5-7ff772637717 608->616 609->608 614 7ff77263768f 609->614 617 7ff772637691-7ff772637699 call 7ff77262b2b4 614->617 615->617 618 7ff772637739-7ff772637744 616->618 619 7ff772637719-7ff77263771d 616->619 617->591 622 7ff77263774a-7ff77263774e 618->622 623 7ff7726377e8 618->623 619->618 621 7ff77263771f-7ff772637734 619->621 621->618 622->623 625 7ff772637754-7ff772637799 CloseHandle CreateFileW 622->625 623->591 626 7ff7726377ce-7ff7726377e3 625->626 627 7ff77263779b-7ff7726377c9 GetLastError call 7ff772627b2c call 7ff7726287a8 625->627 626->623 627->626
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                              • String ID:
                                                              • API String ID: 1617910340-0
                                                              • Opcode ID: 6b5cfb35888fc956fe8d47a7c44be9f993c906b474aae4ca8ca64600ca20d147
                                                              • Instruction ID: 4d25c5e7c39d6ea14c333a9668f12a3e13c889f31c57c7791a2d5c0b6e16d117
                                                              • Opcode Fuzzy Hash: 6b5cfb35888fc956fe8d47a7c44be9f993c906b474aae4ca8ca64600ca20d147
                                                              • Instruction Fuzzy Hash: E7C1D333B38A4185EB11EF64C4905AE7762E74ABA8B501236DE2E97B95CF78E051CB10

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 831 7ff77263674c-7ff772636781 call 7ff772635e58 call 7ff772635e60 call 7ff772635ec8 838 7ff772636787-7ff772636792 call 7ff772635e68 831->838 839 7ff7726368bf-7ff77263692d call 7ff77262b0f4 call 7ff772631d48 831->839 838->839 844 7ff772636798-7ff7726367a3 call 7ff772635e98 838->844 851 7ff77263693b-7ff77263693e 839->851 852 7ff77263692f-7ff772636936 839->852 844->839 850 7ff7726367a9-7ff7726367cc call 7ff77262b13c GetTimeZoneInformation 844->850 863 7ff7726367d2-7ff7726367f3 850->863 864 7ff772636894-7ff7726368be call 7ff772635e50 call 7ff772635e40 call 7ff772635e48 850->864 854 7ff772636940 851->854 855 7ff772636975-7ff772636988 call 7ff77262ddec 851->855 856 7ff7726369cb-7ff7726369ce 852->856 858 7ff772636943 854->858 869 7ff77263698a 855->869 870 7ff772636993-7ff7726369ae call 7ff772631d48 855->870 856->858 859 7ff7726369d4-7ff7726369dc call 7ff7726364d0 856->859 865 7ff772636948-7ff772636974 call 7ff77262b13c call 7ff77261b210 858->865 866 7ff772636943 call 7ff77263674c 858->866 859->865 872 7ff7726367fe-7ff772636805 863->872 873 7ff7726367f5-7ff7726367fb 863->873 866->865 878 7ff77263698c-7ff772636991 call 7ff77262b13c 869->878 890 7ff7726369b0-7ff7726369b3 870->890 891 7ff7726369b5-7ff7726369c7 call 7ff77262b13c 870->891 874 7ff772636819 872->874 875 7ff772636807-7ff77263680f 872->875 873->872 882 7ff77263681b-7ff77263688f call 7ff77261c930 * 4 call 7ff77263332c call 7ff7726369e4 * 2 874->882 875->874 880 7ff772636811-7ff772636817 875->880 878->854 880->882 882->864 890->878 891->856
                                                              APIs
                                                              • _get_daylight.LIBCMT ref: 00007FF77263677A
                                                                • Part of subcall function 00007FF772635EC8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF772635EDC
                                                              • _get_daylight.LIBCMT ref: 00007FF77263678B
                                                                • Part of subcall function 00007FF772635E68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF772635E7C
                                                              • _get_daylight.LIBCMT ref: 00007FF77263679C
                                                                • Part of subcall function 00007FF772635E98: _invalid_parameter_noinfo.LIBCMT ref: 00007FF772635EAC
                                                                • Part of subcall function 00007FF77262B13C: RtlFreeHeap.NTDLL(?,?,?,00007FF7726334F2,?,?,?,00007FF77263352F,?,?,00000000,00007FF7726339F5,?,?,00000000,00007FF772633927), ref: 00007FF77262B152
                                                                • Part of subcall function 00007FF77262B13C: GetLastError.KERNEL32(?,?,?,00007FF7726334F2,?,?,?,00007FF77263352F,?,?,00000000,00007FF7726339F5,?,?,00000000,00007FF772633927), ref: 00007FF77262B15C
                                                              • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF7726369DC), ref: 00007FF7726367C3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                              • String ID: Eastern Standard Time$Eastern Summer Time
                                                              • API String ID: 3458911817-239921721
                                                              • Opcode ID: 6d998e9ab7433d443c26072edc04c990136b6352f2181554ab72cd749afbed9d
                                                              • Instruction ID: 2f63946328e168d2e7783bb31cb66af5c6282fc84c0ee065a79b9f49d3cb3b32
                                                              • Opcode Fuzzy Hash: 6d998e9ab7433d443c26072edc04c990136b6352f2181554ab72cd749afbed9d
                                                              • Instruction Fuzzy Hash: 74514273A3C64245E710EF21948056AA762BB48744F815137DA6DC3E96DF7CE440CF64
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: CurrentFeaturePresentProcessProcessor
                                                              • String ID:
                                                              • API String ID: 1010374628-0
                                                              • Opcode ID: 1ff2dbd24b049d570d9a80da9b89c9b9c8298d246fde8bb7cf94dd17c3f6424a
                                                              • Instruction ID: 0f076eab50c5423d054f6786e51069ba84ef0dc0e6005d53b13495f92d7b2102
                                                              • Opcode Fuzzy Hash: 1ff2dbd24b049d570d9a80da9b89c9b9c8298d246fde8bb7cf94dd17c3f6424a
                                                              • Instruction Fuzzy Hash: F802AD63B3D64241EE51BB1294006BBA2D6AF45BA0FC45536DD7DC6BC2EEBCE441CB20

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 7ff772611710-7ff772611724 1 7ff77261173e-7ff772611742 0->1 2 7ff772611726-7ff77261173d call 7ff772611f60 0->2 4 7ff772611768-7ff77261178b call 7ff772616e40 1->4 5 7ff772611744-7ff77261174d call 7ff7726112b0 1->5 13 7ff7726117b9-7ff7726117d4 call 7ff7726131a0 4->13 14 7ff77261178d-7ff7726117b8 call 7ff772611f20 4->14 11 7ff77261175f-7ff772611767 5->11 12 7ff77261174f-7ff77261175a call 7ff772611f60 5->12 12->11 20 7ff7726117ee-7ff772611801 call 7ff77261fd44 13->20 21 7ff7726117d6-7ff7726117e9 call 7ff772611f60 13->21 27 7ff772611823-7ff772611827 20->27 28 7ff772611803-7ff77261181e call 7ff772611f20 20->28 26 7ff77261192f-7ff772611932 call 7ff77261f6bc 21->26 34 7ff772611937-7ff77261194e 26->34 31 7ff772611829-7ff772611835 call 7ff772611050 27->31 32 7ff772611841-7ff772611861 call 7ff7726251fc 27->32 37 7ff772611927-7ff77261192a call 7ff77261f6bc 28->37 38 7ff77261183a-7ff77261183c 31->38 41 7ff772611882-7ff772611888 32->41 42 7ff772611863-7ff77261187d call 7ff772611f20 32->42 37->26 38->37 43 7ff77261188e-7ff772611897 41->43 44 7ff772611915-7ff772611918 call 7ff7726251e8 41->44 49 7ff77261191d-7ff772611922 42->49 47 7ff7726118a0-7ff7726118c2 call 7ff77261fa0c 43->47 44->49 52 7ff7726118c4-7ff7726118dc call 7ff77262014c 47->52 53 7ff7726118f5-7ff7726118fc 47->53 49->37 58 7ff7726118de-7ff7726118e1 52->58 59 7ff7726118e5-7ff7726118f3 52->59 55 7ff772611903-7ff77261190b call 7ff772611f20 53->55 62 7ff772611910 55->62 58->47 61 7ff7726118e3 58->61 59->55 61->62 62->44
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc$pyi_arch_extract2fs was called before temporary directory was initialized!
                                                              • API String ID: 0-3833288071
                                                              • Opcode ID: bf262973b9ce6ca29cdde4ebd959a4152bc68f08237c31756dcb1e861480abb2
                                                              • Instruction ID: 7d4a19ae3333267b99c9888e23cffa85b409267a5e3194fc38d20a7995e9984c
                                                              • Opcode Fuzzy Hash: bf262973b9ce6ca29cdde4ebd959a4152bc68f08237c31756dcb1e861480abb2
                                                              • Instruction Fuzzy Hash: D85164A3B3C64685EA10BB11D44016BA3A2EF45794FC45972DE2C87F96DFACF144CB20

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 63 7ff772611000-7ff772612adb call 7ff77261f490 call 7ff77261f488 call 7ff772617940 call 7ff77261b1b0 call 7ff7726253c0 call 7ff77262602c call 7ff772611e00 79 7ff772612ae1-7ff772612af1 call 7ff772613090 63->79 80 7ff772612bc6 63->80 79->80 85 7ff772612af7-7ff772612b0a call 7ff772612f60 79->85 81 7ff772612bcb-7ff772612bf4 call 7ff77261b210 80->81 85->80 89 7ff772612b10-7ff772612b2e call 7ff772616d90 85->89 92 7ff772612b70-7ff772612b90 call 7ff772617270 call 7ff772611c50 89->92 93 7ff772612b30-7ff772612b3f call 7ff772616d90 89->93 103 7ff772612c6e-7ff772612c83 call 7ff7726119a0 92->103 104 7ff772612b96-7ff772612bac call 7ff772611c50 92->104 93->92 99 7ff772612b41-7ff772612b47 93->99 101 7ff772612b49-7ff772612b51 99->101 102 7ff772612b53-7ff772612b6d call 7ff7726251e8 call 7ff772617270 99->102 101->102 102->92 114 7ff772612cb7-7ff772612cd2 call 7ff7726127c0 103->114 115 7ff772612c85-7ff772612c96 call 7ff772626070 103->115 112 7ff772612bae-7ff772612bc1 call 7ff772611f60 104->112 113 7ff772612bf5-7ff772612bf8 104->113 112->80 113->103 120 7ff772612bfa-7ff772612c11 call 7ff7726131a0 113->120 127 7ff772612ce9-7ff772612cec 114->127 128 7ff772612cd4-7ff772612cd6 114->128 125 7ff772612c98-7ff772612c9d call 7ff772617ae0 115->125 126 7ff772612c9f-7ff772612cb0 call 7ff772626070 115->126 129 7ff772612c18-7ff772612c44 call 7ff7726174e0 120->129 130 7ff772612c13-7ff772612c16 120->130 125->114 126->114 147 7ff772612cb2 call 7ff772617c30 126->147 131 7ff772612cfe-7ff772612d16 call 7ff772617fe0 127->131 132 7ff772612cee-7ff772612cf0 127->132 128->127 135 7ff772612cd8-7ff772612cdb call 7ff7726114f0 128->135 129->103 150 7ff772612c46-7ff772612c4e call 7ff77261f6bc 129->150 136 7ff772612c53-7ff772612c69 call 7ff772611f60 130->136 151 7ff772612d18-7ff772612d24 call 7ff772611f60 131->151 152 7ff772612d29-7ff772612d30 SetDllDirectoryW 131->152 137 7ff772612cf2-7ff772612cfc 132->137 138 7ff772612d36-7ff772612d43 call 7ff772616010 132->138 144 7ff772612ce0-7ff772612ce3 135->144 136->80 137->131 137->138 158 7ff772612d8e-7ff772612d93 call 7ff772615f90 138->158 159 7ff772612d45-7ff772612d52 call 7ff772615cc0 138->159 144->80 144->127 147->114 150->136 151->80 152->138 165 7ff772612d98-7ff772612d9b 158->165 159->158 166 7ff772612d54-7ff772612d63 call 7ff772615820 159->166 167 7ff772612e7d-7ff772612e8c call 7ff772612650 165->167 168 7ff772612da1-7ff772612daf 165->168 179 7ff772612d84-7ff772612d89 call 7ff772615a70 166->179 180 7ff772612d65-7ff772612d71 call 7ff7726157a0 166->180 167->80 176 7ff772612e92-7ff772612ecc call 7ff772617200 call 7ff772616d90 call 7ff7726155b0 167->176 170 7ff772612db0-7ff772612dba 168->170 173 7ff772612dbc-7ff772612dc1 170->173 174 7ff772612dc3-7ff772612dc5 170->174 173->170 173->174 177 7ff772612dc7-7ff772612dea call 7ff772611e40 174->177 178 7ff772612e11-7ff772612e14 174->178 176->80 213 7ff772612ed2-7ff772612eda call 7ff7726127b0 176->213 177->80 193 7ff772612df0-7ff772612dfb 177->193 184 7ff772612e48-7ff772612e78 call 7ff7726127b0 call 7ff7726125f0 call 7ff7726127a0 call 7ff772615a70 call 7ff772615f90 178->184 185 7ff772612e16-7ff772612e27 call 7ff772626070 178->185 179->158 180->179 195 7ff772612d73-7ff772612d82 call 7ff772615e60 180->195 184->81 201 7ff772612e29-7ff772612e2e call 7ff772617ae0 185->201 202 7ff772612e30-7ff772612e41 call 7ff772626070 185->202 198 7ff772612e00-7ff772612e0f 193->198 195->165 198->178 198->198 201->184 202->184 212 7ff772612e43 call 7ff772617c30 202->212 212->184 220 7ff772612edc-7ff772612eed call 7ff772626070 213->220 221 7ff772612f0e-7ff772612f3e call 7ff7726172b0 call 7ff772615a70 call 7ff772615f90 213->221 229 7ff772612eef-7ff772612ef4 call 7ff772617ae0 220->229 230 7ff772612ef6-7ff772612f07 call 7ff772626070 220->230 240 7ff772612f4c-7ff772612f4f call 7ff772611dd0 221->240 241 7ff772612f40-7ff772612f47 call 7ff772616f70 221->241 229->221 230->221 237 7ff772612f09 call 7ff772617c30 230->237 237->221 244 7ff772612f54-7ff772612f56 240->244 241->240 244->81
                                                              APIs
                                                                • Part of subcall function 00007FF772613090: GetModuleFileNameW.KERNEL32(?,00007FF772612AEF), ref: 00007FF7726130C1
                                                              • SetDllDirectoryW.KERNEL32 ref: 00007FF772612D30
                                                                • Part of subcall function 00007FF772616D90: GetEnvironmentVariableW.KERNEL32(00007FF772612B1C), ref: 00007FF772616DCA
                                                                • Part of subcall function 00007FF772616D90: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF772616DE7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                              • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE$hide-early$hide-late$minimize-early$minimize-late$pyi-hide-console
                                                              • API String ID: 2344891160-1364127678
                                                              • Opcode ID: 914b51dba19ec1e79a9dadd87bbe8d0af0707f8dcbfb55c8e395647a02bf7781
                                                              • Instruction ID: e11da39a367a34b2c7d8d6bf563b8ef6cdbf7e0521328678058fb7f1377c6a86
                                                              • Opcode Fuzzy Hash: 914b51dba19ec1e79a9dadd87bbe8d0af0707f8dcbfb55c8e395647a02bf7781
                                                              • Instruction Fuzzy Hash: 34D16113B3C65282FA65BB2595511BBD293AF44784FC00833E92DC6ED6EFACF505CA60

                                                              Control-flow Graph

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(0000000100000001,00007FF77261331C,00007FF772616B41,?,00007FF772616F56,?,00007FF772611785), ref: 00007FF772617CD0
                                                              • OpenProcessToken.ADVAPI32(?,00007FF772616F56,?,00007FF772611785), ref: 00007FF772617CE1
                                                              • GetTokenInformation.KERNELBASE(?,00007FF772616F56(TokenIntegrityLevel),?,00007FF772611785), ref: 00007FF772617D03
                                                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00007FF772611785), ref: 00007FF772617D0D
                                                              • GetTokenInformation.KERNELBASE(?,TokenIntegrityLevel,?,00007FF772611785), ref: 00007FF772617D4A
                                                              • ConvertSidToStringSidW.ADVAPI32 ref: 00007FF772617D5C
                                                              • CloseHandle.KERNEL32(?,00007FF772616F56,?,00007FF772611785), ref: 00007FF772617D74
                                                              • LocalFree.KERNEL32(?,00007FF772616F56,?,00007FF772611785), ref: 00007FF772617DA6
                                                              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00007FF772617DCD
                                                              • CreateDirectoryW.KERNELBASE(?,00007FF772616F56,?,00007FF772611785), ref: 00007FF772617DDE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Token$ConvertDescriptorInformationProcessSecurityString$CloseCreateCurrentDirectoryErrorFreeHandleLastLocalOpen
                                                              • String ID: D:(A;;FA;;;%s)$S-1-3-4
                                                              • API String ID: 4998090-2855260032
                                                              • Opcode ID: 4e4956c6d4438b247f3c2c53cd05ecc1b9598041c42e1c0afa8546fb2f13f484
                                                              • Instruction ID: f092757435c534602c36f09810d4b983175152ae11a22d4dfb32e1ffc629e161
                                                              • Opcode Fuzzy Hash: 4e4956c6d4438b247f3c2c53cd05ecc1b9598041c42e1c0afa8546fb2f13f484
                                                              • Instruction Fuzzy Hash: 1A416432A3C68642E750AF20E4446BBB362FB84754F840632EA6D87ED5DF7CE544CB10

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock
                                                              • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                              • API String ID: 840049012-1384898525
                                                              • Opcode ID: 2ac47deee739ae8f43c8400badaca2549d9c52214ea501ad61e546da5d8b0c11
                                                              • Instruction ID: 2883d9936ec507139caf53e8cb87cc2fd16842cc738da24c7a719a8fc807aca4
                                                              • Opcode Fuzzy Hash: 2ac47deee739ae8f43c8400badaca2549d9c52214ea501ad61e546da5d8b0c11
                                                              • Instruction Fuzzy Hash: A25191B3B39642C6EB14EB24D44017AB3A2EF48B84B955437DA2CC7B95DEBCE440CB54

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                              • String ID: CreateProcessW$Error creating child process!
                                                              • API String ID: 2895956056-3524285272
                                                              • Opcode ID: 8ef23c2de96b7e92f1531e934cb8a88ecc92767a1d2dd44473a1e0f604d778cb
                                                              • Instruction ID: 814e816ee33704752fb5f12bbc5ead63486640ee3bef9b6860f1dd128ecf8379
                                                              • Opcode Fuzzy Hash: 8ef23c2de96b7e92f1531e934cb8a88ecc92767a1d2dd44473a1e0f604d778cb
                                                              • Instruction Fuzzy Hash: 18412532A2878185DA20AB24E5552ABF391FB94364F901736E5BD87AD5DFBCD044CF10

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 632 7ff772611050-7ff7726110ab call 7ff77261aa40 635 7ff7726110ad-7ff7726110d2 call 7ff772611f60 632->635 636 7ff7726110d3-7ff7726110eb call 7ff7726251fc 632->636 641 7ff772611109-7ff772611119 call 7ff7726251fc 636->641 642 7ff7726110ed-7ff772611104 call 7ff772611f20 636->642 648 7ff772611137-7ff772611147 641->648 649 7ff77261111b-7ff772611132 call 7ff772611f20 641->649 647 7ff77261126c-7ff7726112a0 call 7ff77261a720 call 7ff7726251e8 * 2 642->647 650 7ff772611150-7ff772611175 call 7ff77261fa0c 648->650 649->647 658 7ff77261117b-7ff772611185 call 7ff77261f780 650->658 659 7ff77261125e 650->659 658->659 666 7ff77261118b-7ff772611197 658->666 661 7ff772611264 659->661 661->647 667 7ff7726111a0-7ff7726111c8 call 7ff772618e90 666->667 670 7ff7726111ca-7ff7726111cd 667->670 671 7ff772611241-7ff77261125c call 7ff772611f60 667->671 673 7ff77261123c 670->673 674 7ff7726111cf-7ff7726111d9 670->674 671->661 673->671 676 7ff7726111db-7ff7726111e8 call 7ff77262014c 674->676 677 7ff772611203-7ff772611206 674->677 681 7ff7726111ed-7ff7726111f0 676->681 678 7ff772611208-7ff772611216 call 7ff77261bf70 677->678 679 7ff772611219-7ff77261121e 677->679 678->679 679->667 683 7ff772611220-7ff772611223 679->683 684 7ff7726111fe-7ff772611201 681->684 685 7ff7726111f2-7ff7726111fc call 7ff77261f780 681->685 687 7ff772611237-7ff77261123a 683->687 688 7ff772611225-7ff772611228 683->688 684->671 685->679 685->684 687->661 688->671 690 7ff77261122a-7ff772611232 688->690 690->650
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 1.2.13$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                              • API String ID: 0-1655038675
                                                              • Opcode ID: 556d67486e3193722e3a879e208e706c90b5b8be91e04e9cf34564f4be78012c
                                                              • Instruction ID: f5e16a8d9e88c9700f11da0921c832a73b2c94d3ff271188b18fb2dbe0e2a910
                                                              • Opcode Fuzzy Hash: 556d67486e3193722e3a879e208e706c90b5b8be91e04e9cf34564f4be78012c
                                                              • Instruction Fuzzy Hash: F351D263B3868241E624BB11A4403BBA292BB45794F845532DD6DC7F85EEBCF545CF10

                                                              Control-flow Graph

                                                              APIs
                                                              • FreeLibrary.KERNEL32(?,?,?,00007FF77262F7B2,?,?,-00000018,00007FF77262B547,?,?,?,00007FF77262B43E,?,?,?,00007FF772626612), ref: 00007FF77262F594
                                                              • GetProcAddress.KERNEL32(?,?,?,00007FF77262F7B2,?,?,-00000018,00007FF77262B547,?,?,?,00007FF77262B43E,?,?,?,00007FF772626612), ref: 00007FF77262F5A0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: api-ms-$ext-ms-
                                                              • API String ID: 3013587201-537541572
                                                              • Opcode ID: 85fd8e72ae8b763a3a2727328088619ef131e460ee903e8518073b42dfa075bd
                                                              • Instruction ID: 70f0e8257fba360af78100541c1093f00faa1380b1a53207c1ebb83e963b9c57
                                                              • Opcode Fuzzy Hash: 85fd8e72ae8b763a3a2727328088619ef131e460ee903e8518073b42dfa075bd
                                                              • Instruction Fuzzy Hash: C641E263B3964241EA26AF16A800167A3D6BF04BE0F844536ED2DD7F85DFBCE405CA20

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 718 7ff77262c24c-7ff77262c272 719 7ff77262c28d-7ff77262c291 718->719 720 7ff77262c274-7ff77262c288 call 7ff772627b98 call 7ff772627bb8 718->720 721 7ff77262c667-7ff77262c673 call 7ff772627b98 call 7ff772627bb8 719->721 722 7ff77262c297-7ff77262c29e 719->722 738 7ff77262c67e 720->738 741 7ff77262c679 call 7ff77262b0d4 721->741 722->721 724 7ff77262c2a4-7ff77262c2d2 722->724 724->721 727 7ff77262c2d8-7ff77262c2df 724->727 730 7ff77262c2f8-7ff77262c2fb 727->730 731 7ff77262c2e1-7ff77262c2f3 call 7ff772627b98 call 7ff772627bb8 727->731 736 7ff77262c301-7ff77262c307 730->736 737 7ff77262c663-7ff77262c665 730->737 731->741 736->737 742 7ff77262c30d-7ff77262c310 736->742 739 7ff77262c681-7ff77262c698 737->739 738->739 741->738 742->731 745 7ff77262c312-7ff77262c337 742->745 747 7ff77262c339-7ff77262c33b 745->747 748 7ff77262c36a-7ff77262c371 745->748 751 7ff77262c33d-7ff77262c344 747->751 752 7ff77262c362-7ff77262c368 747->752 749 7ff77262c346-7ff77262c35d call 7ff772627b98 call 7ff772627bb8 call 7ff77262b0d4 748->749 750 7ff77262c373-7ff77262c39b call 7ff77262ddec call 7ff77262b13c * 2 748->750 780 7ff77262c4f0 749->780 783 7ff77262c3b8-7ff77262c3e3 call 7ff77262ca74 750->783 784 7ff77262c39d-7ff77262c3b3 call 7ff772627bb8 call 7ff772627b98 750->784 751->749 751->752 753 7ff77262c3e8-7ff77262c3ff 752->753 757 7ff77262c47a-7ff77262c484 call 7ff7726340ec 753->757 758 7ff77262c401-7ff77262c409 753->758 769 7ff77262c48a-7ff77262c49f 757->769 770 7ff77262c50e 757->770 758->757 762 7ff77262c40b-7ff77262c40d 758->762 762->757 766 7ff77262c40f-7ff77262c425 762->766 766->757 771 7ff77262c427-7ff77262c433 766->771 769->770 775 7ff77262c4a1-7ff77262c4b3 GetConsoleMode 769->775 773 7ff77262c513-7ff77262c533 ReadFile 770->773 771->757 776 7ff77262c435-7ff77262c437 771->776 778 7ff77262c539-7ff77262c541 773->778 779 7ff77262c62d-7ff77262c636 GetLastError 773->779 775->770 781 7ff77262c4b5-7ff77262c4bd 775->781 776->757 782 7ff77262c439-7ff77262c451 776->782 778->779 785 7ff77262c547 778->785 788 7ff77262c638-7ff77262c64e call 7ff772627bb8 call 7ff772627b98 779->788 789 7ff77262c653-7ff77262c656 779->789 790 7ff77262c4f3-7ff77262c4fd call 7ff77262b13c 780->790 781->773 787 7ff77262c4bf-7ff77262c4e1 ReadConsoleW 781->787 782->757 791 7ff77262c453-7ff77262c45f 782->791 783->753 784->780 794 7ff77262c54e-7ff77262c563 785->794 796 7ff77262c502-7ff77262c50c 787->796 797 7ff77262c4e3 GetLastError 787->797 788->780 801 7ff77262c4e9-7ff77262c4eb call 7ff772627b2c 789->801 802 7ff77262c65c-7ff77262c65e 789->802 790->739 791->757 800 7ff77262c461-7ff77262c463 791->800 794->790 804 7ff77262c565-7ff77262c570 794->804 796->794 797->801 800->757 808 7ff77262c465-7ff77262c475 800->808 801->780 802->790 810 7ff77262c597-7ff77262c59f 804->810 811 7ff77262c572-7ff77262c58b call 7ff77262be64 804->811 808->757 814 7ff77262c61b-7ff77262c628 call 7ff77262bca4 810->814 815 7ff77262c5a1-7ff77262c5b3 810->815 818 7ff77262c590-7ff77262c592 811->818 814->818 819 7ff77262c60e-7ff77262c616 815->819 820 7ff77262c5b5 815->820 818->790 819->790 822 7ff77262c5ba-7ff77262c5c1 820->822 823 7ff77262c5fd-7ff77262c608 822->823 824 7ff77262c5c3-7ff77262c5c7 822->824 823->819 825 7ff77262c5c9-7ff77262c5d0 824->825 826 7ff77262c5e3 824->826 825->826 828 7ff77262c5d2-7ff77262c5d6 825->828 827 7ff77262c5e9-7ff77262c5f9 826->827 827->822 829 7ff77262c5fb 827->829 828->826 830 7ff77262c5d8-7ff77262c5e1 828->830 829->819 830->827
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 19639ec9a806cf5fd7b7b21da6b32e82521a3d3d14dfc93c54a317619526b4ec
                                                              • Instruction ID: d5b756e063d1eb5c354e28acb50e159db3a474cda5490863eb0a4c666a80c25d
                                                              • Opcode Fuzzy Hash: 19639ec9a806cf5fd7b7b21da6b32e82521a3d3d14dfc93c54a317619526b4ec
                                                              • Instruction Fuzzy Hash: 6DC10623A3C68281E6116B1494402BFB7D6FB91B80FD65133D96D87B91CEFCE455CB22

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 941 7ff77262d750-7ff77262d775 942 7ff77262d77b-7ff77262d77e 941->942 943 7ff77262da43 941->943 945 7ff77262d7b7-7ff77262d7e3 942->945 946 7ff77262d780-7ff77262d7b2 call 7ff77262b008 942->946 944 7ff77262da45-7ff77262da55 943->944 948 7ff77262d7ee-7ff77262d7f4 945->948 949 7ff77262d7e5-7ff77262d7ec 945->949 946->944 951 7ff77262d7f6-7ff77262d7ff call 7ff77262cb10 948->951 952 7ff77262d804-7ff77262d819 call 7ff7726340ec 948->952 949->946 949->948 951->952 956 7ff77262d81f-7ff77262d828 952->956 957 7ff77262d933-7ff77262d93c 952->957 956->957 958 7ff77262d82e-7ff77262d832 956->958 959 7ff77262d93e-7ff77262d944 957->959 960 7ff77262d990-7ff77262d9b5 WriteFile 957->960 963 7ff77262d843-7ff77262d84e 958->963 964 7ff77262d834-7ff77262d83c call 7ff7726248e0 958->964 961 7ff77262d97c-7ff77262d98e call 7ff77262d208 959->961 962 7ff77262d946-7ff77262d949 959->962 965 7ff77262d9b7-7ff77262d9bd GetLastError 960->965 966 7ff77262d9c0 960->966 989 7ff77262d920-7ff77262d927 961->989 967 7ff77262d968-7ff77262d97a call 7ff77262d428 962->967 968 7ff77262d94b-7ff77262d94e 962->968 970 7ff77262d85f-7ff77262d874 GetConsoleMode 963->970 971 7ff77262d850-7ff77262d859 963->971 964->963 965->966 973 7ff77262d9c3 966->973 967->989 974 7ff77262d9d4-7ff77262d9de 968->974 975 7ff77262d954-7ff77262d966 call 7ff77262d30c 968->975 978 7ff77262d87a-7ff77262d880 970->978 979 7ff77262d92c 970->979 971->957 971->970 981 7ff77262d9c8 973->981 983 7ff77262da3c-7ff77262da41 974->983 984 7ff77262d9e0-7ff77262d9e5 974->984 975->989 987 7ff77262d909-7ff77262d91b call 7ff77262cd90 978->987 988 7ff77262d886-7ff77262d889 978->988 979->957 982 7ff77262d9cd 981->982 982->974 983->944 990 7ff77262d9e7-7ff77262d9ea 984->990 991 7ff77262da13-7ff77262da1d 984->991 987->989 994 7ff77262d88b-7ff77262d88e 988->994 995 7ff77262d894-7ff77262d8a2 988->995 989->981 996 7ff77262d9ec-7ff77262d9fb 990->996 997 7ff77262da03-7ff77262da0e call 7ff772627b74 990->997 998 7ff77262da1f-7ff77262da22 991->998 999 7ff77262da24-7ff77262da33 991->999 994->982 994->995 1000 7ff77262d900-7ff77262d904 995->1000 1001 7ff77262d8a4 995->1001 996->997 997->991 998->943 998->999 999->983 1000->973 1003 7ff77262d8a8-7ff77262d8bf call 7ff7726341b8 1001->1003 1007 7ff77262d8f7-7ff77262d8fd GetLastError 1003->1007 1008 7ff77262d8c1-7ff77262d8cd 1003->1008 1007->1000 1009 7ff77262d8ec-7ff77262d8f3 1008->1009 1010 7ff77262d8cf-7ff77262d8e1 call 7ff7726341b8 1008->1010 1009->1000 1012 7ff77262d8f5 1009->1012 1010->1007 1014 7ff77262d8e3-7ff77262d8ea 1010->1014 1012->1003 1014->1009
                                                              APIs
                                                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF77262D73B), ref: 00007FF77262D86C
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF77262D73B), ref: 00007FF77262D8F7
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ConsoleErrorLastMode
                                                              • String ID:
                                                              • API String ID: 953036326-0
                                                              • Opcode ID: e59e23b9ae9df683a2448d6b8a7942b821cb815a1334738b3acbe0f9f44b8420
                                                              • Instruction ID: b1ddd734c97933c8964eecdfa5c4efee0b1e0ffe3511167f912811d2e65fe205
                                                              • Opcode Fuzzy Hash: e59e23b9ae9df683a2448d6b8a7942b821cb815a1334738b3acbe0f9f44b8420
                                                              • Instruction Fuzzy Hash: F691D623F3865185F750AF2594402BEABE2BB44B88F944136DF5EA6E85CEBCD441CB21

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1015 7ff77262fe4c-7ff77262fe88 1016 7ff77263003e-7ff772630049 call 7ff772627bb8 1015->1016 1017 7ff77262fe8e-7ff77262fe97 1015->1017 1023 7ff77263004d-7ff772630069 call 7ff77261b210 1016->1023 1017->1016 1018 7ff77262fe9d-7ff77262fea6 1017->1018 1018->1016 1020 7ff77262feac-7ff77262feaf 1018->1020 1020->1016 1022 7ff77262feb5-7ff77262fec6 1020->1022 1025 7ff77262fec8-7ff77262fed1 call 7ff77262fdf0 1022->1025 1026 7ff77262fef0-7ff77262fef4 1022->1026 1025->1016 1033 7ff77262fed7-7ff77262feda 1025->1033 1026->1016 1028 7ff77262fefa-7ff77262fefe 1026->1028 1028->1016 1030 7ff77262ff04-7ff77262ff08 1028->1030 1030->1016 1032 7ff77262ff0e-7ff77262ff1e call 7ff77262fdf0 1030->1032 1038 7ff77262ff27 call 7ff772636a64 1032->1038 1039 7ff77262ff20-7ff77262ff23 1032->1039 1033->1016 1035 7ff77262fee0-7ff77262fee3 1033->1035 1035->1016 1036 7ff77262fee9 1035->1036 1036->1026 1042 7ff77262ff2c-7ff77262ff43 call 7ff772635e68 1038->1042 1039->1038 1040 7ff77262ff25 1039->1040 1040->1038 1045 7ff77262ff49-7ff77262ff54 call 7ff772635e98 1042->1045 1046 7ff77263006a-7ff77263007f call 7ff77262b0f4 1042->1046 1045->1046 1051 7ff77262ff5a-7ff77262ff65 call 7ff772635ec8 1045->1051 1051->1046 1054 7ff77262ff6b-7ff77262ffff 1051->1054 1055 7ff772630039-7ff77263003c 1054->1055 1056 7ff772630001-7ff77263001d 1054->1056 1055->1023 1057 7ff77263001f-7ff772630023 1056->1057 1058 7ff772630034-7ff772630037 1056->1058 1057->1058 1059 7ff772630025-7ff772630030 call 7ff772636aa8 1057->1059 1058->1023 1059->1058
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_isindst
                                                              • String ID:
                                                              • API String ID: 4170891091-0
                                                              • Opcode ID: 343253d67182dd2a72448d89f871ab81f98ff4614094d8d01b5f36bf0f0c1cee
                                                              • Instruction ID: f1de8ad0526915968e0cc89474d516d7c88cdeb06f032887689a7dabce18ee79
                                                              • Opcode Fuzzy Hash: 343253d67182dd2a72448d89f871ab81f98ff4614094d8d01b5f36bf0f0c1cee
                                                              • Instruction Fuzzy Hash: 87513873F381914AEB14FF2489516BDA7A2EB04398F900236DE2D92ED6DB78A445CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 1279662727-0
                                                              • Opcode ID: c67f5ae938835fa2502d01562ae39f89bdff0bc4628c51358d722f7e5224c2c4
                                                              • Instruction ID: 67c5f44be65285e6d277aa3b636e7db5c0b99751cd1129f2ea3347335ed1891e
                                                              • Opcode Fuzzy Hash: c67f5ae938835fa2502d01562ae39f89bdff0bc4628c51358d722f7e5224c2c4
                                                              • Instruction Fuzzy Hash: CF41B923D3878183E764AB21951037AB2A1FF54764F509336E66C43ED6DFBCA0A0CB21
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                              • String ID:
                                                              • API String ID: 3058843127-0
                                                              • Opcode ID: 38199fdf601c02b5acd9ad8abd91950348f48aca3f3bf2bc3aa7cea76cfadc85
                                                              • Instruction ID: 7136e502ec3a85c67dc321e8f639de0f2c94d590590dcb394e1350519c4d1260
                                                              • Opcode Fuzzy Hash: 38199fdf601c02b5acd9ad8abd91950348f48aca3f3bf2bc3aa7cea76cfadc85
                                                              • Instruction Fuzzy Hash: 11316A13B3C24281FA14BB2195513BBA293AF55784FD44836E62DC7AD7DEACB804CB71
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Process$CurrentExitTerminate
                                                              • String ID:
                                                              • API String ID: 1703294689-0
                                                              • Opcode ID: 05b912e5e96d4764905faa2e8471cd5f7ff91140ef6925b9dd4b21a42b261191
                                                              • Instruction ID: cf1075be9068c2600589d6c804f803f7ef9f1c7cd348e83cfe720d9cced52b03
                                                              • Opcode Fuzzy Hash: 05b912e5e96d4764905faa2e8471cd5f7ff91140ef6925b9dd4b21a42b261191
                                                              • Instruction Fuzzy Hash: CDD06211B3974642EB543B7058D507A92535F45711B94143AD42E86B93CDEDD84DCA21
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: bf695e5ebd070b16d3c9dc411202ca240fffd92a741aeee788228c76a8eaa1b2
                                                              • Instruction ID: 51e61464b26062e8a4516369a6e743414cb0d4d6e72b3b2eabe43c4c0105c05e
                                                              • Opcode Fuzzy Hash: bf695e5ebd070b16d3c9dc411202ca240fffd92a741aeee788228c76a8eaa1b2
                                                              • Instruction Fuzzy Hash: C851C823B3974245E664B925940067BA292AF44B64F944F36DE7D86BC9CEBCF401CA21
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: FileHandleType
                                                              • String ID:
                                                              • API String ID: 3000768030-0
                                                              • Opcode ID: 092bca7b1ce0229ec2977f61ae05433b611d0675e33fc3257f3191166c979508
                                                              • Instruction ID: 2149772b7f1d8e2702f8eb69889681b82a962188386f5e842fa346f16f67d774
                                                              • Opcode Fuzzy Hash: 092bca7b1ce0229ec2977f61ae05433b611d0675e33fc3257f3191166c979508
                                                              • Instruction Fuzzy Hash: 8F31E623B38B45C1EB20AB14858003AAA91FB45BA0BA52337DB7E877F0CF78E451D711
                                                              APIs
                                                              • SetFilePointerEx.KERNELBASE(?,?,?,?,?,00007FF77262C910,00000000,?,?,?,00007FF772611023,00007FF77262CA19), ref: 00007FF77262C970
                                                              • GetLastError.KERNEL32(?,?,?,?,?,00007FF77262C910,00000000,?,?,?,00007FF772611023,00007FF77262CA19), ref: 00007FF77262C97A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastPointer
                                                              • String ID:
                                                              • API String ID: 2976181284-0
                                                              • Opcode ID: c3276691dfa54add8aab7b71501380a6f7a34088be54c00a230e3fc7dd6eaf3d
                                                              • Instruction ID: 1af612bd14b39eebb704e39297689d1861373928fab0ce977c7851e9ee30e409
                                                              • Opcode Fuzzy Hash: c3276691dfa54add8aab7b71501380a6f7a34088be54c00a230e3fc7dd6eaf3d
                                                              • Instruction Fuzzy Hash: 7511CB63B38B4181DA10AB25A44416AF392AB44FF4F944332DEBD97BD9CEBCD051CB41
                                                              APIs
                                                              • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF77262816D), ref: 00007FF772628313
                                                              • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF77262816D), ref: 00007FF772628329
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Time$System$FileLocalSpecific
                                                              • String ID:
                                                              • API String ID: 1707611234-0
                                                              • Opcode ID: 8e0f84091da675c1e7d2761c5ab01bfa0fdefcc95389433c29e0bddc4b980661
                                                              • Instruction ID: 14fd054cd54fd5606bc7600db53eb31c6170c13a0a8a4211a54a659dfe539b6d
                                                              • Opcode Fuzzy Hash: 8e0f84091da675c1e7d2761c5ab01bfa0fdefcc95389433c29e0bddc4b980661
                                                              • Instruction Fuzzy Hash: 1901702263C25286E7546B14A84123BF7A2FB41B21FA00237EAB9C19D4DBBDD014CF20
                                                              APIs
                                                              • RtlFreeHeap.NTDLL(?,?,?,00007FF7726334F2,?,?,?,00007FF77263352F,?,?,00000000,00007FF7726339F5,?,?,00000000,00007FF772633927), ref: 00007FF77262B152
                                                              • GetLastError.KERNEL32(?,?,?,00007FF7726334F2,?,?,?,00007FF77263352F,?,?,00000000,00007FF7726339F5,?,?,00000000,00007FF772633927), ref: 00007FF77262B15C
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 485612231-0
                                                              • Opcode ID: bd7fbdfdad6615661f21df08ff0b0c44ce39d2d9351f92f753fa45b11a1058ef
                                                              • Instruction ID: 0b3b4b38e2c4c5907f7b2ccabdcd3363eb48c4ec86cca079fcae10fb828126a6
                                                              • Opcode Fuzzy Hash: bd7fbdfdad6615661f21df08ff0b0c44ce39d2d9351f92f753fa45b11a1058ef
                                                              • Instruction Fuzzy Hash: C3E04F52F3810682FF197BB2984513BA2939F48700FC04076C86DC7A52DEAC6451CA71
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: DirectoryErrorLastRemove
                                                              • String ID:
                                                              • API String ID: 377330604-0
                                                              • Opcode ID: 297a737b59c0f26e839d53f0b452475f126c06b16928b64a19d60d2641cf8387
                                                              • Instruction ID: afa2ce35ed22f5835f6fa15ccff9070767052c5c332a917b7e34fb6224648e6f
                                                              • Opcode Fuzzy Hash: 297a737b59c0f26e839d53f0b452475f126c06b16928b64a19d60d2641cf8387
                                                              • Instruction Fuzzy Hash: FCD0C912E3D54281E61437761C4513AA1D26F54B21FD00732C439C4AE1DDECA095C932
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: DeleteErrorFileLast
                                                              • String ID:
                                                              • API String ID: 2018770650-0
                                                              • Opcode ID: eb738eb08f60af69b1d540f13a17ed5422c5c541ba2047e2214e9b3371bf8c0d
                                                              • Instruction ID: 2869c69ed5450a3b89831b987b7136ffb713869b433656e5b028914410530655
                                                              • Opcode Fuzzy Hash: eb738eb08f60af69b1d540f13a17ed5422c5c541ba2047e2214e9b3371bf8c0d
                                                              • Instruction Fuzzy Hash: 86D0C912E3D60281E61437751C4513BA0D22F64B21FD00632C439C1AD1DEDCA195C936
                                                              APIs
                                                              • CloseHandle.KERNELBASE(?,?,?,00007FF77262B1C9,?,?,00000000,00007FF77262B27E), ref: 00007FF77262B3BA
                                                              • GetLastError.KERNEL32(?,?,?,00007FF77262B1C9,?,?,00000000,00007FF77262B27E), ref: 00007FF77262B3C4
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: CloseErrorHandleLast
                                                              • String ID:
                                                              • API String ID: 918212764-0
                                                              • Opcode ID: b828a77dcfeb373352f2d8c7a82202e8f61f505456f082703e4500e335fd06b0
                                                              • Instruction ID: d4fdbfea1f1249b3c9027afe641b0b4c1781fffb02b031e5c71eb79c293bfbf1
                                                              • Opcode Fuzzy Hash: b828a77dcfeb373352f2d8c7a82202e8f61f505456f082703e4500e335fd06b0
                                                              • Instruction Fuzzy Hash: 79219523F3864241EA947765954037E91C3AF98B90F844237DA3DC7AD9DEECE445CB22
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide_findclose
                                                              • String ID:
                                                              • API String ID: 2772937645-0
                                                              • Opcode ID: 86f54e799fc14d6776d83f717cd7df32fbe217db3f0ce8ed81bc5264a9db9ec6
                                                              • Instruction ID: 8dd07b72848ed5fb3491c0404fe801a460ec033a51a0c5d3aea8fbd814265177
                                                              • Opcode Fuzzy Hash: 86f54e799fc14d6776d83f717cd7df32fbe217db3f0ce8ed81bc5264a9db9ec6
                                                              • Instruction Fuzzy Hash: EA719153E28BC581E611DB2CC5052FEA360F7A8B4CF94E721DB9C52952EF68E2D9C710
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: d99b9abc4b8df377e1f0915198cf517e373d90b56daa9aa54f162d9008e272c1
                                                              • Instruction ID: 6cb6a3c64467646a9f7fe97840d31ba32def5a910c9a059f2638d1ed5d307843
                                                              • Opcode Fuzzy Hash: d99b9abc4b8df377e1f0915198cf517e373d90b56daa9aa54f162d9008e272c1
                                                              • Instruction Fuzzy Hash: 7A41C83393864183EA24AB15E54027AB3E2EB55750FA11133D6ADC3ED5CFACE502CF62
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock
                                                              • String ID:
                                                              • API String ID: 840049012-0
                                                              • Opcode ID: 3563ccebc92143b4f049d558b8f52f84df90e0c4a2ad06dd2b5cf157c636f80a
                                                              • Instruction ID: a272b4a459ea1dee2ab2f0813f95c3540e7c0009fe09a7a7c57c11e9ae751abc
                                                              • Opcode Fuzzy Hash: 3563ccebc92143b4f049d558b8f52f84df90e0c4a2ad06dd2b5cf157c636f80a
                                                              • Instruction Fuzzy Hash: EA217322B3829245FA15AA1265043BBE652BF45BD4FC84832EE1D87F86DFBCF441CA10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 5831f6cc4db2824f641be2b7722e7ce2439c7c37cfaa479adb27cb772694de6f
                                                              • Instruction ID: 2990fe00ec6535c85b786d5d7eb3e13e3b77e0881b25fb40ca852e5a74bacdd0
                                                              • Opcode Fuzzy Hash: 5831f6cc4db2824f641be2b7722e7ce2439c7c37cfaa479adb27cb772694de6f
                                                              • Instruction Fuzzy Hash: AA318323A3861285E6117F55884237EA692AB54B52FD24237D93C87BD1CEFCE441CF72
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: HandleModule$AddressFreeLibraryProc
                                                              • String ID:
                                                              • API String ID: 3947729631-0
                                                              • Opcode ID: 819e7aaa781c8a5e0f5c2a28287252285c8c38ccda9f693ebb8c6503ee73f1d7
                                                              • Instruction ID: 2fd9a9802b6bd4f551708049b91020b1edc6c8018384ac86dece673075871cb4
                                                              • Opcode Fuzzy Hash: 819e7aaa781c8a5e0f5c2a28287252285c8c38ccda9f693ebb8c6503ee73f1d7
                                                              • Instruction Fuzzy Hash: B2218D36A2474289EB25AF64C4442ED77E1EB44338F944A36D72C86EC5DFB8D844CB51
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 7624878a2af1481d619e4a3cb70b54330390797c8d08e01795187638a596a408
                                                              • Instruction ID: 13dc8c91ed10a1f0df42a937a264acf63caea841dd5d5d579869817c27e8fcdc
                                                              • Opcode Fuzzy Hash: 7624878a2af1481d619e4a3cb70b54330390797c8d08e01795187638a596a408
                                                              • Instruction Fuzzy Hash: 8F116523A3C64181EA61BF11944127BE2D5BF85B80FD44036EB9D97E8ACEBCD400CF62
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 00d01c734ac26cfb90a0ff058a2250daf25875829242f4a308a5e0168494b067
                                                              • Instruction ID: 1e313c998c4239aa6297e24a94a6e3f2d4bb2914359fd7e7109aa513ea5f4ea7
                                                              • Opcode Fuzzy Hash: 00d01c734ac26cfb90a0ff058a2250daf25875829242f4a308a5e0168494b067
                                                              • Instruction Fuzzy Hash: 1821A433A3C64186DB61AF18D44037AB6A2EB84B54F944235D66D87AD6DF7CD404CF50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 4fabe8843ae8e1237d46ca62601cadab040bf493176b279296c49385cc031cd0
                                                              • Instruction ID: ce212235815fa4ea11347446eb542a30348b9b468d86b11eb54a5fb635cccc71
                                                              • Opcode Fuzzy Hash: 4fabe8843ae8e1237d46ca62601cadab040bf493176b279296c49385cc031cd0
                                                              • Instruction Fuzzy Hash: 6601862273878240E504AB52540016AE692BF85FE0F884A32DF7C93FE9CEBCE011CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 347882529515d01e963d4ad72e621cd89eb36dce10a6a01321c8ca8b0745b047
                                                              • Instruction ID: 8a153fb2bd0993f099b8edec6223f1145bcbfcbc78befd81b65887c4fbac15a1
                                                              • Opcode Fuzzy Hash: 347882529515d01e963d4ad72e621cd89eb36dce10a6a01321c8ca8b0745b047
                                                              • Instruction Fuzzy Hash: 29018E12E3924341FE667A216941A7B92D2EF04390FD40937E93CC2ED6DEACE441CE72
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: 2e9c2fed31ce209c663494d0f972e01238ccad08ce398cd5f1aacec40adad3eb
                                                              • Instruction ID: 32b417e8a7514c1427001efb51430ad9b14b296c82f89f008584cc610f4da7d5
                                                              • Opcode Fuzzy Hash: 2e9c2fed31ce209c663494d0f972e01238ccad08ce398cd5f1aacec40adad3eb
                                                              • Instruction Fuzzy Hash: 0AE04F52A3824646FA563AA00982A7E91829F14700FC05032DD28C6683DD9C68449A33
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: DirectoryErrorLastRemove
                                                              • String ID:
                                                              • API String ID: 377330604-0
                                                              • Opcode ID: 053f510b52f7df2d75c0a03e14d6a8eb1a030f4260df6563830538c7266680a1
                                                              • Instruction ID: 49931c4667595ab5a73bfd972d71603eba6d36fcd18d9e30f7e2b1e549dcd83b
                                                              • Opcode Fuzzy Hash: 053f510b52f7df2d75c0a03e14d6a8eb1a030f4260df6563830538c7266680a1
                                                              • Instruction Fuzzy Hash: DF41B617E3C6C581E611AB2495012BEA361FFA5744F90A733DF9D82593EF68B5C8CB20
                                                              APIs
                                                              • HeapAlloc.KERNEL32(?,?,00000000,00007FF77262BBD6,?,?,?,00007FF77262AD97,?,?,00000000,00007FF77262B032), ref: 00007FF77262F3F5
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap
                                                              • String ID:
                                                              • API String ID: 4292702814-0
                                                              • Opcode ID: 6868375eac3188523277080d0eb70b1da507264a8937f584fe917df63d68eb1e
                                                              • Instruction ID: 56d8e8234759f7325952a0cb27b6277b39106ccb9a9940db931ce176b1811265
                                                              • Opcode Fuzzy Hash: 6868375eac3188523277080d0eb70b1da507264a8937f584fe917df63d68eb1e
                                                              • Instruction Fuzzy Hash: 5AF04942B3920641FE5976A295512BB92C26F58B50FC85436CD2EC6BC2DEECE581CA32
                                                              APIs
                                                              • HeapAlloc.KERNEL32(?,?,?,00007FF772620294,?,?,?,00007FF7726217A6,?,?,?,?,?,00007FF77262380D), ref: 00007FF77262DE2A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: AllocHeap
                                                              • String ID:
                                                              • API String ID: 4292702814-0
                                                              • Opcode ID: a8f0fa57666baf12ed64fd75c1b18540ade0a6450a17d9010f36fbe4a99d2898
                                                              • Instruction ID: 76541901b0ae1b92e0981966402c66287423274e03c38183920207b8d19dd19e
                                                              • Opcode Fuzzy Hash: a8f0fa57666baf12ed64fd75c1b18540ade0a6450a17d9010f36fbe4a99d2898
                                                              • Instruction Fuzzy Hash: 74F05413B3C24640FE5436615841277A1D25F54760FC80272DE7DC5AC2DEECE441C972
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: AddressProc
                                                              • String ID: Failed to get address for PyConfig_Clear$Failed to get address for PyConfig_InitIsolatedConfig$Failed to get address for PyConfig_Read$Failed to get address for PyConfig_SetBytesString$Failed to get address for PyConfig_SetString$Failed to get address for PyConfig_SetWideStringList$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyPreConfig_InitIsolatedConfig$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PyStatus_Exception$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetObject$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_ExitStatusException$Failed to get address for Py_Finalize$Failed to get address for Py_InitializeFromConfig$Failed to get address for Py_IsInitialized$Failed to get address for Py_PreInitialize$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                              • API String ID: 190572456-4266016200
                                                              • Opcode ID: ece4f3cf403fb028bc5f621de4105e28ef9936bcd080506c3e72f08851d14e59
                                                              • Instruction ID: 0ff0fd15f8f420171480c11742216a87e227142f567cb2c6cf074689fa3f2858
                                                              • Opcode Fuzzy Hash: ece4f3cf403fb028bc5f621de4105e28ef9936bcd080506c3e72f08851d14e59
                                                              • Instruction Fuzzy Hash: 4D12DE67A3EB4380F915EB04A854176A3A3AF14780BC45437D87EC6A55FFFCB558CA20
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                              • API String ID: 808467561-2761157908
                                                              • Opcode ID: b4390931dbc09bef546870a63927247bfb1623a2f9b228062280c66f96c213bb
                                                              • Instruction ID: 1b1a70b30713eee108b8633a2f69cf43be398d51bc815537efeaf44a713749f1
                                                              • Opcode Fuzzy Hash: b4390931dbc09bef546870a63927247bfb1623a2f9b228062280c66f96c213bb
                                                              • Instruction Fuzzy Hash: 00B2DA73A3C2828BE7259E64D4407FEB7A2FB54344F905136DA2D97E89DBB8A500CF50
                                                              APIs
                                                              • GetLastError.KERNEL32(WideCharToMultiByte,00007FF772611FF4,?,?,00000000,00007FF772617A84), ref: 00007FF772617817
                                                              • FormatMessageW.KERNEL32 ref: 00007FF772617846
                                                              • WideCharToMultiByte.KERNEL32 ref: 00007FF77261789C
                                                                • Part of subcall function 00007FF772611FC0: GetLastError.KERNEL32(?,?,00000000,00007FF772617A84,?,?,?,?,?,?,?,?,?,?,?,00007FF772611023), ref: 00007FF772611FE7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$ByteCharFormatMessageMultiWide
                                                              • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstaller: FormatMessageW failed.$PyInstaller: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                              • API String ID: 2383786077-2573406579
                                                              • Opcode ID: 063a19e7e4e938bc7e9332b8f0eaf0cb0266979bb0a85abf393a2baae1b6ea9d
                                                              • Instruction ID: 6ae62282b55b87a664c16a8c334e2cb99878483b5d4166917017bc02371d21de
                                                              • Opcode Fuzzy Hash: 063a19e7e4e938bc7e9332b8f0eaf0cb0266979bb0a85abf393a2baae1b6ea9d
                                                              • Instruction Fuzzy Hash: 84215662B3CA4281E750AB11E8502BBA366BB48344FC44536D66DC2A95DFBCE505CF20
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 3140674995-0
                                                              • Opcode ID: cd294871893556a2dccf655154be2bf3df3767e75769f0a36af62d0025b7db43
                                                              • Instruction ID: dc0fd8ed2b7e64ebd0130689e540c2a972cc6e30198f78e92096edea8efe4f83
                                                              • Opcode Fuzzy Hash: cd294871893556a2dccf655154be2bf3df3767e75769f0a36af62d0025b7db43
                                                              • Instruction Fuzzy Hash: 57311073729A8186EB60AF60E8403EEB365FB44744F84443ADA5D87B99DF78D548CB20
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                              • String ID:
                                                              • API String ID: 1239891234-0
                                                              • Opcode ID: 5c909bc5f961fe557bd935f3351fe35852182fda8fef980a068ed3a21c5f954e
                                                              • Instruction ID: 44c3a35d5d4707a8045506201209b6327d96e38b2a14787f751ff0f851737b20
                                                              • Opcode Fuzzy Hash: 5c909bc5f961fe557bd935f3351fe35852182fda8fef980a068ed3a21c5f954e
                                                              • Instruction Fuzzy Hash: 85318333638B8185D720DF25E8402AEB3A5FB88754F900136EA9D83B55DF7CD545CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: FileFindFirst_invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 2227656907-0
                                                              • Opcode ID: ac7b40576828fb79284637305c18dc54aad877062e0664899b88566ec7425f19
                                                              • Instruction ID: 090be1543cf54910807072574d5ce489337a698d596359e78516aa6b8061fe0c
                                                              • Opcode Fuzzy Hash: ac7b40576828fb79284637305c18dc54aad877062e0664899b88566ec7425f19
                                                              • Instruction Fuzzy Hash: 0AB19B13B3C69242EA51AB1599041BBE353FB44BD4F845133DA6D87E96DEBCE841CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: memcpy_s
                                                              • String ID:
                                                              • API String ID: 1502251526-0
                                                              • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                              • Instruction ID: 3e1c606eba0650565448b18a4a15b9c45dcea4b6ad8678d9c8c25ba82bdcd015
                                                              • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                              • Instruction Fuzzy Hash: 5DC1E373B3D2C587D7249F1AA44466AF7A2F785B84F808136DB5A83B45DB7CE801CB40
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ExceptionRaise_clrfp
                                                              • String ID:
                                                              • API String ID: 15204871-0
                                                              • Opcode ID: 14b0b223727ce09c818a2636dcd22f4f349b013c5bbbaf2d02418f2d406c5508
                                                              • Instruction ID: e8ae47f02598492dbb1155dc596ce1861fb688e125ad09ae2ef81a3bbdabfce7
                                                              • Opcode Fuzzy Hash: 14b0b223727ce09c818a2636dcd22f4f349b013c5bbbaf2d02418f2d406c5508
                                                              • Instruction Fuzzy Hash: AAB19E73628B848BE715CF29C88636D77E1F744B48F188922DA6DC3BA5CB79D851CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Find$CloseFileFirst
                                                              • String ID:
                                                              • API String ID: 2295610775-0
                                                              • Opcode ID: 5ef671962e715da3c8a8e416d99f93764277d8f402abbd57efef7bd2dac3d53b
                                                              • Instruction ID: 4944770361966f80d86826fbc459055ce64fa5c1ce3c7f54a39e5117136363c2
                                                              • Opcode Fuzzy Hash: 5ef671962e715da3c8a8e416d99f93764277d8f402abbd57efef7bd2dac3d53b
                                                              • Instruction Fuzzy Hash: C1F0A23763C28186F7A09B60A484367B352EB44724F400636D57D42AD4DF7CE048CE10
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: $
                                                              • API String ID: 0-227171996
                                                              • Opcode ID: 5f0767ddc937569d83b1029b76995e48451a7ec732ae4a2b8629df9491cfb095
                                                              • Instruction ID: 6372b3dce5d88579280cb44b3d91f7866c1bd5df20d7fdeb41218cb08a84065b
                                                              • Opcode Fuzzy Hash: 5f0767ddc937569d83b1029b76995e48451a7ec732ae4a2b8629df9491cfb095
                                                              • Instruction Fuzzy Hash: 8CE1F733A3864282E768AE25805013EB3E2FF45B44F945137DA6E87A90CF79D861CB52
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: e+000$gfff
                                                              • API String ID: 0-3030954782
                                                              • Opcode ID: 34786c9ff5a1a3317b9d56e91dc6f7680ce2ce63c5fb23e1dfbeb465e7250596
                                                              • Instruction ID: abb21a00c08876bdc98f23ada5d2ec2d6b5ef9a7972eff4f6f4528e80eaf149d
                                                              • Opcode Fuzzy Hash: 34786c9ff5a1a3317b9d56e91dc6f7680ce2ce63c5fb23e1dfbeb465e7250596
                                                              • Instruction Fuzzy Hash: F3513F67B382C545E7249A35980076AB7D2F744B94F888232CBB887FC5CEBDE445CB11
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: gfffffff
                                                              • API String ID: 0-1523873471
                                                              • Opcode ID: 8ac5862cb3248682a3be254f9b10f16ec2de46e882c07099e16768db122d88d1
                                                              • Instruction ID: c316084e055e9fea7a0e3ade4e465f1d57a2a1247bc99b58b27a409dd2e88dd1
                                                              • Opcode Fuzzy Hash: 8ac5862cb3248682a3be254f9b10f16ec2de46e882c07099e16768db122d88d1
                                                              • Instruction Fuzzy Hash: 1AA18967B387C586EB21DF25A0107AEB7D6AB54780F448032DEAD87B81DE7DE401CB12
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: TMP
                                                              • API String ID: 3215553584-3125297090
                                                              • Opcode ID: 7f91ca7fa574998dcb546e47ec08620b83c190e5d2876444cf799c44a103b84f
                                                              • Instruction ID: df49b8fdec37aed3a6efe1c72af9b5a8733fa1787cf074c88345cd8aa8735580
                                                              • Opcode Fuzzy Hash: 7f91ca7fa574998dcb546e47ec08620b83c190e5d2876444cf799c44a103b84f
                                                              • Instruction Fuzzy Hash: 3F51A313F3824241EA64B6265D0517BD2D2AF45F84F885036DE2DD3FD6EEBCE441CA26
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: HeapProcess
                                                              • String ID:
                                                              • API String ID: 54951025-0
                                                              • Opcode ID: aac3723c2b6a238aefd16b7154bc2a8422277b696578f47c41093f4a2a161188
                                                              • Instruction ID: 8586df31c44b6429fbd06011cee509cb364432ca0622bc8e3a9a057726b09cb3
                                                              • Opcode Fuzzy Hash: aac3723c2b6a238aefd16b7154bc2a8422277b696578f47c41093f4a2a161188
                                                              • Instruction Fuzzy Hash: EBB09B11F3B605C1E74437115C4111562557F44700FD44076C01C81710DD6C10A58B10
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 322cb2c86716cdece9c726e9e2c975567fe12a8aa85f98836abd6a4efd61a654
                                                              • Instruction ID: 10e24edf180a67c77293c71ed689e93e255c542b99dd982ba66ed01180e9a0e7
                                                              • Opcode Fuzzy Hash: 322cb2c86716cdece9c726e9e2c975567fe12a8aa85f98836abd6a4efd61a654
                                                              • Instruction Fuzzy Hash: 82E1F733A3864285E764AA28C15437EA7D3EB45B54F944133CE2D86BD4CFBDE851CB22
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b05b78add0f2b40b7b087ea5cffa0dec983d100235567ed1e4da1ebc7fff721b
                                                              • Instruction ID: 09ac7c5e5c61b6395023933e5bb82a9c269e90d5b6e7c357ff0b457d899ed377
                                                              • Opcode Fuzzy Hash: b05b78add0f2b40b7b087ea5cffa0dec983d100235567ed1e4da1ebc7fff721b
                                                              • Instruction Fuzzy Hash: 29D1E963E3864245EB28AE25805027FB7E2EB05B48F944137CE2D97E84DFBDD461CB12
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f178bcea31f42b4bc64690478f9f96677cb58666e765d6cdeb9d82255686b749
                                                              • Instruction ID: d372ee007f77625c444069f1fbf060350a08ba65dace4a50951f10db5cd60e1c
                                                              • Opcode Fuzzy Hash: f178bcea31f42b4bc64690478f9f96677cb58666e765d6cdeb9d82255686b749
                                                              • Instruction Fuzzy Hash: FCC1F8732241E04BE289EB29E85947A73E1F788349BD4413BEB8787785D63CF415EB20
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6930fb774978e8bd2e23ea1159758c6b57f5e6197580d07e4b645cf5423f36d5
                                                              • Instruction ID: bda94d45cc228b8db526da62ceaa1022ed7e2656ff95dfffbe4eb054c396ff1e
                                                              • Opcode Fuzzy Hash: 6930fb774978e8bd2e23ea1159758c6b57f5e6197580d07e4b645cf5423f36d5
                                                              • Instruction Fuzzy Hash: E6B1047353864287E7649F24C06023EBBE7E705B48F644136CA5D97B95CFB9D880CB62
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a7fa8dc11ed81710ce6b292fa711a018f65c6a2741825e179c54963bcefd4b70
                                                              • Instruction ID: 57e588d81ae73fe316eb698eb6cbc3c0776ba5da381fc49b1693d22a43575c6e
                                                              • Opcode Fuzzy Hash: a7fa8dc11ed81710ce6b292fa711a018f65c6a2741825e179c54963bcefd4b70
                                                              • Instruction Fuzzy Hash: 9BB1BE7393868586E7649F29C04023EBBE3F745B48FA44136CA5E87B95CFB9D441CB22
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3a1b3bde9e0c906050d36d4556dfde39456ce6978caf9c2efe7239a5fedb6bbf
                                                              • Instruction ID: f6e6cf4a05ecf7c0c90c9fbecbf0228222d25b213bd52cd2a0ea28fadd100ab3
                                                              • Opcode Fuzzy Hash: 3a1b3bde9e0c906050d36d4556dfde39456ce6978caf9c2efe7239a5fedb6bbf
                                                              • Instruction Fuzzy Hash: D481D277A386C186E774DB19904036BA6D2FB45794F84423ADAAD83F95CE7DE400CF12
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID:
                                                              • API String ID: 3215553584-0
                                                              • Opcode ID: eb0d7b43a1028ce40fdf7312490b9c01e59fcbcc0c8d1ac85de18c55be6dc943
                                                              • Instruction ID: 1231396fb31ffce69ced8cbf56f734a600746381455e45d7dbd2e2d4a721392f
                                                              • Opcode Fuzzy Hash: eb0d7b43a1028ce40fdf7312490b9c01e59fcbcc0c8d1ac85de18c55be6dc943
                                                              • Instruction Fuzzy Hash: 6C61A863A3C19246FB65A928545027BD5C3AF42760F95423BD67DC6EC6DEFDE800CE20
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 245e9c4bc0e0b9f18a3364aab59be83cbd96958e997944c25b022b0bfdd10beb
                                                              • Instruction ID: e3dd7bb6faa6a5cf0c4826ff8c4d1f544ab30276d40cf48684f5bbc2bfa742a0
                                                              • Opcode Fuzzy Hash: 245e9c4bc0e0b9f18a3364aab59be83cbd96958e997944c25b022b0bfdd10beb
                                                              • Instruction Fuzzy Hash: C551EAB3A3C65182E7249B28C44033A73E2EB44B58F645172CE5D97B95CB7AEC43CB91
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 36cfbc186101e0a77f1890a1c7e808c8c6087910b00f1974ef122b20eb5bde20
                                                              • Instruction ID: d7134bdb692e5122a422469e5b2b906fe765fb95aa0167a7700da68f8e449806
                                                              • Opcode Fuzzy Hash: 36cfbc186101e0a77f1890a1c7e808c8c6087910b00f1974ef122b20eb5bde20
                                                              • Instruction Fuzzy Hash: 1751F9B7E3C65182E7249B28C44023A73E2EB44B58F649172CE5C97B95CB7AE843CB51
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c8186251b5f2d9343d3d72692f21d58eaac1bc924a39335db57a069b4ce12c81
                                                              • Instruction ID: b3a09e7153412214aff2725f8d0cc022d0d18b02751ea83f8e687875f9c4e17a
                                                              • Opcode Fuzzy Hash: c8186251b5f2d9343d3d72692f21d58eaac1bc924a39335db57a069b4ce12c81
                                                              • Instruction Fuzzy Hash: DF51FA73A3C69181E7249B24C44423A73E2EB44F58F645172CE5C97B95CFBAE843CB51
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9412276bc5eb2fa85696182c8cfd52c2e9645a9302085a3d80f1ecd3ea1c0082
                                                              • Instruction ID: c1140dc1406bbc666304faedf254b35a1407837066de195dd1be76fe17a5ed40
                                                              • Opcode Fuzzy Hash: 9412276bc5eb2fa85696182c8cfd52c2e9645a9302085a3d80f1ecd3ea1c0082
                                                              • Instruction Fuzzy Hash: A151E6B3A3D65181EB249B29C44023E73E2EB44B58F645072DE5C87B96CB79E843CF51
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a877b357e31cd599e68a74dbaf5c8661608319cea2a418fc02a8a2ced54dbdec
                                                              • Instruction ID: 391273d2aea44435453b06887ddb85ad570201ac14829987e39d4a14213dd507
                                                              • Opcode Fuzzy Hash: a877b357e31cd599e68a74dbaf5c8661608319cea2a418fc02a8a2ced54dbdec
                                                              • Instruction Fuzzy Hash: 0D51F577A3C65182E7249B28C44022E73E2EB84B58F795172CE5C87B95CF7AE843CB51
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0b95b690bf34b7a50a36fd66378ab931284c1144445f06a5a46fd3f94635bebb
                                                              • Instruction ID: 492f7b515b02367f5b7628ee71205e6d459526084ef770ba832e2f43bb69e823
                                                              • Opcode Fuzzy Hash: 0b95b690bf34b7a50a36fd66378ab931284c1144445f06a5a46fd3f94635bebb
                                                              • Instruction Fuzzy Hash: 8A51CB3763465185E724AB19C04023E77E2EB54F58F644132CE9C97B94CF7AE883CB91
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7e13b74b0b529d91a8ac9ee6727b9f2d590474870fceb05c3e17ea5803dfc50d
                                                              • Instruction ID: 98492aa33a577ba3792c5529e06da7ba3a7c5703226db80e05bbaf0bb1ee1ebc
                                                              • Opcode Fuzzy Hash: 7e13b74b0b529d91a8ac9ee6727b9f2d590474870fceb05c3e17ea5803dfc50d
                                                              • Instruction Fuzzy Hash: 7E411A83C3A66A44FD91991C05086B696D29F127E0ED822BECCBDA7BD3CC4D3546C732
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 485612231-0
                                                              • Opcode ID: 2096fc0deaccd63eba972606d3676cbfca06e60653cd97219181f616f74d57e3
                                                              • Instruction ID: a63da70e8cf6dd5626969766aebfd74895f22dcee87fc4c5342aa264d8591ace
                                                              • Opcode Fuzzy Hash: 2096fc0deaccd63eba972606d3676cbfca06e60653cd97219181f616f74d57e3
                                                              • Instruction Fuzzy Hash: C4411167734A9482EE14DF2AD92416AB3A2A748FD0B889033DE1DC7B58DEBCD581C710
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e58efc7a4840026da8c2ee224b25c6e4052394f130e4aebb15c57cb528e7ae9d
                                                              • Instruction ID: 67b65637064004ea53ca5fd7b67c13d25b0427b04a26f7c4c9bd98ec376f799f
                                                              • Opcode Fuzzy Hash: e58efc7a4840026da8c2ee224b25c6e4052394f130e4aebb15c57cb528e7ae9d
                                                              • Instruction Fuzzy Hash: 1B310833B3DB4142E715EF21644012FA6D6AB85B90F544239EA6D93FD5DF7CD0018B10
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0754fbf4391b08832e62d9f9ec49176088946d616d14b97ca79cf869398b42df
                                                              • Instruction ID: 0ed7e6eaaabb68961f8e11117523a5ab3d14272cf616ec47e5c8c72a5cadc597
                                                              • Opcode Fuzzy Hash: 0754fbf4391b08832e62d9f9ec49176088946d616d14b97ca79cf869398b42df
                                                              • Instruction Fuzzy Hash: 52F068B27382958ADB94DF29A41262A77D1F7083C4F80D4BAD59DC3F14D67C9450CF14
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 76fa6bc1ba7292d5aca8c23be0546c73b69cb3dc5911c13ad77fb1461f7435d6
                                                              • Instruction ID: d0ed3dc8db3f59bf8de7a5bbafe7106ff3ec3b5295fca2edf13867f75290272c
                                                              • Opcode Fuzzy Hash: 76fa6bc1ba7292d5aca8c23be0546c73b69cb3dc5911c13ad77fb1461f7435d6
                                                              • Instruction Fuzzy Hash: F9A00223A7CC0AD4E644AB50E858032B332FB54341BC00433D02DC19B1AFBCB401CF24
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: AddressProc
                                                              • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                              • API String ID: 190572456-2208601799
                                                              • Opcode ID: 58f48e0339e39b57c848ce72b595bd14467f06102aa010257a61c7e5a99d3338
                                                              • Instruction ID: 596ab3c1aca73385a430e4da0bbb3aafadfe2b917edef67ed783ae4b01f1f73b
                                                              • Opcode Fuzzy Hash: 58f48e0339e39b57c848ce72b595bd14467f06102aa010257a61c7e5a99d3338
                                                              • Instruction Fuzzy Hash: 05E1EC6AE3DB4390FA14BB08A840176A3A3AF05790BC45437C57D86B66EFFCB554CB20
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32 ref: 00007FF772617E5C
                                                                • Part of subcall function 00007FF772611FC0: GetLastError.KERNEL32(?,?,00000000,00007FF772617A84,?,?,?,?,?,?,?,?,?,?,?,00007FF772611023), ref: 00007FF772611FE7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ByteCharErrorLastMultiWide
                                                              • String ID: Failed to decode wchar_t from UTF-8$Failed to encode filename as ANSI.$Failed to get ANSI buffer size.$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$WideCharToMultiByte$win32_utils_from_utf8$win32_wcs_to_mbs
                                                              • API String ID: 203985260-1562484376
                                                              • Opcode ID: a3dc191e6d3a7e30e6d3ca50687f8f113d99b437230db18f3ecdd854ec68b56a
                                                              • Instruction ID: 60175e855f75b442a7a78727669389a6c407dd81f728ae039cfb960f7a13a5fd
                                                              • Opcode Fuzzy Hash: a3dc191e6d3a7e30e6d3ca50687f8f113d99b437230db18f3ecdd854ec68b56a
                                                              • Instruction Fuzzy Hash: B2418062B3CA4285E610BB15A84017BE2D7AF447D0F844536E96D87E96EFBCF501CB60
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _fread_nolock
                                                              • String ID: %s%c%s$Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$\$fread$fseek$malloc
                                                              • API String ID: 840049012-2316137593
                                                              • Opcode ID: 4c95dd0d34d37db03b0c7629831d949fcc18f1294afb2a9d06a67c8a76cf6a06
                                                              • Instruction ID: 37f75f845922618817cd6c99bb314ad5a9fd5cdad307fadcd576bfc6b0525edc
                                                              • Opcode Fuzzy Hash: 4c95dd0d34d37db03b0c7629831d949fcc18f1294afb2a9d06a67c8a76cf6a06
                                                              • Instruction Fuzzy Hash: 28518663B3868245EA20B711A4512BBA356EF44784FC05833EA6DC7E8ADEBCF545CB10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: -$:$f$p$p
                                                              • API String ID: 3215553584-2013873522
                                                              • Opcode ID: d4cdf2ad873fcc1a55b2f356b6780668518a34574565391aeb310e891ef93fd5
                                                              • Instruction ID: 13c0b452683dad776b509f3e36a4b292cfafca8261ec9b1a161469ad5028d65a
                                                              • Opcode Fuzzy Hash: d4cdf2ad873fcc1a55b2f356b6780668518a34574565391aeb310e891ef93fd5
                                                              • Instruction Fuzzy Hash: 2112B363A3C14786FB20AA15D05467BE6D3EB40754FD4443BE6A986EC4DEBCE580CF22
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: f$f$p$p$f
                                                              • API String ID: 3215553584-1325933183
                                                              • Opcode ID: c0a981aa494adbb3b7342c3752dce4118702a1c34e2079eb9dc52d78b32a8c41
                                                              • Instruction ID: f74394175cb911872debf82f5078dd92d57ffab3643e815308cc68c828fcb2a0
                                                              • Opcode Fuzzy Hash: c0a981aa494adbb3b7342c3752dce4118702a1c34e2079eb9dc52d78b32a8c41
                                                              • Instruction Fuzzy Hash: DC128263A3C14385FB207A14A05427BF6E3EBA0754FD44136D6A986DC4DBBDE884CF62
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                              • API String ID: 0-3659356012
                                                              • Opcode ID: 90ce6babe0c5ccd43897601d73f0a6ba32a96eb65b1f49866d0d65fb14adb7b9
                                                              • Instruction ID: 1188d321481240f6a8fd923b544ee662094b8418a1529b5a83a8747170a8aea0
                                                              • Opcode Fuzzy Hash: 90ce6babe0c5ccd43897601d73f0a6ba32a96eb65b1f49866d0d65fb14adb7b9
                                                              • Instruction Fuzzy Hash: 5A317263B3864245EA24BB11A8001BBE3A2EB047D4FD45833DE6D87E56DEBDF541CB50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 849930591-393685449
                                                              • Opcode ID: ed4df90f0730f50539a8535a21476c0a1de0d4e3aa9e3d66922077705c9def21
                                                              • Instruction ID: 1e2799b3c08a0274c30488776ef96531bc1146cd0c37fd55185fe4379eba59f9
                                                              • Opcode Fuzzy Hash: ed4df90f0730f50539a8535a21476c0a1de0d4e3aa9e3d66922077705c9def21
                                                              • Instruction Fuzzy Hash: 29E17037B3878186EB24AF6594412AEB7A2FB49798F400936DE5D97B55CF78F080CB10
                                                              APIs
                                                              • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF772611023), ref: 00007FF7726179DF
                                                              • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF772611023), ref: 00007FF772617A2F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide
                                                              • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                              • API String ID: 626452242-27947307
                                                              • Opcode ID: 283b9852074a23623f78ed3985db15c4f61d23f1de9df3a16f6eda00b8e02162
                                                              • Instruction ID: 1aed322353b2c3ed622bd756e7ba3e4c86c7247ee4eb81cd6c2e3e3ec82b9753
                                                              • Opcode Fuzzy Hash: 283b9852074a23623f78ed3985db15c4f61d23f1de9df3a16f6eda00b8e02162
                                                              • Instruction Fuzzy Hash: E141A43363CB8281D621AF15E84016BE7A6FB84790F944436DAAD83F99DFBCE551CB10
                                                              APIs
                                                              • WideCharToMultiByte.KERNEL32(00000000,00007FF7726130F5), ref: 00007FF772618131
                                                                • Part of subcall function 00007FF772611FC0: GetLastError.KERNEL32(?,?,00000000,00007FF772617A84,?,?,?,?,?,?,?,?,?,?,?,00007FF772611023), ref: 00007FF772611FE7
                                                              • WideCharToMultiByte.KERNEL32(00000000,00007FF7726130F5), ref: 00007FF7726181A5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                              • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                              • API String ID: 1717984340-27947307
                                                              • Opcode ID: 1a6fdf0e1fc89b618f804e67e1824ecb1242a7be15b819eb949045da6c87acc4
                                                              • Instruction ID: 8470bd92ce48835c57a7773a75e94931062c1d4cd9b055ec32c29b89f9188f78
                                                              • Opcode Fuzzy Hash: 1a6fdf0e1fc89b618f804e67e1824ecb1242a7be15b819eb949045da6c87acc4
                                                              • Instruction Fuzzy Hash: F9216F62B38B4385E710AF16A84116AB7A7BB44B80F944536DA6D83B55EFBCE501CB10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo$_fread_nolock
                                                              • String ID: %s%c%s$ERROR: file already exists but should not: %s$PYINSTALLER_STRICT_UNPACK_MODE$WARNING: file already exists but should not: %s$\
                                                              • API String ID: 3231891352-3501660386
                                                              • Opcode ID: 45c82e91027f4a79a680c82a92934e320928fddaa14633864d4e615379ae879d
                                                              • Instruction ID: 7850547135b73835c8204fff9fb1b49769abd7978bebf097ee666278dacb3b02
                                                              • Opcode Fuzzy Hash: 45c82e91027f4a79a680c82a92934e320928fddaa14633864d4e615379ae879d
                                                              • Instruction Fuzzy Hash: 99516056B3D68241FA54BB11A5002BBD2929F45780F844836EA6DC6EDADEACF504CF70
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF77261D5AA,?,?,?,00007FF77261D29C,?,?,00000001,00007FF77261CEB9), ref: 00007FF77261D37D
                                                              • GetLastError.KERNEL32(?,?,?,00007FF77261D5AA,?,?,?,00007FF77261D29C,?,?,00000001,00007FF77261CEB9), ref: 00007FF77261D38B
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF77261D5AA,?,?,?,00007FF77261D29C,?,?,00000001,00007FF77261CEB9), ref: 00007FF77261D3B5
                                                              • FreeLibrary.KERNEL32(?,?,?,00007FF77261D5AA,?,?,?,00007FF77261D29C,?,?,00000001,00007FF77261CEB9), ref: 00007FF77261D3FB
                                                              • GetProcAddress.KERNEL32(?,?,?,00007FF77261D5AA,?,?,?,00007FF77261D29C,?,?,00000001,00007FF77261CEB9), ref: 00007FF77261D407
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProc
                                                              • String ID: api-ms-
                                                              • API String ID: 2559590344-2084034818
                                                              • Opcode ID: 401bf44a21d796c7bc3e63b3c41fdd6ef2024785226a2e5070dcc91098cb9f6a
                                                              • Instruction ID: e32399ee695f01f06f558bede020575cdab6a29640ce3bf58ff9e8972f08bb07
                                                              • Opcode Fuzzy Hash: 401bf44a21d796c7bc3e63b3c41fdd6ef2024785226a2e5070dcc91098cb9f6a
                                                              • Instruction Fuzzy Hash: 58319523B3A64281EE15BB02940056AA396BF45BA0F950936DE3DC6B81DFBCF445CB20
                                                              APIs
                                                                • Part of subcall function 00007FF772617FE0: MultiByteToWideChar.KERNEL32 ref: 00007FF77261801A
                                                              • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF772616BD1,00000000,00000000,00000000,00000000,?,00007FF77261154F), ref: 00007FF7726166AF
                                                              Strings
                                                              • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF772616686
                                                              • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF7726166C3
                                                              • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF77261670A
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ByteCharEnvironmentExpandMultiStringsWide
                                                              • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                              • API String ID: 2001182103-3498232454
                                                              • Opcode ID: 5a9a66fd2af3f3c10d5c7f75e4296a5dff3031b550318f5ebae2e3d37a800bd5
                                                              • Instruction ID: 7834a8cbac0264a767203dc1bf122a29fd7d63137d624692c17dab12d647434f
                                                              • Opcode Fuzzy Hash: 5a9a66fd2af3f3c10d5c7f75e4296a5dff3031b550318f5ebae2e3d37a800bd5
                                                              • Instruction Fuzzy Hash: 2C316857B3D78640FA25B721D5553BB9192AF88780FC44837DA6DC2E96EEACF104CE20
                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32 ref: 00007FF77261801A
                                                                • Part of subcall function 00007FF772611FC0: GetLastError.KERNEL32(?,?,00000000,00007FF772617A84,?,?,?,?,?,?,?,?,?,?,?,00007FF772611023), ref: 00007FF772611FE7
                                                              • MultiByteToWideChar.KERNEL32 ref: 00007FF7726180A0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                              • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                              • API String ID: 1717984340-876015163
                                                              • Opcode ID: 99d0c13c7fcb40935d26c9aca5e49299c1bd3538adca28ac103b13db73bad913
                                                              • Instruction ID: 84eeec4a7bee9c1f9503e5168ccfdcc6cb040ffabd6700a9f4072fd48dc2b91b
                                                              • Opcode Fuzzy Hash: 99d0c13c7fcb40935d26c9aca5e49299c1bd3538adca28ac103b13db73bad913
                                                              • Instruction Fuzzy Hash: 83215422B3CA4281E650EB19F44016AE3A2EB857C4F984536DB6C83F69EF6CE551CB10
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 536890598da63789cafebb39ab7a1b9b197f7be4c8ab1447fe8c2ed6f16a9d87
                                                              • Instruction ID: 37f245e7100e67b607a74e712f096af61ad5208b00b7df69807967a4679a0014
                                                              • Opcode Fuzzy Hash: 536890598da63789cafebb39ab7a1b9b197f7be4c8ab1447fe8c2ed6f16a9d87
                                                              • Instruction Fuzzy Hash: C7216D22E3C64242F9587721565123BE1C39F497A0F904737D87E97ED6DDECA400CE22
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                              • String ID: CONOUT$
                                                              • API String ID: 3230265001-3130406586
                                                              • Opcode ID: 782d7be382e6ca21b379f32368c73bb8775f466e7ed2cdd0d278672f00c346f0
                                                              • Instruction ID: 40cd43c9a79dc2c76273a6a555d6af845286dbd21ba553accf20b8926fd3c0d2
                                                              • Opcode Fuzzy Hash: 782d7be382e6ca21b379f32368c73bb8775f466e7ed2cdd0d278672f00c346f0
                                                              • Instruction Fuzzy Hash: 77119D26B3CA4186E3506B01E85432AB3A2FB58FE4F444235DA6DC7B95DFBCD544CB50
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,00007FF772627BC1,?,?,?,?,00007FF77262F407,?,?,00000000,00007FF77262BBD6,?,?,?), ref: 00007FF77262BAC7
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF772627BC1,?,?,?,?,00007FF77262F407,?,?,00000000,00007FF77262BBD6,?,?,?), ref: 00007FF77262BAFD
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF772627BC1,?,?,?,?,00007FF77262F407,?,?,00000000,00007FF77262BBD6,?,?,?), ref: 00007FF77262BB2A
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF772627BC1,?,?,?,?,00007FF77262F407,?,?,00000000,00007FF77262BBD6,?,?,?), ref: 00007FF77262BB3B
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF772627BC1,?,?,?,?,00007FF77262F407,?,?,00000000,00007FF77262BBD6,?,?,?), ref: 00007FF77262BB4C
                                                              • SetLastError.KERNEL32(?,?,?,00007FF772627BC1,?,?,?,?,00007FF77262F407,?,?,00000000,00007FF77262BBD6,?,?,?), ref: 00007FF77262BB67
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Value$ErrorLast
                                                              • String ID:
                                                              • API String ID: 2506987500-0
                                                              • Opcode ID: 23f6f2c62d004cfd5574e5c3f868082861320257ec1f712a364159cd7c87468a
                                                              • Instruction ID: 650bb620273940e0dfe780474f3945e038f10fd81ae430da037f24558b4a0a87
                                                              • Opcode Fuzzy Hash: 23f6f2c62d004cfd5574e5c3f868082861320257ec1f712a364159cd7c87468a
                                                              • Instruction Fuzzy Hash: 87115B22A3C28242FA187731564127BE1C3DF487B0F944736D83E87ED6DEACA441CE22
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                              • String ID: csm$f
                                                              • API String ID: 2395640692-629598281
                                                              • Opcode ID: 441ec2522eb67d11a7ea9a1300faeb4b4fa433f0a030fc2c64f19feb19168e88
                                                              • Instruction ID: 9657ae973a8752aa4bb5b37f0267794782e6f08e08d4c078b5982cfbe9a909c6
                                                              • Opcode Fuzzy Hash: 441ec2522eb67d11a7ea9a1300faeb4b4fa433f0a030fc2c64f19feb19168e88
                                                              • Instruction Fuzzy Hash: E051A433B3960286D714EB15D404A2EB757FB44B94F908932DA6AC3B88DFB8F941CB51
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 49a44557b6c7559572de52d78303139dcb5ac6347d4980437b0fa0186231bfbf
                                                              • Instruction ID: 8bdb3f3e84b3c58a904394539bcf6c2c1e606ff4c138121095c114a8d522aade
                                                              • Opcode Fuzzy Hash: 49a44557b6c7559572de52d78303139dcb5ac6347d4980437b0fa0186231bfbf
                                                              • Instruction Fuzzy Hash: CAF0442263960642EA106B24A88477BB362FF857A1F940236C57D859E5CFADD549CB20
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _set_statfp
                                                              • String ID:
                                                              • API String ID: 1156100317-0
                                                              • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                              • Instruction ID: 8b1da268690544b2ce3e64c1f040675fb3a851573872c3467d88885141adbbad
                                                              • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                              • Instruction Fuzzy Hash: E3118F33E3DA0301F6543525E64637790826F58370FC41636EABE86BD7AEACAE41DD60
                                                              APIs
                                                              • FlsGetValue.KERNEL32(?,?,?,00007FF77262AD97,?,?,00000000,00007FF77262B032,?,?,?,?,?,00007FF772622AF0), ref: 00007FF77262BB9F
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF77262AD97,?,?,00000000,00007FF77262B032,?,?,?,?,?,00007FF772622AF0), ref: 00007FF77262BBBE
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF77262AD97,?,?,00000000,00007FF77262B032,?,?,?,?,?,00007FF772622AF0), ref: 00007FF77262BBE6
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF77262AD97,?,?,00000000,00007FF77262B032,?,?,?,?,?,00007FF772622AF0), ref: 00007FF77262BBF7
                                                              • FlsSetValue.KERNEL32(?,?,?,00007FF77262AD97,?,?,00000000,00007FF77262B032,?,?,?,?,?,00007FF772622AF0), ref: 00007FF77262BC08
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 826f2a2bb5259ecdca222a4e952b5921e6103acacb5b4ea23dd563de8f2b1a04
                                                              • Instruction ID: 431f262b93833ac008c057eb6d67c25874122c153ded59667ae2e33bc83c35f7
                                                              • Opcode Fuzzy Hash: 826f2a2bb5259ecdca222a4e952b5921e6103acacb5b4ea23dd563de8f2b1a04
                                                              • Instruction Fuzzy Hash: B9119022F3824241F9587731654127BE1C39F497A0F846336E83E86ED6DDACA441CA22
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Value
                                                              • String ID:
                                                              • API String ID: 3702945584-0
                                                              • Opcode ID: 07fc115f0ab617edcc5ddaf63fb37d7a13bf2c82535a12df9d3141224ca85f6c
                                                              • Instruction ID: 0c03cada3fd6bb12ed7c99fcc1cfe90a9b9523173aac0d167c243c85404320d0
                                                              • Opcode Fuzzy Hash: 07fc115f0ab617edcc5ddaf63fb37d7a13bf2c82535a12df9d3141224ca85f6c
                                                              • Instruction Fuzzy Hash: 08113622E7924742F9687631581227BA1C3CF49360E944736D83E8AAD2DDECB401CA72
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: verbose
                                                              • API String ID: 3215553584-579935070
                                                              • Opcode ID: fe1e8efda0cf6c93562b921e4ec050f1932563884317df94160744cb1de47bce
                                                              • Instruction ID: 6e859f74ae1cc6a7443a412c039f6bd867a7bf80aacaf7f83b86b603fd3e16eb
                                                              • Opcode Fuzzy Hash: fe1e8efda0cf6c93562b921e4ec050f1932563884317df94160744cb1de47bce
                                                              • Instruction Fuzzy Hash: 6391D323A3864681F725AE25E45077EB7D2AB00B54FC4413BDA6D87BC4DEBCE441CB62
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _invalid_parameter_noinfo
                                                              • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                              • API String ID: 3215553584-1196891531
                                                              • Opcode ID: b2cc363805ca20447a25c8f81cd7393a480cab13a7b6463fd57a1b4c48298ff2
                                                              • Instruction ID: aebfc29cb05eda0daff5bb8ab6206a1763868221a60b5fc061d5484e309ed4a5
                                                              • Opcode Fuzzy Hash: b2cc363805ca20447a25c8f81cd7393a480cab13a7b6463fd57a1b4c48298ff2
                                                              • Instruction Fuzzy Hash: 0E81B273D3D24385FA64BE25811027AA6A2EF10B44FD55033CA6DD3AC6CABCE509DF61
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 3544855599-2084237596
                                                              • Opcode ID: e30b001a65ecbac323d64855d84c7dd7b86801db1d6a53d41dfb75bd32efedcc
                                                              • Instruction ID: 61061877ae35aa08ed0f0cbcbeed25d12263717bb1bc618127a30b12efbde3ad
                                                              • Opcode Fuzzy Hash: e30b001a65ecbac323d64855d84c7dd7b86801db1d6a53d41dfb75bd32efedcc
                                                              • Instruction Fuzzy Hash: 1A619A3BA28B858AE710DF65D4403AEB7A1FB44B88F544626EF5D47B95DFB8E040CB10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                              • String ID: csm$csm
                                                              • API String ID: 3896166516-3733052814
                                                              • Opcode ID: bdee17589bf75213b8a05d91e8f1b92ccfe5eb3b40fb346315327662de68e928
                                                              • Instruction ID: 6bf78d46fe22729971cf06b1ab35b2a4d7aadcc6311ef279768cce2cf95d8d34
                                                              • Opcode Fuzzy Hash: bdee17589bf75213b8a05d91e8f1b92ccfe5eb3b40fb346315327662de68e928
                                                              • Instruction Fuzzy Hash: C4519237A382C287EA649B11904036AB6A2FB54B84F584537DAAC87ED5CFBCF450CB10
                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(?,00007FF772612AEF), ref: 00007FF7726130C1
                                                                • Part of subcall function 00007FF772611FC0: GetLastError.KERNEL32(?,?,00000000,00007FF772617A84,?,?,?,?,?,?,?,?,?,?,?,00007FF772611023), ref: 00007FF772611FE7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastModuleName
                                                              • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                              • API String ID: 2776309574-1977442011
                                                              • Opcode ID: 49f1ecf3d94381de7c8fcc3105cc7b5bdb7d10445a3a2172c696d0a4c51e4e0e
                                                              • Instruction ID: ce651e0b12194cfe69373884a95303fd5deb0d1db2840517a33b192a07dea226
                                                              • Opcode Fuzzy Hash: 49f1ecf3d94381de7c8fcc3105cc7b5bdb7d10445a3a2172c696d0a4c51e4e0e
                                                              • Instruction Fuzzy Hash: C8015252B3C64655FA60B710D8463B7A292AF4C784FC00833D86EC5A86EEACF158CE20
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: FileWrite$ConsoleErrorLastOutput
                                                              • String ID:
                                                              • API String ID: 2718003287-0
                                                              • Opcode ID: 6eb07c62c7f2be5fe310762afd6a0bfddb871e62887f4110a816b6a1868fb288
                                                              • Instruction ID: 0ef5e4a0f1b97d440bcf19685e8cfe065e773c2398f4ab401a1f91764eec212c
                                                              • Opcode Fuzzy Hash: 6eb07c62c7f2be5fe310762afd6a0bfddb871e62887f4110a816b6a1868fb288
                                                              • Instruction Fuzzy Hash: A1D1F033B38A8189E710DF65D4402AD77B2FB48798B904226CF6E97F99DE78D406CB50
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                              • String ID:
                                                              • API String ID: 2780335769-0
                                                              • Opcode ID: a644cbf01c450c3453b8346303d2a41b57d7119f4d028b80f2dbef41ef418b95
                                                              • Instruction ID: 7fcca234c491ea9f42ad9591d834b7f3ac6e9383469a4239f8580b3b7339b71f
                                                              • Opcode Fuzzy Hash: a644cbf01c450c3453b8346303d2a41b57d7119f4d028b80f2dbef41ef418b95
                                                              • Instruction Fuzzy Hash: E651C323E3824185FB24EF70D49137E63E2BB44758F544536DE1997A49DF78D044CB21
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Window$Process$ConsoleCurrentShowThread
                                                              • String ID:
                                                              • API String ID: 242035731-0
                                                              • Opcode ID: f142a766af94d23a34c50566ceeff269ea394bc3c7539ab27bbf2cb06ea8d491
                                                              • Instruction ID: bd576fb9b0b676bea64dc10f0b648b457c1e1e5be12bc6c51979432563ced811
                                                              • Opcode Fuzzy Hash: f142a766af94d23a34c50566ceeff269ea394bc3c7539ab27bbf2cb06ea8d491
                                                              • Instruction Fuzzy Hash: B9F01222B3C746C2FA516B11A48413AA252FF48794F441032D96E87A55DF7CF455CB20
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Window$Process$ConsoleCurrentShowThread
                                                              • String ID:
                                                              • API String ID: 242035731-0
                                                              • Opcode ID: 3b045ef48ad9d1fcfb93a413f8f0a976a15e26462fa612dd2a279bb063aa5ba7
                                                              • Instruction ID: 43d0567b54d87984666920a0b8c1dbc7db389a0592395c7dfa2d1b2004e26302
                                                              • Opcode Fuzzy Hash: 3b045ef48ad9d1fcfb93a413f8f0a976a15e26462fa612dd2a279bb063aa5ba7
                                                              • Instruction Fuzzy Hash: C7F03722B3D74681EE556B26A48413AA2A2FF88790F481032D96E83A55DF7CF455CA20
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: _get_daylight$_invalid_parameter_noinfo
                                                              • String ID: ?
                                                              • API String ID: 1286766494-1684325040
                                                              • Opcode ID: 5e4ebd1a5459c2e423b2534f2a9cbc7097c5d613e404f6a657933abeadd07c2a
                                                              • Instruction ID: da69bfff6794991ca30fefc4fb50e6791e946011d0374634596cfa2f28511798
                                                              • Opcode Fuzzy Hash: 5e4ebd1a5459c2e423b2534f2a9cbc7097c5d613e404f6a657933abeadd07c2a
                                                              • Instruction Fuzzy Hash: CB41FB23A3C28141F7656B15944137B9692EB807A4F94423AEF6C87EDBDEBCD441CF14
                                                              APIs
                                                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF77262980A
                                                                • Part of subcall function 00007FF77262B13C: RtlFreeHeap.NTDLL(?,?,?,00007FF7726334F2,?,?,?,00007FF77263352F,?,?,00000000,00007FF7726339F5,?,?,00000000,00007FF772633927), ref: 00007FF77262B152
                                                                • Part of subcall function 00007FF77262B13C: GetLastError.KERNEL32(?,?,?,00007FF7726334F2,?,?,?,00007FF77263352F,?,?,00000000,00007FF7726339F5,?,?,00000000,00007FF772633927), ref: 00007FF77262B15C
                                                              • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF77261B535), ref: 00007FF772629828
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                              • String ID: C:\Users\user\Desktop\UiF5hKi5o7.exe
                                                              • API String ID: 3580290477-2226567000
                                                              • Opcode ID: 4dbf1527d4e58d516c7ee72884490de61766f176bacbb8e5bffd339a416dd47e
                                                              • Instruction ID: 6760be6dc69a1dce3353eb45f205975254ae1359a95ac1efbf6031760dc44886
                                                              • Opcode Fuzzy Hash: 4dbf1527d4e58d516c7ee72884490de61766f176bacbb8e5bffd339a416dd47e
                                                              • Instruction Fuzzy Hash: 9041A433A3971285EB15BF2294410BEA2D6EF84790BA44037E96D83F45EE7DD581CB21
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastWrite
                                                              • String ID: U
                                                              • API String ID: 442123175-4171548499
                                                              • Opcode ID: 2dd23d861f39fa8c48265a5b090f5e727a49fb98d456b98054fc3ae4b3cee164
                                                              • Instruction ID: 076bfab05ae5abb859fc2348a6a8667ddae7c348c9eb8c299f2104c8d2ccb8bb
                                                              • Opcode Fuzzy Hash: 2dd23d861f39fa8c48265a5b090f5e727a49fb98d456b98054fc3ae4b3cee164
                                                              • Instruction Fuzzy Hash: 3A41A323B3964185DB20AF25E4443AAA7A5F798794F844032EE5D87B58DFBCE441CB50
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: CurrentDirectory
                                                              • String ID: :
                                                              • API String ID: 1611563598-336475711
                                                              • Opcode ID: c951c9f5a06786afa9f7a1c5b602e5650f2703f1cd8c2b6b9cec0e97c1d1868a
                                                              • Instruction ID: 35cf7e4fa8dd087b30e721d98bc68fd336e266b75bc3c6e0f31cd6139e525d4a
                                                              • Opcode Fuzzy Hash: c951c9f5a06786afa9f7a1c5b602e5650f2703f1cd8c2b6b9cec0e97c1d1868a
                                                              • Instruction Fuzzy Hash: 0521B663A3828181EB24AB11905426FB3F2FB84B44FC54136DAAC83A84CFBCE545CB61
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 6516e85e4b84e47353546abe8fa16ce7e0c12dcece2dedf88f831252cdda500d
                                                              • Instruction ID: fa8a830d25b155307026a968afc89686affe4bb41207d23fccd05f7272019150
                                                              • Opcode Fuzzy Hash: 6516e85e4b84e47353546abe8fa16ce7e0c12dcece2dedf88f831252cdda500d
                                                              • Instruction Fuzzy Hash: 23113D32628B4582EB609F15F44026AB7A1FB88B88F584231DF9C87B65DF7CD551CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000001.00000002.2248053225.00007FF772611000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF772610000, based on PE: true
                                                              • Associated: 00000001.00000002.2248031395.00007FF772610000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248090145.00007FF77263B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF77264E000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248116199.00007FF772650000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                              • Associated: 00000001.00000002.2248161354.00007FF772652000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_1_2_7ff772610000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: DriveType_invalid_parameter_noinfo
                                                              • String ID: :
                                                              • API String ID: 2595371189-336475711
                                                              • Opcode ID: 30ecb463a9293d5892dedd1a0e3f87856f73a65bf087bf20bcac9d3b0060f559
                                                              • Instruction ID: 2a3494ddd854c39e1f729120cfd7fb46d5325d30e1eb6640dba2a858f7ebd56b
                                                              • Opcode Fuzzy Hash: 30ecb463a9293d5892dedd1a0e3f87856f73a65bf087bf20bcac9d3b0060f559
                                                              • Instruction Fuzzy Hash: F7017163A3C24285FB61BF60946127FA3A1EF54714FC40437D96DC6A82DEACE548CE24
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID: volatile$<unknown>$UNKNOWN$__int128$__int16$__int32$__int64$__int8$__w64 $auto$bool$char$char16_t$char32_t$char8_t$const$decltype(auto)$double$float$int$long$long $short$signed $unsigned $void$volatile$wchar_t
                                                              • API String ID: 2943138195-1388207849
                                                              • Opcode ID: 34b20832b4d5a9c82cdd9a34609b0a596913eac70dfc3082442192f721d64891
                                                              • Instruction ID: 59a814306d2f6ba551000e7c7c98938950be1e176704c9972e7a7bcb6dd64de7
                                                              • Opcode Fuzzy Hash: 34b20832b4d5a9c82cdd9a34609b0a596913eac70dfc3082442192f721d64891
                                                              • Instruction Fuzzy Hash: ACF16A72F18A1299FB548BACC8542BC27B1BF157C4F80953ADB1D16AA8DF3DE644C340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID: `anonymous namespace'
                                                              • API String ID: 2943138195-3062148218
                                                              • Opcode ID: c36001f134547c1fc12f70ffa9b86d35a9d04869d0c52a2f257cd9dd74f3dfc9
                                                              • Instruction ID: 10074a9a50bb3f19e6ab12a978becd0af82d1b5e55508cd567abcfba44b5485f
                                                              • Opcode Fuzzy Hash: c36001f134547c1fc12f70ffa9b86d35a9d04869d0c52a2f257cd9dd74f3dfc9
                                                              • Instruction Fuzzy Hash: 58E17DB2A08B8696EB10CFA8E8801ED77A0FB45788F949036EB5D17B95DF3CE555C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID:
                                                              • API String ID: 2943138195-0
                                                              • Opcode ID: 63ad456de8db332c0b347e2e514b887ab112aaee213ccda8367cb7f767930e9c
                                                              • Instruction ID: e1307a64a4be5e025d1e02855915364b4a12bbf23f2fb4e4b3210a4e13a5a7c4
                                                              • Opcode Fuzzy Hash: 63ad456de8db332c0b347e2e514b887ab112aaee213ccda8367cb7f767930e9c
                                                              • Instruction Fuzzy Hash: 98F16976B08A829AEB10DFA8D4901FC77B5EB0578CB448036EB4D67A99DF38D55AC340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID: NULL$`generic-class-parameter-$`generic-method-parameter-$`template-type-parameter-$nullptr
                                                              • API String ID: 2943138195-2309034085
                                                              • Opcode ID: 767f6b35ed257beddb1ea2fff1390adae3ecab9bc22a75a6672164d643aa4b64
                                                              • Instruction ID: 701d136f32e5d2497fdcff3afa9f05bae8a9140dc7294649162de79ebe66683d
                                                              • Opcode Fuzzy Hash: 767f6b35ed257beddb1ea2fff1390adae3ecab9bc22a75a6672164d643aa4b64
                                                              • Instruction Fuzzy Hash: 84E17E62E0C61294FB15ABFEC9941BC27A1AF497C4F54813ACF8D26B99DF3CA905C340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Frame$BlockEstablisherHandler3::Unwindabortterminate$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 3436797354-393685449
                                                              • Opcode ID: d5e0e3ab29c15918133307a59fdea49d8ed4f7431b693d67295d57de9f2acebd
                                                              • Instruction ID: 59c1d873dee27303ad6f4f3d39c5b1faf4c9964f628174750bf9f57642c04c10
                                                              • Opcode Fuzzy Hash: d5e0e3ab29c15918133307a59fdea49d8ed4f7431b693d67295d57de9f2acebd
                                                              • Instruction Fuzzy Hash: 0DD17032A08B418AEB609FA9D4843AD77A4FB857D8F14813ADF8D57B59CF38E494C700
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: `generic-type-$`template-parameter-$generic-type-$template-parameter-
                                                              • API String ID: 0-3207858774
                                                              • Opcode ID: 6f458657f8fae6e2f2557f40169539ea56a3e6fb73d2116d9b83691f1491e61c
                                                              • Instruction ID: ef01b05fdb72ad420aad5c2749f6f328c8a981ed4181199881e4f12f50e84918
                                                              • Opcode Fuzzy Hash: 6f458657f8fae6e2f2557f40169539ea56a3e6fb73d2116d9b83691f1491e61c
                                                              • Instruction Fuzzy Hash: E5919C62B08A8689FB11CFADD4502BC37A1AB55BC4F889036DB5D03795EF3CE906C760
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+$Name::operator+=
                                                              • String ID: `unknown ecsu'$class $coclass $cointerface $enum $struct $union
                                                              • API String ID: 179159573-1464470183
                                                              • Opcode ID: 2fc61dd6c602e97fa3c1e55ca06bd20aebc659b0b394667bc2b1a0081ee2f141
                                                              • Instruction ID: 3d1362c2a29b626f704d40892af7e8b921ce30f37e9e77f6d1a6bfeebabc3ee3
                                                              • Opcode Fuzzy Hash: 2fc61dd6c602e97fa3c1e55ca06bd20aebc659b0b394667bc2b1a0081ee2f141
                                                              • Instruction Fuzzy Hash: 26513772F18A2689FB14DBA8E8805BC77B5BB153C8F508139EF0D66A98DF39E545C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID:
                                                              • API String ID: 2943138195-0
                                                              • Opcode ID: 28d39e64d2900046752fe00e0d170ae61e4b908a297697eb59c3c366de5be272
                                                              • Instruction ID: 545931b1767d8c5e526291caf36c5c70402d4b8059c5bbabae51e318836041da
                                                              • Opcode Fuzzy Hash: 28d39e64d2900046752fe00e0d170ae61e4b908a297697eb59c3c366de5be272
                                                              • Instruction Fuzzy Hash: 4F614A62B14B6698FB00DBE8D8801EC37B1BB45788F909436EF4D6BA99DF78D545C340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: abortterminate$Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                              • String ID: csm$csm$csm
                                                              • API String ID: 211107550-393685449
                                                              • Opcode ID: 1f2c6e9c8ad6c1917ecaa8d6efe9c468c91fc9baef10e6d9588306a72b9f3ebc
                                                              • Instruction ID: 9ea84510a9673dd87d538fa2eebefa4001fee448f7c3055c1b49fbaba37fb1b2
                                                              • Opcode Fuzzy Hash: 1f2c6e9c8ad6c1917ecaa8d6efe9c468c91fc9baef10e6d9588306a72b9f3ebc
                                                              • Instruction Fuzzy Hash: 4FE1A073A086828AE7109FB8D4802AD7BA5FB85BD8F19813ADF9D47755CF38E495C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID: cli::array<$cli::pin_ptr<$std::nullptr_t$std::nullptr_t $void$void
                                                              • API String ID: 2943138195-2239912363
                                                              • Opcode ID: e2dcc5ac231621b7bb9adceaede0f9dd180f9bba2b8fff5e7c5622460418e45f
                                                              • Instruction ID: 9ea80375222b62fdd824682f0d8eb4b1aafdb87d051a526bdbdf06319f5ed3e1
                                                              • Opcode Fuzzy Hash: e2dcc5ac231621b7bb9adceaede0f9dd180f9bba2b8fff5e7c5622460418e45f
                                                              • Instruction Fuzzy Hash: CC518C62E18B5698FB11CBA8D8852BC77B4BB58788F44C13ADF4D12B95DF3CA244CB10
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: FileHeader$ExceptionFindInstanceRaiseTargetType
                                                              • String ID: Access violation - no RTTI data!$Attempted a typeid of nullptr pointer!$Bad dynamic_cast!$Bad read pointer - no RTTI data!
                                                              • API String ID: 1852475696-928371585
                                                              • Opcode ID: 7f6c35cefbfcfc98e88ebc0aa35afe6c2c6ede9eabcdb344d1914a97fbaad475
                                                              • Instruction ID: 07c77ad30da301d77144d21f4f3d6a0758b2c9013d33546275bb46cae5b65968
                                                              • Opcode Fuzzy Hash: 7f6c35cefbfcfc98e88ebc0aa35afe6c2c6ede9eabcdb344d1914a97fbaad475
                                                              • Instruction Fuzzy Hash: 6451C162A19A4692EE60CBACE8906B963A1FF44BD4F408436DB8E07765EF3CE505C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+$Name::operator+=
                                                              • String ID: {for
                                                              • API String ID: 179159573-864106941
                                                              • Opcode ID: edc966f78679f2c80b6a90da374f91d2d358e76260b44eb27b7c84d8a506cb89
                                                              • Instruction ID: f03fe6c83707e6d69bbcb166ac463e9d75e182d12c67f7c4bf21ee11812c5f59
                                                              • Opcode Fuzzy Hash: edc966f78679f2c80b6a90da374f91d2d358e76260b44eb27b7c84d8a506cb89
                                                              • Instruction Fuzzy Hash: 81515772A08A86AAEB119FA8D4413ED33A1FB45788F80D035EB4C4BB95DF7CE555C310
                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF8BFB96A6B,?,?,00000000,00007FF8BFB9689C,?,?,?,?,00007FF8BFB965E5), ref: 00007FF8BFB96931
                                                              • GetLastError.KERNEL32(?,?,?,00007FF8BFB96A6B,?,?,00000000,00007FF8BFB9689C,?,?,?,?,00007FF8BFB965E5), ref: 00007FF8BFB9693F
                                                              • wcsncmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF8BFB96A6B,?,?,00000000,00007FF8BFB9689C,?,?,?,?,00007FF8BFB965E5), ref: 00007FF8BFB96958
                                                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF8BFB96A6B,?,?,00000000,00007FF8BFB9689C,?,?,?,?,00007FF8BFB965E5), ref: 00007FF8BFB9696A
                                                              • FreeLibrary.KERNEL32(?,?,?,00007FF8BFB96A6B,?,?,00000000,00007FF8BFB9689C,?,?,?,?,00007FF8BFB965E5), ref: 00007FF8BFB969B0
                                                              • GetProcAddress.KERNEL32(?,?,?,00007FF8BFB96A6B,?,?,00000000,00007FF8BFB9689C,?,?,?,?,00007FF8BFB965E5), ref: 00007FF8BFB969BC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Library$Load$AddressErrorFreeLastProcwcsncmp
                                                              • String ID: api-ms-
                                                              • API String ID: 916704608-2084034818
                                                              • Opcode ID: 45bb9c456b18d615664943834e4003b355ea3ec7f5874fc1f64106649d67ca5c
                                                              • Instruction ID: d03c2c8cf1a09aa18da2c20488f5606b70ab7929933c65165812047b57ec4d75
                                                              • Opcode Fuzzy Hash: 45bb9c456b18d615664943834e4003b355ea3ec7f5874fc1f64106649d67ca5c
                                                              • Instruction Fuzzy Hash: 5831E521B0AB5691EE51DB9AD8002B523A5FF08BE0F59853AEF2D07394EF3CE544C710
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: abort$AdjustPointer
                                                              • String ID:
                                                              • API String ID: 1501936508-0
                                                              • Opcode ID: ad7bbbe6b4c289a22ae1e43e79ef4439cf3ee9b14764b2eff01f06dd25f3f236
                                                              • Instruction ID: 0b86b1501308bb0f8685659f83e4dc30a8a190d899f1cd59fb9f99b3605ffced
                                                              • Opcode Fuzzy Hash: ad7bbbe6b4c289a22ae1e43e79ef4439cf3ee9b14764b2eff01f06dd25f3f236
                                                              • Instruction Fuzzy Hash: 38518D61E0AA9781FA699BDDD88467877A4AF44FD0F19C439CF4D06B99DF2CE4428310
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: abort$AdjustPointer
                                                              • String ID:
                                                              • API String ID: 1501936508-0
                                                              • Opcode ID: d386002f74db6febb42ef9b4bac4e43e25a554ab645870d9c47f674d5a84533b
                                                              • Instruction ID: cc12bbe9b5d1f8d061891f795ee06781c1af38a86d23a4323cad4e174f7882ef
                                                              • Opcode Fuzzy Hash: d386002f74db6febb42ef9b4bac4e43e25a554ab645870d9c47f674d5a84533b
                                                              • Instruction Fuzzy Hash: 6951BB26E0AA4681FEA69FED99846387390AF55FD0F1AC035CF5D16F95DE2CE842C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: FileHeader_local_unwind
                                                              • String ID: MOC$RCC$csm$csm
                                                              • API String ID: 2627209546-1441736206
                                                              • Opcode ID: 385ada566cdd30ad99b7ac5e1d5c8025a7264eea7c22efa234297d7bd0e399d8
                                                              • Instruction ID: 844427b66b8f5502d0369f3051f6f2a02060f7797de5c4e01edc1e859397835d
                                                              • Opcode Fuzzy Hash: 385ada566cdd30ad99b7ac5e1d5c8025a7264eea7c22efa234297d7bd0e399d8
                                                              • Instruction Fuzzy Hash: 68518D76A0961286EA609FA9D80477D27E0FF84BD4F15A036EF9C42389DF3CE4418A01
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: NameName::atol
                                                              • String ID: `template-parameter$void
                                                              • API String ID: 2130343216-4057429177
                                                              • Opcode ID: 2821a58495c29764098872c6b010649cccddcb6c42941e500fb92a9452cac6b1
                                                              • Instruction ID: a0598c63d22a055deabbf05f02413da5bff08d0a83f2336de15ca94e29ce1746
                                                              • Opcode Fuzzy Hash: 2821a58495c29764098872c6b010649cccddcb6c42941e500fb92a9452cac6b1
                                                              • Instruction Fuzzy Hash: 28410566F08A5688FB01DBA9D8512BC23B1BB08BC8F949139DF4D16B59DF7CA545C340
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID: ,...$,<ellipsis>$...$<ellipsis>$void
                                                              • API String ID: 2943138195-2211150622
                                                              • Opcode ID: 16d5b7056506ac1aa3be62c87a897449e0af35361c1a5b370ad614f7e7c3f2e7
                                                              • Instruction ID: aedea82ee705562226f1c1f10190eb2634951507de7c5b74d92e84ba62d02051
                                                              • Opcode Fuzzy Hash: 16d5b7056506ac1aa3be62c87a897449e0af35361c1a5b370ad614f7e7c3f2e7
                                                              • Instruction Fuzzy Hash: 6F4124B2A18B4A88FB118FACD8802BC3BA4BB48788F949136DB5D57764DF3CE545C750
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID: char $int $long $short $unsigned
                                                              • API String ID: 2943138195-3894466517
                                                              • Opcode ID: 1a667bf595c3f0eddcec5e75b1b20bf055c895b242c78c01af1086ecda962d52
                                                              • Instruction ID: 624d6d48bbc97b99997222cd1fd0f0a212d61dae01a92d412029d30d0f902525
                                                              • Opcode Fuzzy Hash: 1a667bf595c3f0eddcec5e75b1b20bf055c895b242c78c01af1086ecda962d52
                                                              • Instruction Fuzzy Hash: 83415672E1CA5689EB128FACE8841BC77B5BB08788F44D139DB0C56BA8DF3CA544C710
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: free$EntryInterlockedListNamePush__unmallocstrcpy_s
                                                              • String ID:
                                                              • API String ID: 3741236498-0
                                                              • Opcode ID: 6447550c70440ae48e9dc09acfbe7fa3055870e3a5d625089a78ddc05dba8847
                                                              • Instruction ID: de39f78b5c8bb3f2e357d97f3235e3d743efa5fc3e0b9cc466a8083c16c5c6bf
                                                              • Opcode Fuzzy Hash: 6447550c70440ae48e9dc09acfbe7fa3055870e3a5d625089a78ddc05dba8847
                                                              • Instruction Fuzzy Hash: 5331D126B19B9590EB51DB6EA80457933A1FF09FD4B598639DF2D03380EE3DE442C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: abort$CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 2889003569-2084237596
                                                              • Opcode ID: 63425386b35f735f5eb303e83bfbe55818570f32e5447e3767ff35a3eaf3afb3
                                                              • Instruction ID: 5356225f34f08308a2e741a6caf7e2eb01f3b9eb7e583189e80b2fad81aabd53
                                                              • Opcode Fuzzy Hash: 63425386b35f735f5eb303e83bfbe55818570f32e5447e3767ff35a3eaf3afb3
                                                              • Instruction Fuzzy Hash: FF916073A087958AE750CBA9E8802AD7BB4F7447C8F14812AEF8D57B65DF38D1A5C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID: std::nullptr_t$std::nullptr_t $volatile$volatile
                                                              • API String ID: 2943138195-757766384
                                                              • Opcode ID: 8ec89114dc1e92fb087ff84a90b975bd849231731579a14e6ae3ff20f009c8f1
                                                              • Instruction ID: 06f8f51171b040c01a3fcc5817ed7610b10ea8bb59e92893b010c82e630aa980
                                                              • Opcode Fuzzy Hash: 8ec89114dc1e92fb087ff84a90b975bd849231731579a14e6ae3ff20f009c8f1
                                                              • Instruction Fuzzy Hash: 9C7149B6A08A4684EB148FACD9511BC77A5BF157C4F44D539DB5E07AA8DF3CE650C300
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: abort$CallEncodePointerTranslator
                                                              • String ID: MOC$RCC
                                                              • API String ID: 2889003569-2084237596
                                                              • Opcode ID: bda6881e4fb6ddd96fb50e60b72b5d1eaa618bcc944dda4a5bc0b193bb5b3b27
                                                              • Instruction ID: eadd4040517a35ec0bd00425cad08d1b68abd5ef624b4ce7c26e4b51a9a26427
                                                              • Opcode Fuzzy Hash: bda6881e4fb6ddd96fb50e60b72b5d1eaa618bcc944dda4a5bc0b193bb5b3b27
                                                              • Instruction Fuzzy Hash: 24613977A08A858AE714CFA9D4807AD77A5FB84BC8F188125EF4D13B58DF38E055C700
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: NameName::$Name::operator+
                                                              • String ID:
                                                              • API String ID: 826178784-0
                                                              • Opcode ID: 7682a6ebcb32bf14f43659220100a1b4a5a4a6e3db385e7ce84af32120df353b
                                                              • Instruction ID: 15bb7aaf1f47cae7791f23f31d5cb07f53516d67497b2d2c38cfc47beba19fbd
                                                              • Opcode Fuzzy Hash: 7682a6ebcb32bf14f43659220100a1b4a5a4a6e3db385e7ce84af32120df353b
                                                              • Instruction Fuzzy Hash: D4418C32B08B5684EB10CBA9D8901BD77B8BB59BC0BA48036EB5D53795DF3CE955C300
                                                              APIs
                                                                • Part of subcall function 00007FF8BFB96710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8BFB9239E), ref: 00007FF8BFB9671E
                                                              • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8BFB941C3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: abort
                                                              • String ID: $csm$csm
                                                              • API String ID: 4206212132-1512788406
                                                              • Opcode ID: a1e41bd14f4dc8a012b9b6851bae8dba3a2639313cd67671a1d4b299b7556132
                                                              • Instruction ID: 859f935e81d3805313f97a93b73663e86c8a761090893c3ca45e697f9e39e197
                                                              • Opcode Fuzzy Hash: a1e41bd14f4dc8a012b9b6851bae8dba3a2639313cd67671a1d4b299b7556132
                                                              • Instruction Fuzzy Hash: 2271AD32A08691C6DB688FAA94507B97BA1FB45BC9F14C135DF8C07A99CB3CE491C740
                                                              APIs
                                                                • Part of subcall function 00007FF8BFB96710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8BFB9239E), ref: 00007FF8BFB9671E
                                                              • abort.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8BFB93F13
                                                              • __FrameHandler3::FrameUnwindToEmptyState.LIBVCRUNTIME ref: 00007FF8BFB93F23
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Frameabort$EmptyHandler3::StateUnwind
                                                              • String ID: csm$csm
                                                              • API String ID: 4108983575-3733052814
                                                              • Opcode ID: 723d316c6bb1492db26d318ced58129fbbb71e04f86aecbd325fb3d3c805e488
                                                              • Instruction ID: 979f038200b5db12fc09df913a7110e96bfbaeddf1440c24bfc0250e24178c25
                                                              • Opcode Fuzzy Hash: 723d316c6bb1492db26d318ced58129fbbb71e04f86aecbd325fb3d3c805e488
                                                              • Instruction Fuzzy Hash: 0A513A3290868286EB748F9AA44436877A4FB94BD5F18C136EB9D47BD5CF3CE461CB01
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: NameName::
                                                              • String ID: %lf
                                                              • API String ID: 1333004437-2891890143
                                                              • Opcode ID: f37b8968dc856f8c22d72c120ca4476383f363961e161f929d9d255907aecf6d
                                                              • Instruction ID: c7321a7b7c6bae8a351dab48d344368d6c5d5e4dcbeb004634f1179c11f7ab32
                                                              • Opcode Fuzzy Hash: f37b8968dc856f8c22d72c120ca4476383f363961e161f929d9d255907aecf6d
                                                              • Instruction Fuzzy Hash: 7631B076A0CA8185EA20CBA9E85127AB7A5FB89BC4F54C135EB9E47645CF3CE502C700
                                                              APIs
                                                                • Part of subcall function 00007FF8BFB96710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8BFB9239E), ref: 00007FF8BFB9671E
                                                              • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8BFB9243E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: abortterminate
                                                              • String ID: MOC$RCC$csm
                                                              • API String ID: 661698970-2671469338
                                                              • Opcode ID: b838753ef247b2fc749e3877e0128dea9035de62b0ba29f15289213c97603889
                                                              • Instruction ID: 6081b4bd373506fd1ad32b0dbd51f56f45ebaf748aa9b919ff640e745ab17d42
                                                              • Opcode Fuzzy Hash: b838753ef247b2fc749e3877e0128dea9035de62b0ba29f15289213c97603889
                                                              • Instruction Fuzzy Hash: 81F0F93691864686EB506FA9E18106937A5FB88BC4F0AD476DB5807792CF3CE4A0CA42
                                                              APIs
                                                              • __C_specific_handler.LIBVCRUNTIME ref: 00007FF8BFB9E9F0
                                                                • Part of subcall function 00007FF8BFB9EC30: _IsNonwritableInCurrentImage.LIBCMT ref: 00007FF8BFB9ECF0
                                                                • Part of subcall function 00007FF8BFB9EC30: RtlUnwindEx.KERNEL32(?,?,?,?,?,?,?,00007FF8BFB9E9F5), ref: 00007FF8BFB9ED3F
                                                                • Part of subcall function 00007FF8BFB96710: abort.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF8BFB9239E), ref: 00007FF8BFB9671E
                                                              • terminate.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF8BFB9EA1A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: C_specific_handlerCurrentImageNonwritableUnwindabortterminate
                                                              • String ID: csm$f
                                                              • API String ID: 2451123448-629598281
                                                              • Opcode ID: c9fb23446a5b638453e0304dd207887769bfaeb8010eb75ee95ffcfd07f137de
                                                              • Instruction ID: b26ceb9be158d231e2fb2ea12a05ba04cf82c163fe377b8f2f8585c7e3479f6a
                                                              • Opcode Fuzzy Hash: c9fb23446a5b638453e0304dd207887769bfaeb8010eb75ee95ffcfd07f137de
                                                              • Instruction Fuzzy Hash: 2EE09236D1C38681EB606FE9B18113D27A5FF25BD4F15C039DB8807796CE3CE8A08611
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID:
                                                              • API String ID: 2943138195-0
                                                              • Opcode ID: f50f9f5b0f4c072e52125a456639a7d4e2bd829a5a5137cb56b4f6bb80237050
                                                              • Instruction ID: f5b4cb19c80e133e9869be8571df65a2a438ca18891eedcbcd180ce939206afe
                                                              • Opcode Fuzzy Hash: f50f9f5b0f4c072e52125a456639a7d4e2bd829a5a5137cb56b4f6bb80237050
                                                              • Instruction Fuzzy Hash: 18916962E08B5689FB918BE8D8803BC37B1BB14788F54903ADF5D176A5DF7CA846C340
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+$NameName::
                                                              • String ID:
                                                              • API String ID: 168861036-0
                                                              • Opcode ID: fdc850366a52cc8509fdc883a27d076c67a20e363f2b2ed3a2a440fa302089d7
                                                              • Instruction ID: 66dcf7a77a53776eedc68467be17f5e45bb7491c17c86acd9cda35d82b0196d3
                                                              • Opcode Fuzzy Hash: fdc850366a52cc8509fdc883a27d076c67a20e363f2b2ed3a2a440fa302089d7
                                                              • Instruction Fuzzy Hash: 265186B2E18A5689EB10CFA8E8403BD77A9BB85B88F548035DB1E47B95DF3DE441C340
                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID:
                                                              • API String ID: 2943138195-0
                                                              • Opcode ID: 010c9cc7b649f2daabbc83b7255f351f4a32df461fe661a6f710ba75eaae01a6
                                                              • Instruction ID: 0148a451bd8665bb4edb4516ee673b93a7252c8eabc50aaea0697eadbbe5b036
                                                              • Opcode Fuzzy Hash: 010c9cc7b649f2daabbc83b7255f351f4a32df461fe661a6f710ba75eaae01a6
                                                              • Instruction Fuzzy Hash: 0E4108B2A08B968AFB02CFA8D8413AC77B0FB55B88F548039DB4D5775ADF789541C710
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: abort$CreateFrameInfo
                                                              • String ID: csm
                                                              • API String ID: 2697087660-1018135373
                                                              • Opcode ID: f6943bea1c78c8542bb5a279c29cdd6a6ec40214996e776607272464948ef889
                                                              • Instruction ID: a52a1f19d88308d377c5747548d0a799d0a9eafbf859d3e5eec1de7b6150ba2a
                                                              • Opcode Fuzzy Hash: f6943bea1c78c8542bb5a279c29cdd6a6ec40214996e776607272464948ef889
                                                              • Instruction Fuzzy Hash: F2514C36A1978186E660AF59E08026E77A5FB89BD0F148539DF8D07B55CF3CE461CB00
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+
                                                              • String ID: void$void
                                                              • API String ID: 2943138195-3746155364
                                                              • Opcode ID: ff67bb32e799e4a453516f5f2b265aba841f0c9d9f12838b8a28f15594d75a10
                                                              • Instruction ID: aeceb7f233bc73a7b4bc56bc9db263a723cc190e6e0cfb7d5cc271773406ca09
                                                              • Opcode Fuzzy Hash: ff67bb32e799e4a453516f5f2b265aba841f0c9d9f12838b8a28f15594d75a10
                                                              • Instruction Fuzzy Hash: 11312662E18B6998FB10CBA8E8410FC37B4BB48788B44813AEF4E62B59DF3C9144C750
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: FileHeader$ExceptionRaise
                                                              • String ID: Access violation - no RTTI data!$Bad dynamic_cast!
                                                              • API String ID: 3685223789-3176238549
                                                              • Opcode ID: d06b4d24d7aa4607bffac334420f89fbd77c373aef9fdd9199db5b082a62258c
                                                              • Instruction ID: 05c269f8d8d97ae2e558294d98dc07500205ead954dc2610aa73993014389b34
                                                              • Opcode Fuzzy Hash: d06b4d24d7aa4607bffac334420f89fbd77c373aef9fdd9199db5b082a62258c
                                                              • Instruction Fuzzy Hash: 3601A265A2DA4AE1EF40DB9CE8911B86361FF90BC4F80A435E74E076A9EF7CD509C700
                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFileHeaderRaise
                                                              • String ID: csm
                                                              • API String ID: 2573137834-1018135373
                                                              • Opcode ID: 04e89f2c23f7d49b97199698fdfbf86ccf7878464e1c577e170b006b6ea557c8
                                                              • Instruction ID: c01eb0993129f9d3bb597ff2c1e759d555c527c4c1ea18d21540c46505371af9
                                                              • Opcode Fuzzy Hash: 04e89f2c23f7d49b97199698fdfbf86ccf7878464e1c577e170b006b6ea557c8
                                                              • Instruction Fuzzy Hash: EA114C32A18B8582EB618F69F440269BBA5FB88BC4F588235DF8C07B58DF3CD551CB00
                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,00007FF8BFB965B9,?,?,?,?,00007FF8BFB9FB22,?,?,?,?,?), ref: 00007FF8BFB9674B
                                                              • SetLastError.KERNEL32(?,?,?,00007FF8BFB965B9,?,?,?,?,00007FF8BFB9FB22,?,?,?,?,?), ref: 00007FF8BFB967D4
                                                              Memory Dump Source
                                                              • Source File: 00000004.00000002.2247322827.00007FF8BFB91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF8BFB90000, based on PE: true
                                                              • Associated: 00000004.00000002.2247299680.00007FF8BFB90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247348346.00007FF8BFBA1000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247370423.00007FF8BFBA6000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                              • Associated: 00000004.00000002.2247392718.00007FF8BFBA7000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_4_2_7ff8bfb90000_UiF5hKi5o7.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast
                                                              • String ID:
                                                              • API String ID: 1452528299-0
                                                              • Opcode ID: c7aaac8a80d8b30c274ca3e3b7c59e83a4e0092024cc1b5b0b7c72c8c7be0031
                                                              • Instruction ID: d87610e8c624524a597633017e84312b9672516bc219dbb15bfd063c06a64c3a
                                                              • Opcode Fuzzy Hash: c7aaac8a80d8b30c274ca3e3b7c59e83a4e0092024cc1b5b0b7c72c8c7be0031
                                                              • Instruction Fuzzy Hash: BC111F24E0D65682FA649BA9A8641352392AF48BE0F15C63CDF7F077E5DE2CF8518710