Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KzHndnydSG.dll

Overview

General Information

Sample name:KzHndnydSG.dll
renamed because original name is a hash value
Original sample name:5144ec5b8e4375671dd921a235f83dbe1620c50091bd6c9f91eb0cf362ea7c7f.exe
Analysis ID:1568429
MD5:6af2398f4f0239a8fc1d7e64bf0b3be3
SHA1:b9af7cc99389dcee4157d095b6479cbe4c3670fe
SHA256:5144ec5b8e4375671dd921a235f83dbe1620c50091bd6c9f91eb0cf362ea7c7f
Tags:185-216-71-202exeuser-JAMESWT_MHT
Infos:

Detection

CobaltStrike
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file does not import any functions
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 7748 cmdline: loaddll64.exe "C:\Users\user\Desktop\KzHndnydSG.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 7756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7800 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 7824 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7808 cmdline: rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DAssemble MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7932 cmdline: rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DCompile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7964 cmdline: rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DCompile2 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7560 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DAssemble MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3820 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1852 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompile2 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1968 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",IEX MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4344 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",DebugSetMute MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4348 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DWriteBlobToFile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4240 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DStripShader MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4244 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DSetBlobPart MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3420 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReturnFailure1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6916 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReflectLibrary MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5936 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReflect MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7140 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReadFileToBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7536 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DPreprocess MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6524 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DLoadModule MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 744 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetTraceInstructionOffsets MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4780 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetOutputSignatureBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6256 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetInputSignatureBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7000 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetInputAndOutputSignatureBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7644 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetDebugInfo MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5580 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetBlobPart MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2156 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassembleRegion MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6532 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble11Trace MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6616 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble10Effect MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7672 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7876 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDecompressShaders MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 764 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateLinker MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7864 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateFunctionLinkingGraph MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7860 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7868 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompressShaders MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3276 cmdline: rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompileFromFile MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 18500, "MaxGetSize": 2140839, "Jitter": 35, "C2Server": "185.216.71.202,/broadcast", "HttpPostUri": "/1/events/com.amazon.csm.csa.prod", "Malleable_C2_Instructions": ["Remove 1308 bytes from the end", "Remove 1 bytes from the end", "Remove 194 bytes from the beginning", "Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\wermgr.exe", "Spawnto_x64": "%windir%\\sysnative\\wermgr.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 12345, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 24576, "ProcInject_PrependAppend_x86": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_PrependAppend_x64": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
    00000006.00000002.1932419653.0000021A31BCC000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000006.00000003.1905939888.0000021A3036D000.00000020.00000001.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        00000004.00000002.1861923373.000001D38B8DC000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
          00000000.00000003.1937652629.0000023D5F31D000.00000020.00000001.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            3.3.rundll32.exe.21a85040000.0.unpackJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
              3.3.rundll32.exe.21a85040000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
                3.3.rundll32.exe.21a85040000.0.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
                  0.3.loaddll64.exe.23d5f300000.0.unpackJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
                    0.3.loaddll64.exe.23d5f300000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
                      Click to see the 10 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-04T16:18:11.371997+010020287653Unknown Traffic192.168.2.949824185.216.71.202443TCP
                      2024-12-04T16:18:40.107699+010020287653Unknown Traffic192.168.2.949843185.216.71.202443TCP
                      2024-12-04T16:19:11.124435+010020287653Unknown Traffic192.168.2.949873185.216.71.202443TCP
                      2024-12-04T16:19:41.497897+010020287653Unknown Traffic192.168.2.949901185.216.71.202443TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 18500, "MaxGetSize": 2140839, "Jitter": 35, "C2Server": "185.216.71.202,/broadcast", "HttpPostUri": "/1/events/com.amazon.csm.csa.prod", "Malleable_C2_Instructions": ["Remove 1308 bytes from the end", "Remove 1 bytes from the end", "Remove 194 bytes from the beginning", "Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\wermgr.exe", "Spawnto_x64": "%windir%\\sysnative\\wermgr.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 12345, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 24576, "ProcInject_PrependAppend_x86": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_PrependAppend_x64": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": ""}
                      Source: KzHndnydSG.dllReversingLabs: Detection: 47%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                      Source: KzHndnydSG.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 185.216.71.202
                      Source: Joe Sandbox ViewASN Name: CLOUDCOMPUTINGDE CLOUDCOMPUTINGDE
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.9:49824 -> 185.216.71.202:443
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.9:49843 -> 185.216.71.202:443
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.9:49873 -> 185.216.71.202:443
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.9:49901 -> 185.216.71.202:443
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.216.71.202
                      Source: KzHndnydSG.dllString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                      Source: KzHndnydSG.dllString found in binary or memory: http://ocsp.thawte.com0
                      Source: KzHndnydSG.dllString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                      Source: KzHndnydSG.dllString found in binary or memory: http://s2.symcb.com0
                      Source: KzHndnydSG.dllString found in binary or memory: http://sv.symcb.com/sv.crl0f
                      Source: KzHndnydSG.dllString found in binary or memory: http://sv.symcb.com/sv.crt0
                      Source: KzHndnydSG.dllString found in binary or memory: http://sv.symcd.com0&
                      Source: KzHndnydSG.dllString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                      Source: KzHndnydSG.dllString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                      Source: KzHndnydSG.dllString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                      Source: KzHndnydSG.dllString found in binary or memory: http://www.symauth.com/cps0(
                      Source: KzHndnydSG.dllString found in binary or memory: http://www.symauth.com/rpa00
                      Source: loaddll64.exe, 00000000.00000003.2899583217.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899456465.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589317398.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844376273.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589434374.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2246602342.0000023D5F1AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/
                      Source: loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202//
                      Source: loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/broadcast
                      Source: loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/broadcast32
                      Source: loaddll64.exe, 00000000.00000003.2899583217.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589492234.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844376273.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844496263.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899456465.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589317398.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/broadcastA~
                      Source: loaddll64.exe, 00000000.00000003.2899583217.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844376273.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844496263.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899456465.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/broadcastLx
                      Source: loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/broadcastU~
                      Source: loaddll64.exe, 00000000.00000003.2589492234.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589317398.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/broadcastXx
                      Source: loaddll64.exe, 00000000.00000003.2589492234.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589317398.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/broadcastk~
                      Source: loaddll64.exe, 00000000.00000003.2899583217.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844376273.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844496263.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899456465.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/broadcastm~
                      Source: loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://185.216.71.202/broadcastox
                      Source: KzHndnydSG.dllString found in binary or memory: https://d.symcb.com/cps0%
                      Source: KzHndnydSG.dllString found in binary or memory: https://d.symcb.com/rpa0
                      Source: rundll32.exe, 00000007.00000002.1934840953.000002220A11F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49906
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49901
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49901 -> 443
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D9F9C5 NtOpenSection,NtMapViewOfSection,11_2_00007FF8E7D9F9C5
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A8507AC603_3_0000021A8507AC60
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A850496803_3_0000021A85049680
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A8507B5443_3_0000021A8507B544
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A85079F343_3_0000021A85079F34
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A850887503_3_0000021A85088750
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A8507F9E43_3_0000021A8507F9E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A8505B1F43_3_0000021A8505B1F4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A85084AA83_3_0000021A85084AA8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A850859003_3_0000021A85085900
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000021A8504916C3_3_0000021A8504916C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A8512CB5C3_2_0000021A8512CB5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A851373D03_2_0000021A851373D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A851305E43_2_0000021A851305E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A85137D403_2_0000021A85137D40
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A85129D703_2_0000021A85129D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A8512B8603_2_0000021A8512B860
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A8512BFCC3_2_0000021A8512BFCC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B844AA84_3_000001D38B844AA8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B81B1F44_3_000001D38B81B1F4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B83F9E44_3_000001D38B83F9E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B8459004_3_000001D38B845900
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B80916C4_3_000001D38B80916C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B839F344_3_000001D38B839F34
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B8487504_3_000001D38B848750
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B8096804_3_000001D38B809680
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B83B5444_3_000001D38B83B544
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001D38B83AC604_3_000001D38B83AC60
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B8CCB5C4_2_000001D38B8CCB5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B8CB8604_2_000001D38B8CB860
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B8CBFCC4_2_000001D38B8CBFCC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B8D05E44_2_000001D38B8D05E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B8D7D404_2_000001D38B8D7D40
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B8C9D704_2_000001D38B8C9D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B8D73D04_2_000001D38B8D73D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000021A31BBB8606_2_0000021A31BBB860
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000021A31BBBFCC6_2_0000021A31BBBFCC
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000021A31BBCB5C6_2_0000021A31BBCB5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000021A31BB9D706_2_0000021A31BB9D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002220BBAB8607_2_000002220BBAB860
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002220BBABFCC7_2_000002220BBABFCC
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002220BBA9D707_2_000002220BBA9D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002220BBACB5C7_2_000002220BBACB5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D9F9C511_2_00007FF8E7D9F9C5
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAAF2D11_2_00007FF8E7DAAF2D
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D7EBDF11_2_00007FF8E7D7EBDF
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAD4F411_2_00007FF8E7DAD4F4
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DA52E811_2_00007FF8E7DA52E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAE1E811_2_00007FF8E7DAE1E8
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DC31C011_2_00007FF8E7DC31C0
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAD9D211_2_00007FF8E7DAD9D2
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D853CE11_2_00007FF8E7D853CE
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D764CC11_2_00007FF8E7D764CC
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D788D211_2_00007FF8E7D788D2
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAB8A711_2_00007FF8E7DAB8A7
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D96FB511_2_00007FF8E7D96FB5
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D752B311_2_00007FF8E7D752B3
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D7A87D11_2_00007FF8E7D7A87D
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAC28011_2_00007FF8E7DAC280
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DB477C11_2_00007FF8E7DB477C
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D7B38D11_2_00007FF8E7D7B38D
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D73C5D11_2_00007FF8E7D73C5D
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D94A5B11_2_00007FF8E7D94A5B
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D7146E11_2_00007FF8E7D7146E
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D7876C11_2_00007FF8E7D7876C
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DB1D7511_2_00007FF8E7DB1D75
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D8497311_2_00007FF8E7D84973
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAC63D11_2_00007FF8E7DAC63D
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAD14911_2_00007FF8E7DAD149
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D7545211_2_00007FF8E7D75452
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D8EA2711_2_00007FF8E7D8EA27
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7D9990211_2_00007FF8E7D99902
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAC4F811_2_00007FF8E7DAC4F8
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DADB1711_2_00007FF8E7DADB17
                      Source: C:\Windows\System32\rundll32.exeCode function: 11_2_00007FF8E7DAC00811_2_00007FF8E7DAC008
                      Source: KzHndnydSG.dllStatic PE information: invalid certificate
                      Source: KzHndnydSG.dllStatic PE information: No import functions for PE file found
                      Source: KzHndnydSG.dllBinary or memory string: OriginalFilenameiisexpress.exe\ vs KzHndnydSG.dll
                      Source: classification engineClassification label: mal92.troj.evad.winDLL@72/0@0/1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7756:120:WilError_03
                      Source: KzHndnydSG.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DAssemble
                      Source: KzHndnydSG.dllReversingLabs: Detection: 47%
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\KzHndnydSG.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DAssemble
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DCompile
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DCompile2
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DAssemble
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompile
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompile2
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",IEX
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",DebugSetMute
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DWriteBlobToFile
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DStripShader
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DSetBlobPart
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReturnFailure1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReflectLibrary
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReflect
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReadFileToBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DPreprocess
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DLoadModule
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetTraceInstructionOffsets
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetOutputSignatureBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetInputSignatureBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetInputAndOutputSignatureBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetDebugInfo
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetBlobPart
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassembleRegion
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble11Trace
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble10Effect
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDecompressShaders
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateLinker
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateFunctionLinkingGraph
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompressShaders
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompileFromFile
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DAssembleJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DCompileJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DCompile2Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DAssembleJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompileJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompile2Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",IEXJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",DebugSetMuteJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DWriteBlobToFileJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DStripShaderJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DSetBlobPartJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReturnFailure1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReflectLibraryJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReflectJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReadFileToBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DPreprocessJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DLoadModuleJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetTraceInstructionOffsetsJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetOutputSignatureBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetInputSignatureBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetInputAndOutputSignatureBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetDebugInfoJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetBlobPartJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassembleRegionJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble11TraceJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble10EffectJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassembleJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDecompressShadersJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateLinkerJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateFunctionLinkingGraphJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompressShadersJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompileFromFileJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                      Source: KzHndnydSG.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: KzHndnydSG.dllStatic file information: File size 1050144 > 1048576
                      Source: KzHndnydSG.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A850FA35D push edi; iretd 3_2_0000021A850FA35E
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A8513252E push es; iretd 3_2_0000021A8513252F
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A850FBD58 push ebp; iretd 3_2_0000021A850FBD59
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A8513A5D8 push ebp; iretd 3_2_0000021A8513A5DD
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A850FA71E push cs; retf 3_2_0000021A850FA71F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B89A35D push edi; iretd 4_2_000001D38B89A35E
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B89A71E push cs; retf 4_2_000001D38B89A71F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B8DA5D8 push ebp; iretd 4_2_000001D38B8DA5DD
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B8D252E push es; iretd 4_2_000001D38B8D252F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001D38B89BD58 push ebp; iretd 4_2_000001D38B89BD59
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000021A31B8A71E push cs; retf 6_2_0000021A31B8A71F
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000021A31B8A35D push edi; iretd 6_2_0000021A31B8A35E
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_0000021A31B8BD58 push ebp; iretd 6_2_0000021A31B8BD59
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002220BB7A71E push cs; retf 7_2_000002220BB7A71F
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002220BB7BD58 push ebp; iretd 7_2_000002220BB7BD59
                      Source: C:\Windows\System32\rundll32.exeCode function: 7_2_000002220BB7A35D push edi; iretd 7_2_000002220BB7A35E
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\loaddll64.exe TID: 7752Thread sleep time: -120000s >= -30000sJump to behavior
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
                      Source: loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1C1000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899456465.0000023D5F1C1000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2246602342.0000023D5F1C1000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899583217.0000023D5F1C1000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589434374.0000023D5F1C1000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1C1000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589317398.0000023D5F1C1000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844376273.0000023D5F1C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: rundll32.exe, 00000003.00000002.1853213808.0000021A84E4E000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.1861843993.000001D38B638000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\loaddll64.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\loaddll64.exeNtClose: Direct from: 0x7FF8E7DA23B0
                      Source: C:\Windows\System32\loaddll64.exeNtDeviceIoControlFile: Direct from: 0x7FF908164B5EJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x23D5F31D169Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtDeviceIoControlFile: Direct from: 0x23D5F380141Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FF694B8154BJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FF8E7DAFBDDJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtCreateThreadEx: Direct from: 0x7FF8E7DB45D2Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtSetSecurityObject: Direct from: 0x7FF9081426A1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FF8E7DB3D00Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FF694B81957Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtQuerySystemInformation: Direct from: 0x23D5F31CD31Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x23D5F37FB61Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtQueryVolumeInformationFile: Direct from: 0x23D5F3B21A7Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtQueryInformationToken: Direct from: 0x23D5F387DB0Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtQueryInformationToken: Direct from: 0x23D5F37FA82Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtClose: Direct from: 0x23D5F3801D0
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FF8E7DB4543Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtUnmapViewOfSection: Direct from: 0x7FF8E7DA33F2Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtDelayExecution: Direct from: 0x7FF8E7DB1B34Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x23D5F3711BEJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x23D5F31D1B2Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FF694B815F3Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FF8E7DB0E67Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x23D5F3A94C3Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FF8E7DAEE28Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtQuerySystemInformation: Direct from: 0x23D5F38020BJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x23D5F31CBBBJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x23D5F3800E6Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x23D5F37F716Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtSetInformationThread: Direct from: 0x7FF694B8D459Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x23D5F31D0DCJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FF694B81CF4Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",#1Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000021A85107CFC GetUserNameA,strrchr,_snprintf,3_2_0000021A85107CFC
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 3.3.rundll32.exe.21a85040000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll64.exe.23d5f300000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.21a30350000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.3.rundll32.exe.2220a330000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.3.rundll32.exe.1d38b800000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.1932419653.0000021A31BCC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.1905939888.0000021A3036D000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.1861923373.000001D38B8DC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1937652629.0000023D5F31D000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.1853432312.0000021A8513C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.1935047568.000002220BBBC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000003.1932094220.000002220A34D000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 7748, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7808, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7824, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7932, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7964, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Disable or Modify Tools
                      OS Credential Dumping1
                      Security Software Discovery
                      Remote Services1
                      Archive Collected Data
                      12
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      Abuse Elevation Control Mechanism
                      11
                      Virtualization/Sandbox Evasion
                      LSASS Memory11
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable Media11
                      Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      11
                      Process Injection
                      Security Account Manager1
                      Account Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Abuse Elevation Control Mechanism
                      NTDS1
                      System Owner/User Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA Secrets2
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Rundll32
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1568429 Sample: KzHndnydSG.dll Startdate: 04/12/2024 Architecture: WINDOWS Score: 92 23 Found malware configuration 2->23 25 Multi AV Scanner detection for submitted file 2->25 27 Yara detected CobaltStrike 2->27 29 2 other signatures 2->29 7 loaddll64.exe 7 2->7         started        process3 dnsIp4 21 185.216.71.202, 443, 49824, 49828 CLOUDCOMPUTINGDE Germany 7->21 31 Found direct / indirect Syscall (likely to bypass EDR) 7->31 11 cmd.exe 1 7->11         started        13 rundll32.exe 7->13         started        15 conhost.exe 7->15         started        17 32 other processes 7->17 signatures5 process6 process7 19 rundll32.exe 11->19         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      KzHndnydSG.dll47%ReversingLabsWin64.Backdoor.Cobeacon
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://185.216.71.202/broadcastA~0%Avira URL Cloudsafe
                      https://185.216.71.202/broadcast320%Avira URL Cloudsafe
                      https://185.216.71.202/0%Avira URL Cloudsafe
                      https://185.216.71.202/broadcastLx0%Avira URL Cloudsafe
                      https://185.216.71.202/broadcastXx0%Avira URL Cloudsafe
                      https://185.216.71.202//0%Avira URL Cloudsafe
                      https://185.216.71.202/broadcastU~0%Avira URL Cloudsafe
                      https://185.216.71.202/broadcastox0%Avira URL Cloudsafe
                      https://185.216.71.202/broadcast0%Avira URL Cloudsafe
                      185.216.71.2020%Avira URL Cloudsafe
                      https://185.216.71.202/broadcastm~0%Avira URL Cloudsafe
                      https://185.216.71.202/broadcastk~0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      s-part-0035.t-0009.t-msedge.net
                      13.107.246.63
                      truefalse
                        high
                        fp2e7a.wpc.phicdn.net
                        192.229.221.95
                        truefalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          185.216.71.202true
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://185.216.71.202/broadcast32loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://185.216.71.202/broadcastA~loaddll64.exe, 00000000.00000003.2899583217.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589492234.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844376273.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844496263.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899456465.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589317398.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://185.216.71.202/loaddll64.exe, 00000000.00000003.2899583217.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899456465.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589317398.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844376273.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589434374.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2246602342.0000023D5F1AA000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.thawte.com/ThawteTimestampingCA.crl0KzHndnydSG.dllfalse
                            high
                            http://www.symauth.com/rpa00KzHndnydSG.dllfalse
                              high
                              https://www.amazon.comrundll32.exe, 00000007.00000002.1934840953.000002220A11F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://ocsp.thawte.com0KzHndnydSG.dllfalse
                                  high
                                  https://185.216.71.202/broadcastXxloaddll64.exe, 00000000.00000003.2589492234.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589317398.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://185.216.71.202/broadcastLxloaddll64.exe, 00000000.00000003.2899583217.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844376273.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844496263.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899456465.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://185.216.71.202//loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://185.216.71.202/broadcastU~loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://185.216.71.202/broadcastoxloaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.symauth.com/cps0(KzHndnydSG.dllfalse
                                    high
                                    https://185.216.71.202/broadcastloaddll64.exe, 00000000.00000003.2534310845.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://185.216.71.202/broadcastk~loaddll64.exe, 00000000.00000003.2589492234.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2589317398.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2534310845.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://185.216.71.202/broadcastm~loaddll64.exe, 00000000.00000003.2899583217.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844376273.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3147805688.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2844496263.0000023D5F1D2000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.2899456465.0000023D5F1D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    185.216.71.202
                                    unknownGermany
                                    43659CLOUDCOMPUTINGDEtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1568429
                                    Start date and time:2024-12-04 16:15:49 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 9m 14s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Run name:Run with higher sleep bypass
                                    Number of analysed new started processes analysed:43
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:KzHndnydSG.dll
                                    renamed because original name is a hash value
                                    Original Sample Name:5144ec5b8e4375671dd921a235f83dbe1620c50091bd6c9f91eb0cf362ea7c7f.exe
                                    Detection:MAL
                                    Classification:mal92.troj.evad.winDLL@72/0@0/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 13
                                    • Number of non-executed functions: 231
                                    Cookbook Comments:
                                    • Found application associated with file extension: .dll
                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded domains from analysis (whitelisted): crl.edge.digicert.com, ts-crl.ws.symantec.com, crl-symcprod.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: KzHndnydSG.dll
                                    No simulations
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    s-part-0035.t-0009.t-msedge.net105vjMVwfJ.dllGet hashmaliciousCobaltStrikeBrowse
                                    • 13.107.246.63
                                    file.exeGet hashmaliciousLummaC StealerBrowse
                                    • 13.107.246.63
                                    Uii3leknna.exeGet hashmaliciousUnknownBrowse
                                    • 13.107.246.63
                                    3FHcnOdHz2.lnkGet hashmaliciousUnknownBrowse
                                    • 13.107.246.63
                                    https://trinasolarus-my.sharepoint.com/:f:/g/personal/matt_hutchison_trinasolar_com/EuTm6V8CKxFPmV0-8tDYkU8B7bgg8BNpE1Urptg3NNJsZw?e=bQub2MGet hashmaliciousUnknownBrowse
                                    • 13.107.246.63
                                    H1WNju5cCI.dllGet hashmaliciousRemcosBrowse
                                    • 13.107.246.63
                                    1nbqpDK2ZJ.dllGet hashmaliciousRemcosBrowse
                                    • 13.107.246.63
                                    eF13KEkEKy.dllGet hashmaliciousRemcosBrowse
                                    • 13.107.246.63
                                    rukT6hBo6P.exeGet hashmaliciousPhemedrone StealerBrowse
                                    • 13.107.246.63
                                    https://bdb142c8309e44b2310105b0e00240d6.surge.sh/Get hashmaliciousUnknownBrowse
                                    • 13.107.246.63
                                    fp2e7a.wpc.phicdn.net5LZZEXBpNE.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    • 192.229.221.95
                                    3861227PDF.exeGet hashmaliciousAZORultBrowse
                                    • 192.229.221.95
                                    Order_DEC2024.wsfGet hashmaliciousRemcosBrowse
                                    • 192.229.221.95
                                    lnvoice-1620804301.pdf .jsGet hashmaliciousRHADAMANTHYSBrowse
                                    • 192.229.221.95
                                    lnvoice-1620804301.pdf (1).jsGet hashmaliciousRHADAMANTHYSBrowse
                                    • 192.229.221.95
                                    P102462 INVOICE.exeGet hashmaliciousFormBookBrowse
                                    • 192.229.221.95
                                    30550107002876429834.jsGet hashmaliciousStrela DownloaderBrowse
                                    • 192.229.221.95
                                    file.exeGet hashmaliciousStealcBrowse
                                    • 192.229.221.95
                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                    • 192.229.221.95
                                    ft.exeGet hashmaliciousLummaC StealerBrowse
                                    • 192.229.221.95
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CLOUDCOMPUTINGDEbot.sh4.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                    • 80.76.51.45
                                    bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                    • 80.76.51.45
                                    bot.arm7.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 80.76.51.45
                                    bot.x86_64.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                    • 80.76.51.45
                                    bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                    • 80.76.51.45
                                    bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                    • 80.76.51.45
                                    bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                    • 80.76.51.45
                                    bot.mips.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
                                    • 80.76.51.45
                                    cac2L07hOS.exeGet hashmaliciousRedLine, XmrigBrowse
                                    • 85.31.47.143
                                    8UR62ANiqm.exeGet hashmaliciousXWormBrowse
                                    • 194.169.175.112
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                    Entropy (8bit):6.411261737500153
                                    TrID:
                                    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                    • Win64 Executable (generic) (12005/4) 10.17%
                                    • Generic Win/DOS Executable (2004/3) 1.70%
                                    • DOS Executable Generic (2002/1) 1.70%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                    File name:KzHndnydSG.dll
                                    File size:1'050'144 bytes
                                    MD5:6af2398f4f0239a8fc1d7e64bf0b3be3
                                    SHA1:b9af7cc99389dcee4157d095b6479cbe4c3670fe
                                    SHA256:5144ec5b8e4375671dd921a235f83dbe1620c50091bd6c9f91eb0cf362ea7c7f
                                    SHA512:3414921782c6de919255cd50e8468b92e39439dd164bf0251ea175c5c669cd97bbb391cf6bfd0001e8ae02f414a8376d4a55dd450217236c0e9aeed3f5c38884
                                    SSDEEP:12288:HIDvCzFdigSVXfIG1gb73dhbWK9WTHtFfpMunHvpKLiT0s+u7oGCF0JFihLt3A+Y:kCF1G1gyauhCiSu7YKkhhZY
                                    TLSH:F1255A76A9F65A2AF0D8A07E1C7B8F6109B43DF44464D1FB03F0203A6AE21505F9DB5B
                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....V(e.........." .........8......-........................................`......+/....`........................................
                                    Icon Hash:1a1de1e5e1239e38
                                    Entrypoint:0x18003af2d
                                    Entrypoint Section:.text
                                    Digitally signed:true
                                    Imagebase:0x180000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x6528569E [Thu Oct 12 20:27:10 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:0
                                    File Version Major:6
                                    File Version Minor:0
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:0
                                    Import Hash:
                                    Signature Valid:false
                                    Signature Issuer:CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US
                                    Signature Validation Error:The digital signature of the object did not verify
                                    Error Number:-2146869232
                                    Not Before, Not After
                                    • 13/04/2015 20:00:00 13/04/2018 19:59:59
                                    Subject Chain
                                    • CN="Oracle America, Inc.", OU=Code Signing Bureau, O="Oracle America, Inc.", L=Redwood Shores, S=California, C=US
                                    Version:3
                                    Thumbprint MD5:7F2E08A290C8767AFAFAFFFE09BE1149
                                    Thumbprint SHA-1:3B75816D15A6D8F4598E9CF5603F1839EE84D73D
                                    Thumbprint SHA-256:9D9365087330DF525292796A656A389C13E4F37ADA62693F4A951C0CB1B8B0BC
                                    Serial:12F0277E0F233B39F9419B06E8CDE352
                                    Instruction
                                    push ebp
                                    inc ecx
                                    push edi
                                    inc ecx
                                    push esi
                                    inc ecx
                                    push ebp
                                    inc ecx
                                    push esp
                                    push esi
                                    push edi
                                    push ebx
                                    dec eax
                                    sub esp, 000000F8h
                                    dec eax
                                    lea ebp, dword ptr [esp+00000080h]
                                    mov dword ptr [ebp+5Ch], edx
                                    xorps xmm0, xmm0
                                    movups dqword ptr [ebp+3Ch], xmm0
                                    movaps ebp+30h, dqword ptr [xmm0]
                                    movaps ebp+20h, dqword ptr [xmm0]
                                    movaps ebp+10h, dqword ptr [xmm0]
                                    movaps ebp+00h, dqword ptr [xmm0]
                                    movaps ebp-10h, dqword ptr [xmm0]
                                    movaps ebp-20h, dqword ptr [xmm0]
                                    cmp dword ptr [000AB10Bh], 0Ah
                                    mov eax, dword ptr [000AB101h]
                                    setl cl
                                    lea edx, dword ptr [eax+01h]
                                    imul edx, eax
                                    test dl, 00000001h
                                    sete al
                                    mov edx, ecx
                                    and dl, al
                                    mov byte ptr [ebp+77h], dl
                                    xor cl, al
                                    mov byte ptr [ebp+76h], cl
                                    xor eax, eax
                                    dec eax
                                    lea ecx, dword ptr [0001EBA5h]
                                    dec eax
                                    arpl word ptr [eax+ecx], dx
                                    xor dword ptr [ebp+edx*4-20h], 00001E27h
                                    dec eax
                                    add eax, 04h
                                    dec eax
                                    cmp eax, 68h
                                    jne 00007F595909E58Ch
                                    mov eax, 000008C0h
                                    xor ecx, ecx
                                    dec eax
                                    mov dword ptr [ebp-58h], ecx
                                    dec eax
                                    lea esi, dword ptr [0001ECFDh]
                                    dec eax
                                    lea edi, dword ptr [0001ED5Ah]
                                    dec esp
                                    lea esi, dword ptr [0001ED5Bh]
                                    dec esp
                                    lea ecx, dword ptr [0001EAF8h]
                                    dec esp
                                    lea edx, dword ptr [0001EC31h]
                                    dec esp
                                    lea edi, dword ptr [0001ED36h]
                                    dec esp
                                    lea ebp, dword ptr [0001ED27h]
                                    dec esp
                                    lea esp, dword ptr [0001ED18h]
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x509c60x386.text
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xe90000x1b758.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50d4c0x4f8.text
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xfee000x1820.rsrc
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1050000x2c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5b5b00x140.text
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x5b1040x5b200d943478eebdc6fcb7301e02c5972a6aeFalse0.34970582561728397data5.890325051671784IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .data0x5d0000x8afd80x87c00fd87fa614ce73418aaaef9b097d68526False0.34015848008747696data6.1041379360185495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .sdata0xe80000x300x200f927ec16777b24dc4dfb58c1c73b2751False0.056640625data0.41911781941489346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .rsrc0xe90000x1b7580x1b80028bd58503c3e58848ffcef5b44b72905False0.8856001420454546data7.577434366625928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1050000x2c0x200dd37af5637020c49f853952bd28448abFalse0.10546875data0.5163459669794561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xe96e80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3445121951219512
                                    RT_ICON0xe9d500x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5067204301075269
                                    RT_ICON0xea0380x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.5676229508196722
                                    RT_ICON0xea2200x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.625
                                    RT_ICON0xea3480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6284648187633263
                                    RT_ICON0xeb1f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7766245487364621
                                    RT_ICON0xeba980x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.8358294930875576
                                    RT_ICON0xec1600x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5939306358381503
                                    RT_ICON0xec6c80x13b8ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9997895570795474
                                    RT_ICON0x1002580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5776970954356846
                                    RT_ICON0x1028000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6177298311444653
                                    RT_ICON0x1038a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6778688524590164
                                    RT_ICON0x1042300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6879432624113475
                                    RT_GROUP_ICON0x1046980xbcdataEnglishUnited States0.6170212765957447
                                    RT_VERSION0xe93400x3a4dataEnglishUnited States0.45493562231759654
                                    NameOrdinalAddress
                                    D3DAssemble10x18003d768
                                    D3DCompile20x18003d9d2
                                    D3DCompile230x18003d89b
                                    D3DCompileFromFile40x18003c63d
                                    D3DCompressShaders50x18003c3c5
                                    D3DCreateBlob60x18003d28e
                                    D3DCreateFunctionLinkingGraph70x18003b9ec
                                    D3DCreateLinker80x18003cc62
                                    D3DDecompressShaders90x18003c280
                                    D3DDisassemble100x18003d012
                                    D3DDisassemble10Effect110x18003bed1
                                    D3DDisassemble11Trace120x18003c008
                                    D3DDisassembleRegion130x18003c14d
                                    D3DGetBlobPart140x18003cedb
                                    D3DGetDebugInfo150x18003cb2f
                                    D3DGetInputAndOutputSignatureBlob160x18003b8a7
                                    D3DGetInputSignatureBlob170x18003bd9e
                                    D3DGetOutputSignatureBlob180x18003bc65
                                    D3DGetTraceInstructionOffsets190x18003bb1f
                                    D3DLoadModule200x18003d4f4
                                    D3DPreprocess210x18003d3c1
                                    D3DReadFileToBlob220x18003c9ec
                                    D3DReflect230x18003db17
                                    D3DReflectLibrary240x18003c782
                                    D3DReturnFailure1250x18003c8b5
                                    D3DSetBlobPart260x18003cd95
                                    D3DStripShader270x18003d149
                                    D3DWriteBlobToFile280x18003c4f8
                                    DebugSetMute290x18003d635
                                    IEX300x18003dc5a
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-12-04T16:18:11.371997+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.949824185.216.71.202443TCP
                                    2024-12-04T16:18:40.107699+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.949843185.216.71.202443TCP
                                    2024-12-04T16:19:11.124435+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.949873185.216.71.202443TCP
                                    2024-12-04T16:19:41.497897+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.949901185.216.71.202443TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 4, 2024 16:18:06.529167891 CET49824443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:06.529207945 CET44349824185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:06.529278040 CET49824443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:06.537703037 CET49824443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:06.537718058 CET44349824185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:11.371926069 CET44349824185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:11.371997118 CET49824443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:12.024350882 CET49824443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:12.024391890 CET44349824185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:12.033190012 CET49828443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:12.033252954 CET44349828185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:12.033318996 CET49828443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:12.033622026 CET49828443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:12.033638000 CET44349828185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:16.979782104 CET44349828185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:16.980535030 CET49828443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:17.617750883 CET49828443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:17.617773056 CET44349828185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:17.620914936 CET49831443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:17.620954037 CET44349831185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:17.621021986 CET49831443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:17.621114016 CET49831443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:17.621159077 CET44349831185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:17.621211052 CET49831443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:34.587663889 CET49843443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:34.587712049 CET44349843185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:34.587785959 CET49843443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:35.262460947 CET49843443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:35.262494087 CET44349843185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:40.107507944 CET44349843185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:40.107698917 CET49843443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:40.799866915 CET49843443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:40.799889088 CET44349843185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:40.810472012 CET49849443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:40.810519934 CET44349849185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:40.810584068 CET49849443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:40.810920954 CET49849443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:40.810928106 CET44349849185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:45.656960964 CET44349849185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:45.657032013 CET49849443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:46.300682068 CET49849443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:46.300724030 CET44349849185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:46.312330961 CET49854443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:46.312391996 CET44349854185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:46.312464952 CET49854443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:46.312591076 CET49854443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:18:46.312635899 CET44349854185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:18:46.312685966 CET49854443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:05.602777958 CET49873443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:05.602838039 CET44349873185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:05.602933884 CET49873443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:06.274463892 CET49873443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:06.274506092 CET44349873185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:11.124361992 CET44349873185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:11.124434948 CET49873443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:11.806694984 CET49873443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:11.806734085 CET44349873185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:11.821742058 CET49878443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:11.821794987 CET44349878185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:11.821866989 CET49878443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:11.822441101 CET49878443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:11.822453022 CET44349878185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:16.668773890 CET44349878185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:16.668909073 CET49878443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:17.314708948 CET49878443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:17.314754009 CET44349878185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:17.326632977 CET49884443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:17.326680899 CET44349884185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:17.326805115 CET49884443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:17.326886892 CET49884443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:17.326932907 CET44349884185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:17.327020884 CET49884443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:36.016300917 CET49901443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:36.016345978 CET44349901185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:36.016416073 CET49901443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:36.680788040 CET49901443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:36.680818081 CET44349901185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:41.497802973 CET44349901185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:41.497896910 CET49901443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:42.149719000 CET49901443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:42.149749994 CET44349901185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:42.158153057 CET49906443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:42.158195019 CET44349906185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:42.158277988 CET49906443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:42.158525944 CET49906443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:19:42.158540010 CET44349906185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:47.012856007 CET44349906185.216.71.202192.168.2.9
                                    Dec 4, 2024 16:19:47.013056040 CET49906443192.168.2.9185.216.71.202
                                    Dec 4, 2024 16:20:20.322170973 CET49906443192.168.2.9185.216.71.202
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 4, 2024 16:16:34.297009945 CET1.1.1.1192.168.2.90x560cNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                    Dec 4, 2024 16:16:34.297009945 CET1.1.1.1192.168.2.90x560cNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                    Dec 4, 2024 16:16:38.069500923 CET1.1.1.1192.168.2.90x11d1No error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                    Dec 4, 2024 16:16:38.069500923 CET1.1.1.1192.168.2.90x11d1No error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to jump to process

                                    Target ID:0
                                    Start time:10:16:39
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\loaddll64.exe
                                    Wow64 process (32bit):false
                                    Commandline:loaddll64.exe "C:\Users\user\Desktop\KzHndnydSG.dll"
                                    Imagebase:0x7ff694b80000
                                    File size:165'888 bytes
                                    MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.1937652629.0000023D5F31D000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:false

                                    Target ID:1
                                    Start time:10:16:39
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff70f010000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:2
                                    Start time:10:16:39
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",#1
                                    Imagebase:0x7ff70fc30000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:10:16:39
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DAssemble
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000003.00000002.1853432312.0000021A8513C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:10:16:39
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",#1
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000004.00000002.1861923373.000001D38B8DC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:10:16:42
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DCompile
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000006.00000002.1932419653.0000021A31BCC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000006.00000003.1905939888.0000021A3036D000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:10:16:45
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe C:\Users\user\Desktop\KzHndnydSG.dll,D3DCompile2
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000007.00000002.1935047568.000002220BBBC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000007.00000003.1932094220.000002220A34D000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DAssemble
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:12
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompile
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:13
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompile2
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:14
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",IEX
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:15
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",DebugSetMute
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:16
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DWriteBlobToFile
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:17
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DStripShader
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:18
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DSetBlobPart
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:19
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReturnFailure1
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:20
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReflectLibrary
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:21
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReflect
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:22
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DReadFileToBlob
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:23
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DPreprocess
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:24
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DLoadModule
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:25
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetTraceInstructionOffsets
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:26
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetOutputSignatureBlob
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:27
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetInputSignatureBlob
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:28
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetInputAndOutputSignatureBlob
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:29
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetDebugInfo
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:30
                                    Start time:10:17:40
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DGetBlobPart
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:31
                                    Start time:10:17:41
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassembleRegion
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:32
                                    Start time:10:17:41
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble11Trace
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:33
                                    Start time:10:17:41
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble10Effect
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:34
                                    Start time:10:17:41
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDisassemble
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:35
                                    Start time:10:17:42
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DDecompressShaders
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:36
                                    Start time:10:17:42
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateLinker
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:37
                                    Start time:10:17:42
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateFunctionLinkingGraph
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:38
                                    Start time:10:17:42
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCreateBlob
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:39
                                    Start time:10:17:42
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompressShaders
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:40
                                    Start time:10:17:42
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\KzHndnydSG.dll",D3DCompileFromFile
                                    Imagebase:0x7ff7d40d0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:0.8%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:2.9%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:24
                                      execution_graph 19153 21a8512b544 19155 21a8512b560 _DllMainCRTStartup 19153->19155 19159 21a8512b5f0 19155->19159 19163 21a8512b5ba 19155->19163 19165 21a8512b3e4 19155->19165 19158 21a8512b637 19160 21a8512b3e4 _CRT_INIT RtlFreeHeap 19158->19160 19158->19163 19159->19163 19194 21a8510d0fc 19159->19194 19160->19163 19161 21a8510d0fc _DllMainCRTStartup 7 API calls 19162 21a8512b62a 19161->19162 19164 21a8512b3e4 _CRT_INIT RtlFreeHeap 19162->19164 19164->19158 19166 21a8512b473 19165->19166 19168 21a8512b3f6 _heap_init 19165->19168 19167 21a8512b4c9 19166->19167 19169 21a8512b477 _CRT_INIT 19166->19169 19170 21a8512b52c 19167->19170 19174 21a8512b4ce _freeptd 19167->19174 19187 21a8512b3ff _CRT_INIT 19168->19187 19202 21a8512f580 19168->19202 19169->19187 19242 21a85129b34 19169->19242 19170->19187 19276 21a8512f3d8 19170->19276 19174->19187 19264 21a8512e2f8 19174->19264 19177 21a8513223c _ioterm RtlFreeHeap 19177->19187 19178 21a8512b40b _RTC_Initialize 19178->19187 19208 21a85132b90 19178->19208 19179 21a8512b4eb _freeptd 19181 21a8512b50c 19179->19181 19182 21a8512b522 19179->19182 19179->19187 19268 21a8512f4bc 19181->19268 19273 21a85129428 19182->19273 19187->19159 19195 21a8510d134 19194->19195 19198 21a8510d123 _DllMainCRTStartup 19194->19198 19567 21a85126f68 19195->19567 19196 21a8510d12a 19196->19158 19196->19161 19198->19196 19200 21a8510d228 VirtualFree 19198->19200 19201 21a8510d1d7 19198->19201 19200->19201 19521 21a850fcb50 19201->19521 19204 21a8512f58b _mtinit _mtinitlocks 19202->19204 19203 21a8512f5de 19203->19178 19204->19203 19205 21a8512e2f8 _calloc_crt RtlFreeHeap 19204->19205 19206 21a8512f5ba _freeptd 19205->19206 19206->19203 19207 21a8512f4bc _initptd RtlFreeHeap 19206->19207 19207->19203 19209 21a85132baf 19208->19209 19211 21a8512b42d 19209->19211 19280 21a8512e378 19209->19280 19214 21a85131f10 19211->19214 19213 21a85129428 free RtlFreeHeap 19213->19211 19357 21a8512d958 19214->19357 19243 21a85129b4b 19242->19243 19244 21a85129b6d 19243->19244 19246 21a85129428 free RtlFreeHeap 19243->19246 19245 21a85129428 free RtlFreeHeap 19244->19245 19247 21a85129b7c 19245->19247 19246->19243 19248 21a85129ba3 19247->19248 19251 21a85129428 free RtlFreeHeap 19247->19251 19249 21a85129428 free RtlFreeHeap 19248->19249 19250 21a85129bb2 19249->19250 19252 21a85129428 free RtlFreeHeap 19250->19252 19251->19247 19253 21a85129bc6 19252->19253 19254 21a85129428 free RtlFreeHeap 19253->19254 19255 21a85129bd2 19254->19255 19256 21a85129428 free RtlFreeHeap 19255->19256 19257 21a85129bfd 19255->19257 19256->19257 19258 21a85129c1e 19257->19258 19260 21a85129428 free RtlFreeHeap 19257->19260 19259 21a85129c37 19258->19259 19261 21a85129428 free RtlFreeHeap 19258->19261 19262 21a85129c68 19259->19262 19263 21a85129428 free RtlFreeHeap 19259->19263 19260->19258 19261->19259 19262->19177 19262->19187 19263->19262 19267 21a8512e31d 19264->19267 19266 21a8512e35a 19266->19179 19267->19266 19491 21a85133a60 19267->19491 19269 21a8512d958 _lock RtlFreeHeap 19268->19269 19270 21a8512f522 _locterm 19269->19270 19271 21a8512d958 _lock RtlFreeHeap 19270->19271 19272 21a8512f541 _locterm __addlocaleref 19271->19272 19272->19187 19274 21a8512942d RtlFreeHeap 19273->19274 19275 21a85129448 _errno free 19273->19275 19274->19275 19275->19187 19277 21a8512f40e 19276->19277 19278 21a8512f3ec _freeptd 19276->19278 19277->19187 19495 21a8512f2a4 19278->19495 19282 21a8512e3a0 19280->19282 19283 21a8512e3d5 19282->19283 19284 21a85129468 19282->19284 19283->19211 19283->19213 19285 21a851294fc _callnewh 19284->19285 19290 21a85129480 _callnewh _mtinitlocknum 19284->19290 19287 21a8512b714 _errno RtlFreeHeap 19285->19287 19294 21a851294f1 19287->19294 19289 21a851294e1 19320 21a8512b714 19289->19320 19290->19289 19292 21a851294e6 19290->19292 19290->19294 19295 21a8512b7ec 19290->19295 19304 21a8512b860 19290->19304 19293 21a8512b714 _errno RtlFreeHeap 19292->19293 19293->19294 19294->19282 19323 21a85132f24 19295->19323 19297 21a8512b7fa 19298 21a8512b809 19297->19298 19299 21a85132f24 _set_error_mode RtlFreeHeap 19297->19299 19300 21a8512b860 _NMSG_WRITE RtlFreeHeap 19298->19300 19302 21a8512b82a 19298->19302 19299->19298 19301 21a8512b820 19300->19301 19303 21a8512b860 _NMSG_WRITE RtlFreeHeap 19301->19303 19302->19290 19303->19302 19305 21a8512b894 _NMSG_WRITE 19304->19305 19306 21a85132f24 _set_error_mode RtlFreeHeap 19305->19306 19310 21a8512b9b1 _NMSG_WRITE __crtMessageBoxW _invoke_watson 19305->19310 19307 21a8512b8aa 19306->19307 19308 21a85132f24 _set_error_mode RtlFreeHeap 19307->19308 19307->19310 19309 21a8512b8bb 19308->19309 19309->19310 19327 21a85132dd0 19309->19327 19310->19290 19312 21a8512b8f7 19312->19310 19313 21a85132dd0 _NMSG_WRITE RtlFreeHeap 19312->19313 19314 21a8512b937 _NMSG_WRITE 19312->19314 19313->19314 19314->19310 19315 21a8512b981 19314->19315 19334 21a85132e58 19314->19334 19315->19310 19341 21a85132d48 19315->19341 19317 21a8512b99b 19317->19310 19319 21a85132d48 _NMSG_WRITE RtlFreeHeap 19317->19319 19319->19310 19348 21a8512f438 19320->19348 19324 21a85132f2c 19323->19324 19325 21a8512b714 _errno RtlFreeHeap 19324->19325 19326 21a85132f36 _invalid_parameter_noinfo 19324->19326 19325->19326 19326->19297 19328 21a85132de8 19327->19328 19329 21a85132dde 19327->19329 19330 21a8512b714 _errno RtlFreeHeap 19328->19330 19329->19328 19331 21a85132e05 19329->19331 19333 21a85132df1 _invalid_parameter_noinfo 19330->19333 19332 21a8512b714 _errno RtlFreeHeap 19331->19332 19331->19333 19332->19333 19333->19312 19338 21a85132e65 19334->19338 19335 21a85132e6a 19336 21a85132e6f _invalid_parameter_noinfo 19335->19336 19337 21a8512b714 _errno RtlFreeHeap 19335->19337 19336->19315 19337->19336 19338->19335 19338->19336 19339 21a85132ea8 19338->19339 19339->19336 19340 21a8512b714 _errno RtlFreeHeap 19339->19340 19340->19336 19342 21a85132d59 19341->19342 19344 21a85132d63 19341->19344 19342->19344 19346 21a85132d9a 19342->19346 19343 21a8512b714 _errno RtlFreeHeap 19345 21a85132d6c _invalid_parameter_noinfo 19343->19345 19344->19343 19345->19317 19346->19345 19347 21a8512b714 _errno RtlFreeHeap 19346->19347 19347->19345 19349 21a8512f448 _freeptd 19348->19349 19350 21a8512e2f8 _calloc_crt RtlFreeHeap 19349->19350 19356 21a8512b71d 19349->19356 19351 21a8512f46a _freeptd 19350->19351 19352 21a8512f49d 19351->19352 19353 21a8512f487 19351->19353 19351->19356 19355 21a85129428 free RtlFreeHeap 19352->19355 19354 21a8512f4bc _initptd RtlFreeHeap 19353->19354 19354->19356 19355->19356 19356->19292 19358 21a8512d97b 19357->19358 19359 21a8512d976 19357->19359 19361 21a8512da24 19359->19361 19362 21a8512da50 _mtinitlocknum 19361->19362 19363 21a8512da41 19361->19363 19364 21a8512da6b 19362->19364 19367 21a8512e378 _malloc_crt RtlFreeHeap 19362->19367 19365 21a8512b7ec _FF_MSGBANNER RtlFreeHeap 19363->19365 19364->19358 19366 21a8512da46 19365->19366 19368 21a8512b860 _NMSG_WRITE RtlFreeHeap 19366->19368 19369 21a8512da7c 19367->19369 19368->19362 19370 21a8512da84 19369->19370 19371 21a8512da93 19369->19371 19372 21a8512b714 _errno RtlFreeHeap 19370->19372 19373 21a8512d958 _lock RtlFreeHeap 19371->19373 19372->19364 19374 21a8512da9d 19373->19374 19374->19364 19375 21a85129428 free RtlFreeHeap 19374->19375 19375->19364 19492 21a85133a75 19491->19492 19494 21a85133a88 _callnewh 19491->19494 19493 21a8512b714 _errno RtlFreeHeap 19492->19493 19492->19494 19493->19494 19494->19267 19496 21a8512f2ad 19495->19496 19520 21a8512f3cc 19495->19520 19497 21a8512f2c8 19496->19497 19499 21a85129428 free RtlFreeHeap 19496->19499 19498 21a8512f2d6 19497->19498 19500 21a85129428 free RtlFreeHeap 19497->19500 19501 21a8512f2e4 19498->19501 19502 21a85129428 free RtlFreeHeap 19498->19502 19499->19497 19500->19498 19503 21a8512f2f2 19501->19503 19504 21a85129428 free RtlFreeHeap 19501->19504 19502->19501 19505 21a8512f300 19503->19505 19506 21a85129428 free RtlFreeHeap 19503->19506 19504->19503 19507 21a8512f30e 19505->19507 19508 21a85129428 free RtlFreeHeap 19505->19508 19506->19505 19509 21a85129428 free RtlFreeHeap 19507->19509 19510 21a8512f31f 19507->19510 19508->19507 19509->19510 19511 21a8512f337 19510->19511 19512 21a85129428 free RtlFreeHeap 19510->19512 19513 21a8512d958 _lock RtlFreeHeap 19511->19513 19512->19511 19515 21a8512f343 19513->19515 19514 21a8512f370 _locterm 19517 21a8512d958 _lock RtlFreeHeap 19514->19517 19515->19514 19516 21a85129428 free RtlFreeHeap 19515->19516 19516->19514 19518 21a8512f382 _locterm _updatetlocinfoEx_nolock 19517->19518 19519 21a85129428 free RtlFreeHeap 19518->19519 19519->19520 19520->19277 19575 21a85107f80 19521->19575 19523 21a850fcb6e _DllMainCRTStartup 19524 21a85129468 malloc RtlFreeHeap 19523->19524 19525 21a850fcc53 _DllMainCRTStartup 19524->19525 19582 21a85128aec 19525->19582 19528 21a85128aec _DllMainCRTStartup RtlFreeHeap 19529 21a850fcd09 _DllMainCRTStartup 19528->19529 19531 21a850fcd17 _DllMainCRTStartup 19529->19531 19615 21a85127fc8 19529->19615 19532 21a850fcd31 19531->19532 19533 21a85127fc8 _DllMainCRTStartup RtlFreeHeap 19531->19533 19589 21a851002c0 19532->19589 19533->19532 19536 21a850fcd49 19595 21a851003ac 19536->19595 19537 21a85127fc8 _DllMainCRTStartup RtlFreeHeap 19537->19536 19540 21a85127fc8 _DllMainCRTStartup RtlFreeHeap 19541 21a850fcd57 _DllMainCRTStartup 19540->19541 19542 21a85129468 malloc RtlFreeHeap 19541->19542 19543 21a850fcd87 19542->19543 19544 21a850fcd99 _DllMainCRTStartup 19543->19544 19545 21a85127fc8 _DllMainCRTStartup RtlFreeHeap 19543->19545 19546 21a85128aec _DllMainCRTStartup RtlFreeHeap 19544->19546 19545->19544 19547 21a850fcdc3 _DllMainCRTStartup 19546->19547 19605 21a85107ac8 19547->19605 19549 21a850fd076 19551 21a85129428 free RtlFreeHeap 19549->19551 19550 21a85127820 RtlFreeHeap _DllMainCRTStartup 19556 21a850fcdd9 _DllMainCRTStartup 19550->19556 19552 21a850fd080 19551->19552 19554 21a85127fc8 _DllMainCRTStartup RtlFreeHeap 19552->19554 19553 21a85129700 RtlFreeHeap _snprintf 19553->19556 19555 21a850fd085 19554->19555 19555->19196 19556->19549 19556->19550 19556->19553 19561 21a85102b5c RtlFreeHeap _DllMainCRTStartup 19556->19561 19562 21a85127fc8 RtlFreeHeap _DllMainCRTStartup 19556->19562 19564 21a85103598 RtlFreeHeap _DllMainCRTStartup 19556->19564 19565 21a850ff9c0 InternetOpenA _DllMainCRTStartup 19556->19565 19619 21a850ff978 19556->19619 19623 21a851268d4 19556->19623 19642 21a8510c964 19556->19642 19646 21a85109294 19556->19646 19653 21a85106198 19556->19653 19661 21a850ffbec 19556->19661 19561->19556 19562->19556 19564->19556 19565->19556 19568 21a85129468 malloc RtlFreeHeap 19567->19568 19569 21a85126f8c 19568->19569 19570 21a85128aec _DllMainCRTStartup RtlFreeHeap 19569->19570 19573 21a85126fc9 _DllMainCRTStartup 19570->19573 19571 21a85127045 19571->19196 19572 21a85129468 malloc RtlFreeHeap 19572->19573 19573->19571 19573->19572 19574 21a85128aec _DllMainCRTStartup RtlFreeHeap 19573->19574 19574->19573 19576 21a85129468 malloc RtlFreeHeap 19575->19576 19577 21a85107f9c 19576->19577 19578 21a85129468 malloc RtlFreeHeap 19577->19578 19581 21a85107fa9 _DllMainCRTStartup 19577->19581 19579 21a85107fba 19578->19579 19580 21a85129428 free RtlFreeHeap 19579->19580 19579->19581 19580->19581 19581->19523 19583 21a850fccdb 19582->19583 19584 21a85128b18 19582->19584 19583->19528 19585 21a85128b35 19584->19585 19586 21a85128b22 19584->19586 19588 21a8512b310 realloc RtlFreeHeap 19585->19588 19587 21a85129468 malloc RtlFreeHeap 19586->19587 19587->19583 19588->19583 19590 21a851002dd _DllMainCRTStartup 19589->19590 19590->19590 19591 21a850fcd40 19590->19591 19681 21a85126294 19590->19681 19591->19536 19591->19537 19593 21a8510036c 19685 21a851262e0 19593->19685 19597 21a851003d0 _DllMainCRTStartup 19595->19597 19596 21a850fcd4e 19596->19540 19596->19541 19597->19596 19598 21a85129468 malloc RtlFreeHeap 19597->19598 19599 21a851004ed _DllMainCRTStartup 19598->19599 19600 21a8510057c 19599->19600 19601 21a85126294 _DllMainCRTStartup RtlFreeHeap 19599->19601 19602 21a85129428 free RtlFreeHeap 19600->19602 19603 21a85100553 19601->19603 19602->19596 19604 21a851262e0 _DllMainCRTStartup RtlFreeHeap 19603->19604 19604->19600 19606 21a85107add _DllMainCRTStartup 19605->19606 19869 21a85126d54 19606->19869 19608 21a85107b0e 19873 21a8512a014 19608->19873 19610 21a85107b2d _DllMainCRTStartup 19876 21a85107cfc 19610->19876 19612 21a85107c3a _DllMainCRTStartup 19887 21a851267bc 19612->19887 19614 21a85107cb1 19614->19556 19616 21a85127fd6 _DllMainCRTStartup 19615->19616 19993 21a85128c40 19616->19993 19618 21a85127fff 19618->19531 19620 21a850ff995 _wcsupr_s 19619->19620 20003 21a850ff484 19620->20003 19622 21a850ff9ae _wcsupr_s 19622->19556 19624 21a85126908 19623->19624 19639 21a85126901 19623->19639 19625 21a85129468 malloc RtlFreeHeap 19624->19625 19626 21a8512691c 19625->19626 19627 21a85126948 19626->19627 19628 21a85126937 19626->19628 20047 21a850f198c 19627->20047 19629 21a85129428 free RtlFreeHeap 19628->19629 19629->19639 19631 21a8512698d _DllMainCRTStartup 19632 21a851269df 19631->19632 19634 21a851269f0 _DllMainCRTStartup 19631->19634 19633 21a85129428 free RtlFreeHeap 19632->19633 19633->19639 19635 21a85126b19 19634->19635 19640 21a85126b44 _DllMainCRTStartup 19634->19640 19636 21a85129428 free RtlFreeHeap 19635->19636 19637 21a85126b23 19636->19637 20057 21a850ff250 19637->20057 19639->19556 19640->19639 19641 21a85129428 free RtlFreeHeap 19640->19641 19641->19639 19644 21a8510c97a 19642->19644 19643 21a8510c9d1 19643->19556 19644->19643 20149 21a8510bdf4 19644->20149 21666 21a851092e8 19646->21666 19649 21a851092a7 19650 21a851092d7 19649->19650 21673 21a8510991c 19649->21673 21677 21a85109bbc 19650->21677 19654 21a851061d4 19653->19654 19655 21a851061d9 19653->19655 19654->19556 19656 21a85129468 malloc RtlFreeHeap 19655->19656 19660 21a851061e6 _DllMainCRTStartup 19656->19660 19657 21a85129428 free RtlFreeHeap 19658 21a85106300 19657->19658 19659 21a8510630c _DllMainCRTStartup RtlFreeHeap 19658->19659 19659->19654 19660->19657 19662 21a850ffc7a 19661->19662 19676 21a850ffc75 _wcsupr_s 19661->19676 19663 21a8510b828 _DllMainCRTStartup RtlFreeHeap 19662->19663 19664 21a850ffc8d 19663->19664 19665 21a85129700 _snprintf RtlFreeHeap 19664->19665 19666 21a850ffcae 19665->19666 19667 21a85129700 _snprintf RtlFreeHeap 19666->19667 19668 21a850ffcce _DllMainCRTStartup 19667->19668 19669 21a8510abbc _DllMainCRTStartup RtlFreeHeap 19668->19669 19670 21a850ffd49 19669->19670 19671 21a850ffd7e 19670->19671 19672 21a850ffda1 19670->19672 19673 21a85129700 _snprintf RtlFreeHeap 19671->19673 19674 21a85129700 _snprintf RtlFreeHeap 19672->19674 19677 21a850ffd9f _wcsupr_s _DllMainCRTStartup 19673->19677 19674->19677 19675 21a8510b808 _DllMainCRTStartup RtlFreeHeap 19675->19676 19676->19556 19678 21a85100038 _DllMainCRTStartup RtlFreeHeap 19677->19678 19680 21a850ffeb6 19677->19680 19678->19680 19679 21a850ffec9 19679->19556 19680->19675 19680->19679 19682 21a851262af _DllMainCRTStartup 19681->19682 19683 21a851262b3 19681->19683 19682->19593 19690 21a851266ec 19683->19690 19686 21a85129700 _snprintf RtlFreeHeap 19685->19686 19687 21a8512637c 19686->19687 19688 21a85129700 _snprintf RtlFreeHeap 19687->19688 19689 21a8512639a _openfile _DllMainCRTStartup 19688->19689 19689->19591 19697 21a85129700 19690->19697 19692 21a85126712 19693 21a85129700 _snprintf RtlFreeHeap 19692->19693 19694 21a851267a2 19693->19694 19706 21a851299cc 19694->19706 19700 21a85129732 _vsnprintf_helper 19697->19700 19698 21a85129737 19699 21a8512b714 _errno RtlFreeHeap 19698->19699 19704 21a8512973c _invalid_parameter_noinfo 19699->19704 19700->19698 19701 21a85129756 19700->19701 19710 21a8512bfcc 19701->19710 19703 21a85129786 19703->19704 19727 21a8512bd98 19703->19727 19704->19692 19707 21a8512d8b8 19706->19707 19852 21a8512d67c 19707->19852 19709 21a851267ac 19709->19682 19711 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19710->19711 19712 21a8512c032 19711->19712 19713 21a8512b714 _errno RtlFreeHeap 19712->19713 19714 21a8512c037 19713->19714 19715 21a8512c997 19714->19715 19725 21a8512c064 _snprintf 19714->19725 19748 21a8512f624 19714->19748 19716 21a8512b714 _errno RtlFreeHeap 19715->19716 19718 21a8512c99c _invalid_parameter_noinfo _NMSG_WRITE 19716->19718 19718->19703 19720 21a8512c9ec RtlFreeHeap write_char 19720->19725 19721 21a85129428 free RtlFreeHeap 19721->19725 19722 21a8512e378 _malloc_crt RtlFreeHeap 19722->19725 19723 21a8512d5e8 RtlFreeHeap write_string 19723->19725 19724 21a8512d594 RtlFreeHeap write_multi_char 19724->19725 19725->19715 19725->19718 19725->19720 19725->19721 19725->19722 19725->19723 19725->19724 19726 21a85133864 RtlFreeHeap _snprintf 19725->19726 19752 21a85133634 19725->19752 19726->19725 19728 21a8512f624 _fileno RtlFreeHeap 19727->19728 19729 21a8512bdba 19728->19729 19730 21a8512bddc 19729->19730 19731 21a8512bdc5 19729->19731 19733 21a8512bde1 19730->19733 19742 21a8512bdee _vsnprintf_helper 19730->19742 19732 21a8512b714 _errno RtlFreeHeap 19731->19732 19741 21a8512bdca 19732->19741 19734 21a8512b714 _errno RtlFreeHeap 19733->19734 19734->19741 19735 21a8512be53 19736 21a8512beeb 19735->19736 19737 21a8512be60 19735->19737 19739 21a85130504 _wsopen_nolock RtlFreeHeap 19736->19739 19738 21a8512be7c 19737->19738 19744 21a8512be95 19737->19744 19764 21a85130504 19738->19764 19739->19741 19741->19704 19742->19735 19742->19741 19745 21a8512be47 19742->19745 19755 21a851331dc 19742->19755 19744->19741 19784 21a85131cd8 19744->19784 19745->19735 19761 21a8513323c 19745->19761 19749 21a8512f62d 19748->19749 19750 21a8512f632 _invalid_parameter_noinfo 19748->19750 19751 21a8512b714 _errno RtlFreeHeap 19749->19751 19750->19725 19751->19750 19753 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19752->19753 19754 21a85133646 19753->19754 19754->19725 19756 21a851331e5 19755->19756 19757 21a851331f2 19755->19757 19758 21a8512b714 _errno RtlFreeHeap 19756->19758 19759 21a8512b714 _errno RtlFreeHeap 19757->19759 19760 21a851331ea _invalid_parameter_noinfo 19757->19760 19758->19760 19759->19760 19760->19745 19762 21a8512e378 _malloc_crt RtlFreeHeap 19761->19762 19763 21a85133255 19762->19763 19763->19735 19765 21a8513053f 19764->19765 19766 21a85130527 19764->19766 19768 21a851305b6 19765->19768 19772 21a85130571 19765->19772 19804 21a8512b6a4 19766->19804 19770 21a8512b6a4 __doserrno RtlFreeHeap 19768->19770 19773 21a851305bb 19770->19773 19771 21a8512b714 _errno RtlFreeHeap 19783 21a85130534 _invalid_parameter_noinfo _unlock_fhandle 19771->19783 19807 21a8513438c 19772->19807 19775 21a8512b714 _errno RtlFreeHeap 19773->19775 19775->19783 19776 21a85130578 19777 21a85130595 19776->19777 19778 21a85130584 19776->19778 19780 21a8512b714 _errno RtlFreeHeap 19777->19780 19811 21a851305e4 19778->19811 19781 21a8513059a 19780->19781 19782 21a8512b6a4 __doserrno RtlFreeHeap 19781->19782 19782->19783 19783->19741 19785 21a85131cfb 19784->19785 19787 21a85131d13 19784->19787 19788 21a8512b6a4 __doserrno RtlFreeHeap 19785->19788 19786 21a85131d8d 19789 21a8512b6a4 __doserrno RtlFreeHeap 19786->19789 19787->19786 19792 21a85131d45 19787->19792 19790 21a85131d00 19788->19790 19791 21a85131d92 19789->19791 19793 21a8512b714 _errno RtlFreeHeap 19790->19793 19794 21a8512b714 _errno RtlFreeHeap 19791->19794 19795 21a8513438c __lock_fhandle RtlFreeHeap 19792->19795 19801 21a85131d08 _invalid_parameter_noinfo _unlock_fhandle 19793->19801 19794->19801 19796 21a85131d4c 19795->19796 19797 21a85131d6a 19796->19797 19798 21a85131d58 19796->19798 19800 21a8512b714 _errno RtlFreeHeap 19797->19800 19799 21a85131dbc _lseeki64_nolock RtlFreeHeap 19798->19799 19799->19801 19802 21a85131d6f 19800->19802 19801->19741 19803 21a8512b6a4 __doserrno RtlFreeHeap 19802->19803 19803->19801 19805 21a8512f438 _getptd_noexit RtlFreeHeap 19804->19805 19806 21a8512b6ad 19805->19806 19806->19771 19808 21a851343c4 19807->19808 19810 21a851343ce _locterm 19807->19810 19809 21a8512d958 _lock RtlFreeHeap 19808->19809 19809->19810 19810->19776 19813 21a85130606 19811->19813 19812 21a8513063a 19815 21a8512b6a4 __doserrno RtlFreeHeap 19812->19815 19813->19812 19814 21a85130696 19813->19814 19822 21a8513062e _invalid_parameter_noinfo _NMSG_WRITE 19813->19822 19816 21a851306ab 19814->19816 19836 21a85131dbc 19814->19836 19817 21a8513063f 19815->19817 19819 21a851331dc _isatty RtlFreeHeap 19816->19819 19820 21a8512b714 _errno RtlFreeHeap 19817->19820 19821 21a851306b2 19819->19821 19820->19822 19823 21a8512f414 _getptd RtlFreeHeap 19821->19823 19834 21a85130943 19821->19834 19822->19783 19835 21a851306d6 _putwch_nolock 19823->19835 19824 21a85130cb1 19824->19822 19825 21a8512b714 _errno RtlFreeHeap 19824->19825 19826 21a85130cdd 19825->19826 19827 21a8512b6a4 __doserrno RtlFreeHeap 19826->19827 19827->19822 19828 21a85130ca3 19847 21a8512b6c4 19828->19847 19829 21a8512b714 _errno RtlFreeHeap 19831 21a85130c98 19829->19831 19832 21a8512b6a4 __doserrno RtlFreeHeap 19831->19832 19832->19828 19834->19822 19834->19824 19834->19828 19834->19829 19835->19834 19844 21a85133678 19835->19844 19837 21a851346c8 _lseeki64_nolock RtlFreeHeap 19836->19837 19838 21a85131ddb 19837->19838 19839 21a85131de1 19838->19839 19840 21a85131df2 19838->19840 19841 21a8512b714 _errno RtlFreeHeap 19839->19841 19842 21a8512b6c4 _dosmaperr RtlFreeHeap 19840->19842 19843 21a85131de6 19840->19843 19841->19843 19842->19843 19843->19816 19845 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19844->19845 19846 21a8513368c 19845->19846 19846->19835 19848 21a8512f438 _getptd_noexit RtlFreeHeap 19847->19848 19849 21a8512b6d5 19848->19849 19850 21a8512f438 _getptd_noexit RtlFreeHeap 19849->19850 19851 21a8512b6ee free 19850->19851 19851->19824 19853 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19852->19853 19856 21a8512d6a8 19853->19856 19854 21a8512d6c3 19855 21a8512b714 _errno RtlFreeHeap 19854->19855 19861 21a8512d6c8 _invalid_parameter_noinfo 19855->19861 19856->19854 19858 21a8512d6d8 19856->19858 19859 21a8512d72a 19858->19859 19862 21a85133878 19858->19862 19860 21a8512b714 _errno RtlFreeHeap 19859->19860 19859->19861 19860->19861 19861->19709 19863 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19862->19863 19864 21a8513389a 19863->19864 19865 21a85133634 _isleadbyte_l RtlFreeHeap 19864->19865 19868 21a851338a4 19864->19868 19866 21a851338c7 19865->19866 19867 21a85134268 _isctype_l RtlFreeHeap 19866->19867 19867->19868 19868->19858 19870 21a85126d71 _DllMainCRTStartup 19869->19870 19893 21a850f18bc 19870->19893 19872 21a85126da8 _DllMainCRTStartup 19872->19608 19874 21a8512f414 _getptd RtlFreeHeap 19873->19874 19875 21a8512a021 19874->19875 19875->19610 19877 21a85107f80 _DllMainCRTStartup RtlFreeHeap 19876->19877 19878 21a85107d16 _DllMainCRTStartup 19877->19878 19879 21a85107d7a GetUserNameA 19878->19879 19880 21a85107dc8 19879->19880 19899 21a851000a4 19880->19899 19882 21a85107dcd strrchr _DllMainCRTStartup 19883 21a85129700 _snprintf RtlFreeHeap 19882->19883 19884 21a85107f11 _DllMainCRTStartup 19883->19884 19906 21a851080f0 19884->19906 19888 21a851267e3 _DllMainCRTStartup 19887->19888 19914 21a850f1cc4 19888->19914 19890 21a85126838 19934 21a850f1b64 19890->19934 19892 21a851268b0 19892->19614 19895 21a850f18ec _DllMainCRTStartup 19893->19895 19894 21a850f190d 19894->19872 19895->19894 19896 21a85129468 malloc RtlFreeHeap 19895->19896 19897 21a850f1921 19896->19897 19897->19894 19898 21a85129428 free RtlFreeHeap 19897->19898 19898->19894 19912 21a851001dc 19899->19912 19901 21a851000c0 WSASocketA 19902 21a851000fa WSAIoctl 19901->19902 19903 21a851000f3 19901->19903 19905 21a85100145 closesocket 19902->19905 19903->19882 19905->19903 19907 21a85108103 _DllMainCRTStartup 19906->19907 19908 21a85129428 free RtlFreeHeap 19907->19908 19909 21a85108110 19908->19909 19910 21a85129428 free RtlFreeHeap 19909->19910 19911 21a85107f78 19910->19911 19911->19612 19913 21a851001ec _DllMainCRTStartup 19912->19913 19913->19901 19915 21a850f1d5e _DllMainCRTStartup 19914->19915 19916 21a850f1d77 _NMSG_WRITE _DllMainCRTStartup 19915->19916 19938 21a85138f58 19915->19938 19916->19890 19918 21a850f1d6f _DllMainCRTStartup 19918->19916 19919 21a850f1f0c 19918->19919 19924 21a850f1e6d 19918->19924 19920 21a85129428 free RtlFreeHeap 19919->19920 19922 21a850f1f14 19920->19922 19923 21a850f4e64 _DllMainCRTStartup RtlFreeHeap 19922->19923 19930 21a850f1f40 19923->19930 19945 21a850f4e64 19924->19945 19926 21a850f1ef3 19928 21a85129428 free RtlFreeHeap 19926->19928 19927 21a850f1efd 19929 21a85129428 free RtlFreeHeap 19927->19929 19928->19916 19929->19916 19930->19916 19932 21a850f4e64 _DllMainCRTStartup RtlFreeHeap 19930->19932 19933 21a850f205c 19930->19933 19931 21a850f4e64 _DllMainCRTStartup RtlFreeHeap 19931->19916 19932->19933 19933->19916 19933->19931 19935 21a850f1ba5 _DllMainCRTStartup 19934->19935 19936 21a850f1b9b _DllMainCRTStartup 19934->19936 19935->19936 19951 21a850f460c 19935->19951 19936->19892 19939 21a85133a60 _calloc_impl RtlFreeHeap 19938->19939 19940 21a85138f6d 19939->19940 19941 21a85138f8a 19940->19941 19942 21a8512b714 _errno RtlFreeHeap 19940->19942 19941->19918 19943 21a85138f80 19942->19943 19943->19941 19944 21a8512b714 _errno RtlFreeHeap 19943->19944 19944->19941 19947 21a850f4e90 19945->19947 19946 21a850f1eea 19946->19926 19946->19927 19947->19946 19948 21a85138f58 _DllMainCRTStartup RtlFreeHeap 19947->19948 19949 21a850f4ecf _DllMainCRTStartup 19948->19949 19949->19946 19950 21a85129428 free RtlFreeHeap 19949->19950 19950->19946 19953 21a850f463d _DllMainCRTStartup 19951->19953 19952 21a850f4893 19952->19936 19953->19952 19954 21a85129468 malloc RtlFreeHeap 19953->19954 19955 21a850f46ae 19954->19955 19956 21a85129468 malloc RtlFreeHeap 19955->19956 19957 21a850f46b8 19956->19957 19958 21a85129468 malloc RtlFreeHeap 19957->19958 19959 21a850f46c3 19958->19959 19960 21a850f489f 19959->19960 19962 21a850f4897 19959->19962 19965 21a850f46e1 19959->19965 19961 21a850f48ac 19960->19961 19964 21a85129428 free RtlFreeHeap 19960->19964 19961->19952 19966 21a85129428 free RtlFreeHeap 19961->19966 19963 21a85129428 free RtlFreeHeap 19962->19963 19963->19960 19964->19961 19967 21a850f18bc _DllMainCRTStartup RtlFreeHeap 19965->19967 19966->19952 19973 21a850f4723 _vsnprintf_helper memcpy_s 19967->19973 19968 21a85129428 free RtlFreeHeap 19969 21a850f4883 19968->19969 19970 21a85129428 free RtlFreeHeap 19969->19970 19971 21a850f488b 19970->19971 19972 21a85129428 free RtlFreeHeap 19971->19972 19972->19952 19977 21a850f4797 memcpy_s 19973->19977 19978 21a850f54f0 19973->19978 19975 21a850f54f0 _DllMainCRTStartup RtlFreeHeap 19975->19977 19976 21a850f47bf 19976->19975 19976->19976 19976->19977 19977->19968 19979 21a850f551c _DllMainCRTStartup 19978->19979 19980 21a850f5639 19979->19980 19981 21a85129468 malloc RtlFreeHeap 19979->19981 19980->19976 19982 21a850f553f 19981->19982 19983 21a85129468 malloc RtlFreeHeap 19982->19983 19984 21a850f554a 19983->19984 19985 21a850f5645 19984->19985 19986 21a850f563d 19984->19986 19992 21a850f555f 19984->19992 19985->19980 19988 21a85129428 free RtlFreeHeap 19985->19988 19987 21a85129428 free RtlFreeHeap 19986->19987 19987->19985 19988->19980 19989 21a85129428 free RtlFreeHeap 19990 21a850f5631 19989->19990 19991 21a85129428 free RtlFreeHeap 19990->19991 19991->19980 19992->19989 19994 21a85128c5e 19993->19994 19995 21a85128c70 19994->19995 19996 21a85128da7 19994->19996 20001 21a85129428 free RtlFreeHeap 19995->20001 20002 21a85128c88 19995->20002 19997 21a85128dbd 19996->19997 19998 21a85129428 free RtlFreeHeap 19996->19998 19999 21a85128dd3 19997->19999 20000 21a85129428 free RtlFreeHeap 19997->20000 19998->19997 19999->19618 20000->19999 20001->20002 20002->19618 20021 21a8510b828 20003->20021 20005 21a850ff52f 20006 21a85129700 _snprintf RtlFreeHeap 20005->20006 20007 21a850ff550 _DllMainCRTStartup 20006->20007 20025 21a8510abbc 20007->20025 20010 21a850ff5db 20012 21a85129700 _snprintf RtlFreeHeap 20010->20012 20011 21a850ff5fe 20013 21a85129700 _snprintf RtlFreeHeap 20011->20013 20014 21a850ff5fc _DllMainCRTStartup 20012->20014 20013->20014 20031 21a8510b808 20014->20031 20018 21a850ff70b 20018->19622 20019 21a850ff707 _DllMainCRTStartup 20019->20018 20038 21a8510b940 20019->20038 20022 21a8510b852 20021->20022 20023 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20022->20023 20024 21a8510b875 _DllMainCRTStartup 20023->20024 20024->20005 20030 21a8510ac38 _DllMainCRTStartup 20025->20030 20026 21a850ff5a0 20026->20010 20026->20011 20027 21a8510b752 20027->20026 20027->20027 20028 21a85129700 _snprintf RtlFreeHeap 20027->20028 20028->20026 20029 21a85129700 RtlFreeHeap _snprintf 20029->20030 20030->20026 20030->20027 20030->20029 20032 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20031->20032 20033 21a850ff6fd 20032->20033 20034 21a85100038 20033->20034 20035 21a85100072 20034->20035 20036 21a851299cc _DllMainCRTStartup RtlFreeHeap 20035->20036 20037 21a85100076 20035->20037 20036->20037 20037->20019 20039 21a85129468 malloc RtlFreeHeap 20038->20039 20044 21a8510b9af _DllMainCRTStartup 20039->20044 20040 21a8510b9bc 20040->20018 20041 21a8510bdcb 20042 21a85129428 free RtlFreeHeap 20041->20042 20042->20040 20043 21a85129428 free RtlFreeHeap 20043->20044 20044->20040 20044->20041 20044->20043 20046 21a8510ba7f 20044->20046 20045 21a85129428 free RtlFreeHeap 20045->20040 20046->20045 20049 21a850f19b8 _DllMainCRTStartup 20047->20049 20048 21a850f19d7 20048->19631 20049->20048 20050 21a85129468 malloc RtlFreeHeap 20049->20050 20051 21a850f1a07 20050->20051 20051->20048 20061 21a850f4300 20051->20061 20053 21a850f1a52 20054 21a85129428 free RtlFreeHeap 20053->20054 20054->20048 20055 21a850f1a24 _DllMainCRTStartup 20055->20053 20073 21a850f4170 20055->20073 20058 21a850ff262 20057->20058 20090 21a850fd090 20058->20090 20063 21a850f432f _DllMainCRTStartup 20061->20063 20062 21a850f4352 20062->20055 20063->20062 20064 21a85129468 malloc RtlFreeHeap 20063->20064 20065 21a850f4368 20064->20065 20065->20062 20066 21a85129468 malloc RtlFreeHeap 20065->20066 20067 21a850f4381 20066->20067 20068 21a850f438d 20067->20068 20070 21a850f18bc _DllMainCRTStartup RtlFreeHeap 20067->20070 20072 21a850f43c3 memcpy_s _DllMainCRTStartup 20067->20072 20069 21a85129428 free RtlFreeHeap 20068->20069 20069->20062 20070->20072 20071 21a85129428 free RtlFreeHeap 20071->20068 20072->20068 20072->20071 20072->20072 20074 21a850f419d _DllMainCRTStartup 20073->20074 20075 21a85129468 malloc RtlFreeHeap 20074->20075 20088 21a850f42c4 20074->20088 20076 21a850f41c2 20075->20076 20077 21a85129468 malloc RtlFreeHeap 20076->20077 20078 21a850f41cd 20077->20078 20079 21a850f42d0 20078->20079 20080 21a850f42c8 20078->20080 20089 21a850f41e2 20078->20089 20082 21a85129428 free RtlFreeHeap 20079->20082 20079->20088 20081 21a85129428 free RtlFreeHeap 20080->20081 20081->20079 20082->20088 20083 21a85129428 free RtlFreeHeap 20084 21a850f42b4 20083->20084 20085 21a85129428 free RtlFreeHeap 20084->20085 20086 21a850f42bc 20085->20086 20087 21a85129428 free RtlFreeHeap 20086->20087 20087->20088 20088->20053 20089->20083 20091 21a850fd0ac _DllMainCRTStartup 20090->20091 20092 21a850fd0ef 20091->20092 20093 21a850fd0da 20091->20093 20104 21a850fd10c 20092->20104 20097 21a850ff128 20093->20097 20096 21a850fd0ed 20096->19639 20098 21a850ff144 _DllMainCRTStartup 20097->20098 20099 21a850ff14a 20098->20099 20100 21a850ff15f 20098->20100 20111 21a850fefdc 20099->20111 20102 21a850fd10c _DllMainCRTStartup RtlFreeHeap 20100->20102 20103 21a850ff15d 20102->20103 20103->20096 20127 21a850ff180 20104->20127 20107 21a850fd14f 20107->20096 20108 21a850fd175 20110 21a85129428 free RtlFreeHeap 20108->20110 20110->20107 20112 21a850feff8 _DllMainCRTStartup 20111->20112 20121 21a850fd2bc 20112->20121 20114 21a850ff016 _DllMainCRTStartup 20115 21a850fd10c _DllMainCRTStartup RtlFreeHeap 20114->20115 20116 21a850ff0ab 20115->20116 20124 21a850fd280 20116->20124 20118 21a850ff0b5 20119 21a850ff122 20118->20119 20120 21a850fd10c _DllMainCRTStartup RtlFreeHeap 20118->20120 20119->20103 20120->20118 20122 21a85129468 malloc RtlFreeHeap 20121->20122 20123 21a850fd2d6 _DllMainCRTStartup 20122->20123 20123->20114 20125 21a85129428 free RtlFreeHeap 20124->20125 20126 21a850fd2b6 20125->20126 20126->20118 20128 21a85129468 malloc RtlFreeHeap 20127->20128 20130 21a850ff1a8 _DllMainCRTStartup 20128->20130 20129 21a850fd143 20129->20107 20129->20108 20135 21a850fff10 20129->20135 20130->20129 20131 21a850ff230 20130->20131 20132 21a850ff217 20130->20132 20145 21a85126bd8 20131->20145 20133 21a85129428 free RtlFreeHeap 20132->20133 20133->20129 20136 21a850fff3c 20135->20136 20137 21a850fff73 20135->20137 20138 21a85129468 malloc RtlFreeHeap 20136->20138 20139 21a850fff84 20137->20139 20141 21a850ffbec _DllMainCRTStartup RtlFreeHeap 20137->20141 20143 21a850fffb1 20137->20143 20140 21a850fff46 20138->20140 20139->20108 20142 21a85128aec _DllMainCRTStartup RtlFreeHeap 20140->20142 20141->20143 20142->20137 20143->20139 20144 21a850ffbec _DllMainCRTStartup RtlFreeHeap 20143->20144 20144->20139 20148 21a85126c00 _DllMainCRTStartup 20145->20148 20146 21a850f198c _DllMainCRTStartup RtlFreeHeap 20147 21a85126d2a 20146->20147 20147->20129 20148->20146 20150 21a8510c019 20149->20150 20151 21a8510be19 20149->20151 20154 21a8510c111 20150->20154 20155 21a8510c024 20150->20155 20152 21a8510c5f1 20151->20152 20153 21a8510be24 20151->20153 20618 21a85102f10 20152->20618 20159 21a8510be2f 20153->20159 20160 21a8510bf37 20153->20160 20156 21a8510c18b 20154->20156 20157 21a8510c118 20154->20157 20161 21a8510c7cb 20155->20161 20162 21a8510c02f 20155->20162 20163 21a8510c196 20156->20163 20164 21a8510c8c9 20156->20164 20177 21a8510c7de 20157->20177 20178 21a8510c12e 20157->20178 20297 21a8510be99 _DllMainCRTStartup 20157->20297 20168 21a8510be3a 20159->20168 20169 21a8510c407 20159->20169 20166 21a8510bf3e 20160->20166 20167 21a8510bfb1 20160->20167 20731 21a85109038 20161->20731 20170 21a8510c036 20162->20170 20171 21a8510c0a9 20162->20171 20172 21a8510c8df 20163->20172 20173 21a8510c1a1 20163->20173 20764 21a85103f60 20164->20764 20179 21a8510c4fd 20166->20179 20180 21a8510bf49 20166->20180 20174 21a8510bfbc 20167->20174 20175 21a8510c519 20167->20175 20184 21a8510becf 20168->20184 20185 21a8510be45 20168->20185 20479 21a851282cc 20169->20479 20186 21a8510c041 20170->20186 20187 21a8510c6e7 20170->20187 20181 21a8510c0b4 20171->20181 20182 21a8510c706 20171->20182 20194 21a85103f60 _DllMainCRTStartup RtlFreeHeap 20172->20194 20190 21a8510c1ac 20173->20190 20191 21a8510c8f8 20173->20191 20202 21a8510bfc7 20174->20202 20203 21a8510c539 20174->20203 20566 21a85103ae0 20175->20566 20738 21a850fc7a8 20177->20738 20204 21a8510c7f1 20178->20204 20205 21a8510c139 20178->20205 20198 21a85103870 _DllMainCRTStartup RtlFreeHeap 20179->20198 20195 21a8510c430 20180->20195 20196 21a8510bf54 20180->20196 20199 21a8510c0bf 20181->20199 20200 21a8510c722 20181->20200 20197 21a85103c08 _DllMainCRTStartup RtlFreeHeap 20182->20197 20224 21a8510c33e 20184->20224 20225 21a8510bee5 20184->20225 20184->20297 20219 21a8510be9e 20185->20219 20220 21a8510be57 20185->20220 20185->20297 20188 21a8510c60b 20186->20188 20189 21a8510c04c 20186->20189 20664 21a85103c08 20187->20664 20626 21a85102e94 20188->20626 20213 21a8510c61e 20189->20213 20214 21a8510c057 20189->20214 20206 21a8510c90e 20190->20206 20207 21a8510c1b7 20190->20207 20782 21a85104104 20191->20782 20194->20297 20504 21a8510cad8 20195->20504 20208 21a8510c44a 20196->20208 20209 21a8510bf5f 20196->20209 20197->20297 20198->20297 20216 21a8510c0ca 20199->20216 20217 21a8510c735 20199->20217 20671 21a85100d38 20200->20671 20233 21a8510bfdd 20202->20233 20234 21a8510c56e 20202->20234 20202->20297 20221 21a85103ae0 _DllMainCRTStartup RtlFreeHeap 20203->20221 20745 21a850fc958 20204->20745 20222 21a8510c804 20205->20222 20223 21a8510c144 20205->20223 20239 21a85104104 _DllMainCRTStartup RtlFreeHeap 20206->20239 20226 21a8510c921 20207->20226 20227 21a8510c1c2 20207->20227 20519 21a8510ca28 20208->20519 20228 21a8510bf6a 20209->20228 20229 21a8510c46c 20209->20229 20639 21a85100eb0 20213->20639 20235 21a8510c062 20214->20235 20236 21a8510c636 20214->20236 20237 21a8510c0d5 20216->20237 20238 21a8510c748 20216->20238 20674 21a85102dd8 20217->20674 20244 21a8510c28b 20219->20244 20245 21a8510bea9 20219->20245 20241 21a8510c271 20220->20241 20242 21a8510be62 20220->20242 20221->20297 20750 21a850fc8b8 20222->20750 20246 21a8510c14f 20223->20246 20247 21a8510c815 20223->20247 20446 21a85108b54 20224->20446 20248 21a8510bef0 20225->20248 20249 21a8510c358 20225->20249 20788 21a850fd654 20226->20788 20250 21a8510c1cd 20227->20250 20251 21a8510c931 20227->20251 20252 21a8510c47f 20228->20252 20253 21a8510bf75 20228->20253 20523 21a8510a30c 20229->20523 20257 21a8510c588 20233->20257 20258 21a8510bfe8 20233->20258 20570 21a8512817c 20234->20570 20261 21a8510c06d 20235->20261 20262 21a8510c649 20235->20262 20643 21a85128f98 20236->20643 20263 21a8510c75b 20237->20263 20264 21a8510c0e0 20237->20264 20681 21a85103334 20238->20681 20239->20297 20371 21a85101080 20241->20371 20266 21a8510c1f3 20242->20266 20327 21a8510be6d 20242->20327 20390 21a85102854 20244->20390 20270 21a8510c2a5 20245->20270 20271 21a8510beb4 20245->20271 20272 21a8510c15a 20246->20272 20273 21a8510c82f 20246->20273 20757 21a8510757c 20247->20757 20274 21a8510befb 20248->20274 20275 21a8510c378 20248->20275 20450 21a85103b70 20249->20450 20278 21a8510c949 20250->20278 20279 21a8510c1d8 20250->20279 20289 21a85105c14 _DllMainCRTStartup RtlFreeHeap 20251->20289 20529 21a85100a44 20252->20529 20253->20297 20298 21a8510bf8b 20253->20298 20299 21a8510c4aa 20253->20299 20577 21a85108ea8 20257->20577 20258->20297 20302 21a8510bffe 20258->20302 20303 21a8510c5b1 20258->20303 20285 21a8510c65c 20261->20285 20286 21a8510c078 20261->20286 20647 21a851014f8 20262->20647 20688 21a8510a810 20263->20688 20287 21a8510c0eb 20264->20287 20288 21a8510c76e 20264->20288 20353 21a85103870 20266->20353 20430 21a8510089c 20270->20430 20292 21a8510bebf 20271->20292 20293 21a8510c2b8 20271->20293 20295 21a8510c84b 20272->20295 20296 21a8510c165 20272->20296 20281 21a85103c08 _DllMainCRTStartup RtlFreeHeap 20273->20281 20276 21a8510c395 20274->20276 20277 21a8510bf06 20274->20277 20454 21a85102ae4 20275->20454 20458 21a85106780 20276->20458 20277->20297 20333 21a8510c3e3 20277->20333 20334 21a8510bf27 20277->20334 20278->20297 20309 21a85108ea8 _DllMainCRTStartup RtlFreeHeap 20278->20309 20279->20297 20442 21a85108934 20279->20442 20281->20297 20651 21a8510141c 20285->20651 20305 21a8510c66d 20286->20305 20306 21a8510c083 20286->20306 20307 21a8510c781 20287->20307 20308 21a8510c0f6 20287->20308 20692 21a85100bc0 20288->20692 20289->20297 20292->20297 20438 21a8510868c 20292->20438 20434 21a851271ac 20293->20434 20300 21a85103c08 _DllMainCRTStartup RtlFreeHeap 20295->20300 20311 21a8510c170 20296->20311 20312 21a8510c864 20296->20312 20297->19644 20314 21a8510c4c3 20298->20314 20315 21a8510bf96 20298->20315 20548 21a85105c14 20299->20548 20300->20297 20316 21a8510c5c4 20302->20316 20317 21a8510c009 20302->20317 20584 21a85100dc4 20303->20584 20319 21a85105c14 _DllMainCRTStartup RtlFreeHeap 20305->20319 20322 21a8510c69d 20306->20322 20323 21a8510c08e 20306->20323 20700 21a851015d8 20307->20700 20325 21a8510c79b 20308->20325 20326 21a8510c101 20308->20326 20309->20297 20329 21a8510c17b 20311->20329 20330 21a8510c880 20311->20330 20318 21a85103870 _DllMainCRTStartup RtlFreeHeap 20312->20318 20555 21a85105dac 20314->20555 20335 21a8510bfa1 20315->20335 20336 21a8510c4d4 20315->20336 20588 21a85102fb8 20316->20588 20317->20297 20610 21a851032e4 20317->20610 20318->20297 20319->20297 20338 21a85101080 _DllMainCRTStartup RtlFreeHeap 20322->20338 20340 21a8510c6b7 20323->20340 20341 21a8510c099 20323->20341 20713 21a851006d4 20325->20713 20326->20297 20727 21a8510a288 20326->20727 20327->20297 20359 21a851039a0 20327->20359 20329->20297 20347 21a85103b70 _DllMainCRTStartup RtlFreeHeap 20329->20347 20337 21a85103870 _DllMainCRTStartup RtlFreeHeap 20330->20337 20462 21a851280bc 20333->20462 20334->20297 20475 21a8512826c 20334->20475 20335->20297 20352 21a851039a0 _DllMainCRTStartup RtlFreeHeap 20335->20352 20562 21a85105b98 20336->20562 20337->20297 20338->20297 20661 21a85106fb0 20340->20661 20341->20297 20351 21a851271ac _DllMainCRTStartup RtlFreeHeap 20341->20351 20347->20297 20351->20297 20352->20297 20354 21a85103897 _DllMainCRTStartup 20353->20354 20795 21a851272a0 20354->20795 20358 21a85103926 _DllMainCRTStartup 20358->20297 20360 21a851039d5 _DllMainCRTStartup 20359->20360 20361 21a85103a2c _DllMainCRTStartup 20360->20361 20362 21a85103a10 20360->20362 20365 21a85103a44 20361->20365 20366 21a85103a59 _DllMainCRTStartup 20361->20366 20363 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20362->20363 20364 21a85103a27 20363->20364 20364->20297 20368 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20365->20368 20367 21a85103a7f _DllMainCRTStartup 20366->20367 20369 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20366->20369 20367->20364 20370 21a85104708 _DllMainCRTStartup RtlFreeHeap 20367->20370 20368->20364 20369->20367 20370->20364 20372 21a85129468 malloc RtlFreeHeap 20371->20372 20373 21a8510109c _DllMainCRTStartup 20372->20373 20374 21a851010ea 20373->20374 20375 21a851010db 20373->20375 20378 21a851010a9 20373->20378 20921 21a8512a1e8 20374->20921 20376 21a85129428 free RtlFreeHeap 20375->20376 20376->20378 20378->20297 20379 21a851010f9 20380 21a8510110e 20379->20380 20383 21a8510112c _DllMainCRTStartup 20379->20383 20381 21a85129428 free RtlFreeHeap 20380->20381 20382 21a85101118 20381->20382 20384 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20382->20384 20936 21a8512a384 20383->20936 20384->20378 20386 21a85101161 20943 21a8512a0a8 20386->20943 20388 21a8510116b 20389 21a85129428 free RtlFreeHeap 20388->20389 20389->20378 20391 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20390->20391 20392 21a8510287c _DllMainCRTStartup 20391->20392 20393 21a8512a1e8 _DllMainCRTStartup RtlFreeHeap 20392->20393 20394 21a851028e9 20393->20394 20395 21a851028fe 20394->20395 20396 21a8510291c 20394->20396 21095 21a850ff430 20395->21095 21098 21a8512aa64 20396->21098 20400 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20402 21a85102917 20400->20402 20401 21a8510292e 21105 21a8512aad8 20401->21105 20402->20297 20404 21a85102938 20405 21a8512aa64 fseek RtlFreeHeap 20404->20405 20406 21a8510294c 20405->20406 20407 21a85102960 20406->20407 20408 21a85102988 20406->20408 20409 21a850ff430 _DllMainCRTStartup RtlFreeHeap 20407->20409 20413 21a851029b5 20408->20413 20416 21a851029dd 20408->20416 20410 21a8510296f 20409->20410 20411 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20410->20411 20412 21a85102979 20411->20412 20415 21a8512a0a8 fclose RtlFreeHeap 20412->20415 20414 21a850ff430 _DllMainCRTStartup RtlFreeHeap 20413->20414 20417 21a851029c4 20414->20417 20415->20402 20418 21a85129468 malloc RtlFreeHeap 20416->20418 20419 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20417->20419 20420 21a851029e7 20418->20420 20421 21a851029ce 20419->20421 20422 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 20420->20422 20423 21a8512a0a8 fclose RtlFreeHeap 20421->20423 20424 21a85102a4c _DllMainCRTStartup 20422->20424 20423->20402 20425 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20424->20425 20426 21a85102ab7 20425->20426 20427 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20426->20427 20428 21a85102ac1 20427->20428 20428->20402 21111 21a85102c54 20428->21111 20431 21a851008e2 20430->20431 20432 21a8510a870 _DllMainCRTStartup RtlFreeHeap 20431->20432 20433 21a85100928 _DllMainCRTStartup 20431->20433 20432->20433 20433->20297 20435 21a851271ca 20434->20435 20436 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20435->20436 20437 21a851271de _DllMainCRTStartup 20435->20437 20436->20437 20437->20297 20439 21a85108723 _DllMainCRTStartup 20438->20439 20441 21a851087d5 20439->20441 21196 21a85108558 20439->21196 20441->20297 20443 21a851089c2 _DllMainCRTStartup 20442->20443 20444 21a85108a74 20443->20444 21202 21a85108598 20443->21202 20444->20297 20447 21a85108b88 _DllMainCRTStartup 20446->20447 20448 21a85108470 _DllMainCRTStartup RtlFreeHeap 20447->20448 20449 21a85108bbc 20447->20449 20448->20449 20449->20297 20451 21a85103bc0 20450->20451 20452 21a85103870 _DllMainCRTStartup RtlFreeHeap 20451->20452 20453 21a85103bde 20452->20453 20453->20297 20455 21a85102b11 20454->20455 20456 21a85102b54 20455->20456 20457 21a8512a0a8 fclose RtlFreeHeap 20455->20457 20456->20297 20457->20455 20459 21a851067d7 _DllMainCRTStartup 20458->20459 20461 21a851067ea _DllMainCRTStartup 20458->20461 20460 21a85129468 malloc RtlFreeHeap 20459->20460 20460->20461 20461->20297 20463 21a851280d4 20462->20463 20464 21a8512810a 20463->20464 20465 21a851280ee 20463->20465 20467 21a85128143 20464->20467 20468 21a85128127 20464->20468 21205 21a851287fc 20465->21205 20469 21a8512814d _wcsupr_s 20467->20469 20470 21a8512816a 20467->20470 20471 21a851287fc _DllMainCRTStartup RtlFreeHeap 20468->20471 20474 21a851287fc _DllMainCRTStartup RtlFreeHeap 20469->20474 21213 21a850ff410 20470->21213 20473 21a851280fd _wcsupr_s 20471->20473 20473->20297 20474->20473 20476 21a8512827c 20475->20476 20477 21a851282b0 20476->20477 20478 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20476->20478 20477->20297 20478->20477 20480 21a85128305 20479->20480 20481 21a85128390 20480->20481 20482 21a85128374 20480->20482 20503 21a8512830f 20480->20503 20483 21a851283ce 20481->20483 20484 21a85128397 20481->20484 20485 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20482->20485 20486 21a851283cc 20483->20486 20488 21a851283e6 20483->20488 20484->20486 20487 21a851283b0 20484->20487 20485->20503 20489 21a8512826c _DllMainCRTStartup RtlFreeHeap 20486->20489 20491 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20487->20491 20492 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20488->20492 20490 21a85128407 20489->20490 20493 21a85128432 20490->20493 20494 21a85128416 20490->20494 20491->20503 20492->20503 20496 21a8512847f 20493->20496 20497 21a85128463 20493->20497 20495 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20494->20495 20495->20503 20498 21a851284ac 20496->20498 20499 21a85128490 20496->20499 20500 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20497->20500 20501 21a851288c4 _DllMainCRTStartup RtlFreeHeap 20498->20501 20502 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20499->20502 20500->20503 20501->20503 20502->20503 20503->20297 20505 21a8510cb45 _DllMainCRTStartup 20504->20505 20506 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 20505->20506 20507 21a8510cb65 _DllMainCRTStartup 20506->20507 20508 21a8510cc01 20507->20508 20509 21a8510cbf2 20507->20509 20512 21a8510cc22 20508->20512 20516 21a8510cc3c _DllMainCRTStartup 20508->20516 20510 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20509->20510 20511 21a8510cbfc 20510->20511 20511->20297 20513 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20512->20513 20513->20511 20514 21a850fd338 RtlFreeHeap _DllMainCRTStartup 20514->20516 20516->20514 20517 21a8510cd97 _DllMainCRTStartup 20516->20517 21220 21a8510ce70 20516->21220 20518 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20517->20518 20518->20511 20520 21a8510ca6d _DllMainCRTStartup 20519->20520 20521 21a8510caab 20520->20521 20522 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20520->20522 20521->20297 20522->20521 20524 21a8510a331 20523->20524 20525 21a8510a325 20523->20525 20527 21a85129468 malloc RtlFreeHeap 20524->20527 20526 21a85129428 free RtlFreeHeap 20525->20526 20526->20524 20528 21a8510a341 20527->20528 20528->20297 20530 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20529->20530 20531 21a85100a63 _DllMainCRTStartup 20530->20531 20532 21a85100afa _DllMainCRTStartup 20531->20532 20533 21a85100aeb 20531->20533 20535 21a85100b22 _DllMainCRTStartup 20532->20535 20536 21a85100b13 20532->20536 20534 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20533->20534 20547 21a85100af5 _DllMainCRTStartup 20534->20547 20538 21a85100b3b 20535->20538 20539 21a85100b47 _DllMainCRTStartup 20535->20539 20537 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20536->20537 20537->20547 20540 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20538->20540 20541 21a85100b6c _wcsupr_s 20539->20541 20542 21a85100b60 20539->20542 20540->20547 21224 21a851025a8 20541->21224 20543 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20542->20543 20543->20547 20545 21a85100b9c _wcsupr_s 20546 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20545->20546 20546->20547 20547->20297 20553 21a85105c84 _wcsupr_s _DllMainCRTStartup 20548->20553 20549 21a85105ccd 20549->20297 20550 21a85105d90 20551 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20550->20551 20551->20549 20552 21a85105d42 _DllMainCRTStartup 21255 21a85105f88 20552->21255 20553->20549 20553->20550 20553->20552 20556 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 20555->20556 20557 21a85105dd0 20556->20557 20559 21a85105e18 _DllMainCRTStartup 20557->20559 21258 21a850fd338 20557->21258 20560 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20559->20560 20561 21a85105e4d 20560->20561 20561->20297 20564 21a85105bc5 _DllMainCRTStartup 20562->20564 21267 21a8510630c 20564->21267 20567 21a85103b30 20566->20567 20568 21a851039a0 _DllMainCRTStartup RtlFreeHeap 20567->20568 20569 21a85103b48 20568->20569 20569->20297 20571 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20570->20571 20573 21a85128198 _DllMainCRTStartup 20571->20573 20572 21a85128206 20572->20297 20573->20572 21271 21a851285f0 20573->21271 20576 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20576->20572 20578 21a85108ede _DllMainCRTStartup 20577->20578 20579 21a85108f23 _DllMainCRTStartup 20578->20579 20580 21a85108f58 20578->20580 20583 21a85108efb 20578->20583 20582 21a85108470 _DllMainCRTStartup RtlFreeHeap 20579->20582 20581 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20580->20581 20581->20583 20582->20583 20583->20297 20585 21a85100de0 _DllMainCRTStartup 20584->20585 20586 21a850ff410 _DllMainCRTStartup RtlFreeHeap 20585->20586 20587 21a85100e70 20585->20587 20586->20587 20587->20297 20589 21a85129468 malloc RtlFreeHeap 20588->20589 20590 21a85102fec _DllMainCRTStartup 20589->20590 20591 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 20590->20591 20593 21a85103057 _openfile _DllMainCRTStartup 20591->20593 20592 21a851030af 20594 21a850fd338 _DllMainCRTStartup RtlFreeHeap 20592->20594 20593->20592 21284 21a8512a414 20593->21284 20595 21a851030c8 20594->20595 20597 21a85103152 20595->20597 20598 21a851030e8 20595->20598 20599 21a85129428 free RtlFreeHeap 20597->20599 21291 21a850ff458 20598->21291 20601 21a8510315c 20599->20601 20603 21a850fd338 RtlFreeHeap _DllMainCRTStartup 20601->20603 20608 21a8510328d _DllMainCRTStartup 20601->20608 20602 21a85103100 _DllMainCRTStartup 20604 21a85129428 free RtlFreeHeap 20602->20604 20603->20601 20605 21a8510313e 20604->20605 20606 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20605->20606 20607 21a8510314b 20606->20607 20607->20297 20609 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20608->20609 20609->20607 20611 21a85103305 _DllMainCRTStartup 20610->20611 21294 21a85108430 20611->21294 20613 21a85103314 21297 21a8512af00 20613->21297 20616 21a85129428 free RtlFreeHeap 20617 21a8510332d 20616->20617 20617->20297 20619 21a85102f36 _DllMainCRTStartup 20618->20619 20620 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 20619->20620 20621 21a85102f45 _DllMainCRTStartup 20620->20621 20622 21a850fd338 _DllMainCRTStartup RtlFreeHeap 20621->20622 20623 21a85102f7b _DllMainCRTStartup 20622->20623 20624 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20623->20624 20625 21a85102fb3 20624->20625 20625->20297 20627 21a85102eb5 _DllMainCRTStartup 20626->20627 20628 21a85108430 _DllMainCRTStartup RtlFreeHeap 20627->20628 20629 21a85102ec4 _DllMainCRTStartup 20628->20629 20630 21a85102ef4 20629->20630 20631 21a85102ed7 20629->20631 21334 21a8512ae28 20630->21334 21323 21a8510cecc 20631->21323 20635 21a85102ef2 20637 21a85129428 free RtlFreeHeap 20635->20637 20638 21a85102f08 20637->20638 20638->20297 20641 21a85100ece _wcsupr_s _DllMainCRTStartup 20639->20641 20640 21a850ff458 _DllMainCRTStartup RtlFreeHeap 20642 21a85100f59 20640->20642 20641->20640 20641->20642 20642->20297 20644 21a85128fb9 _DllMainCRTStartup 20643->20644 21371 21a851290d4 20644->21371 20648 21a8510151c 20647->20648 20649 21a85101517 20647->20649 20648->20649 20650 21a85127f5c _DllMainCRTStartup RtlFreeHeap 20648->20650 20649->20297 20650->20649 20652 21a85101432 20651->20652 20653 21a85101452 20652->20653 20654 21a851014e3 20652->20654 20656 21a85101463 20653->20656 20657 21a85101477 20653->20657 20655 21a850ff410 _DllMainCRTStartup RtlFreeHeap 20654->20655 20660 21a85101475 20655->20660 20659 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20656->20659 20658 21a851288c4 _DllMainCRTStartup RtlFreeHeap 20657->20658 20658->20660 20659->20660 20660->20297 21400 21a85107278 20661->21400 20665 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20664->20665 20666 21a85103c2c _DllMainCRTStartup 20665->20666 21420 21a85103d98 20666->21420 20668 21a85103d81 20669 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20668->20669 20670 21a85103d8e 20669->20670 20670->20297 21433 21a85138b48 20671->21433 20673 21a85100d4f 20673->20297 20675 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20674->20675 20676 21a85102def _DllMainCRTStartup 20675->20676 20677 21a85102e83 20676->20677 20680 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20676->20680 20678 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20677->20678 20679 21a85102e8d 20678->20679 20679->20297 20680->20677 20682 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20681->20682 20683 21a8510334b _DllMainCRTStartup 20682->20683 20684 21a851033dc 20683->20684 20687 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20683->20687 20685 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20684->20685 20686 21a851033e6 20685->20686 20686->20297 20687->20684 20689 21a8510a831 _DllMainCRTStartup 20688->20689 20690 21a8510a84a 20689->20690 20691 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20689->20691 20690->20297 20691->20690 20693 21a85100c1e 20692->20693 20694 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20693->20694 20695 21a85100c61 _DllMainCRTStartup 20694->20695 20695->20695 20696 21a8510a618 _DllMainCRTStartup RtlFreeHeap 20695->20696 20697 21a85100d18 20696->20697 20698 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20697->20698 20699 21a85100d22 _DllMainCRTStartup 20698->20699 20699->20297 20701 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 20700->20701 20702 21a851015f9 20701->20702 20703 21a85101603 _wcsupr_s 20702->20703 20704 21a85101629 20702->20704 21625 21a851017a8 20703->21625 20706 21a8510166b 20704->20706 20707 21a85101646 20704->20707 20709 21a850ff410 _DllMainCRTStartup RtlFreeHeap 20706->20709 20708 21a851017a8 _DllMainCRTStartup RtlFreeHeap 20707->20708 20711 21a85101622 _wcsupr_s _DllMainCRTStartup 20708->20711 20709->20711 20710 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20712 21a851016b5 20710->20712 20711->20710 20712->20297 20714 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20713->20714 20715 21a851006ee _DllMainCRTStartup 20714->20715 20716 21a8512a414 _DllMainCRTStartup RtlFreeHeap 20715->20716 20717 21a851007c5 20716->20717 20718 21a8512a414 _DllMainCRTStartup RtlFreeHeap 20717->20718 20719 21a851007df 20718->20719 20720 21a85100846 20719->20720 20722 21a851007ec _DllMainCRTStartup 20719->20722 20721 21a8510117c _DllMainCRTStartup RtlFreeHeap 20720->20721 20726 21a8510083a _DllMainCRTStartup 20721->20726 20722->20722 21629 21a8510117c 20722->21629 20723 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20725 21a85100894 20723->20725 20725->20297 20726->20723 20728 21a8510a29f 20727->20728 20729 21a8510a2a1 _DllMainCRTStartup 20727->20729 20728->20297 20730 21a851290d4 _DllMainCRTStartup RtlFreeHeap 20729->20730 20730->20728 20732 21a85109069 _DllMainCRTStartup 20731->20732 20733 21a851090ce 20732->20733 20734 21a85109099 _DllMainCRTStartup 20732->20734 20735 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20733->20735 20736 21a85108470 _DllMainCRTStartup RtlFreeHeap 20734->20736 20737 21a851090cc 20735->20737 20736->20737 20737->20297 20739 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20738->20739 20740 21a850fc7bf _DllMainCRTStartup 20739->20740 21638 21a850fca54 20740->21638 20742 21a850fc85d _DllMainCRTStartup 20743 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20742->20743 20744 21a850fc8b1 20743->20744 20744->20297 20746 21a85129468 malloc RtlFreeHeap 20745->20746 20749 21a850fc97c _DllMainCRTStartup 20746->20749 20747 21a85129428 free RtlFreeHeap 20748 21a850fca4b 20747->20748 20748->20297 20749->20747 20751 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 20750->20751 20752 21a850fc8dc 20751->20752 20753 21a850fd338 _DllMainCRTStartup RtlFreeHeap 20752->20753 20754 21a850fc920 _DllMainCRTStartup 20752->20754 20753->20752 20755 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20754->20755 20756 21a850fc952 20755->20756 20756->20297 20760 21a851075a2 _DllMainCRTStartup 20757->20760 20758 21a8510762a 20762 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20758->20762 20759 21a8510763e _DllMainCRTStartup 20761 21a85106c54 _DllMainCRTStartup RtlFreeHeap 20759->20761 20760->20758 20760->20759 20763 21a8510763c 20761->20763 20762->20763 20763->20297 20765 21a85107f80 _DllMainCRTStartup RtlFreeHeap 20764->20765 20766 21a85103f7f _DllMainCRTStartup 20765->20766 20767 21a85104002 _DllMainCRTStartup 20766->20767 20768 21a85103ff3 20766->20768 20770 21a8510401b 20767->20770 20772 21a8510402a _DllMainCRTStartup 20767->20772 20769 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20768->20769 20779 21a85103ffd _DllMainCRTStartup 20769->20779 20771 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20770->20771 20771->20779 20773 21a85104052 20772->20773 20774 21a85104043 20772->20774 21642 21a85127330 20773->21642 20775 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20774->20775 20775->20779 20777 21a851040e2 20778 21a851080f0 _DllMainCRTStartup RtlFreeHeap 20777->20778 20778->20779 20779->20297 20780 21a8510407a _DllMainCRTStartup 20780->20777 20781 21a85104708 _DllMainCRTStartup RtlFreeHeap 20780->20781 20781->20777 20783 21a85104134 _DllMainCRTStartup 20782->20783 21647 21a8512739c 20783->21647 20786 21a85104708 _DllMainCRTStartup RtlFreeHeap 20787 21a85104200 _DllMainCRTStartup 20786->20787 20787->20297 21652 21a850fe02c 20788->21652 20790 21a850fd681 20793 21a850fd685 _DllMainCRTStartup 20790->20793 21656 21a850fdc28 20790->21656 20793->20297 20794 21a85105154 _DllMainCRTStartup RtlFreeHeap 20794->20793 20813 21a85127438 20795->20813 20797 21a851272ca 20819 21a8510a870 20797->20819 20800 21a85104708 20801 21a85104750 _DllMainCRTStartup 20800->20801 20802 21a85104811 20801->20802 20853 21a851052b4 20801->20853 20804 21a85104863 20802->20804 20806 21a8510482f 20802->20806 20805 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 20804->20805 20807 21a85104886 _DllMainCRTStartup 20805->20807 20860 21a8510425c 20806->20860 20810 21a8510425c _DllMainCRTStartup RtlFreeHeap 20807->20810 20809 21a8510485e 20809->20358 20811 21a8510491f 20810->20811 20812 21a850fd280 _DllMainCRTStartup RtlFreeHeap 20811->20812 20812->20809 20814 21a85127484 20813->20814 20815 21a85127465 20813->20815 20817 21a85127594 _DllMainCRTStartup RtlFreeHeap 20814->20817 20822 21a85127594 20815->20822 20818 21a8512747f strstr 20817->20818 20818->20797 20834 21a8510a618 20819->20834 20825 21a8512764e 20822->20825 20826 21a851275c9 20822->20826 20823 21a85127626 _DllMainCRTStartup 20829 21a85129700 _snprintf RtlFreeHeap 20823->20829 20824 21a851276ab _DllMainCRTStartup 20828 21a85129700 _snprintf RtlFreeHeap 20824->20828 20825->20824 20825->20825 20830 21a8512768c 20825->20830 20826->20823 20826->20826 20827 21a85127607 20826->20827 20831 21a85129700 _snprintf RtlFreeHeap 20827->20831 20832 21a85127624 _DllMainCRTStartup 20828->20832 20829->20832 20833 21a85129700 _snprintf RtlFreeHeap 20830->20833 20831->20832 20832->20818 20833->20832 20837 21a8510a378 20834->20837 20836 21a85103922 20836->20358 20836->20800 20838 21a8510a39e _DllMainCRTStartup 20837->20838 20839 21a8510a3a9 20838->20839 20842 21a8510a3bb _DllMainCRTStartup 20838->20842 20844 21a85102238 20839->20844 20841 21a85102238 _DllMainCRTStartup RtlFreeHeap 20843 21a8510a3b6 _DllMainCRTStartup 20841->20843 20842->20841 20842->20843 20843->20836 20845 21a851022e5 20844->20845 20846 21a85102255 _DllMainCRTStartup 20844->20846 20847 21a85101e58 _DllMainCRTStartup RtlFreeHeap 20845->20847 20852 21a851022ac 20845->20852 20846->20845 20848 21a8510226b 20846->20848 20847->20852 20849 21a85101e58 _DllMainCRTStartup RtlFreeHeap 20848->20849 20850 21a85102295 20849->20850 20851 21a85101fc8 _DllMainCRTStartup RtlFreeHeap 20850->20851 20851->20852 20852->20843 20854 21a851052d1 _DllMainCRTStartup 20853->20854 20855 21a8510530c 20854->20855 20856 21a851052eb 20854->20856 20874 21a851054e8 20855->20874 20870 21a85105330 20856->20870 20859 21a8510530a 20859->20802 20861 21a8510427f 20860->20861 20862 21a85104294 20860->20862 20897 21a851051dc 20861->20897 20864 21a851052b4 _DllMainCRTStartup RtlFreeHeap 20862->20864 20865 21a8510428d 20864->20865 20866 21a851042b5 20865->20866 20904 21a851042f8 20865->20904 20866->20809 20869 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20869->20866 20872 21a85105371 _DllMainCRTStartup 20870->20872 20871 21a851053b7 20871->20859 20872->20871 20884 21a850ff2ec 20872->20884 20875 21a85105511 _DllMainCRTStartup 20874->20875 20876 21a8510557d 20875->20876 20877 21a8510555f 20875->20877 20879 21a851055d8 20876->20879 20881 21a85105576 20876->20881 20882 21a8510563a _DllMainCRTStartup 20876->20882 20894 21a850ff310 20877->20894 20880 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20879->20880 20880->20881 20881->20859 20882->20881 20883 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20882->20883 20883->20881 20887 21a850ff33c 20884->20887 20888 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 20887->20888 20889 21a850ff361 _DllMainCRTStartup 20888->20889 20890 21a850fd090 _DllMainCRTStartup RtlFreeHeap 20889->20890 20891 21a850ff3fe 20890->20891 20895 21a850ff33c _DllMainCRTStartup RtlFreeHeap 20894->20895 20896 21a850ff336 20895->20896 20896->20881 20898 21a851051fd _DllMainCRTStartup 20897->20898 20899 21a85105264 20898->20899 20900 21a85105249 20898->20900 20908 21a85105154 20899->20908 20902 21a850ff310 _DllMainCRTStartup RtlFreeHeap 20900->20902 20903 21a85105260 20902->20903 20903->20865 20907 21a8510431d _DllMainCRTStartup 20904->20907 20905 21a851042d0 20905->20866 20905->20869 20907->20905 20912 21a85104be4 20907->20912 20909 21a8510516c _DllMainCRTStartup 20908->20909 20910 21a85105188 20909->20910 20911 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 20909->20911 20910->20903 20911->20910 20913 21a85104caf 20912->20913 20915 21a85104ccc 20913->20915 20916 21a85104adc 20913->20916 20915->20907 20922 21a8512a110 20921->20922 20923 21a8512a13f 20922->20923 20925 21a8512a16a 20922->20925 20924 21a8512b714 _errno RtlFreeHeap 20923->20924 20935 21a8512a144 _invalid_parameter_noinfo _ioinit fseek 20924->20935 20949 21a8512fb9c 20925->20949 20927 21a8512a16f 20928 21a8512a17c 20927->20928 20929 21a8512a189 20927->20929 20932 21a8512b714 _errno RtlFreeHeap 20928->20932 20930 21a8512a1b0 20929->20930 20931 21a8512a18e 20929->20931 20957 21a8512fcd0 20930->20957 20933 21a8512b714 _errno RtlFreeHeap 20931->20933 20932->20935 20933->20935 20935->20379 20937 21a8512a3ae 20936->20937 20942 21a8512a3c4 _invalid_parameter_noinfo fseek 20936->20942 20938 21a8512a3d1 fseek 20937->20938 20939 21a8512a3bf 20937->20939 20937->20942 21014 21a8512a1f4 20938->21014 20940 21a8512b714 _errno RtlFreeHeap 20939->20940 20940->20942 20942->20386 20944 21a8512a0c9 20943->20944 20946 21a8512a0dd fseek 20943->20946 20945 21a8512b714 _errno RtlFreeHeap 20944->20945 20948 21a8512a0ce _invalid_parameter_noinfo fseek 20945->20948 20946->20948 21030 21a8512a02c 20946->21030 20948->20388 20950 21a8512d958 _lock RtlFreeHeap 20949->20950 20951 21a8512fbb5 20950->20951 20952 21a8512fc3d 20951->20952 20953 21a8512fc31 _locterm 20951->20953 20956 21a8512da24 _mtinitlocknum RtlFreeHeap 20951->20956 20972 21a8512f784 20951->20972 20954 21a8512e378 _malloc_crt RtlFreeHeap 20952->20954 20953->20927 20954->20953 20956->20951 20962 21a8512fd0a 20957->20962 20958 21a8512fd21 20959 21a8512b714 _errno RtlFreeHeap 20958->20959 20963 21a8512fd26 _invalid_parameter_noinfo 20959->20963 20960 21a8512ff27 20992 21a85134a54 20960->20992 20962->20958 20971 21a8512fec2 20962->20971 20977 21a85134a88 20962->20977 20963->20935 20965 21a8512fe82 20965->20958 20965->20965 20983 21a85134bbc 20965->20983 20967 21a8512febe 20968 21a85134bbc _openfile RtlFreeHeap 20967->20968 20967->20971 20969 21a8512fee1 20968->20969 20970 21a85134bbc _openfile RtlFreeHeap 20969->20970 20969->20971 20970->20971 20971->20958 20971->20960 20973 21a8512f7a5 20972->20973 20974 21a8512f792 20972->20974 20975 21a8512d958 _lock RtlFreeHeap 20974->20975 20976 21a8512f79a 20975->20976 20976->20951 20978 21a85134a90 20977->20978 20979 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 20978->20979 20982 21a85134ab4 _invalid_parameter_noinfo _openfile 20978->20982 20980 21a85134ac8 20979->20980 20981 21a8512b714 _errno RtlFreeHeap 20980->20981 20980->20982 20981->20982 20982->20965 20984 21a85134bc4 20983->20984 20985 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 20984->20985 20986 21a85134bed 20985->20986 20987 21a85134c15 20986->20987 20988 21a85134c02 20986->20988 20991 21a85134c10 _invalid_parameter_noinfo 20986->20991 20990 21a8512b714 _errno RtlFreeHeap 20987->20990 20987->20991 20995 21a85135eac 20988->20995 20990->20991 20991->20967 21000 21a851348f0 20992->21000 20994 21a85134a81 20994->20963 20996 21a85135ee6 20995->20996 20997 21a85135eb9 20995->20997 20997->20996 20998 21a8512b714 _errno RtlFreeHeap 20997->20998 20999 21a85135ec3 _invalid_parameter_noinfo 20998->20999 20999->20991 21001 21a85134931 21000->21001 21002 21a85134919 21000->21002 21001->21002 21004 21a8513495e 21001->21004 21003 21a8512b714 _errno RtlFreeHeap 21002->21003 21006 21a8513491e _invalid_parameter_noinfo _unlock_fhandle 21003->21006 21007 21a851349cc 21004->21007 21006->20994 21008 21a851299d8 remove RtlFreeHeap 21007->21008 21009 21a851349f6 21008->21009 21010 21a851349fa 21009->21010 21011 21a851356a8 _wsopen_nolock RtlFreeHeap 21009->21011 21010->21006 21012 21a85134a33 21011->21012 21013 21a85129428 free RtlFreeHeap 21012->21013 21013->21010 21016 21a8512a222 21014->21016 21018 21a8512a231 _invalid_parameter_noinfo 21014->21018 21015 21a8512a22c 21017 21a8512b714 _errno RtlFreeHeap 21015->21017 21016->21015 21016->21018 21022 21a8512a26e memcpy_s 21016->21022 21017->21018 21018->20942 21019 21a8512bd98 _vsnprintf_helper RtlFreeHeap 21019->21022 21021 21a8512f624 _fileno RtlFreeHeap 21021->21022 21022->21018 21022->21019 21022->21021 21023 21a85130504 _wsopen_nolock RtlFreeHeap 21022->21023 21024 21a8512fa2c 21022->21024 21023->21022 21025 21a8512fa49 21024->21025 21029 21a8512fa6e 21024->21029 21026 21a8512f624 _fileno RtlFreeHeap 21025->21026 21025->21029 21027 21a8512fa60 21026->21027 21028 21a85130504 _wsopen_nolock RtlFreeHeap 21027->21028 21028->21029 21029->21022 21031 21a8512a041 21030->21031 21032 21a8512a055 21030->21032 21033 21a8512b714 _errno RtlFreeHeap 21031->21033 21034 21a8512fa2c _flush RtlFreeHeap 21032->21034 21042 21a8512a046 _invalid_parameter_noinfo 21032->21042 21033->21042 21035 21a8512a060 21034->21035 21044 21a8512f9a8 21035->21044 21038 21a8512f624 _fileno RtlFreeHeap 21039 21a8512a072 21038->21039 21048 21a8512f828 21039->21048 21042->20948 21045 21a8512a06a 21044->21045 21046 21a8512f9b7 21044->21046 21045->21038 21046->21045 21047 21a85129428 free RtlFreeHeap 21046->21047 21047->21045 21049 21a8512f841 21048->21049 21050 21a8512f859 21048->21050 21051 21a8512b6a4 __doserrno RtlFreeHeap 21049->21051 21052 21a8512f8c2 21050->21052 21055 21a8512f88b 21050->21055 21053 21a8512f846 21051->21053 21054 21a8512b6a4 __doserrno RtlFreeHeap 21052->21054 21058 21a8513438c __lock_fhandle RtlFreeHeap 21055->21058 21061 21a8512f892 21058->21061 21096 21a850ff33c _DllMainCRTStartup RtlFreeHeap 21095->21096 21097 21a850ff450 21096->21097 21097->20400 21099 21a8512aa8c 21098->21099 21100 21a8512aaa1 21098->21100 21101 21a8512b714 _errno RtlFreeHeap 21099->21101 21100->21099 21102 21a8512aaa7 fseek 21100->21102 21103 21a8512aa91 _invalid_parameter_noinfo fseek 21101->21103 21115 21a8512a9b8 21102->21115 21103->20401 21106 21a8512ab0c fseek 21105->21106 21107 21a8512aaf6 21105->21107 21177 21a8512ab34 21106->21177 21108 21a8512b714 _errno RtlFreeHeap 21107->21108 21109 21a8512aafb _invalid_parameter_noinfo fseek 21108->21109 21109->20404 21116 21a8512a9eb 21115->21116 21117 21a8512a9db 21115->21117 21119 21a8512a9fe 21116->21119 21127 21a8513186c 21116->21127 21118 21a8512b714 _errno RtlFreeHeap 21117->21118 21121 21a8512a9e0 21118->21121 21120 21a8512fa2c _flush RtlFreeHeap 21119->21120 21123 21a8512aa0a 21120->21123 21121->21103 21124 21a8512f624 _fileno RtlFreeHeap 21123->21124 21125 21a8512aa36 21124->21125 21149 21a85131b60 21125->21149 21128 21a8513188e 21127->21128 21129 21a851318ab 21128->21129 21130 21a851318c3 21128->21130 21132 21a8512b714 _errno RtlFreeHeap 21129->21132 21131 21a8512f624 _fileno RtlFreeHeap 21130->21131 21133 21a851318c8 21131->21133 21148 21a851318b0 _invalid_parameter_noinfo _NMSG_WRITE 21132->21148 21134 21a85131b60 _fseek_nolock RtlFreeHeap 21133->21134 21135 21a851318e2 21134->21135 21136 21a85131a5a 21135->21136 21137 21a8513193e 21135->21137 21135->21148 21138 21a85131a5e 21136->21138 21141 21a85131a30 21136->21141 21140 21a85131953 21137->21140 21137->21141 21139 21a8512b714 _errno RtlFreeHeap 21138->21139 21139->21148 21142 21a85131cd8 _ftell_nolock RtlFreeHeap 21140->21142 21140->21148 21143 21a85131b60 _fseek_nolock RtlFreeHeap 21141->21143 21141->21148 21145 21a8513196f 21142->21145 21144 21a85131aa4 21143->21144 21146 21a85131b60 _fseek_nolock RtlFreeHeap 21144->21146 21144->21148 21147 21a85131b60 _fseek_nolock RtlFreeHeap 21145->21147 21145->21148 21146->21148 21147->21148 21148->21119 21150 21a85131b9b 21149->21150 21151 21a85131b83 21149->21151 21152 21a85131c12 21150->21152 21156 21a85131bcd 21150->21156 21153 21a8512b6a4 __doserrno RtlFreeHeap 21151->21153 21154 21a8512b6a4 __doserrno RtlFreeHeap 21152->21154 21155 21a85131b88 21153->21155 21157 21a85131c17 21154->21157 21158 21a8512b714 _errno RtlFreeHeap 21155->21158 21159 21a8513438c __lock_fhandle RtlFreeHeap 21156->21159 21160 21a8512b714 _errno RtlFreeHeap 21157->21160 21162 21a85131b90 _invalid_parameter_noinfo _unlock_fhandle 21158->21162 21161 21a85131bd4 21159->21161 21160->21162 21163 21a85131bf1 21161->21163 21164 21a85131be0 21161->21164 21162->21121 21166 21a8512b714 _errno RtlFreeHeap 21163->21166 21169 21a85131c40 21164->21169 21167 21a85131bf6 21166->21167 21168 21a8512b6a4 __doserrno RtlFreeHeap 21167->21168 21168->21162 21170 21a851346c8 _lseeki64_nolock RtlFreeHeap 21169->21170 21171 21a85131c5e 21170->21171 21172 21a85131c64 21171->21172 21174 21a85131c74 21171->21174 21173 21a8512b714 _errno RtlFreeHeap 21172->21173 21175 21a85131c69 21173->21175 21174->21175 21176 21a8512b6c4 _dosmaperr RtlFreeHeap 21174->21176 21175->21162 21176->21175 21178 21a8512ab56 21177->21178 21179 21a8512f624 _fileno RtlFreeHeap 21178->21179 21180 21a8512ab73 21179->21180 21181 21a85131cd8 _ftell_nolock RtlFreeHeap 21180->21181 21182 21a8512ab8f 21181->21182 21183 21a8512ad12 21182->21183 21184 21a8512abf7 21182->21184 21195 21a8512ab97 _NMSG_WRITE 21182->21195 21185 21a8512ad16 21183->21185 21189 21a8512ace7 21183->21189 21187 21a8512ac0c 21184->21187 21184->21189 21186 21a8512b714 _errno RtlFreeHeap 21185->21186 21186->21195 21188 21a85131cd8 _ftell_nolock RtlFreeHeap 21187->21188 21187->21195 21192 21a8512ac24 21188->21192 21190 21a85131cd8 _ftell_nolock RtlFreeHeap 21189->21190 21189->21195 21191 21a8512ad61 21190->21191 21193 21a85131cd8 _ftell_nolock RtlFreeHeap 21191->21193 21191->21195 21194 21a85131cd8 _ftell_nolock RtlFreeHeap 21192->21194 21192->21195 21193->21195 21194->21195 21195->21109 21199 21a85108470 21196->21199 21200 21a85129468 malloc RtlFreeHeap 21199->21200 21201 21a85108491 21200->21201 21201->20441 21203 21a85108470 _DllMainCRTStartup RtlFreeHeap 21202->21203 21204 21a851085d3 21203->21204 21204->20444 21216 21a851288c4 21205->21216 21207 21a85128825 _DllMainCRTStartup 21208 21a85128856 21207->21208 21209 21a85128836 21207->21209 21212 21a85128854 21207->21212 21211 21a85129700 _snprintf RtlFreeHeap 21208->21211 21210 21a85129700 _snprintf RtlFreeHeap 21209->21210 21210->21212 21211->21212 21212->20473 21214 21a850ff33c _DllMainCRTStartup RtlFreeHeap 21213->21214 21215 21a850ff429 21214->21215 21215->20473 21218 21a851288de 21216->21218 21217 21a8512896b 21217->21207 21218->21217 21219 21a85129700 _snprintf RtlFreeHeap 21218->21219 21219->21217 21221 21a8510ce98 21220->21221 21222 21a851288c4 _DllMainCRTStartup RtlFreeHeap 21221->21222 21223 21a8510ce9c 21221->21223 21222->21223 21223->20516 21225 21a85107f80 _DllMainCRTStartup RtlFreeHeap 21224->21225 21227 21a851025da _DllMainCRTStartup 21225->21227 21226 21a851027f2 21228 21a851080f0 _DllMainCRTStartup RtlFreeHeap 21226->21228 21227->21226 21231 21a850ff280 21227->21231 21230 21a85102846 21228->21230 21230->20545 21236 21a8512990c 21231->21236 21234 21a850ff33c _DllMainCRTStartup RtlFreeHeap 21235 21a850ff2e2 21234->21235 21235->21226 21239 21a8512989c 21236->21239 21238 21a850ff2c3 21238->21234 21240 21a851298aa 21239->21240 21241 21a851298f1 21239->21241 21240->21241 21243 21a851298b4 21240->21243 21242 21a8512b714 _errno RtlFreeHeap 21241->21242 21246 21a851298e9 _invalid_parameter_noinfo 21242->21246 21248 21a851297b4 21243->21248 21245 21a851298d8 21245->21246 21247 21a8512b714 _errno RtlFreeHeap 21245->21247 21246->21238 21247->21246 21250 21a851297f0 _vsnprintf_helper 21248->21250 21249 21a851297f5 21251 21a8512b714 _errno RtlFreeHeap 21249->21251 21250->21249 21253 21a85129814 21250->21253 21252 21a851297fa _invalid_parameter_noinfo 21251->21252 21252->21245 21253->21252 21254 21a8512bd98 _vsnprintf_helper RtlFreeHeap 21253->21254 21254->21252 21256 21a85129468 malloc RtlFreeHeap 21255->21256 21257 21a85105fa9 _DllMainCRTStartup 21256->21257 21257->20549 21263 21a85129924 21258->21263 21260 21a850fd369 21261 21a850fd395 21260->21261 21262 21a8512990c _DllMainCRTStartup RtlFreeHeap 21260->21262 21261->20557 21262->21261 21264 21a8512993c _vsnprintf_helper 21263->21264 21265 21a8512b714 _errno RtlFreeHeap 21264->21265 21266 21a8512997a _invalid_parameter_noinfo 21264->21266 21265->21266 21266->21260 21270 21a85106331 21267->21270 21268 21a85105c0e 21268->20297 21269 21a85129428 RtlFreeHeap free 21269->21270 21270->21268 21270->21269 21272 21a8512826c _DllMainCRTStartup RtlFreeHeap 21271->21272 21273 21a8512860d 21272->21273 21274 21a85128640 21273->21274 21275 21a85128657 21273->21275 21276 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 21274->21276 21277 21a8512867f 21275->21277 21279 21a85128668 21275->21279 21283 21a8512825a 21276->21283 21278 21a85107f80 _DllMainCRTStartup RtlFreeHeap 21277->21278 21281 21a85128689 _DllMainCRTStartup 21278->21281 21280 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 21279->21280 21280->21283 21282 21a851288c4 _DllMainCRTStartup RtlFreeHeap 21281->21282 21282->21283 21283->20576 21288 21a8512a427 21284->21288 21285 21a8512a42c 21286 21a8512b714 _errno RtlFreeHeap 21285->21286 21287 21a8512a431 _invalid_parameter_noinfo 21285->21287 21286->21287 21287->20592 21288->21285 21289 21a8512a47a 21288->21289 21289->21287 21290 21a8512b714 _errno RtlFreeHeap 21289->21290 21290->21287 21292 21a850ff33c _DllMainCRTStartup RtlFreeHeap 21291->21292 21293 21a850ff47f 21292->21293 21293->20602 21295 21a85129468 malloc RtlFreeHeap 21294->21295 21296 21a8510844a _DllMainCRTStartup 21295->21296 21296->20613 21298 21a8512af1c 21297->21298 21299 21a8512af12 21297->21299 21303 21a85103323 21298->21303 21319 21a851322e0 21298->21319 21305 21a851299d8 21299->21305 21303->20616 21304 21a85129428 free RtlFreeHeap 21304->21303 21306 21a851299fe 21305->21306 21307 21a85129a16 21305->21307 21308 21a8512b714 _errno RtlFreeHeap 21306->21308 21307->21306 21310 21a85129a1b __crtIsPackagedApp 21307->21310 21309 21a85129a03 _invalid_parameter_noinfo 21308->21309 21309->21298 21311 21a85129a5d 21310->21311 21312 21a85129a6e 21310->21312 21314 21a8512b6c4 _dosmaperr RtlFreeHeap 21311->21314 21313 21a8512e378 _malloc_crt RtlFreeHeap 21312->21313 21315 21a85129a79 21313->21315 21314->21309 21315->21309 21316 21a8512b6c4 _dosmaperr RtlFreeHeap 21315->21316 21317 21a85129aac 21316->21317 21318 21a85129428 free RtlFreeHeap 21317->21318 21318->21309 21321 21a851322ec 21319->21321 21320 21a8512af32 21320->21304 21321->21320 21322 21a8512b6c4 _dosmaperr RtlFreeHeap 21321->21322 21322->21320 21342 21a8510cf00 21323->21342 21326 21a8512af48 21327 21a8512af5a 21326->21327 21328 21a8512af64 21326->21328 21330 21a851299d8 remove RtlFreeHeap 21327->21330 21333 21a8512af68 21328->21333 21363 21a85132314 21328->21363 21330->21328 21332 21a85129428 free RtlFreeHeap 21332->21333 21333->20635 21335 21a8512ae3a 21334->21335 21336 21a8512ae44 21334->21336 21337 21a851299d8 remove RtlFreeHeap 21335->21337 21340 21a8512ae48 21336->21340 21367 21a851322b0 21336->21367 21337->21336 21340->20635 21341 21a85129428 free RtlFreeHeap 21341->21340 21343 21a85129468 malloc RtlFreeHeap 21342->21343 21344 21a8510cf1d 21343->21344 21345 21a85129700 _snprintf RtlFreeHeap 21344->21345 21346 21a8510cf3d 21345->21346 21347 21a85129428 free RtlFreeHeap 21346->21347 21352 21a8510cf5c 21347->21352 21348 21a85102ee8 21348->21326 21349 21a85129468 malloc RtlFreeHeap 21349->21352 21350 21a85129700 _snprintf RtlFreeHeap 21350->21352 21352->21348 21352->21349 21352->21350 21353 21a85129428 free RtlFreeHeap 21352->21353 21354 21a8510d08c 21352->21354 21353->21352 21355 21a85129468 malloc RtlFreeHeap 21354->21355 21356 21a8510d0ae 21355->21356 21357 21a85129700 _snprintf RtlFreeHeap 21356->21357 21358 21a8510d0d8 21357->21358 21359 21a8510cf00 _DllMainCRTStartup RtlFreeHeap 21358->21359 21360 21a8510d0ec 21359->21360 21361 21a85129428 free RtlFreeHeap 21360->21361 21362 21a8510d0f6 21361->21362 21362->21352 21364 21a8513231e 21363->21364 21365 21a8512b6c4 _dosmaperr RtlFreeHeap 21364->21365 21366 21a8512af7a 21364->21366 21365->21366 21366->21332 21368 21a851322ba 21367->21368 21369 21a8512b6c4 _dosmaperr RtlFreeHeap 21368->21369 21370 21a8512ae5a 21368->21370 21369->21370 21370->21341 21372 21a851290fd _DllMainCRTStartup 21371->21372 21373 21a85128ff9 21372->21373 21377 21a851292bc 21372->21377 21373->20297 21378 21a85129468 malloc RtlFreeHeap 21377->21378 21379 21a851292db 21378->21379 21380 21a85129468 malloc RtlFreeHeap 21379->21380 21381 21a851292fa 21380->21381 21382 21a85129468 malloc RtlFreeHeap 21381->21382 21383 21a85129331 21382->21383 21384 21a85129700 _snprintf RtlFreeHeap 21383->21384 21385 21a8512935d 21384->21385 21386 21a85129468 malloc RtlFreeHeap 21385->21386 21387 21a851291b9 21386->21387 21388 21a85127f5c 21387->21388 21389 21a85127f82 _DllMainCRTStartup 21388->21389 21391 21a85127f99 21389->21391 21392 21a85127eb4 21389->21392 21391->21373 21393 21a85127ee4 21392->21393 21396 21a85128078 21393->21396 21397 21a85128088 21396->21397 21398 21a85127f19 21396->21398 21399 21a851051dc _DllMainCRTStartup RtlFreeHeap 21397->21399 21398->21391 21399->21398 21401 21a85107291 21400->21401 21402 21a8510734c 21401->21402 21403 21a8510731e 21401->21403 21404 21a85107375 21402->21404 21405 21a85107377 _DllMainCRTStartup 21402->21405 21406 21a85107335 21403->21406 21407 21a85107329 21403->21407 21411 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 21404->21411 21413 21a85106c54 21405->21413 21410 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 21406->21410 21408 21a850ff410 _DllMainCRTStartup RtlFreeHeap 21407->21408 21412 21a85106fd1 21408->21412 21410->21412 21411->21412 21412->20297 21415 21a85106c99 21413->21415 21414 21a85106e80 21417 21a850ff410 _DllMainCRTStartup RtlFreeHeap 21414->21417 21415->21414 21416 21a85106d14 21415->21416 21419 21a85106c9d _DllMainCRTStartup 21415->21419 21418 21a85129468 malloc RtlFreeHeap 21416->21418 21416->21419 21417->21419 21418->21419 21419->21412 21421 21a85103dbf _DllMainCRTStartup 21420->21421 21422 21a851272a0 _DllMainCRTStartup RtlFreeHeap 21421->21422 21423 21a85103e8c 21422->21423 21424 21a85103e90 _DllMainCRTStartup 21423->21424 21425 21a85104708 _DllMainCRTStartup RtlFreeHeap 21423->21425 21424->20668 21426 21a85103ef6 _DllMainCRTStartup 21425->21426 21428 21a851060bc 21426->21428 21429 21a85129468 malloc RtlFreeHeap 21428->21429 21430 21a851060e0 21429->21430 21431 21a85129700 _snprintf RtlFreeHeap 21430->21431 21432 21a85106182 _DllMainCRTStartup 21431->21432 21432->21424 21434 21a8512d958 _lock RtlFreeHeap 21433->21434 21435 21a85138b5b 21434->21435 21438 21a85138b7c 21435->21438 21437 21a85138b66 _locterm 21437->20673 21439 21a85138bab 21438->21439 21443 21a85138ba3 _invalid_parameter_noinfo 21438->21443 21440 21a85138bb0 21439->21440 21442 21a85138bc7 21439->21442 21445 21a85138c26 _putenv_helper 21439->21445 21441 21a8512b714 _errno RtlFreeHeap 21440->21441 21441->21443 21471 21a85139728 21442->21471 21443->21437 21445->21440 21449 21a85138c51 21445->21449 21446 21a85138bf8 21448 21a8512e2f8 _calloc_crt RtlFreeHeap 21446->21448 21447 21a85138bd3 _putenv_helper 21447->21440 21447->21446 21454 21a85138c11 21448->21454 21450 21a8512e2f8 _calloc_crt RtlFreeHeap 21449->21450 21451 21a85138c65 21450->21451 21451->21443 21452 21a85134fbc __crtsetenv RtlFreeHeap 21451->21452 21452->21454 21453 21a85134fbc __crtsetenv RtlFreeHeap 21455 21a85138ca6 21453->21455 21454->21443 21454->21453 21477 21a85138fb8 21455->21477 21457 21a85138cb4 21458 21a85138cb8 21457->21458 21460 21a85138ccf 21457->21460 21458->21443 21459 21a85129428 free RtlFreeHeap 21458->21459 21459->21443 21460->21443 21461 21a85138d07 21460->21461 21463 21a8512e2f8 _calloc_crt RtlFreeHeap 21460->21463 21462 21a8512b714 _errno RtlFreeHeap 21461->21462 21462->21443 21468 21a85138d50 _NMSG_WRITE 21463->21468 21464 21a85138d77 21465 21a85129428 free RtlFreeHeap 21464->21465 21465->21461 21466 21a85138dc5 21515 21a85139350 21466->21515 21468->21443 21468->21464 21468->21466 21470 21a85129428 free RtlFreeHeap 21470->21443 21472 21a85139730 21471->21472 21473 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21472->21473 21474 21a85139751 21473->21474 21475 21a8512b714 _errno RtlFreeHeap 21474->21475 21476 21a8513975d _invalid_parameter_noinfo strchr 21474->21476 21475->21476 21476->21447 21478 21a85138fe1 21477->21478 21479 21a85138ff6 21477->21479 21480 21a8512b714 _errno RtlFreeHeap 21478->21480 21481 21a851390d8 21479->21481 21483 21a85139728 __crtsetenv RtlFreeHeap 21479->21483 21508 21a85138fe6 _invalid_parameter_noinfo 21480->21508 21482 21a8512b714 _errno RtlFreeHeap 21481->21482 21482->21508 21484 21a8513900f 21483->21484 21484->21481 21485 21a8513904f 21484->21485 21487 21a8512e2f8 _calloc_crt RtlFreeHeap 21484->21487 21486 21a851390fe 21485->21486 21488 21a851390cf 21485->21488 21493 21a85139133 21485->21493 21491 21a8512e378 _malloc_crt RtlFreeHeap 21486->21491 21486->21508 21498 21a8513906e 21487->21498 21552 21a85139c2c 21488->21552 21494 21a85139111 21491->21494 21502 21a85139199 21493->21502 21493->21508 21560 21a85139d20 21493->21560 21494->21493 21501 21a8512e378 _malloc_crt RtlFreeHeap 21494->21501 21494->21508 21495 21a8513923d 21496 21a8513932b 21495->21496 21504 21a85139234 21495->21504 21497 21a85129428 free RtlFreeHeap 21496->21497 21506 21a85139333 _invoke_watson 21497->21506 21498->21485 21546 21a85139bbc 21498->21546 21499 21a85129428 free RtlFreeHeap 21499->21502 21501->21493 21502->21495 21502->21499 21502->21504 21503 21a85139314 21505 21a85129428 free RtlFreeHeap 21503->21505 21503->21508 21504->21503 21507 21a8512e2f8 _calloc_crt RtlFreeHeap 21504->21507 21504->21508 21505->21508 21509 21a851392b6 21507->21509 21508->21457 21509->21503 21510 21a85134fbc __crtsetenv RtlFreeHeap 21509->21510 21512 21a851392d5 21510->21512 21511 21a85139306 21514 21a85129428 free RtlFreeHeap 21511->21514 21512->21506 21512->21511 21513 21a8512b714 _errno RtlFreeHeap 21512->21513 21513->21511 21514->21503 21519 21a8513938d wcschr 21515->21519 21516 21a85139483 21517 21a8512b714 _errno RtlFreeHeap 21516->21517 21518 21a85138dd0 21517->21518 21518->21443 21518->21470 21519->21516 21520 21a851394a9 21519->21520 21521 21a85139465 21519->21521 21532 21a851394e3 21519->21532 21520->21518 21522 21a851394be 21520->21522 21525 21a8512e378 _malloc_crt RtlFreeHeap 21520->21525 21594 21a8513a264 21521->21594 21522->21518 21527 21a8512e378 _malloc_crt RtlFreeHeap 21522->21527 21522->21532 21525->21522 21526 21a8513960d 21529 21a85139700 21526->21529 21537 21a85139601 _NMSG_WRITE 21526->21537 21527->21532 21531 21a85129428 free RtlFreeHeap 21529->21531 21532->21518 21534 21a85139553 21532->21534 21609 21a85139ea0 21532->21609 21533 21a85129428 free RtlFreeHeap 21533->21534 21534->21526 21534->21533 21534->21537 21536 21a851396e9 21536->21518 21538 21a85129428 free RtlFreeHeap 21536->21538 21537->21518 21537->21536 21539 21a8512e2f8 _calloc_crt RtlFreeHeap 21537->21539 21538->21518 21540 21a85139691 _NMSG_WRITE 21539->21540 21540->21536 21547 21a85139bd3 21546->21547 21551 21a85139bfb _invoke_watson 21546->21551 21548 21a85129468 malloc RtlFreeHeap 21547->21548 21549 21a85139be4 21548->21549 21550 21a85134fbc __crtsetenv RtlFreeHeap 21549->21550 21549->21551 21550->21551 21551->21498 21553 21a851390d4 21552->21553 21554 21a85139c54 21552->21554 21553->21481 21553->21493 21554->21553 21555 21a8512e2f8 _calloc_crt RtlFreeHeap 21554->21555 21556 21a85139d10 21554->21556 21558 21a85138fb8 __crtsetenv RtlFreeHeap 21554->21558 21559 21a85129428 free RtlFreeHeap 21554->21559 21555->21554 21557 21a85129428 free RtlFreeHeap 21556->21557 21557->21553 21558->21554 21559->21554 21561 21a85139d28 21560->21561 21562 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21561->21562 21563 21a85139d59 21562->21563 21564 21a85139d6f 21563->21564 21565 21a85139d86 21563->21565 21569 21a85139d5e _invalid_parameter_noinfo 21563->21569 21566 21a8512b714 _errno RtlFreeHeap 21564->21566 21567 21a85139d90 21565->21567 21568 21a85139da2 21565->21568 21566->21569 21570 21a8512b714 _errno RtlFreeHeap 21567->21570 21571 21a85139dad 21568->21571 21572 21a85139dc2 21568->21572 21569->21493 21570->21569 21575 21a8513a918 21571->21575 21591 21a8513ad60 21572->21591 21576 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21575->21576 21577 21a8513a941 21576->21577 21592 21a8512bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21591->21592 21593 21a8513ad85 __crtCompareStringA_stat 21592->21593 21593->21569 21595 21a8513a27e 21594->21595 21596 21a8513a288 memcpy_s 21595->21596 21597 21a8512e378 _malloc_crt RtlFreeHeap 21595->21597 21597->21596 21610 21a85139eb6 21609->21610 21613 21a85139f29 21609->21613 21611 21a8512b714 _errno RtlFreeHeap 21610->21611 21619 21a85139ee3 21610->21619 21612 21a85139ec0 _invalid_parameter_noinfo 21611->21612 21612->21532 21614 21a85139f69 21613->21614 21616 21a85139f88 21613->21616 21623 21a85139f5d _invalid_parameter_noinfo 21613->21623 21615 21a8512b714 _errno RtlFreeHeap 21614->21615 21615->21623 21617 21a85139f92 21616->21617 21618 21a85139fa7 21616->21618 21619->21532 21623->21532 21627 21a851017f6 _DllMainCRTStartup 21625->21627 21626 21a851018e1 21626->20711 21627->21626 21628 21a850fd338 _DllMainCRTStartup RtlFreeHeap 21627->21628 21628->21627 21630 21a851011f1 21629->21630 21631 21a8510a870 _DllMainCRTStartup RtlFreeHeap 21630->21631 21632 21a85101265 21631->21632 21633 21a85101269 21632->21633 21635 21a8510648c 21632->21635 21633->20726 21636 21a851060bc _DllMainCRTStartup RtlFreeHeap 21635->21636 21637 21a851064d3 21636->21637 21637->21633 21639 21a850fca6a 21638->21639 21640 21a85129468 malloc RtlFreeHeap 21639->21640 21641 21a850fcaa8 21639->21641 21640->21641 21641->20742 21643 21a85127438 _DllMainCRTStartup RtlFreeHeap 21642->21643 21644 21a8512735b 21643->21644 21645 21a851025a8 _DllMainCRTStartup RtlFreeHeap 21644->21645 21646 21a85127392 21645->21646 21646->20780 21648 21a85127438 _DllMainCRTStartup RtlFreeHeap 21647->21648 21649 21a851273c6 21648->21649 21650 21a8510a618 _DllMainCRTStartup RtlFreeHeap 21649->21650 21651 21a851041fc 21650->21651 21651->20786 21651->20787 21653 21a850fe053 _DllMainCRTStartup 21652->21653 21654 21a850ff310 _DllMainCRTStartup RtlFreeHeap 21653->21654 21655 21a850fe55a _DllMainCRTStartup 21653->21655 21654->21655 21655->20790 21663 21a850fdc5e _DllMainCRTStartup 21656->21663 21657 21a850fdd13 21658 21a850ff2ec _DllMainCRTStartup RtlFreeHeap 21657->21658 21659 21a850fd691 21658->21659 21659->20793 21659->20794 21660 21a850fd9e4 RtlFreeHeap _DllMainCRTStartup 21660->21663 21661 21a850fdf39 21662 21a850ff280 _DllMainCRTStartup RtlFreeHeap 21661->21662 21662->21659 21663->21657 21663->21659 21663->21660 21663->21661 21664 21a850fdf7f 21663->21664 21665 21a850ff410 _DllMainCRTStartup RtlFreeHeap 21664->21665 21665->21659 21671 21a85109323 _DllMainCRTStartup 21666->21671 21667 21a85109625 21667->19649 21668 21a85106c54 _DllMainCRTStartup RtlFreeHeap 21668->21671 21669 21a85108470 _DllMainCRTStartup RtlFreeHeap 21669->21671 21670 21a850fd2bc _DllMainCRTStartup RtlFreeHeap 21670->21671 21671->21667 21671->21668 21671->21669 21671->21670 21672 21a850fd280 _DllMainCRTStartup RtlFreeHeap 21671->21672 21672->21671 21674 21a85109964 21673->21674 21676 21a8510996e _DllMainCRTStartup 21673->21676 21675 21a85129468 malloc RtlFreeHeap 21674->21675 21675->21676 21676->19649 21679 21a85109bea 21677->21679 21678 21a851092e1 21678->19556 21679->21678 21680 21a85129428 RtlFreeHeap free 21679->21680 21680->21679

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: NameSocketUser_snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 1789932928-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 210916ae00a8f62c935d8525a323aa4480340f95bbd46dededf9abf66342125d
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: E571CA70619B488FE794EF18C498B9AB7E2FBD9350F51496DB489C32A1CB74D885CB02
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: DCBA
                                      • API String ID: 544645111-2222620526
                                      • Opcode ID: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction ID: f5cbde60ef1f31431444e5a65bb490ecf9752c003431801e8ab898489f40a8bf
                                      • Opcode Fuzzy Hash: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction Fuzzy Hash: FD411773202B499EDB10CF65D8847D837B2F758BACF158212EE0D87B98DA34CA458740

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ($0
                                      • API String ID: 0-506339136
                                      • Opcode ID: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction ID: a9da84887bcbf257f7927f2eb847575689eb011cb2c08396f5c53132c68dc61b
                                      • Opcode Fuzzy Hash: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction Fuzzy Hash: F74184305597458FE7A4EB28D0587AAB7E2FBE8305F91497DE48AC32A1DB74C845CB03

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: IoctlSocketclosesocket
                                      • String ID:
                                      • API String ID: 3445158922-0
                                      • Opcode ID: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction ID: 51e8469b186f960884087e5cbf230e0293e6c3778f5fdaf04a800d462358a683
                                      • Opcode Fuzzy Hash: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction Fuzzy Hash: 94311E7065D7888FE350EF68C448B5BFBE5FB98344F50492DE49AC2290E7B8D445CB02

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: InternetOpen
                                      • String ID:
                                      • API String ID: 2038078732-0
                                      • Opcode ID: 170dc46f2207cb387e16a0227af4bff50695bdbce6e0c670e9cf9a8f94b52204
                                      • Instruction ID: 374284e13050fc060a68a9bb8dbdf1f0b244e837cc574fa5efe7d73bb6a0c934
                                      • Opcode Fuzzy Hash: 170dc46f2207cb387e16a0227af4bff50695bdbce6e0c670e9cf9a8f94b52204
                                      • Instruction Fuzzy Hash: 45517B706197848FF354EB68C8597AAB7F2FB99306F41442EE586D26E1CB788841CB03
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnowrite_multi_char$Locale_invalid_parameter_noinfowrite_charwrite_string$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                      • String ID: $@
                                      • API String ID: 2950348734-1077428164
                                      • Opcode ID: d0c11ce3fe9816791c8f3df9114e5837cab1464e9dac4973b158c2e25600f33a
                                      • Instruction ID: 4a9526d36164951d66a856d6a67abe48c5a51ae9c5d3e936854444bea59ab6b3
                                      • Opcode Fuzzy Hash: d0c11ce3fe9816791c8f3df9114e5837cab1464e9dac4973b158c2e25600f33a
                                      • Instruction Fuzzy Hash: BA62273091AB498AF768EA18C4497F9B7E2FBB5304F66015DDD86C31D2DB64DC438643
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnowrite_multi_char$Locale_invalid_parameter_noinfowrite_charwrite_string$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
                                      • String ID: $@
                                      • API String ID: 2950348734-1077428164
                                      • Opcode ID: c5deec5cbe16e2340369a60e72f21974cfb8fc15909817b37a753fe08bdbb5a8
                                      • Instruction ID: 4cb0333a66b0c033ec88644be34e8aff37e19f3ddf0815a8e850988ddbf5755a
                                      • Opcode Fuzzy Hash: c5deec5cbe16e2340369a60e72f21974cfb8fc15909817b37a753fe08bdbb5a8
                                      • Instruction Fuzzy Hash: 3962F73091AB459AFB68FA58C4497FABBD3FB75718F26411DDE87C31C2DB2498028643

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 941 21a851305e4-21a8513062c call 21a8512a680 944 21a8513062e-21a85130630 941->944 945 21a85130635-21a85130638 941->945 946 21a85130cf6-21a85130d1f call 21a85131ef0 944->946 947 21a8513063a-21a85130654 call 21a8512b6a4 call 21a8512b714 call 21a8512bd3c 945->947 948 21a85130659-21a8513068b 945->948 947->946 949 21a8513068d-21a85130694 948->949 950 21a85130696-21a8513069c 948->950 949->947 949->950 953 21a851306ab-21a851306b4 call 21a851331dc 950->953 954 21a8513069e-21a851306a6 call 21a85131dbc 950->954 962 21a851306ba-21a851306cb 953->962 963 21a85130976-21a85130987 953->963 954->953 962->963 968 21a851306d1-21a85130705 call 21a8512f414 962->968 966 21a8513098d-21a85130999 963->966 967 21a85130c58-21a85130c74 963->967 969 21a8513099f-21a851309a2 966->969 970 21a85130a67-21a85130a6b 966->970 981 21a85130c7e-21a85130c84 967->981 982 21a85130c76-21a85130c7c 967->982 968->963 999 21a8513070b-21a8513070d 968->999 974 21a851309a8 969->974 975 21a85130cb6-21a85130ccc 969->975 972 21a85130a71-21a85130a74 970->972 973 21a85130b46-21a85130b49 970->973 972->975 979 21a85130a7a 972->979 973->975 978 21a85130b4f-21a85130b50 973->978 980 21a851309ab-21a851309b6 974->980 983 21a85130cce-21a85130cd2 975->983 984 21a85130cd8-21a85130ce8 call 21a8512b714 call 21a8512b6a4 975->984 985 21a85130b55-21a85130b5a 978->985 986 21a85130a7f-21a85130a8a 979->986 987 21a851309b8-21a851309c1 980->987 988 21a85130c86-21a85130c88 981->988 982->988 983->944 983->984 997 21a85130cf0-21a85130cf4 984->997 991 21a85130b5c-21a85130b65 985->991 992 21a85130a8c-21a85130a95 986->992 993 21a851309c3-21a851309cc 987->993 994 21a851309e9-21a85130a2c 987->994 996 21a85130c8a-21a85130c8c 988->996 988->997 1002 21a85130b67-21a85130b74 991->1002 1003 21a85130b96-21a85130bdf 991->1003 1004 21a85130ac8-21a85130b0b 992->1004 1005 21a85130a97-21a85130aa4 992->1005 1006 21a851309ce-21a851309d6 993->1006 1007 21a851309d8-21a851309e7 993->1007 994->981 1023 21a85130a32-21a85130a48 994->1023 996->975 1008 21a85130c8e-21a85130c91 996->1008 997->946 1000 21a8513070f-21a85130712 999->1000 1001 21a85130718-21a8513072c 999->1001 1000->963 1000->1001 1025 21a8513096d-21a85130971 1001->1025 1026 21a85130732-21a85130735 1001->1026 1010 21a85130b82-21a85130b94 1002->1010 1011 21a85130b76-21a85130b7f 1002->1011 1003->981 1028 21a85130be5 1003->1028 1004->981 1029 21a85130b11-21a85130b27 1004->1029 1012 21a85130ab4-21a85130ac6 1005->1012 1013 21a85130aa6-21a85130ab1 1005->1013 1006->1007 1007->987 1007->994 1015 21a85130caa-21a85130cb1 call 21a8512b6c4 1008->1015 1016 21a85130c93-21a85130ca3 call 21a8512b714 call 21a8512b6a4 1008->1016 1010->991 1010->1003 1011->1010 1012->992 1012->1004 1013->1012 1015->975 1016->1015 1023->988 1030 21a85130a4e-21a85130a5c 1023->1030 1025->996 1033 21a8513073b-21a8513075a 1026->1033 1034 21a851308bf-21a851308c4 1026->1034 1035 21a85130be7-21a85130c21 1028->1035 1029->988 1036 21a85130b2d-21a85130b3b 1029->1036 1030->980 1031 21a85130a62 1030->1031 1031->988 1040 21a8513077c-21a85130786 call 21a85133678 1033->1040 1041 21a8513075c-21a8513077a 1033->1041 1037 21a851308e4-21a851308e5 1034->1037 1038 21a851308c6-21a851308e2 1034->1038 1051 21a85130c31-21a85130c39 1035->1051 1052 21a85130c23-21a85130c2d 1035->1052 1036->986 1042 21a85130b41 1036->1042 1043 21a851308e9-21a851308ee 1037->1043 1038->1043 1055 21a851307bc-21a851307c3 1040->1055 1056 21a85130788-21a85130795 1040->1056 1044 21a851307c5-21a851307d2 call 21a85134ec8 1041->1044 1042->988 1048 21a851308f0-21a851308ff call 21a85134ed0 1043->1048 1049 21a8513092f-21a85130930 1043->1049 1060 21a85130964-21a85130968 1044->1060 1061 21a851307d8-21a85130815 1044->1061 1048->981 1068 21a85130905-21a8513090b 1048->1068 1057 21a85130934-21a8513093c 1049->1057 1066 21a85130c3d-21a85130c3f 1051->1066 1052->1035 1058 21a85130c2f 1052->1058 1055->1044 1063 21a8513079b-21a851307b1 call 21a85134ec8 1056->1063 1064 21a85130943-21a8513095c 1056->1064 1057->1060 1065 21a8513093e 1057->1065 1058->1066 1060->988 1061->1060 1074 21a8513081b-21a8513084a 1061->1074 1063->1060 1076 21a851307b7-21a851307ba 1063->1076 1064->1060 1065->1026 1066->988 1067 21a85130c41-21a85130c50 1066->1067 1067->985 1070 21a85130c56 1067->1070 1068->1049 1072 21a8513090d-21a85130923 call 21a85134ed0 1068->1072 1070->988 1072->981 1079 21a85130929-21a8513092b 1072->1079 1074->981 1080 21a85130850-21a8513085e 1074->1080 1076->1061 1079->1049 1080->1060 1081 21a85130864-21a8513086e 1080->1081 1081->1057 1082 21a85130874-21a851308a6 1081->1082 1082->981 1084 21a851308ac-21a851308b1 1082->1084 1084->1060 1085 21a851308b7-21a851308bd 1084->1085 1085->1057
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: __doserrno_errno_invalid_parameter_noinfo
                                      • String ID: @$U
                                      • API String ID: 3902385426-1013562545
                                      • Opcode ID: da7689ce54228aaf4bddcdee74e72ebc99834143e299237826ea97d9c58be4b6
                                      • Instruction ID: 12ef77020c1905bf635d0bcca45be79d5a4e1d6d0d7a9804a7aaa653e9e0d33a
                                      • Opcode Fuzzy Hash: da7689ce54228aaf4bddcdee74e72ebc99834143e299237826ea97d9c58be4b6
                                      • Instruction Fuzzy Hash: 4E220A31119B488BE718FF98D8587EA77E2FBA5710F11052DE886C31A1DB39D942CB43
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_invalid_parameter_noinfo
                                      • String ID: U
                                      • API String ID: 3902385426-4171548499
                                      • Opcode ID: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction ID: e75b50227c9597f5122232bb1da3084e972fcf91ac75080e798f678b5fea0121
                                      • Opcode Fuzzy Hash: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction Fuzzy Hash: A4123732206A458EEB208F24D84C3DA73B3F7A5765F520112DE8947BA4DB3EC947CB12
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: write_multi_charwrite_string$write_char$_errno_invalid_parameter_noinfo_isleadbyte_l_malloc_crtfree
                                      • String ID:
                                      • API String ID: 2600834739-3916222277
                                      • Opcode ID: 95db6e67095b1cff7f5ed97d2d1907cd3ce88e16966fe85260d16a5165bf001e
                                      • Instruction ID: cc87204c9a7e68dbd9ecb699c0a60a3caa5d4fb118591c395f0ca3c9d5ed649b
                                      • Opcode Fuzzy Hash: 95db6e67095b1cff7f5ed97d2d1907cd3ce88e16966fe85260d16a5165bf001e
                                      • Instruction Fuzzy Hash: 0532147260A6848EFB658A15D14C3FE6BB3B761766F164005DE46836D8FB7AC843CB03
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: $<$Changing the code in this way will not affect the quality of the resulting optimized code.$uctDir
                                      • API String ID: 0-3812399124
                                      • Opcode ID: 8608a6510d78ded6d7b72b0d922fa4575634e3d77ec576b96213c711cfdf47ce
                                      • Instruction ID: 51a9977261efd1fc861cc5bfe18367aa083459210aaac927ff1157e6854c7835
                                      • Opcode Fuzzy Hash: 8608a6510d78ded6d7b72b0d922fa4575634e3d77ec576b96213c711cfdf47ce
                                      • Instruction Fuzzy Hash: F192E4B2325A4087DB58CB1DE4A573AB7A1F3C8B84F44512AEB9B87798CE3CD551CB04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: h
                                      • API String ID: 0-2439710439
                                      • Opcode ID: 17c874fdfca0e46784307bd0b6e64768fd4c1a3d89b12e191bda19c005753cbd
                                      • Instruction ID: 22626b7d01ff40cf3ff71cebfb41e808a324404d3690a12a59d3d7d751bc1113
                                      • Opcode Fuzzy Hash: 17c874fdfca0e46784307bd0b6e64768fd4c1a3d89b12e191bda19c005753cbd
                                      • Instruction Fuzzy Hash: 7A520D3110A640CEE630DF54E4596EEB732F7E5364F120612EE8A52AA98B7DE447CF13
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _initp_misc_winsig
                                      • String ID:
                                      • API String ID: 2710132595-0
                                      • Opcode ID: a07fc22a08f5e67a1c7ac2f0e580d16a86d42523d264ac07f3f61779ccf3c060
                                      • Instruction ID: 1e00156c5564a90e23ade4b91a9a365cf727961b55fd8c72e0c7d3409b4035cf
                                      • Opcode Fuzzy Hash: a07fc22a08f5e67a1c7ac2f0e580d16a86d42523d264ac07f3f61779ccf3c060
                                      • Instruction Fuzzy Hash: 53A1C931619E488FEF54FFB5E89CAA937E2F7B8301721892A900AD3170EA7CD555CB40
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9eab68fb9e7b9d9b3771e682694464f1b14661e19fa50621f11c28dc9949e1d3
                                      • Instruction ID: 25fd609aa4b718287f859947c4d176b1c29280f9bc2c41f7ffe662761d6ff6e5
                                      • Opcode Fuzzy Hash: 9eab68fb9e7b9d9b3771e682694464f1b14661e19fa50621f11c28dc9949e1d3
                                      • Instruction Fuzzy Hash: 81621A312286558FD31CCB1CC4B1B7AB7E1FB89340F44896DE28BCB692C639D945CB91
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 08ac40124cc23334790defe89c47a364b21545b827a4d258faee6f67e278948b
                                      • Instruction ID: 41d3625e4383a40479733c4d728de319f4f09d823d0a5ec406c0432429c13510
                                      • Opcode Fuzzy Hash: 08ac40124cc23334790defe89c47a364b21545b827a4d258faee6f67e278948b
                                      • Instruction Fuzzy Hash: D052ED312286558FD31CCF1CC5A1E7AB7E1FB8D340F448A6DE28ACB692C639E545CB91
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 428beff660b2dd63aba7e3c02aee92ffa63a6193adce4ad15022cc3a3e5488b1
                                      • Instruction ID: 1a290f31edd9f679abac924eb81627c8e5509faa6d0653f6e5d59f8ab952bd49
                                      • Opcode Fuzzy Hash: 428beff660b2dd63aba7e3c02aee92ffa63a6193adce4ad15022cc3a3e5488b1
                                      • Instruction Fuzzy Hash: FAF1D932705A428AEB20CB55D5943EE63B3F7A47ACF920425DE4997789EF34C907CB41
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 1f6ea64bb700f135ef9746f642ebdda6f198d38bec0304a88397afe1d72f797d
                                      • Instruction ID: 9adccc049a9a7dfbc84f01c46dfd5d33ab690ac2304696e28a00338c77fda9c5
                                      • Opcode Fuzzy Hash: 1f6ea64bb700f135ef9746f642ebdda6f198d38bec0304a88397afe1d72f797d
                                      • Instruction Fuzzy Hash: 0DE1E632706A4299EF209B94D4843EE63B3F7A47ACF920521DE4DA7699EB34C907C741
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                      • String ID: -$@
                                      • API String ID: 3246410048-1222683799
                                      • Opcode ID: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction ID: 2dd82cdc119dc4d88e52bcc9e5409d9af5467806e3ddfa4aba10f3fc6c7275db
                                      • Opcode Fuzzy Hash: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction Fuzzy Hash: 99B13972206A808DFB65CB6494483FE7BB2F7607B1F164006DE49876D8EB3AC943C742

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction ID: 37927a83b646308858e88c90abce0c54259266c542e4681438a79092a105f31e
                                      • Opcode Fuzzy Hash: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction Fuzzy Hash: AC31F37021AB444FE718BFA8C89A3F936D6EB65720F170259EC16872D3D678AD018753
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$ExitProcess__crt_errno
                                      • String ID:
                                      • API String ID: 1362684943-0
                                      • Opcode ID: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction ID: b911a7630b26d9c8fb49de1dd76843791b0f20c6c0d0ca5fb99b04fa506015be
                                      • Opcode Fuzzy Hash: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction Fuzzy Hash: F9413B396036048DFE95AB11E85E3E82373BF747B6F0B15259D194A2E6CF39C4538243
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction ID: 4460b13c88539fc46f9132eab139f60c13ca5e7b8cb37a60ccdea24d003023c2
                                      • Opcode Fuzzy Hash: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction Fuzzy Hash: AE31F1323066808FE72AAF659DA97ED2677ABA07B0F574114AE1107BC3C638C443C712

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction ID: 8a7ac419cebc6a1dd247f1b46d3bbedf7e61330aaa3a753ba8f46373d664becd
                                      • Opcode Fuzzy Hash: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction Fuzzy Hash: EF21383561AB000EF718BB58DC5E3F9B6D2EB62320F1B065DEC5A871D3C76858018663

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction ID: 7a8f05e3cdea77c1137cc7479b38a37592adee0ce26fa0cbf42fb02bc9ee1c91
                                      • Opcode Fuzzy Hash: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction Fuzzy Hash: 0A214B3074A3000EF718BB58C8AE3FCB6D2DBA6320F1B061CEC56871E3D76858428263
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction ID: c55fa70f029634aaa143224c76ca2c604a717fedb8727b8bdc19f9c07f629fdc
                                      • Opcode Fuzzy Hash: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction Fuzzy Hash: 8921CF3262664059FA096F159C097ED6673ABA0BF2F0F8214AE350BBD2C73884538712
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction ID: e36bedf90b5492b79e3757300423a30ebc3d761d258bbce13e892e3d21f749ac
                                      • Opcode Fuzzy Hash: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction Fuzzy Hash: 9721F2322165804DF61A6B159C597EC6673ABA07F2F1B4114AE150BBD3DBBC8853C712

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1186 21a85139ea0-21a85139eb4 1187 21a85139f29-21a85139f5b 1186->1187 1188 21a85139eb6-21a85139eb9 1186->1188 1193 21a85139f5d-21a85139f5f 1187->1193 1194 21a85139f64-21a85139f67 1187->1194 1189 21a85139ebb-21a85139ed4 call 21a8512b714 call 21a8512bd3c 1188->1189 1190 21a85139ed5-21a85139ed8 1188->1190 1190->1189 1195 21a85139eda-21a85139ee1 1190->1195 1197 21a8513a049-21a8513a063 1193->1197 1198 21a85139f83-21a85139f86 1194->1198 1199 21a85139f69-21a85139f7e call 21a8512b714 call 21a8512bd3c 1194->1199 1195->1189 1200 21a85139ee3-21a85139ee4 1195->1200 1198->1199 1204 21a85139f88-21a85139f90 1198->1204 1199->1197 1203 21a85139ee6-21a85139ef2 1200->1203 1209 21a85139ef4 1203->1209 1210 21a85139ef8-21a85139f03 1203->1210 1205 21a85139f92-21a85139fa2 call 21a8512b714 call 21a8512bd3c 1204->1205 1206 21a85139fa7-21a85139fc3 call 21a8512bf24 1204->1206 1229 21a8513a047 1205->1229 1223 21a85139fc5-21a85139fc6 1206->1223 1224 21a8513a007-21a8513a022 call 21a8513adec 1206->1224 1209->1210 1211 21a85139f05 1210->1211 1212 21a85139f09-21a85139f10 1210->1212 1211->1212 1216 21a85139f1c-21a85139f28 1212->1216 1217 21a85139f12-21a85139f15 1212->1217 1217->1216 1221 21a85139f17-21a85139f1a 1217->1221 1221->1203 1221->1216 1227 21a85139fc8-21a85139fd4 1223->1227 1232 21a8513a031 1224->1232 1233 21a8513a024-21a8513a02f call 21a8512b714 1224->1233 1230 21a85139fda-21a85139fe4 1227->1230 1231 21a85139fd6 1227->1231 1229->1197 1234 21a85139fea-21a85139ff1 1230->1234 1235 21a85139fe6 1230->1235 1231->1230 1237 21a8513a034-21a8513a039 1232->1237 1233->1237 1238 21a85139ffd-21a8513a005 1234->1238 1239 21a85139ff3-21a85139ff6 1234->1239 1235->1234 1237->1229 1241 21a8513a03b-21a8513a040 1237->1241 1238->1237 1239->1238 1242 21a85139ff8-21a85139ffb 1239->1242 1241->1229 1242->1227 1242->1238
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction ID: 947b1b8ec73725f3ef57ec08568a6616a6f1a2c56b4fe76989c0a6567493e904
                                      • Opcode Fuzzy Hash: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction Fuzzy Hash: 8A51033011AB1A4AEB64FF18C4593F576D3EB74321F56026AE895C71D6EB2CC8818693
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction ID: 939272e99beaa1e786bd1f64302e8297cb9e2d4515812d00d04e02c5587df70e
                                      • Opcode Fuzzy Hash: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction Fuzzy Hash: 1B41F3716073908DFB68BB918848BE932F3E774FB1F964521AE5443FC5E72988639602

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction ID: 83ad6aa67f6ff139c97a55226320f694e3a50cc86d2415035b6a9bf6b1a522a5
                                      • Opcode Fuzzy Hash: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction Fuzzy Hash: 8C21383060A7004EF714BB98D89E3F876C3EBA5321F17025DE856872D3D7A85C4186A7

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction ID: 77a1ecbdbdea952cc00a416730c08361b3279c994f44e564540f98441c30999a
                                      • Opcode Fuzzy Hash: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction Fuzzy Hash: 3721D23262AB044EF715FB64C89E3E8B692EB61320F1B052DE816872D7D77488808763
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction ID: db99278876f9ab65a723fa6ab307c0001c8b39ad4ce34a1b0a0625b578ce0932
                                      • Opcode Fuzzy Hash: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction Fuzzy Hash: 642101723066445EF606AF2598493ED2673ABA0BB2F0B4114AE150B3D3EB79C843C323
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction ID: f165a83b9a334733dd70789a699a2610beb1f0b65b9c852d252e04ad121473d6
                                      • Opcode Fuzzy Hash: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction Fuzzy Hash: 9911D3323076844DF615AF359D4D3DC6673A7A07B2F1B4624AE19073D3D67AC8438726
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$FreeHeap_errno
                                      • String ID:
                                      • API String ID: 2737118440-0
                                      • Opcode ID: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction ID: d7c51686a5e1dd146e0ea3f2528a0804d64856e45da4ba9f6fb9cadb4be6897d
                                      • Opcode Fuzzy Hash: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction Fuzzy Hash: 0041103065AB4A8FFBA4FB5CD8D9BED32D3F768311F5540689809C2291DB2C9895CB12
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction ID: c13e910bcb7a38cf59edeca8c5193725c2df47c0ed797f3846658d36c5fa183e
                                      • Opcode Fuzzy Hash: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction Fuzzy Hash: FC91A134719B484FE759EAAC94597FD73E2EBA5710F51025EDC8AD72C2EE2098038683
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction ID: e020d260bbf804c3fde3b629c6c64e4a9cf47c4256bdb980e48d08ae86ee08b9
                                      • Opcode Fuzzy Hash: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction Fuzzy Hash: C47117323063854EEB209B2694487EE77B2FBA5BDCF125015DE4A47B86DB38C447CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _time64$strtok$malloc
                                      • String ID:
                                      • API String ID: 2141844861-0
                                      • Opcode ID: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction ID: e1c1326b434d97c28a4562f21e520ed58cdbdf4e4d26112e8d6c1b1b7b652219
                                      • Opcode Fuzzy Hash: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction Fuzzy Hash: 75912779506A44CEE761CF04E88839977B2F3A4375F524219DD9A8ABB4DB3DC493CB02
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-3916222277
                                      • Opcode ID: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction ID: f93b1f6706466b55c662536de75739f9ae96f51e99140e027755c08fee60d417
                                      • Opcode Fuzzy Hash: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction Fuzzy Hash: B1411472602B444EEB689F24C4593BC37B2E764B71F164215DE55873C5FA36C853C742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction ID: a79e4131d2a574514a53c25bb908308374d53e092e27a41003798f4db3336400
                                      • Opcode Fuzzy Hash: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction Fuzzy Hash: E7315C34619B084FD754EF1CD09A7E976D2EB68320F5602A9A849C72D2DB74DC448786
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction ID: 7ac65a719d0b5cbe544640581cb4dbb4dac49cb2904c98b852c0fc714c919b43
                                      • Opcode Fuzzy Hash: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction Fuzzy Hash: 7B31B130615B094FEB54FB6D98097A972D3FFA8320F15466DA84AC32E2DB78C8818743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                      • String ID:
                                      • API String ID: 4120058822-0
                                      • Opcode ID: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction ID: e967d1a9a9d037d7c706fc30a0a13d7837c66aca4d52a11d8eeed75663e20fc4
                                      • Opcode Fuzzy Hash: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction Fuzzy Hash: 0821B8347067804EF614BFA8D8ED3E87692EB65310F170668E805872D3D6A85C408757
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction ID: 1074b3d84e5e9b67af92676856aa6948624395a31fa34af9b50950f2106ddea5
                                      • Opcode Fuzzy Hash: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction Fuzzy Hash: 2F31A571702B448AFB14AF22D81C3A866F3BFA4BB5F0645249E45477E1EF39C4028302
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction ID: 80f1fb1ee2a21670b765d5e833619868576a9ede4d5c0650522553f87cc86ebf
                                      • Opcode Fuzzy Hash: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction Fuzzy Hash: 8A31A07220A7848DEA24AB91988CBDDB6B7F364BF0F5A4521EE5843F85DB34D852C701
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction ID: db94bfa3e05745ddfd022cbf4e73b533bb3f2b7d50a0c23da0129ecab3f77512
                                      • Opcode Fuzzy Hash: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction Fuzzy Hash: 9261B330219F094AE66CF62C584E2B576D3E7A4721F16032EE856C36D1EFA19C5286C7
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction ID: 417821470380a0be72167e50fe9e7529daa0527b23b6f6866b635ca6e5c7be6a
                                      • Opcode Fuzzy Hash: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction Fuzzy Hash: 8A711D305197488FE784FB18C459B9AB7E2FBE8354F514A2DB48AC32A2CB74D945CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction ID: 55f995aa1f6d13ca50dcc61928d4aa3b60008ed7db3fc7a8aba826f7746e204b
                                      • Opcode Fuzzy Hash: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction Fuzzy Hash: B15129317062408AFE248AA659087E966F3B7B4BF5F164B10AE3943BD5DB36C4938642
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction ID: b7aaa6fbde5d61ca9f73ac30510948f41f38b338748b03c31e1e4dde060da2de
                                      • Opcode Fuzzy Hash: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction Fuzzy Hash: 43615C32219A848AEB20DB15E48439EB772F7D57A4F114116EECD43BAACF38C446CF02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction ID: 6b91255470f0298df72f799a71b018c2e440a89e07320b82602f7ee47ebca1be
                                      • Opcode Fuzzy Hash: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction Fuzzy Hash: EB21953061AB4A4FF790FB2954093AA76D3EBA9320F46096AAC49C3296EF64CC414753
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction ID: 0c73c7b72b6a33668c7a569c1f30df189110b894a14be3977d659f2487461d17
                                      • Opcode Fuzzy Hash: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction Fuzzy Hash: 8F312F30959B489FE284FB28C4597DAB7E2FBA8354F51061DB88AD32A1DB349941C743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction ID: 0bdc26476dd16ca909d59ce14be002701a1376b2cc534034fe24da8f8a553e81
                                      • Opcode Fuzzy Hash: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction Fuzzy Hash: 4F210D713073964DFB619B7198053DEA6B3B7647E1F064820AD8987786EF3EC4438712
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction ID: 0849ab802602322d96480bdfc0e63ab860ec7bf234e1e82201d06cd033bb5cdb
                                      • Opcode Fuzzy Hash: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction Fuzzy Hash: 8C214132619A40C9EA60EB11E4583DE6772F7E47F4F110211BE8E53AEADE3CC5428B42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_set_error_mode$__crt_errno$ExitMessageProcess_lock_malloc_crtmalloc
                                      • String ID:
                                      • API String ID: 2751257304-0
                                      • Opcode ID: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction ID: 47da4f615198748e493aa52e7950f254405220eaf1948bc4f3f10f5145e5281b
                                      • Opcode Fuzzy Hash: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction Fuzzy Hash: 6F11AC31257A8889F760AF20E44D7E827B3FBA07B2F070020ED46466E2CF7988539353
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction ID: d0a67bb7cddefdbee880c4e9fe0aa1a89f81508cdaa840e4267b3b81c0f89637
                                      • Opcode Fuzzy Hash: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction Fuzzy Hash: 9751D334619F0A4FE799EB6C94596FD73E2FB69310F91016DDC4AC7286EB20DC438682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction ID: e3c3673b7ba136470f1114cb9c98027748cbee5b23841858e47782df9203eca5
                                      • Opcode Fuzzy Hash: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction Fuzzy Hash: 524126313027429FEB55AB2695583DD27B2FB25BE4F429424CE0A47742DF34D467C342
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc$_errno_snprintf$FreeHeap_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 1397185943-0
                                      • Opcode ID: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction ID: 5cef32caa4c7f45782f95c5037423179af91b7ace997969df14b14a3a5fb31f6
                                      • Opcode Fuzzy Hash: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction Fuzzy Hash: A8E11A7061A7448FF754FB64C45A7EAB6E3FBA4300F51452DA98AC32E2DF3898458B43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 74200508-0
                                      • Opcode ID: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction ID: 6820fd02c58e9d1c7fdcaf3cb0d9d8a53ef59fd6a9609bc4ec71a47b0ba9dd09
                                      • Opcode Fuzzy Hash: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction Fuzzy Hash: 4BD150716066408EF750AB60E4593DA76B3F7E4365F520029AE89877D6DF39C807CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _lock$_calloc_crt_mtinitlocknum
                                      • String ID:
                                      • API String ID: 3962633935-0
                                      • Opcode ID: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction ID: 2ca824a1cc7ae347da2b2830ffe64480a866a250b517b62102413335f849d73b
                                      • Opcode Fuzzy Hash: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction Fuzzy Hash: 0651F674519B098BE754AF58C89D3E5B7D1FB68310F16025DEC4AC72A2D7B8DC428A83
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction ID: d55108eebe4c25b0389e2b0c4a17f86ba64be9d7256fa7f3f8e46c8c26802aaf
                                      • Opcode Fuzzy Hash: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction Fuzzy Hash: CD41E830219B4D4FE759EA6C48492BA36E6E7A6311F15012DDCC7C3283EE20D8078792
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-0
                                      • Opcode ID: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction ID: 391e19609d4c2d8422d39d187b7bbdb638f3caa3007ab05e5596c13506b2d686
                                      • Opcode Fuzzy Hash: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction Fuzzy Hash: 9D51C170215B484FEB98FF28C49A7E576E2EB68310F150699DC56CB2D6D738C881CB82
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 343393124-0
                                      • Opcode ID: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction ID: 5aa929b1340153150a37cb970e5e6943eb51cb3d1ca2f56a7cac645ba2028cad
                                      • Opcode Fuzzy Hash: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction Fuzzy Hash: 54417A30658B448FE740FB2CC499BAAB7F2FBA9344F51056DE489C32A1DB25D981CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction ID: 8f217a57e4c4c76be57fe2cd8a29c9e58c18e0765a420fbdce59944d37b3079c
                                      • Opcode Fuzzy Hash: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction Fuzzy Hash: 384104363127854AFB15DB2664082DD67B6F775BA9F4B4024DD058B742EE38C81BC306
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno_malloc_crt$_calloc_crt_calloc_impl_getptd_noexit_invalid_parameter_noinfo_invoke_watson_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 321378830-0
                                      • Opcode ID: 1af5591cc140629ef8a1eaab72b160ba28423dfa39d6b40620a42b0b9187e2b6
                                      • Instruction ID: 5daed19d02b6e1ec25b56387f5f5d670d51cf5fe481d267de8b15370a6cc05c7
                                      • Opcode Fuzzy Hash: 1af5591cc140629ef8a1eaab72b160ba28423dfa39d6b40620a42b0b9187e2b6
                                      • Instruction Fuzzy Hash: 6221E570326F4D4EF744BF68D85A7F973C3FB64310F52416D985AC22E2DB2888418643
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno_malloc_crt$_calloc_crt_calloc_impl_getptd_noexit_invalid_parameter_noinfo_invoke_watson_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 321378830-0
                                      • Opcode ID: 8a2acd4545fb3e1ff377b7186d7311079e6a4c6a1743b8f02e9e066f6884292d
                                      • Instruction ID: 7a34468bdc51b93bbfb7f098723f189c7124f0bb554b4095335ed82dbe4f4775
                                      • Opcode Fuzzy Hash: 8a2acd4545fb3e1ff377b7186d7311079e6a4c6a1743b8f02e9e066f6884292d
                                      • Instruction Fuzzy Hash: 9721AE7071AF094AF794BF18D46A7E972C3EBA4720F520139DC5BC22D2EB288C458683
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_calloc_crt_errno_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 3700215360-0
                                      • Opcode ID: 5671fb06d6f05841401363cc8443e27ee7f0052eb4ca124240904de72179e6d7
                                      • Instruction ID: 573bc746bd693b0b29c0718e3b588cc014071ad7a7a323e52c18604934e76958
                                      • Opcode Fuzzy Hash: 5671fb06d6f05841401363cc8443e27ee7f0052eb4ca124240904de72179e6d7
                                      • Instruction Fuzzy Hash: 86217F7071AB194AF7A4BF58D46A7E972C3EBA4310F520139DC5BC22D2EF288C458683
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_calloc_crt_errno_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 3700215360-0
                                      • Opcode ID: d21b9421d81b7aad527b41b40eb760196fdcb429390ac35a4901b8c372e18314
                                      • Instruction ID: d0695fd8d5c5f4cfa21b412fed4a5fa420fa61315f59af4e5fa2dc41003c3460
                                      • Opcode Fuzzy Hash: d21b9421d81b7aad527b41b40eb760196fdcb429390ac35a4901b8c372e18314
                                      • Instruction Fuzzy Hash: FD219570716F4D4FF694BF69D46D7F973C3EBA4350F524129984AC21D2EF2888058243
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction ID: 427c50fdd9294dde599c2cdcae775b646d49d0781f91d8a6b0cedb6e9e845abb
                                      • Opcode Fuzzy Hash: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction Fuzzy Hash: BA018134226B484EFA59FB64C9AD7D43693EF36325F5A4658EC09871E2C7BC4440C623
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction ID: 8f694c683fe9f4cceae3ddc9dacb867a6c2485aefbef92d2b4a8eae3f7c054ce
                                      • Opcode Fuzzy Hash: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction Fuzzy Hash: 3301BB7052D7489FE384FB18C459B9DB7E2FBE4701F81192DB889C22A1DB749984CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction ID: f38a2ed5e09bd8061e3424f0d360518d54586a10ab50eb89537c64e7d73784ff
                                      • Opcode Fuzzy Hash: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction Fuzzy Hash: C9016DB1717A4449EA095B54CC993EC36B35BB4B72F5B4305DE2A067D2C72D44138613
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction ID: c1a315a3580df8b7945e742988e20781264d700e51af3929cea8a2d081c653fd
                                      • Opcode Fuzzy Hash: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction Fuzzy Hash: F1F06272529B808ADA40EB51F44539EB371FBD47A1F411116BE8D53BA9CF38C412CB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction ID: a7d7ebe73283c4cc5e99acb36d8a092403ce419cf98866472c886dffd21893d3
                                      • Opcode Fuzzy Hash: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction Fuzzy Hash: EB9107306197848FE7A4EB28C4597DEB7E2FBA4301F51492DE88AC3291DB759885CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction ID: 3683a71b77fbc3e639289c1c26cbf1ac3541b7171d3a3d13d3c6fc70355876c1
                                      • Opcode Fuzzy Hash: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction Fuzzy Hash: 368193322096808FE770DB24E4593DEB7B2F394761F510425EE8987A99DB7EC846CF42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction ID: 3adab32381c3ac56894216c569fd16eee8bc24e67adba909cbbac76cb4dff170
                                      • Opcode Fuzzy Hash: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction Fuzzy Hash: 1F31C774518B489FDB84EF1CC044A9AB7E2FBAC315F100A6DA48DD73A1DB34E981CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction ID: 82b0537393c8b00b1f7598ed230a001705629a77cf702467017d4f603e85f626
                                      • Opcode Fuzzy Hash: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction Fuzzy Hash: 4E21E236609B848ACA60DB06E49025AB7A1F7D8BA4F114216EECD43BA9CF38C542CF00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction ID: 86ddd5e32b5a270ad2f97b47bbe9d1332527064bf00be37935fa645c99664b42
                                      • Opcode Fuzzy Hash: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction Fuzzy Hash: CD51C630219F094BE668FA6D544D7B572C2E779310F16022DEC9AC35D6EFA1DC8245C3
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction ID: d559ed892b1c89fc2784a579f6bdc34833df2a405797fc92efa1cc2ff3ba41e0
                                      • Opcode Fuzzy Hash: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction Fuzzy Hash: A0415C313027844EFE244EA3564C3E9B6B3B764FF1F0A4A249E55477C5DA3AD443C206
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: ea37440d35f38375b25d0fd288cbed4acfe83d3ec9175d2f064361c28f8f3470
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: 4621F63140E7180EE768FAE8D44A2E6B6E1E7A53A1F1A022DED8683192E5519C4782C7
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction ID: 6c2b7e8aa39b9920248bd476a7c176a6217e508134af7aab70b63aefbafe714f
                                      • Opcode Fuzzy Hash: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction Fuzzy Hash: 0B210D706197AD0AEB94FF28C0AC3FA7DD3E765315F060559A996C71C1CB688841CA53
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 99e9f663e41960ba664c7a58890dd3bd6ee8b2c3161cd5448cfd89b4a75d62a9
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: 47113A3250178489F374AEA678547ABF6B1FB643B8F2B1425EE446B641EA34C883C602
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction ID: b34ba0f7b09224fd8d5bc3fcd787541bdb34520224eee1c2e5cecda2e9f9fb28
                                      • Opcode Fuzzy Hash: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction Fuzzy Hash: 28215EB21062E448FB68561594187FD66F3EBE4BF4F1E4820EE8607EC5D92CC453E702
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 3587327836-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 5e9a73db7d629309cfc8d8fbfd5834fb1190ab8f927e38533a61ec5d878f7a7d
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: 6361D93221AA848AE750DB15E88439AB7B1F3D57A0F115115FECE47BAACF7CC446CB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction ID: 75cc209f1eefa77846201512951ff250c9779cc057e1f16f3b3bdad269c90471
                                      • Opcode Fuzzy Hash: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction Fuzzy Hash: 61D12A7468D7859FD7A4EB18C0487AFB7E1FB9A314F91092DA9C9C3250CB349881CB07
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction ID: 59f1c0ddea06bc3ffbc36d47b5d40ddbb0434144504c6aaf43ac85d6e3e575e0
                                      • Opcode Fuzzy Hash: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction Fuzzy Hash: 3611C430228B084FD744EF5CD4897A5B7D2FBA8324F11476EA419C32E1DB34C880CB82
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CaptureContextPrevious__crt__raise_securityfailure
                                      • String ID: sv-FI
                                      • API String ID: 37250909-2947700294
                                      • Opcode ID: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction ID: 98199742f8e41cb9bb74ac20f0bafebde9196a113d594d93f1c2e4959e0a231f
                                      • Opcode Fuzzy Hash: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction Fuzzy Hash: 04214734223B0499FE158B08F8593D477B6F7A5366F920126DD8E46BA6EF3CC526C302
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction ID: cad48b640e727bff436c2f85714c007abe4c0a6fc4337d5d7b1955713a6045a0
                                      • Opcode Fuzzy Hash: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction Fuzzy Hash: 54118272615A4489EB109B52D444399B662FBA8FE4F594310AF5847B96DF38C641CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_calloc_implcalloc
                                      • String ID:
                                      • API String ID: 4000150058-0
                                      • Opcode ID: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction ID: 62dc6da468a8ef92b86fbabdba17f014ff355d46b322f6ac0a7d9567244ce355
                                      • Opcode Fuzzy Hash: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction Fuzzy Hash: BAC12836609B848AE764CF65E88439E77B5F398B98F11412AEF8D87B58DF38C455CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction ID: abf64f710a4038702b8237b4019cd410a968dff54d9371146e1feb27234e4788
                                      • Opcode Fuzzy Hash: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction Fuzzy Hash: 54C1E6762196C08ED7B0CA14E08439BB7B1F7997A5F51102AEF8A93B58CB39D841CF06
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: 485b68a12a8fd6921d54a51525aeeaee5686e44d9d3d53666266259f587c0ec9
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: B8913F70118B888FE764EF18C455BABB7E2FBA9311F50092DE48AC32E1DB749945CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction ID: 920dfa38193c0ef37fd8a18e4a28fd8797d064d6c737c2ee7610cbe5d2a25885
                                      • Opcode Fuzzy Hash: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction Fuzzy Hash: 3351C43420CA054FEB58DF6CD4892A973E2FBA5310F05056DEC8BD72C6EA20EC438682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: be20ee676b97cb5dbb7dca3ed6b26603533b26fe45eb60d391c3d29ed8f25e42
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: 8281E93620AAC48AE7209B51F8583DAB772F7957A4F510216DE9D43BA9DF38C446CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction ID: dba32cd27e4496a93aba5735143200ccae6a91c366e6e3c1f2944e60c2b24df1
                                      • Opcode Fuzzy Hash: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction Fuzzy Hash: AA41D3327027808BEB58DB26A4087EE73B2F764BA8F425428DE5A47785EF34D847C741
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: e090d9d4d7dce01c983703bdff16f518dfd9a11226673f7631c4cc9ab1b1906f
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 90413130119B488FF755FB18D859BDA77E2F7A8310F514529A849C32E0DB38D985CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction ID: 6c90df2b6c1d675b4f23941d7f16357e3d901edce62de56c5fbf34a3a8858460
                                      • Opcode Fuzzy Hash: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction Fuzzy Hash: BE310334519B8C9FE790FB18D448B6A77E3FBA9315F51061DE48AC32A1D734D841CB02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 9aaf4856bce2074589812b2b30e8f26b41a500626a3037a4743972080886639c
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 9F319235516E849AE7218B41E4483DA6772F3A8774F914212EE9E03BE9DF3DC943CB02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.1851485785.0000021A8505D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021A85040000, based on PE: true
                                      • Associated: 00000003.00000003.1851450391.0000021A85040000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.1851485785.0000021A8509C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_21a85040000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction ID: 0bc6f0cb33b4da3dee3aae1a60708128ac3a8cdda7d23d25b66f6a619e516677
                                      • Opcode Fuzzy Hash: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction Fuzzy Hash: 37213D35106B448CEA609B15F84839A6372F3A57B1F411315EE9E477E9DF3DC446C701
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.1853403862.0000021A850F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A850F1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_21a850f1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$FreeHeap_errno
                                      • String ID:
                                      • API String ID: 2737118440-0
                                      • Opcode ID: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction ID: 9d2ad4b5e3424aa3eb4d5aea543cfa2175726f0641aec22bbf3a81f05163aef3
                                      • Opcode Fuzzy Hash: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction Fuzzy Hash: 83F04C3452DA88AFD6C8FB1CC595E9977E2FFA8300F811498B449C73A2DB24EC40CB12

                                      Execution Graph

                                      Execution Coverage:1.1%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:24
                                      execution_graph 19177 1d38b8cb544 19180 1d38b8cb560 _DllMainCRTStartup 19177->19180 19178 1d38b8cb5f0 19187 1d38b8cb5ba 19178->19187 19220 1d38b8ad0fc 19178->19220 19180->19178 19180->19187 19189 1d38b8cb3e4 19180->19189 19182 1d38b8cb637 19185 1d38b8cb3e4 _CRT_INIT 2 API calls 19182->19185 19182->19187 19184 1d38b8ad0fc _DllMainCRTStartup 7 API calls 19186 1d38b8cb62a 19184->19186 19185->19187 19188 1d38b8cb3e4 _CRT_INIT 2 API calls 19186->19188 19188->19182 19190 1d38b8cb473 19189->19190 19193 1d38b8cb3f6 _heap_init 19189->19193 19191 1d38b8cb4c9 19190->19191 19195 1d38b8cb477 _CRT_INIT 19190->19195 19192 1d38b8cb52c 19191->19192 19199 1d38b8cb4ce _getptd_noexit 19191->19199 19205 1d38b8cb3ff _CRT_INIT _mtterm 19192->19205 19293 1d38b8cf3d8 19192->19293 19193->19205 19228 1d38b8cf580 19193->19228 19195->19205 19255 1d38b8c9b34 19195->19255 19199->19205 19281 1d38b8ce2f8 19199->19281 19202 1d38b8cb40b _RTC_Initialize 19202->19205 19234 1d38b8d2b90 19202->19234 19203 1d38b8cb4eb _getptd_noexit 19203->19205 19206 1d38b8cb522 19203->19206 19207 1d38b8cb50c 19203->19207 19205->19178 19290 1d38b8c9428 19206->19290 19285 1d38b8cf4bc 19207->19285 19221 1d38b8ad134 19220->19221 19225 1d38b8ad123 _DllMainCRTStartup 19220->19225 19553 1d38b8c6f68 19221->19553 19222 1d38b8ad12a 19222->19182 19222->19184 19225->19222 19226 1d38b8ad228 VirtualFree 19225->19226 19227 1d38b8ad1d7 19225->19227 19226->19227 19507 1d38b89cb50 19227->19507 19229 1d38b8cf58b _mtinit _mtinitlocks 19228->19229 19230 1d38b8ce2f8 _calloc_crt RtlFreeHeap 19229->19230 19233 1d38b8cf5de _mtterm 19229->19233 19231 1d38b8cf5ba _getptd_noexit 19230->19231 19232 1d38b8cf4bc _initptd RtlFreeHeap 19231->19232 19231->19233 19232->19233 19233->19202 19236 1d38b8d2baf 19234->19236 19235 1d38b8cb42d 19240 1d38b8d1f10 19235->19240 19236->19235 19297 1d38b8ce378 19236->19297 19239 1d38b8c9428 free RtlFreeHeap 19239->19235 19374 1d38b8cd958 19240->19374 19256 1d38b8c9b4b 19255->19256 19257 1d38b8c9b6d 19256->19257 19260 1d38b8c9428 free RtlFreeHeap 19256->19260 19258 1d38b8c9428 free RtlFreeHeap 19257->19258 19259 1d38b8c9b7c 19258->19259 19261 1d38b8c9ba3 19259->19261 19263 1d38b8c9428 free RtlFreeHeap 19259->19263 19260->19256 19262 1d38b8c9428 free RtlFreeHeap 19261->19262 19264 1d38b8c9bb2 19262->19264 19263->19259 19265 1d38b8c9428 free RtlFreeHeap 19264->19265 19266 1d38b8c9bc6 19265->19266 19267 1d38b8c9428 free RtlFreeHeap 19266->19267 19268 1d38b8c9bd2 19267->19268 19269 1d38b8c9bfd 19268->19269 19270 1d38b8c9428 free RtlFreeHeap 19268->19270 19271 1d38b8c9c1e 19269->19271 19272 1d38b8c9428 free RtlFreeHeap 19269->19272 19270->19269 19273 1d38b8c9428 free RtlFreeHeap 19271->19273 19274 1d38b8c9c37 19271->19274 19272->19271 19273->19274 19275 1d38b8c9428 free RtlFreeHeap 19274->19275 19276 1d38b8c9c68 19274->19276 19275->19276 19276->19205 19277 1d38b8d223c 19276->19277 19279 1d38b8d2257 19277->19279 19278 1d38b8d229f 19278->19205 19279->19278 19280 1d38b8c9428 free RtlFreeHeap 19279->19280 19280->19279 19284 1d38b8ce31d 19281->19284 19283 1d38b8ce35a 19283->19203 19284->19283 19477 1d38b8d3a60 19284->19477 19286 1d38b8cd958 _lock RtlFreeHeap 19285->19286 19287 1d38b8cf522 _setmbcp 19286->19287 19288 1d38b8cd958 _lock RtlFreeHeap 19287->19288 19289 1d38b8cf541 _setmbcp __addlocaleref 19288->19289 19289->19205 19291 1d38b8c942d RtlFreeHeap 19290->19291 19292 1d38b8c9448 _errno realloc 19290->19292 19291->19292 19292->19205 19294 1d38b8cf40e 19293->19294 19295 1d38b8cf3ec _getptd_noexit 19293->19295 19294->19205 19481 1d38b8cf2a4 19295->19481 19298 1d38b8ce3a0 19297->19298 19300 1d38b8ce3d5 19298->19300 19301 1d38b8c9468 19298->19301 19300->19235 19300->19239 19302 1d38b8c94fc _callnewh 19301->19302 19306 1d38b8c9480 _callnewh _mtinitlocknum 19301->19306 19303 1d38b8cb714 _errno RtlFreeHeap 19302->19303 19305 1d38b8c94f1 19303->19305 19305->19298 19306->19305 19308 1d38b8c94e1 19306->19308 19310 1d38b8c94e6 19306->19310 19312 1d38b8cb7ec 19306->19312 19321 1d38b8cb860 19306->19321 19337 1d38b8cb714 19308->19337 19311 1d38b8cb714 _errno RtlFreeHeap 19310->19311 19311->19305 19340 1d38b8d2f24 19312->19340 19314 1d38b8cb7fa 19315 1d38b8d2f24 _set_error_mode RtlFreeHeap 19314->19315 19318 1d38b8cb809 19314->19318 19315->19318 19316 1d38b8cb860 _NMSG_WRITE RtlFreeHeap 19317 1d38b8cb820 19316->19317 19320 1d38b8cb860 _NMSG_WRITE RtlFreeHeap 19317->19320 19318->19316 19319 1d38b8cb82a 19318->19319 19319->19306 19320->19319 19322 1d38b8cb894 _NMSG_WRITE 19321->19322 19323 1d38b8d2f24 _set_error_mode RtlFreeHeap 19322->19323 19336 1d38b8cb9b1 setSBUpLow __crtMessageBoxW _invoke_watson 19322->19336 19324 1d38b8cb8aa 19323->19324 19325 1d38b8d2f24 _set_error_mode RtlFreeHeap 19324->19325 19324->19336 19326 1d38b8cb8bb 19325->19326 19326->19336 19344 1d38b8d2dd0 19326->19344 19328 1d38b8cb8f7 19329 1d38b8d2dd0 _NMSG_WRITE RtlFreeHeap 19328->19329 19330 1d38b8cb937 _putenv_helper 19328->19330 19328->19336 19329->19330 19331 1d38b8cb981 19330->19331 19330->19336 19351 1d38b8d2e58 19330->19351 19331->19336 19358 1d38b8d2d48 19331->19358 19333 1d38b8cb99b 19335 1d38b8d2d48 _NMSG_WRITE RtlFreeHeap 19333->19335 19333->19336 19335->19336 19336->19306 19365 1d38b8cf438 19337->19365 19341 1d38b8d2f2c 19340->19341 19342 1d38b8cb714 _errno RtlFreeHeap 19341->19342 19343 1d38b8d2f36 _invalid_parameter_noinfo 19341->19343 19342->19343 19343->19314 19345 1d38b8d2de8 19344->19345 19346 1d38b8d2dde 19344->19346 19347 1d38b8cb714 _errno RtlFreeHeap 19345->19347 19346->19345 19349 1d38b8d2e05 19346->19349 19348 1d38b8d2df1 _invalid_parameter_noinfo 19347->19348 19348->19328 19349->19348 19350 1d38b8cb714 _errno RtlFreeHeap 19349->19350 19350->19348 19355 1d38b8d2e65 19351->19355 19352 1d38b8d2e6a 19353 1d38b8cb714 _errno RtlFreeHeap 19352->19353 19354 1d38b8d2e6f _invalid_parameter_noinfo 19352->19354 19353->19354 19354->19331 19355->19352 19355->19354 19356 1d38b8d2ea8 19355->19356 19356->19354 19357 1d38b8cb714 _errno RtlFreeHeap 19356->19357 19357->19354 19359 1d38b8d2d59 19358->19359 19361 1d38b8d2d63 19358->19361 19359->19361 19363 1d38b8d2d9a 19359->19363 19360 1d38b8cb714 _errno RtlFreeHeap 19362 1d38b8d2d6c _invalid_parameter_noinfo 19360->19362 19361->19360 19362->19333 19363->19362 19364 1d38b8cb714 _errno RtlFreeHeap 19363->19364 19364->19362 19366 1d38b8cf448 _getptd_noexit 19365->19366 19367 1d38b8cb71d 19366->19367 19368 1d38b8ce2f8 _calloc_crt RtlFreeHeap 19366->19368 19367->19310 19369 1d38b8cf46a _getptd_noexit 19368->19369 19369->19367 19370 1d38b8cf49d 19369->19370 19371 1d38b8cf487 19369->19371 19373 1d38b8c9428 free RtlFreeHeap 19370->19373 19372 1d38b8cf4bc _initptd RtlFreeHeap 19371->19372 19372->19367 19373->19367 19375 1d38b8cd97b 19374->19375 19376 1d38b8cd976 19374->19376 19378 1d38b8cda24 19376->19378 19379 1d38b8cda41 19378->19379 19381 1d38b8cda50 _mtinitlocknum 19378->19381 19380 1d38b8cb7ec _FF_MSGBANNER RtlFreeHeap 19379->19380 19382 1d38b8cda46 19380->19382 19383 1d38b8ce378 _malloc_crt RtlFreeHeap 19381->19383 19390 1d38b8cda6b 19381->19390 19384 1d38b8cb860 _NMSG_WRITE RtlFreeHeap 19382->19384 19385 1d38b8cda7c 19383->19385 19384->19381 19386 1d38b8cda84 19385->19386 19387 1d38b8cda93 19385->19387 19389 1d38b8cb714 _errno RtlFreeHeap 19386->19389 19388 1d38b8cd958 _lock RtlFreeHeap 19387->19388 19391 1d38b8cda9d 19388->19391 19389->19390 19390->19375 19391->19390 19392 1d38b8c9428 free RtlFreeHeap 19391->19392 19392->19390 19478 1d38b8d3a75 19477->19478 19480 1d38b8d3a88 _callnewh 19477->19480 19479 1d38b8cb714 _errno RtlFreeHeap 19478->19479 19478->19480 19479->19480 19480->19284 19482 1d38b8cf2ad 19481->19482 19506 1d38b8cf3cc 19481->19506 19483 1d38b8cf2c8 19482->19483 19484 1d38b8c9428 free RtlFreeHeap 19482->19484 19485 1d38b8cf2d6 19483->19485 19486 1d38b8c9428 free RtlFreeHeap 19483->19486 19484->19483 19487 1d38b8cf2e4 19485->19487 19488 1d38b8c9428 free RtlFreeHeap 19485->19488 19486->19485 19489 1d38b8c9428 free RtlFreeHeap 19487->19489 19490 1d38b8cf2f2 19487->19490 19488->19487 19489->19490 19491 1d38b8c9428 free RtlFreeHeap 19490->19491 19493 1d38b8cf300 19490->19493 19491->19493 19492 1d38b8cf30e 19495 1d38b8cf31f 19492->19495 19496 1d38b8c9428 free RtlFreeHeap 19492->19496 19493->19492 19494 1d38b8c9428 free RtlFreeHeap 19493->19494 19494->19492 19497 1d38b8cf337 19495->19497 19498 1d38b8c9428 free RtlFreeHeap 19495->19498 19496->19495 19499 1d38b8cd958 _lock RtlFreeHeap 19497->19499 19498->19497 19501 1d38b8cf343 19499->19501 19500 1d38b8cf370 _setmbcp 19503 1d38b8cd958 _lock RtlFreeHeap 19500->19503 19501->19500 19502 1d38b8c9428 free RtlFreeHeap 19501->19502 19502->19500 19504 1d38b8cf382 _setmbcp _freefls 19503->19504 19505 1d38b8c9428 free RtlFreeHeap 19504->19505 19505->19506 19506->19294 19561 1d38b8a7f80 19507->19561 19509 1d38b89cb6e _DllMainCRTStartup 19510 1d38b8c9468 malloc RtlFreeHeap 19509->19510 19511 1d38b89cc53 _DllMainCRTStartup 19510->19511 19568 1d38b8c8aec 19511->19568 19514 1d38b8c8aec _DllMainCRTStartup RtlFreeHeap 19515 1d38b89cd09 _DllMainCRTStartup 19514->19515 19517 1d38b89cd17 _DllMainCRTStartup 19515->19517 19601 1d38b8c7fc8 19515->19601 19518 1d38b89cd31 19517->19518 19519 1d38b8c7fc8 _DllMainCRTStartup RtlFreeHeap 19517->19519 19575 1d38b8a02c0 19518->19575 19519->19518 19522 1d38b89cd49 19581 1d38b8a03ac 19522->19581 19523 1d38b8c7fc8 _DllMainCRTStartup RtlFreeHeap 19523->19522 19526 1d38b8c7fc8 _DllMainCRTStartup RtlFreeHeap 19527 1d38b89cd57 _DllMainCRTStartup 19526->19527 19528 1d38b8c9468 malloc RtlFreeHeap 19527->19528 19529 1d38b89cd87 19528->19529 19530 1d38b89cd99 _DllMainCRTStartup 19529->19530 19531 1d38b8c7fc8 _DllMainCRTStartup RtlFreeHeap 19529->19531 19532 1d38b8c8aec _DllMainCRTStartup RtlFreeHeap 19530->19532 19531->19530 19533 1d38b89cdc3 _DllMainCRTStartup 19532->19533 19591 1d38b8a7ac8 19533->19591 19535 1d38b89d076 19536 1d38b8c9428 free RtlFreeHeap 19535->19536 19538 1d38b89d080 19536->19538 19537 1d38b8c7820 RtlFreeHeap _DllMainCRTStartup 19551 1d38b89cdd9 _DllMainCRTStartup 19537->19551 19540 1d38b8c7fc8 _DllMainCRTStartup RtlFreeHeap 19538->19540 19539 1d38b8c9700 RtlFreeHeap _snprintf 19539->19551 19541 1d38b89d085 19540->19541 19541->19222 19542 1d38b89f9c0 InternetOpenA _DllMainCRTStartup 19542->19551 19547 1d38b8a2b5c RtlFreeHeap _DllMainCRTStartup 19547->19551 19548 1d38b8c7fc8 RtlFreeHeap _DllMainCRTStartup 19548->19551 19550 1d38b8a3598 RtlFreeHeap _DllMainCRTStartup 19550->19551 19551->19535 19551->19537 19551->19539 19551->19542 19551->19547 19551->19548 19551->19550 19605 1d38b89f978 19551->19605 19609 1d38b8c68d4 19551->19609 19628 1d38b8ac964 19551->19628 19632 1d38b8a9294 19551->19632 19639 1d38b8a6198 19551->19639 19647 1d38b89fbec 19551->19647 19554 1d38b8c9468 malloc RtlFreeHeap 19553->19554 19555 1d38b8c6f8c 19554->19555 19556 1d38b8c8aec _DllMainCRTStartup RtlFreeHeap 19555->19556 19559 1d38b8c6fc9 _DllMainCRTStartup 19556->19559 19557 1d38b8c7045 19557->19222 19558 1d38b8c9468 malloc RtlFreeHeap 19558->19559 19559->19557 19559->19558 19560 1d38b8c8aec _DllMainCRTStartup RtlFreeHeap 19559->19560 19560->19559 19562 1d38b8c9468 malloc RtlFreeHeap 19561->19562 19563 1d38b8a7f9c 19562->19563 19564 1d38b8c9468 malloc RtlFreeHeap 19563->19564 19567 1d38b8a7fa9 _DllMainCRTStartup 19563->19567 19565 1d38b8a7fba 19564->19565 19566 1d38b8c9428 free RtlFreeHeap 19565->19566 19565->19567 19566->19567 19567->19509 19569 1d38b8c8b18 19568->19569 19572 1d38b89ccdb 19568->19572 19570 1d38b8c8b22 19569->19570 19571 1d38b8c8b35 19569->19571 19573 1d38b8c9468 malloc RtlFreeHeap 19570->19573 19666 1d38b8cb310 19571->19666 19572->19514 19573->19572 19577 1d38b8a02dd _DllMainCRTStartup 19575->19577 19576 1d38b89cd40 19576->19522 19576->19523 19577->19576 19577->19577 19680 1d38b8c6294 19577->19680 19579 1d38b8a036c 19684 1d38b8c62e0 19579->19684 19583 1d38b8a03d0 _DllMainCRTStartup 19581->19583 19582 1d38b89cd4e 19582->19526 19582->19527 19583->19582 19584 1d38b8c9468 malloc RtlFreeHeap 19583->19584 19585 1d38b8a04ed _DllMainCRTStartup 19584->19585 19586 1d38b8a057c 19585->19586 19588 1d38b8c6294 _DllMainCRTStartup RtlFreeHeap 19585->19588 19587 1d38b8c9428 free RtlFreeHeap 19586->19587 19587->19582 19589 1d38b8a0553 19588->19589 19590 1d38b8c62e0 _DllMainCRTStartup RtlFreeHeap 19589->19590 19590->19586 19592 1d38b8a7add _DllMainCRTStartup 19591->19592 19868 1d38b8c6d54 19592->19868 19594 1d38b8a7b0e 19872 1d38b8ca014 19594->19872 19596 1d38b8a7b2d _DllMainCRTStartup 19875 1d38b8a7cfc 19596->19875 19598 1d38b8a7c3a _DllMainCRTStartup 19886 1d38b8c67bc 19598->19886 19600 1d38b8a7cb1 19600->19551 19602 1d38b8c7fd6 _DllMainCRTStartup 19601->19602 19992 1d38b8c8c40 19602->19992 19604 1d38b8c7fff 19604->19517 19606 1d38b89f995 _wcsupr_s 19605->19606 20002 1d38b89f484 19606->20002 19608 1d38b89f9ae _wcsupr_s 19608->19551 19610 1d38b8c6908 19609->19610 19625 1d38b8c6901 19609->19625 19611 1d38b8c9468 malloc RtlFreeHeap 19610->19611 19612 1d38b8c691c 19611->19612 19613 1d38b8c6937 19612->19613 19614 1d38b8c6948 19612->19614 19615 1d38b8c9428 free RtlFreeHeap 19613->19615 20047 1d38b89198c 19614->20047 19615->19625 19617 1d38b8c698d _DllMainCRTStartup 19618 1d38b8c69df 19617->19618 19623 1d38b8c69f0 _DllMainCRTStartup 19617->19623 19619 1d38b8c9428 free RtlFreeHeap 19618->19619 19619->19625 19620 1d38b8c6b19 19621 1d38b8c9428 free RtlFreeHeap 19620->19621 19622 1d38b8c6b23 19621->19622 20057 1d38b89f250 19622->20057 19623->19620 19626 1d38b8c6b44 _DllMainCRTStartup 19623->19626 19625->19551 19626->19625 19627 1d38b8c9428 free RtlFreeHeap 19626->19627 19627->19625 19630 1d38b8ac97a 19628->19630 19629 1d38b8ac9d1 19629->19551 19630->19629 20149 1d38b8abdf4 19630->20149 21672 1d38b8a92e8 19632->21672 19634 1d38b8a92a7 19636 1d38b8a92d7 19634->19636 21679 1d38b8a991c 19634->21679 21683 1d38b8a9bbc 19636->21683 19640 1d38b8a61d4 19639->19640 19641 1d38b8a61d9 19639->19641 19640->19551 19642 1d38b8c9468 malloc RtlFreeHeap 19641->19642 19646 1d38b8a61e6 _DllMainCRTStartup 19642->19646 19643 1d38b8c9428 free RtlFreeHeap 19644 1d38b8a6300 19643->19644 19645 1d38b8a630c _DllMainCRTStartup RtlFreeHeap 19644->19645 19645->19640 19646->19643 19648 1d38b89fc7a 19647->19648 19663 1d38b89fc75 _wcsupr_s 19647->19663 19649 1d38b8ab828 _DllMainCRTStartup RtlFreeHeap 19648->19649 19650 1d38b89fc8d 19649->19650 19651 1d38b8c9700 _snprintf RtlFreeHeap 19650->19651 19652 1d38b89fcae 19651->19652 19653 1d38b8c9700 _snprintf RtlFreeHeap 19652->19653 19654 1d38b89fcce _DllMainCRTStartup 19653->19654 19655 1d38b8aabbc _DllMainCRTStartup RtlFreeHeap 19654->19655 19656 1d38b89fd49 19655->19656 19657 1d38b89fd7e 19656->19657 19658 1d38b89fda1 19656->19658 19659 1d38b8c9700 _snprintf RtlFreeHeap 19657->19659 19660 1d38b8c9700 _snprintf RtlFreeHeap 19658->19660 19661 1d38b89fd9f _wcsupr_s _DllMainCRTStartup 19659->19661 19660->19661 19664 1d38b8a0038 _DllMainCRTStartup RtlFreeHeap 19661->19664 19665 1d38b89feb6 19661->19665 19662 1d38b8ab808 _DllMainCRTStartup RtlFreeHeap 19662->19663 19663->19551 19664->19665 19665->19551 19665->19662 19667 1d38b8cb32a 19666->19667 19668 1d38b8cb334 19666->19668 19669 1d38b8c9468 malloc RtlFreeHeap 19667->19669 19670 1d38b8cb339 19668->19670 19678 1d38b8cb340 _callnewh 19668->19678 19671 1d38b8cb332 realloc 19669->19671 19672 1d38b8c9428 free RtlFreeHeap 19670->19672 19671->19572 19672->19671 19673 1d38b8cb389 _callnewh 19674 1d38b8cb714 _errno RtlFreeHeap 19673->19674 19674->19671 19675 1d38b8cb3c7 19676 1d38b8cb714 _errno RtlFreeHeap 19675->19676 19676->19671 19677 1d38b8cb3ae 19679 1d38b8cb714 _errno RtlFreeHeap 19677->19679 19678->19671 19678->19673 19678->19675 19678->19677 19679->19671 19681 1d38b8c62b3 19680->19681 19683 1d38b8c62af _DllMainCRTStartup 19680->19683 19689 1d38b8c66ec 19681->19689 19683->19579 19685 1d38b8c9700 _snprintf RtlFreeHeap 19684->19685 19686 1d38b8c637c 19685->19686 19687 1d38b8c9700 _snprintf RtlFreeHeap 19686->19687 19688 1d38b8c639a _openfile _DllMainCRTStartup 19687->19688 19688->19576 19696 1d38b8c9700 19689->19696 19691 1d38b8c6712 19692 1d38b8c9700 _snprintf RtlFreeHeap 19691->19692 19693 1d38b8c67a2 19692->19693 19705 1d38b8c99cc 19693->19705 19699 1d38b8c9732 memcpy_s 19696->19699 19697 1d38b8c9737 19698 1d38b8cb714 _errno RtlFreeHeap 19697->19698 19703 1d38b8c973c _invalid_parameter_noinfo 19698->19703 19699->19697 19700 1d38b8c9756 19699->19700 19709 1d38b8cbfcc 19700->19709 19702 1d38b8c9786 19702->19703 19726 1d38b8cbd98 19702->19726 19703->19691 19706 1d38b8cd8b8 19705->19706 19851 1d38b8cd67c 19706->19851 19708 1d38b8c67ac 19708->19683 19710 1d38b8cbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19709->19710 19711 1d38b8cc032 19710->19711 19712 1d38b8cb714 _errno RtlFreeHeap 19711->19712 19713 1d38b8cc037 19712->19713 19714 1d38b8cc997 19713->19714 19719 1d38b8cc064 _snprintf 19713->19719 19747 1d38b8cf624 19713->19747 19715 1d38b8cb714 _errno RtlFreeHeap 19714->19715 19717 1d38b8cc99c _invalid_parameter_noinfo setSBUpLow 19715->19717 19717->19702 19719->19714 19719->19717 19720 1d38b8cc9ec RtlFreeHeap write_char 19719->19720 19721 1d38b8c9428 free RtlFreeHeap 19719->19721 19722 1d38b8ce378 _malloc_crt RtlFreeHeap 19719->19722 19723 1d38b8cd594 RtlFreeHeap write_multi_char 19719->19723 19724 1d38b8d3864 RtlFreeHeap _snprintf 19719->19724 19725 1d38b8cd5e8 RtlFreeHeap write_string 19719->19725 19751 1d38b8d3634 19719->19751 19720->19719 19721->19719 19722->19719 19723->19719 19724->19719 19725->19719 19727 1d38b8cf624 _fileno RtlFreeHeap 19726->19727 19728 1d38b8cbdba 19727->19728 19729 1d38b8cbddc 19728->19729 19730 1d38b8cbdc5 19728->19730 19732 1d38b8cbde1 19729->19732 19740 1d38b8cbdee write_char 19729->19740 19731 1d38b8cb714 _errno RtlFreeHeap 19730->19731 19735 1d38b8cbdca 19731->19735 19733 1d38b8cb714 _errno RtlFreeHeap 19732->19733 19733->19735 19734 1d38b8cbe53 19736 1d38b8cbe60 19734->19736 19737 1d38b8cbeeb 19734->19737 19735->19703 19739 1d38b8cbe7c 19736->19739 19742 1d38b8cbe95 19736->19742 19738 1d38b8d0504 _wsopen_nolock RtlFreeHeap 19737->19738 19738->19735 19763 1d38b8d0504 19739->19763 19740->19734 19740->19735 19744 1d38b8cbe47 19740->19744 19754 1d38b8d31dc 19740->19754 19742->19735 19783 1d38b8d1cd8 19742->19783 19744->19734 19760 1d38b8d323c 19744->19760 19748 1d38b8cf62d 19747->19748 19750 1d38b8cf632 _invalid_parameter_noinfo 19747->19750 19749 1d38b8cb714 _errno RtlFreeHeap 19748->19749 19749->19750 19750->19719 19752 1d38b8cbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19751->19752 19753 1d38b8d3646 19752->19753 19753->19719 19755 1d38b8d31f2 19754->19755 19756 1d38b8d31e5 19754->19756 19758 1d38b8d31ea _invalid_parameter_noinfo 19755->19758 19759 1d38b8cb714 _errno RtlFreeHeap 19755->19759 19757 1d38b8cb714 _errno RtlFreeHeap 19756->19757 19757->19758 19758->19744 19759->19758 19761 1d38b8ce378 _malloc_crt RtlFreeHeap 19760->19761 19762 1d38b8d3255 19761->19762 19762->19734 19764 1d38b8d053f 19763->19764 19765 1d38b8d0527 19763->19765 19766 1d38b8d05b6 19764->19766 19771 1d38b8d0571 19764->19771 19803 1d38b8cb6a4 19765->19803 19768 1d38b8cb6a4 __doserrno RtlFreeHeap 19766->19768 19772 1d38b8d05bb 19768->19772 19770 1d38b8cb714 _errno RtlFreeHeap 19776 1d38b8d0534 _invalid_parameter_noinfo _unlock_fhandle 19770->19776 19806 1d38b8d438c 19771->19806 19774 1d38b8cb714 _errno RtlFreeHeap 19772->19774 19774->19776 19775 1d38b8d0578 19777 1d38b8d0584 19775->19777 19778 1d38b8d0595 19775->19778 19776->19735 19810 1d38b8d05e4 19777->19810 19780 1d38b8cb714 _errno RtlFreeHeap 19778->19780 19781 1d38b8d059a 19780->19781 19782 1d38b8cb6a4 __doserrno RtlFreeHeap 19781->19782 19782->19776 19784 1d38b8d1cfb 19783->19784 19785 1d38b8d1d13 19783->19785 19786 1d38b8cb6a4 __doserrno RtlFreeHeap 19784->19786 19787 1d38b8d1d8d 19785->19787 19792 1d38b8d1d45 19785->19792 19788 1d38b8d1d00 19786->19788 19789 1d38b8cb6a4 __doserrno RtlFreeHeap 19787->19789 19790 1d38b8cb714 _errno RtlFreeHeap 19788->19790 19791 1d38b8d1d92 19789->19791 19795 1d38b8d1d08 _invalid_parameter_noinfo _unlock_fhandle 19790->19795 19793 1d38b8cb714 _errno RtlFreeHeap 19791->19793 19794 1d38b8d438c __lock_fhandle RtlFreeHeap 19792->19794 19793->19795 19796 1d38b8d1d4c 19794->19796 19795->19735 19797 1d38b8d1d58 19796->19797 19798 1d38b8d1d6a 19796->19798 19799 1d38b8d1dbc _lseeki64_nolock RtlFreeHeap 19797->19799 19800 1d38b8cb714 _errno RtlFreeHeap 19798->19800 19799->19795 19801 1d38b8d1d6f 19800->19801 19802 1d38b8cb6a4 __doserrno RtlFreeHeap 19801->19802 19802->19795 19804 1d38b8cf438 _getptd_noexit RtlFreeHeap 19803->19804 19805 1d38b8cb6ad 19804->19805 19805->19770 19807 1d38b8d43c4 19806->19807 19809 1d38b8d43ce _setmbcp 19806->19809 19808 1d38b8cd958 _lock RtlFreeHeap 19807->19808 19808->19809 19809->19775 19812 1d38b8d0606 19810->19812 19811 1d38b8d063a 19814 1d38b8cb6a4 __doserrno RtlFreeHeap 19811->19814 19812->19811 19813 1d38b8d0696 19812->19813 19821 1d38b8d062e _invalid_parameter_noinfo setSBUpLow 19812->19821 19815 1d38b8d06ab 19813->19815 19835 1d38b8d1dbc 19813->19835 19816 1d38b8d063f 19814->19816 19818 1d38b8d31dc _isatty RtlFreeHeap 19815->19818 19819 1d38b8cb714 _errno RtlFreeHeap 19816->19819 19820 1d38b8d06b2 19818->19820 19819->19821 19822 1d38b8cf414 _getptd RtlFreeHeap 19820->19822 19827 1d38b8d0943 19820->19827 19821->19776 19833 1d38b8d06d6 _putwch_nolock 19822->19833 19823 1d38b8d0cb1 19823->19821 19824 1d38b8cb714 _errno RtlFreeHeap 19823->19824 19825 1d38b8d0cdd 19824->19825 19826 1d38b8cb6a4 __doserrno RtlFreeHeap 19825->19826 19826->19821 19827->19821 19827->19823 19828 1d38b8d0ca3 19827->19828 19830 1d38b8cb714 _errno RtlFreeHeap 19827->19830 19846 1d38b8cb6c4 19828->19846 19831 1d38b8d0c98 19830->19831 19832 1d38b8cb6a4 __doserrno RtlFreeHeap 19831->19832 19832->19828 19833->19827 19843 1d38b8d3678 19833->19843 19836 1d38b8d46c8 _chsize_nolock RtlFreeHeap 19835->19836 19837 1d38b8d1ddb 19836->19837 19838 1d38b8d1de1 19837->19838 19841 1d38b8d1df2 19837->19841 19839 1d38b8cb714 _errno RtlFreeHeap 19838->19839 19840 1d38b8d1de6 19839->19840 19840->19815 19841->19840 19842 1d38b8cb6c4 _dosmaperr RtlFreeHeap 19841->19842 19842->19840 19844 1d38b8cbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19843->19844 19845 1d38b8d368c 19844->19845 19845->19833 19847 1d38b8cf438 _getptd_noexit RtlFreeHeap 19846->19847 19848 1d38b8cb6d5 19847->19848 19849 1d38b8cf438 _getptd_noexit RtlFreeHeap 19848->19849 19850 1d38b8cb6ee realloc 19849->19850 19850->19823 19852 1d38b8cbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19851->19852 19854 1d38b8cd6a8 19852->19854 19853 1d38b8cd6c3 19855 1d38b8cb714 _errno RtlFreeHeap 19853->19855 19854->19853 19856 1d38b8cd6d8 19854->19856 19860 1d38b8cd6c8 _invalid_parameter_noinfo 19855->19860 19858 1d38b8cd72a 19856->19858 19861 1d38b8d3878 19856->19861 19859 1d38b8cb714 _errno RtlFreeHeap 19858->19859 19858->19860 19859->19860 19860->19708 19862 1d38b8cbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19861->19862 19863 1d38b8d389a 19862->19863 19864 1d38b8d38a4 19863->19864 19865 1d38b8d3634 _isleadbyte_l RtlFreeHeap 19863->19865 19864->19856 19866 1d38b8d38c7 19865->19866 19867 1d38b8d4268 setSBUpLow RtlFreeHeap 19866->19867 19867->19864 19869 1d38b8c6d71 _DllMainCRTStartup 19868->19869 19892 1d38b8918bc 19869->19892 19871 1d38b8c6da8 _DllMainCRTStartup 19871->19594 19873 1d38b8cf414 _getptd RtlFreeHeap 19872->19873 19874 1d38b8ca021 19873->19874 19874->19596 19876 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 19875->19876 19877 1d38b8a7d16 _DllMainCRTStartup 19876->19877 19878 1d38b8a7d7a GetUserNameA 19877->19878 19879 1d38b8a7dc8 19878->19879 19898 1d38b8a00a4 19879->19898 19881 1d38b8a7dcd strrchr _DllMainCRTStartup 19882 1d38b8c9700 _snprintf RtlFreeHeap 19881->19882 19883 1d38b8a7f11 _DllMainCRTStartup 19882->19883 19905 1d38b8a80f0 19883->19905 19887 1d38b8c67e3 _DllMainCRTStartup 19886->19887 19913 1d38b891cc4 19887->19913 19889 1d38b8c6838 19933 1d38b891b64 19889->19933 19891 1d38b8c68b0 19891->19600 19894 1d38b8918ec _DllMainCRTStartup 19892->19894 19893 1d38b89190d 19893->19871 19894->19893 19895 1d38b8c9468 malloc RtlFreeHeap 19894->19895 19897 1d38b891921 19895->19897 19896 1d38b8c9428 free RtlFreeHeap 19896->19893 19897->19893 19897->19896 19911 1d38b8a01dc 19898->19911 19900 1d38b8a00c0 WSASocketA 19901 1d38b8a00fa WSAIoctl 19900->19901 19902 1d38b8a00f3 19900->19902 19904 1d38b8a0145 closesocket 19901->19904 19902->19881 19904->19902 19906 1d38b8a8103 _DllMainCRTStartup 19905->19906 19907 1d38b8c9428 free RtlFreeHeap 19906->19907 19908 1d38b8a8110 19907->19908 19909 1d38b8c9428 free RtlFreeHeap 19908->19909 19910 1d38b8a7f78 19909->19910 19910->19598 19912 1d38b8a01ec _DllMainCRTStartup 19911->19912 19912->19900 19914 1d38b891d5e _DllMainCRTStartup 19913->19914 19932 1d38b891d77 setSBUpLow _DllMainCRTStartup 19914->19932 19937 1d38b8d8f58 19914->19937 19916 1d38b891d6f _DllMainCRTStartup 19917 1d38b891f0c 19916->19917 19922 1d38b891e6d 19916->19922 19916->19932 19918 1d38b8c9428 free RtlFreeHeap 19917->19918 19919 1d38b891f14 19918->19919 19921 1d38b894e64 _DllMainCRTStartup RtlFreeHeap 19919->19921 19928 1d38b891f40 19921->19928 19944 1d38b894e64 19922->19944 19924 1d38b891efd 19927 1d38b8c9428 free RtlFreeHeap 19924->19927 19925 1d38b891ef3 19926 1d38b8c9428 free RtlFreeHeap 19925->19926 19926->19932 19927->19932 19930 1d38b894e64 _DllMainCRTStartup RtlFreeHeap 19928->19930 19931 1d38b89205c 19928->19931 19928->19932 19929 1d38b894e64 _DllMainCRTStartup RtlFreeHeap 19929->19932 19930->19931 19931->19929 19931->19932 19932->19889 19934 1d38b891ba5 _DllMainCRTStartup 19933->19934 19935 1d38b891b9b _DllMainCRTStartup 19933->19935 19934->19935 19950 1d38b89460c 19934->19950 19935->19891 19938 1d38b8d3a60 _calloc_impl RtlFreeHeap 19937->19938 19939 1d38b8d8f6d 19938->19939 19940 1d38b8cb714 _errno RtlFreeHeap 19939->19940 19943 1d38b8d8f8a 19939->19943 19941 1d38b8d8f80 19940->19941 19942 1d38b8cb714 _errno RtlFreeHeap 19941->19942 19941->19943 19942->19943 19943->19916 19945 1d38b894e90 19944->19945 19946 1d38b891eea 19945->19946 19947 1d38b8d8f58 _DllMainCRTStartup RtlFreeHeap 19945->19947 19946->19924 19946->19925 19948 1d38b894ecf _DllMainCRTStartup 19947->19948 19948->19946 19949 1d38b8c9428 free RtlFreeHeap 19948->19949 19949->19946 19952 1d38b89463d _DllMainCRTStartup 19950->19952 19951 1d38b894893 19951->19935 19952->19951 19953 1d38b8c9468 malloc RtlFreeHeap 19952->19953 19954 1d38b8946ae 19953->19954 19955 1d38b8c9468 malloc RtlFreeHeap 19954->19955 19956 1d38b8946b8 19955->19956 19957 1d38b8c9468 malloc RtlFreeHeap 19956->19957 19958 1d38b8946c3 19957->19958 19959 1d38b89489f 19958->19959 19960 1d38b894897 19958->19960 19962 1d38b8946e1 19958->19962 19961 1d38b8948ac 19959->19961 19964 1d38b8c9428 free RtlFreeHeap 19959->19964 19963 1d38b8c9428 free RtlFreeHeap 19960->19963 19961->19951 19965 1d38b8c9428 free RtlFreeHeap 19961->19965 19966 1d38b8918bc _DllMainCRTStartup RtlFreeHeap 19962->19966 19963->19959 19964->19961 19965->19951 19972 1d38b894723 _setmbcp memcpy_s 19966->19972 19967 1d38b8c9428 free RtlFreeHeap 19968 1d38b894883 19967->19968 19969 1d38b8c9428 free RtlFreeHeap 19968->19969 19970 1d38b89488b 19969->19970 19971 1d38b8c9428 free RtlFreeHeap 19970->19971 19971->19951 19976 1d38b894797 _setmbcp 19972->19976 19977 1d38b8954f0 19972->19977 19974 1d38b8947bf 19974->19974 19975 1d38b8954f0 _DllMainCRTStartup RtlFreeHeap 19974->19975 19974->19976 19975->19976 19976->19967 19978 1d38b89551c _DllMainCRTStartup 19977->19978 19979 1d38b895639 19978->19979 19980 1d38b8c9468 malloc RtlFreeHeap 19978->19980 19979->19974 19981 1d38b89553f 19980->19981 19982 1d38b8c9468 malloc RtlFreeHeap 19981->19982 19983 1d38b89554a 19982->19983 19984 1d38b895645 19983->19984 19985 1d38b89563d 19983->19985 19991 1d38b89555f 19983->19991 19984->19979 19987 1d38b8c9428 free RtlFreeHeap 19984->19987 19986 1d38b8c9428 free RtlFreeHeap 19985->19986 19986->19984 19987->19979 19988 1d38b8c9428 free RtlFreeHeap 19989 1d38b895631 19988->19989 19990 1d38b8c9428 free RtlFreeHeap 19989->19990 19990->19979 19991->19988 19993 1d38b8c8c5e 19992->19993 19994 1d38b8c8c70 19993->19994 19995 1d38b8c8da7 19993->19995 20000 1d38b8c9428 free RtlFreeHeap 19994->20000 20001 1d38b8c8c88 19994->20001 19996 1d38b8c8dbd 19995->19996 19997 1d38b8c9428 free RtlFreeHeap 19995->19997 19998 1d38b8c8dd3 19996->19998 19999 1d38b8c9428 free RtlFreeHeap 19996->19999 19997->19996 19998->19604 19999->19998 20000->20001 20001->19604 20020 1d38b8ab828 20002->20020 20004 1d38b89f52f 20005 1d38b8c9700 _snprintf RtlFreeHeap 20004->20005 20006 1d38b89f550 _DllMainCRTStartup 20005->20006 20024 1d38b8aabbc 20006->20024 20009 1d38b89f5fe 20011 1d38b8c9700 _snprintf RtlFreeHeap 20009->20011 20010 1d38b89f5db 20012 1d38b8c9700 _snprintf RtlFreeHeap 20010->20012 20013 1d38b89f5fc _DllMainCRTStartup 20011->20013 20012->20013 20013->20013 20030 1d38b8ab808 20013->20030 20017 1d38b89f70b 20017->19608 20018 1d38b89f707 _DllMainCRTStartup 20018->20017 20037 1d38b8ab940 20018->20037 20021 1d38b8ab852 20020->20021 20022 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20021->20022 20023 1d38b8ab875 _DllMainCRTStartup 20022->20023 20023->20004 20029 1d38b8aac38 _DllMainCRTStartup 20024->20029 20025 1d38b89f5a0 20025->20009 20025->20010 20026 1d38b8c9700 RtlFreeHeap _snprintf 20026->20029 20027 1d38b8ab752 20027->20025 20027->20027 20028 1d38b8c9700 _snprintf RtlFreeHeap 20027->20028 20028->20025 20029->20025 20029->20026 20029->20027 20029->20029 20031 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20030->20031 20032 1d38b89f6fd 20031->20032 20033 1d38b8a0038 20032->20033 20034 1d38b8a0072 20033->20034 20035 1d38b8a0076 20034->20035 20036 1d38b8c99cc _DllMainCRTStartup RtlFreeHeap 20034->20036 20035->20018 20036->20035 20038 1d38b8c9468 malloc RtlFreeHeap 20037->20038 20044 1d38b8ab9af _DllMainCRTStartup 20038->20044 20039 1d38b8ab9bc 20039->20017 20040 1d38b8abdcb 20041 1d38b8c9428 free RtlFreeHeap 20040->20041 20041->20039 20042 1d38b8abdb3 20043 1d38b8c9428 free RtlFreeHeap 20042->20043 20043->20039 20044->20039 20044->20040 20044->20042 20046 1d38b8aba7f 20044->20046 20045 1d38b8c9428 free RtlFreeHeap 20045->20039 20046->20045 20048 1d38b8919b8 _DllMainCRTStartup 20047->20048 20049 1d38b8c9468 malloc RtlFreeHeap 20048->20049 20051 1d38b8919d7 20048->20051 20050 1d38b891a07 20049->20050 20050->20051 20061 1d38b894300 20050->20061 20051->19617 20053 1d38b891a52 20054 1d38b8c9428 free RtlFreeHeap 20053->20054 20054->20051 20055 1d38b891a24 _DllMainCRTStartup 20055->20053 20073 1d38b894170 20055->20073 20058 1d38b89f262 20057->20058 20090 1d38b89d090 20058->20090 20063 1d38b89432f _DllMainCRTStartup 20061->20063 20062 1d38b894352 20062->20055 20063->20062 20064 1d38b8c9468 malloc RtlFreeHeap 20063->20064 20065 1d38b894368 20064->20065 20065->20062 20066 1d38b8c9468 malloc RtlFreeHeap 20065->20066 20067 1d38b894381 20066->20067 20068 1d38b89438d 20067->20068 20069 1d38b8918bc _DllMainCRTStartup RtlFreeHeap 20067->20069 20071 1d38b8943c3 _setmbcp _DllMainCRTStartup 20067->20071 20070 1d38b8c9428 free RtlFreeHeap 20068->20070 20069->20071 20070->20062 20071->20068 20072 1d38b8c9428 free RtlFreeHeap 20071->20072 20072->20068 20074 1d38b89419d _DllMainCRTStartup 20073->20074 20075 1d38b8c9468 malloc RtlFreeHeap 20074->20075 20088 1d38b8942c4 20074->20088 20076 1d38b8941c2 20075->20076 20077 1d38b8c9468 malloc RtlFreeHeap 20076->20077 20078 1d38b8941cd 20077->20078 20079 1d38b8942d0 20078->20079 20080 1d38b8942c8 20078->20080 20089 1d38b8941e2 20078->20089 20081 1d38b8c9428 free RtlFreeHeap 20079->20081 20079->20088 20082 1d38b8c9428 free RtlFreeHeap 20080->20082 20081->20088 20082->20079 20083 1d38b8c9428 free RtlFreeHeap 20084 1d38b8942b4 20083->20084 20085 1d38b8c9428 free RtlFreeHeap 20084->20085 20086 1d38b8942bc 20085->20086 20087 1d38b8c9428 free RtlFreeHeap 20086->20087 20087->20088 20088->20053 20089->20083 20091 1d38b89d0ac _DllMainCRTStartup 20090->20091 20092 1d38b89d0ef 20091->20092 20094 1d38b89d0da 20091->20094 20104 1d38b89d10c 20092->20104 20097 1d38b89f128 20094->20097 20095 1d38b89d0ed 20095->19625 20098 1d38b89f144 _DllMainCRTStartup 20097->20098 20099 1d38b89f15f 20098->20099 20100 1d38b89f14a 20098->20100 20102 1d38b89d10c _DllMainCRTStartup RtlFreeHeap 20099->20102 20111 1d38b89efdc 20100->20111 20103 1d38b89f15d 20102->20103 20103->20095 20127 1d38b89f180 20104->20127 20107 1d38b89d14f 20107->20095 20108 1d38b89d175 20109 1d38b8c9428 free RtlFreeHeap 20108->20109 20109->20107 20112 1d38b89eff8 _DllMainCRTStartup 20111->20112 20121 1d38b89d2bc 20112->20121 20114 1d38b89f016 _DllMainCRTStartup 20115 1d38b89d10c _DllMainCRTStartup RtlFreeHeap 20114->20115 20116 1d38b89f0ab 20115->20116 20124 1d38b89d280 20116->20124 20118 1d38b89f0b5 20119 1d38b89f122 20118->20119 20120 1d38b89d10c _DllMainCRTStartup RtlFreeHeap 20118->20120 20119->20103 20120->20118 20122 1d38b8c9468 malloc RtlFreeHeap 20121->20122 20123 1d38b89d2d6 _DllMainCRTStartup 20122->20123 20123->20114 20125 1d38b8c9428 free RtlFreeHeap 20124->20125 20126 1d38b89d2b6 20125->20126 20126->20118 20128 1d38b8c9468 malloc RtlFreeHeap 20127->20128 20130 1d38b89f1a8 _DllMainCRTStartup 20128->20130 20129 1d38b89d143 20129->20107 20129->20108 20135 1d38b89ff10 20129->20135 20130->20129 20131 1d38b89f230 20130->20131 20132 1d38b89f217 20130->20132 20145 1d38b8c6bd8 20131->20145 20133 1d38b8c9428 free RtlFreeHeap 20132->20133 20133->20129 20136 1d38b89ff3c 20135->20136 20137 1d38b89ff73 20135->20137 20139 1d38b8c9468 malloc RtlFreeHeap 20136->20139 20138 1d38b89ff84 20137->20138 20141 1d38b89fbec _DllMainCRTStartup RtlFreeHeap 20137->20141 20143 1d38b89ffb1 20137->20143 20138->20108 20140 1d38b89ff46 20139->20140 20142 1d38b8c8aec _DllMainCRTStartup RtlFreeHeap 20140->20142 20141->20143 20142->20137 20143->20138 20144 1d38b89fbec _DllMainCRTStartup RtlFreeHeap 20143->20144 20144->20138 20148 1d38b8c6c00 _DllMainCRTStartup 20145->20148 20146 1d38b89198c _DllMainCRTStartup RtlFreeHeap 20147 1d38b8c6d2a 20146->20147 20147->20129 20148->20146 20150 1d38b8ac019 20149->20150 20151 1d38b8abe19 20149->20151 20154 1d38b8ac111 20150->20154 20155 1d38b8ac024 20150->20155 20152 1d38b8ac5f1 20151->20152 20153 1d38b8abe24 20151->20153 20618 1d38b8a2f10 20152->20618 20159 1d38b8abe2f 20153->20159 20160 1d38b8abf37 20153->20160 20156 1d38b8ac18b 20154->20156 20157 1d38b8ac118 20154->20157 20161 1d38b8ac7cb 20155->20161 20162 1d38b8ac02f 20155->20162 20163 1d38b8ac196 20156->20163 20164 1d38b8ac8c9 20156->20164 20179 1d38b8ac7de 20157->20179 20180 1d38b8ac12e 20157->20180 20311 1d38b8abe99 _DllMainCRTStartup 20157->20311 20168 1d38b8abe3a 20159->20168 20169 1d38b8ac407 20159->20169 20166 1d38b8abf3e 20160->20166 20167 1d38b8abfb1 20160->20167 20731 1d38b8a9038 20161->20731 20170 1d38b8ac036 20162->20170 20171 1d38b8ac0a9 20162->20171 20174 1d38b8ac1a1 20163->20174 20175 1d38b8ac8df 20163->20175 20764 1d38b8a3f60 20164->20764 20181 1d38b8ac4fd 20166->20181 20182 1d38b8abf49 20166->20182 20176 1d38b8abfbc 20167->20176 20177 1d38b8ac519 20167->20177 20186 1d38b8abecf 20168->20186 20187 1d38b8abe45 20168->20187 20479 1d38b8c82cc 20169->20479 20172 1d38b8ac041 20170->20172 20173 1d38b8ac6e7 20170->20173 20183 1d38b8ac706 20171->20183 20184 1d38b8ac0b4 20171->20184 20192 1d38b8ac60b 20172->20192 20193 1d38b8ac04c 20172->20193 20664 1d38b8a3c08 20173->20664 20194 1d38b8ac1ac 20174->20194 20195 1d38b8ac8f8 20174->20195 20198 1d38b8a3f60 _DllMainCRTStartup RtlFreeHeap 20175->20198 20188 1d38b8ac539 20176->20188 20189 1d38b8abfc7 20176->20189 20566 1d38b8a3ae0 20177->20566 20738 1d38b89c7a8 20179->20738 20190 1d38b8ac7f1 20180->20190 20191 1d38b8ac139 20180->20191 20202 1d38b8a3870 _DllMainCRTStartup RtlFreeHeap 20181->20202 20199 1d38b8ac430 20182->20199 20200 1d38b8abf54 20182->20200 20201 1d38b8a3c08 _DllMainCRTStartup RtlFreeHeap 20183->20201 20203 1d38b8ac722 20184->20203 20204 1d38b8ac0bf 20184->20204 20218 1d38b8ac33e 20186->20218 20219 1d38b8abee5 20186->20219 20186->20311 20213 1d38b8abe9e 20187->20213 20214 1d38b8abe57 20187->20214 20187->20311 20215 1d38b8a3ae0 _DllMainCRTStartup RtlFreeHeap 20188->20215 20227 1d38b8abfdd 20189->20227 20228 1d38b8ac56e 20189->20228 20189->20311 20745 1d38b89c958 20190->20745 20216 1d38b8ac804 20191->20216 20217 1d38b8ac144 20191->20217 20626 1d38b8a2e94 20192->20626 20207 1d38b8ac61e 20193->20207 20208 1d38b8ac057 20193->20208 20220 1d38b8ac90e 20194->20220 20221 1d38b8ac1b7 20194->20221 20782 1d38b8a4104 20195->20782 20198->20311 20504 1d38b8acad8 20199->20504 20222 1d38b8abf5f 20200->20222 20223 1d38b8ac44a 20200->20223 20201->20311 20202->20311 20671 1d38b8a0d38 20203->20671 20211 1d38b8ac735 20204->20211 20212 1d38b8ac0ca 20204->20212 20639 1d38b8a0eb0 20207->20639 20229 1d38b8ac062 20208->20229 20230 1d38b8ac636 20208->20230 20674 1d38b8a2dd8 20211->20674 20231 1d38b8ac0d5 20212->20231 20232 1d38b8ac748 20212->20232 20238 1d38b8ac28b 20213->20238 20239 1d38b8abea9 20213->20239 20235 1d38b8ac271 20214->20235 20236 1d38b8abe62 20214->20236 20215->20311 20750 1d38b89c8b8 20216->20750 20240 1d38b8ac14f 20217->20240 20241 1d38b8ac815 20217->20241 20446 1d38b8a8b54 20218->20446 20242 1d38b8abef0 20219->20242 20243 1d38b8ac358 20219->20243 20233 1d38b8a4104 _DllMainCRTStartup RtlFreeHeap 20220->20233 20244 1d38b8ac921 20221->20244 20245 1d38b8ac1c2 20221->20245 20246 1d38b8ac46c 20222->20246 20247 1d38b8abf6a 20222->20247 20519 1d38b8aca28 20223->20519 20253 1d38b8ac588 20227->20253 20254 1d38b8abfe8 20227->20254 20570 1d38b8c817c 20228->20570 20257 1d38b8ac06d 20229->20257 20258 1d38b8ac649 20229->20258 20643 1d38b8c8f98 20230->20643 20259 1d38b8ac75b 20231->20259 20260 1d38b8ac0e0 20231->20260 20681 1d38b8a3334 20232->20681 20233->20311 20371 1d38b8a1080 20235->20371 20261 1d38b8ac1f3 20236->20261 20325 1d38b8abe6d 20236->20325 20390 1d38b8a2854 20238->20390 20266 1d38b8ac2a5 20239->20266 20267 1d38b8abeb4 20239->20267 20268 1d38b8ac82f 20240->20268 20269 1d38b8ac15a 20240->20269 20757 1d38b8a757c 20241->20757 20270 1d38b8abefb 20242->20270 20271 1d38b8ac378 20242->20271 20450 1d38b8a3b70 20243->20450 20788 1d38b89d654 20244->20788 20272 1d38b8ac1cd 20245->20272 20273 1d38b8ac931 20245->20273 20523 1d38b8aa30c 20246->20523 20274 1d38b8ac47f 20247->20274 20275 1d38b8abf75 20247->20275 20577 1d38b8a8ea8 20253->20577 20299 1d38b8abffe 20254->20299 20300 1d38b8ac5b1 20254->20300 20254->20311 20280 1d38b8ac65c 20257->20280 20281 1d38b8ac078 20257->20281 20647 1d38b8a14f8 20258->20647 20688 1d38b8aa810 20259->20688 20282 1d38b8ac76e 20260->20282 20283 1d38b8ac0eb 20260->20283 20353 1d38b8a3870 20261->20353 20430 1d38b8a089c 20266->20430 20287 1d38b8abebf 20267->20287 20288 1d38b8ac2b8 20267->20288 20276 1d38b8a3c08 _DllMainCRTStartup RtlFreeHeap 20268->20276 20290 1d38b8ac84b 20269->20290 20291 1d38b8ac165 20269->20291 20292 1d38b8ac395 20270->20292 20293 1d38b8abf06 20270->20293 20454 1d38b8a2ae4 20271->20454 20294 1d38b8ac949 20272->20294 20295 1d38b8ac1d8 20272->20295 20284 1d38b8a5c14 _DllMainCRTStartup RtlFreeHeap 20273->20284 20529 1d38b8a0a44 20274->20529 20275->20311 20312 1d38b8abf8b 20275->20312 20313 1d38b8ac4aa 20275->20313 20276->20311 20651 1d38b8a141c 20280->20651 20302 1d38b8ac66d 20281->20302 20303 1d38b8ac083 20281->20303 20692 1d38b8a0bc0 20282->20692 20304 1d38b8ac781 20283->20304 20305 1d38b8ac0f6 20283->20305 20284->20311 20287->20311 20438 1d38b8a868c 20287->20438 20434 1d38b8c71ac 20288->20434 20297 1d38b8a3c08 _DllMainCRTStartup RtlFreeHeap 20290->20297 20308 1d38b8ac170 20291->20308 20309 1d38b8ac864 20291->20309 20458 1d38b8a6780 20292->20458 20293->20311 20341 1d38b8ac3e3 20293->20341 20346 1d38b8abf27 20293->20346 20306 1d38b8a8ea8 _DllMainCRTStartup RtlFreeHeap 20294->20306 20294->20311 20295->20311 20442 1d38b8a8934 20295->20442 20297->20311 20314 1d38b8ac5c4 20299->20314 20315 1d38b8ac009 20299->20315 20584 1d38b8a0dc4 20300->20584 20317 1d38b8a5c14 _DllMainCRTStartup RtlFreeHeap 20302->20317 20320 1d38b8ac69d 20303->20320 20321 1d38b8ac08e 20303->20321 20700 1d38b8a15d8 20304->20700 20323 1d38b8ac79b 20305->20323 20324 1d38b8ac101 20305->20324 20306->20311 20327 1d38b8ac17b 20308->20327 20328 1d38b8ac880 20308->20328 20316 1d38b8a3870 _DllMainCRTStartup RtlFreeHeap 20309->20316 20311->19630 20330 1d38b8abf96 20312->20330 20331 1d38b8ac4c3 20312->20331 20548 1d38b8a5c14 20313->20548 20588 1d38b8a2fb8 20314->20588 20315->20311 20610 1d38b8a32e4 20315->20610 20316->20311 20317->20311 20335 1d38b8a1080 _DllMainCRTStartup RtlFreeHeap 20320->20335 20337 1d38b8ac099 20321->20337 20338 1d38b8ac6b7 20321->20338 20713 1d38b8a06d4 20323->20713 20324->20311 20727 1d38b8aa288 20324->20727 20325->20311 20359 1d38b8a39a0 20325->20359 20327->20311 20342 1d38b8a3b70 _DllMainCRTStartup RtlFreeHeap 20327->20342 20334 1d38b8a3870 _DllMainCRTStartup RtlFreeHeap 20328->20334 20332 1d38b8abfa1 20330->20332 20333 1d38b8ac4d4 20330->20333 20555 1d38b8a5dac 20331->20555 20332->20311 20351 1d38b8a39a0 _DllMainCRTStartup RtlFreeHeap 20332->20351 20562 1d38b8a5b98 20333->20562 20334->20311 20335->20311 20337->20311 20350 1d38b8c71ac _DllMainCRTStartup RtlFreeHeap 20337->20350 20661 1d38b8a6fb0 20338->20661 20462 1d38b8c80bc 20341->20462 20342->20311 20346->20311 20475 1d38b8c826c 20346->20475 20350->20311 20351->20311 20354 1d38b8a3897 _DllMainCRTStartup 20353->20354 20795 1d38b8c72a0 20354->20795 20357 1d38b8a3926 _DllMainCRTStartup 20357->20311 20360 1d38b8a39d5 _DllMainCRTStartup 20359->20360 20361 1d38b8a3a10 20360->20361 20362 1d38b8a3a2c _DllMainCRTStartup 20360->20362 20363 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20361->20363 20365 1d38b8a3a44 20362->20365 20368 1d38b8a3a59 _DllMainCRTStartup 20362->20368 20364 1d38b8a3a27 20363->20364 20364->20311 20366 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20365->20366 20366->20364 20367 1d38b8a3a7f _DllMainCRTStartup 20367->20364 20370 1d38b8a4708 _DllMainCRTStartup RtlFreeHeap 20367->20370 20368->20367 20369 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20368->20369 20369->20367 20370->20364 20372 1d38b8c9468 malloc RtlFreeHeap 20371->20372 20373 1d38b8a109c _DllMainCRTStartup 20372->20373 20374 1d38b8a10db 20373->20374 20375 1d38b8a10ea 20373->20375 20384 1d38b8a10a9 20373->20384 20376 1d38b8c9428 free RtlFreeHeap 20374->20376 20921 1d38b8ca1e8 20375->20921 20376->20384 20378 1d38b8a110e 20380 1d38b8c9428 free RtlFreeHeap 20378->20380 20379 1d38b8a10f9 20379->20378 20382 1d38b8a112c _DllMainCRTStartup 20379->20382 20381 1d38b8a1118 20380->20381 20383 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20381->20383 20936 1d38b8ca384 20382->20936 20383->20384 20384->20311 20386 1d38b8a1161 20943 1d38b8ca0a8 20386->20943 20388 1d38b8a116b 20389 1d38b8c9428 free RtlFreeHeap 20388->20389 20389->20384 20391 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20390->20391 20392 1d38b8a287c _DllMainCRTStartup 20391->20392 20393 1d38b8ca1e8 _DllMainCRTStartup RtlFreeHeap 20392->20393 20394 1d38b8a28e9 20393->20394 20395 1d38b8a28fe 20394->20395 20397 1d38b8a291c 20394->20397 21095 1d38b89f430 20395->21095 21098 1d38b8caa64 20397->21098 20400 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20402 1d38b8a2917 20400->20402 20401 1d38b8a292e 21105 1d38b8caad8 20401->21105 20402->20311 20404 1d38b8a2938 20405 1d38b8caa64 fseek RtlFreeHeap 20404->20405 20406 1d38b8a294c 20405->20406 20407 1d38b8a2960 20406->20407 20408 1d38b8a2988 20406->20408 20409 1d38b89f430 _DllMainCRTStartup RtlFreeHeap 20407->20409 20413 1d38b8a29b5 20408->20413 20415 1d38b8a29dd 20408->20415 20410 1d38b8a296f 20409->20410 20411 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20410->20411 20412 1d38b8a2979 20411->20412 20414 1d38b8ca0a8 fclose RtlFreeHeap 20412->20414 20416 1d38b89f430 _DllMainCRTStartup RtlFreeHeap 20413->20416 20414->20402 20418 1d38b8c9468 malloc RtlFreeHeap 20415->20418 20417 1d38b8a29c4 20416->20417 20420 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20417->20420 20419 1d38b8a29e7 20418->20419 20421 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 20419->20421 20422 1d38b8a29ce 20420->20422 20424 1d38b8a2a4c _DllMainCRTStartup 20421->20424 20423 1d38b8ca0a8 fclose RtlFreeHeap 20422->20423 20423->20402 20425 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20424->20425 20426 1d38b8a2ab7 20425->20426 20427 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20426->20427 20428 1d38b8a2ac1 20427->20428 20428->20402 21111 1d38b8a2c54 20428->21111 20431 1d38b8a08e2 20430->20431 20432 1d38b8aa870 _DllMainCRTStartup RtlFreeHeap 20431->20432 20433 1d38b8a0928 _DllMainCRTStartup 20431->20433 20432->20433 20433->20311 20435 1d38b8c71ca 20434->20435 20436 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20435->20436 20437 1d38b8c71de _DllMainCRTStartup 20435->20437 20436->20437 20437->20311 20440 1d38b8a8723 _DllMainCRTStartup 20438->20440 20439 1d38b8a87d5 20439->20311 20440->20439 21196 1d38b8a8558 20440->21196 20443 1d38b8a89c2 _DllMainCRTStartup 20442->20443 20444 1d38b8a8a74 20443->20444 21202 1d38b8a8598 20443->21202 20444->20311 20447 1d38b8a8b88 _DllMainCRTStartup 20446->20447 20448 1d38b8a8bbc 20447->20448 20449 1d38b8a8470 _DllMainCRTStartup RtlFreeHeap 20447->20449 20448->20311 20449->20448 20451 1d38b8a3bc0 20450->20451 20452 1d38b8a3870 _DllMainCRTStartup RtlFreeHeap 20451->20452 20453 1d38b8a3bde 20452->20453 20453->20311 20455 1d38b8a2b11 20454->20455 20456 1d38b8a2b54 20455->20456 20457 1d38b8ca0a8 fclose RtlFreeHeap 20455->20457 20456->20311 20457->20455 20459 1d38b8a67d7 _DllMainCRTStartup 20458->20459 20461 1d38b8a67ea _DllMainCRTStartup 20458->20461 20460 1d38b8c9468 malloc RtlFreeHeap 20459->20460 20460->20461 20461->20311 20463 1d38b8c80d4 20462->20463 20464 1d38b8c80ee 20463->20464 20465 1d38b8c810a 20463->20465 21205 1d38b8c87fc 20464->21205 20467 1d38b8c8127 20465->20467 20468 1d38b8c8143 20465->20468 20469 1d38b8c87fc _DllMainCRTStartup RtlFreeHeap 20467->20469 20470 1d38b8c814d _wcsupr_s 20468->20470 20471 1d38b8c816a 20468->20471 20474 1d38b8c80fd _wcsupr_s 20469->20474 20473 1d38b8c87fc _DllMainCRTStartup RtlFreeHeap 20470->20473 21213 1d38b89f410 20471->21213 20473->20474 20474->20311 20476 1d38b8c827c 20475->20476 20477 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20476->20477 20478 1d38b8c82b0 20476->20478 20477->20478 20478->20311 20480 1d38b8c8305 20479->20480 20481 1d38b8c8390 20480->20481 20482 1d38b8c8374 20480->20482 20503 1d38b8c830f 20480->20503 20483 1d38b8c83ce 20481->20483 20484 1d38b8c8397 20481->20484 20485 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20482->20485 20486 1d38b8c83cc 20483->20486 20487 1d38b8c83e6 20483->20487 20484->20486 20488 1d38b8c83b0 20484->20488 20485->20503 20489 1d38b8c826c _DllMainCRTStartup RtlFreeHeap 20486->20489 20492 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20487->20492 20491 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20488->20491 20490 1d38b8c8407 20489->20490 20493 1d38b8c8432 20490->20493 20494 1d38b8c8416 20490->20494 20491->20503 20492->20503 20496 1d38b8c847f 20493->20496 20497 1d38b8c8463 20493->20497 20495 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20494->20495 20495->20503 20498 1d38b8c8490 20496->20498 20499 1d38b8c84ac 20496->20499 20500 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20497->20500 20501 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20498->20501 20502 1d38b8c88c4 _DllMainCRTStartup RtlFreeHeap 20499->20502 20500->20503 20501->20503 20502->20503 20503->20311 20505 1d38b8acb45 _DllMainCRTStartup 20504->20505 20506 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 20505->20506 20507 1d38b8acb65 _DllMainCRTStartup 20506->20507 20508 1d38b8acbf2 20507->20508 20509 1d38b8acc01 20507->20509 20510 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20508->20510 20512 1d38b8acc22 20509->20512 20516 1d38b8acc3c _DllMainCRTStartup 20509->20516 20511 1d38b8acbfc 20510->20511 20511->20311 20513 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20512->20513 20513->20511 20514 1d38b89d338 RtlFreeHeap _DllMainCRTStartup 20514->20516 20516->20514 20517 1d38b8acd97 _DllMainCRTStartup 20516->20517 21220 1d38b8ace70 20516->21220 20518 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20517->20518 20518->20511 20520 1d38b8aca6d _DllMainCRTStartup 20519->20520 20521 1d38b8acaab 20520->20521 20522 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20520->20522 20521->20311 20522->20521 20524 1d38b8aa331 20523->20524 20525 1d38b8aa325 20523->20525 20527 1d38b8c9468 malloc RtlFreeHeap 20524->20527 20526 1d38b8c9428 free RtlFreeHeap 20525->20526 20526->20524 20528 1d38b8aa341 20527->20528 20528->20311 20530 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20529->20530 20531 1d38b8a0a63 _DllMainCRTStartup 20530->20531 20532 1d38b8a0aeb 20531->20532 20533 1d38b8a0afa _DllMainCRTStartup 20531->20533 20534 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20532->20534 20535 1d38b8a0b22 _DllMainCRTStartup 20533->20535 20536 1d38b8a0b13 20533->20536 20547 1d38b8a0af5 _DllMainCRTStartup 20534->20547 20538 1d38b8a0b3b 20535->20538 20539 1d38b8a0b47 _DllMainCRTStartup 20535->20539 20537 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20536->20537 20537->20547 20540 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20538->20540 20541 1d38b8a0b6c _wcsupr_s 20539->20541 20542 1d38b8a0b60 20539->20542 20540->20547 21224 1d38b8a25a8 20541->21224 20543 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20542->20543 20543->20547 20545 1d38b8a0b9c _wcsupr_s 20546 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20545->20546 20546->20547 20547->20311 20551 1d38b8a5c84 _wcsupr_s _DllMainCRTStartup 20548->20551 20549 1d38b8a5ccd 20549->20311 20550 1d38b8a5d90 20550->20549 20553 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20550->20553 20551->20549 20551->20550 20552 1d38b8a5d42 _DllMainCRTStartup 20551->20552 21255 1d38b8a5f88 20552->21255 20553->20549 20556 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 20555->20556 20557 1d38b8a5dd0 20556->20557 20559 1d38b8a5e18 _DllMainCRTStartup 20557->20559 21258 1d38b89d338 20557->21258 20560 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20559->20560 20561 1d38b8a5e4d 20560->20561 20561->20311 20563 1d38b8a5bc5 _DllMainCRTStartup 20562->20563 21267 1d38b8a630c 20563->21267 20567 1d38b8a3b30 20566->20567 20568 1d38b8a39a0 _DllMainCRTStartup RtlFreeHeap 20567->20568 20569 1d38b8a3b48 20568->20569 20569->20311 20571 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20570->20571 20573 1d38b8c8198 _DllMainCRTStartup 20571->20573 20572 1d38b8c8206 20572->20311 20573->20572 21271 1d38b8c85f0 20573->21271 20576 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20576->20572 20578 1d38b8a8ede _DllMainCRTStartup 20577->20578 20579 1d38b8a8efb 20578->20579 20580 1d38b8a8f23 _DllMainCRTStartup 20578->20580 20581 1d38b8a8f58 20578->20581 20579->20311 20583 1d38b8a8470 _DllMainCRTStartup RtlFreeHeap 20580->20583 20582 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20581->20582 20582->20579 20583->20579 20585 1d38b8a0de0 _DllMainCRTStartup 20584->20585 20586 1d38b89f410 _DllMainCRTStartup RtlFreeHeap 20585->20586 20587 1d38b8a0e70 20585->20587 20586->20587 20587->20311 20589 1d38b8c9468 malloc RtlFreeHeap 20588->20589 20590 1d38b8a2fec _DllMainCRTStartup 20589->20590 20591 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 20590->20591 20594 1d38b8a3057 _openfile _DllMainCRTStartup 20591->20594 20592 1d38b8a30af 20593 1d38b89d338 _DllMainCRTStartup RtlFreeHeap 20592->20593 20595 1d38b8a30c8 20593->20595 20594->20592 21284 1d38b8ca414 20594->21284 20597 1d38b8a3152 20595->20597 20598 1d38b8a30e8 20595->20598 20599 1d38b8a315c 20597->20599 20600 1d38b8c9428 free RtlFreeHeap 20597->20600 21291 1d38b89f458 20598->21291 20602 1d38b89d338 RtlFreeHeap _DllMainCRTStartup 20599->20602 20608 1d38b8a328d _DllMainCRTStartup 20599->20608 20600->20599 20602->20599 20603 1d38b8a3100 _DllMainCRTStartup 20604 1d38b8c9428 free RtlFreeHeap 20603->20604 20605 1d38b8a313e 20604->20605 20606 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20605->20606 20607 1d38b8a314b 20606->20607 20607->20311 20609 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20608->20609 20609->20607 20611 1d38b8a3305 _DllMainCRTStartup 20610->20611 21294 1d38b8a8430 20611->21294 20613 1d38b8a3314 21297 1d38b8caf00 20613->21297 20616 1d38b8c9428 free RtlFreeHeap 20617 1d38b8a332d 20616->20617 20617->20311 20619 1d38b8a2f36 _DllMainCRTStartup 20618->20619 20620 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 20619->20620 20621 1d38b8a2f45 _DllMainCRTStartup 20620->20621 20622 1d38b89d338 _DllMainCRTStartup RtlFreeHeap 20621->20622 20623 1d38b8a2f7b _DllMainCRTStartup 20622->20623 20624 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20623->20624 20625 1d38b8a2fb3 20624->20625 20625->20311 20627 1d38b8a2eb5 _DllMainCRTStartup 20626->20627 20628 1d38b8a8430 _DllMainCRTStartup RtlFreeHeap 20627->20628 20629 1d38b8a2ec4 _DllMainCRTStartup 20628->20629 20630 1d38b8a2ef4 20629->20630 20631 1d38b8a2ed7 20629->20631 21334 1d38b8cae28 20630->21334 21323 1d38b8acecc 20631->21323 20635 1d38b8a2ef2 20637 1d38b8c9428 free RtlFreeHeap 20635->20637 20638 1d38b8a2f08 20637->20638 20638->20311 20642 1d38b8a0ece _wcsupr_s _DllMainCRTStartup 20639->20642 20640 1d38b89f458 _DllMainCRTStartup RtlFreeHeap 20641 1d38b8a0f59 20640->20641 20641->20311 20642->20311 20642->20640 20642->20641 20644 1d38b8c8fb9 _DllMainCRTStartup 20643->20644 21371 1d38b8c90d4 20644->21371 20648 1d38b8a151c 20647->20648 20649 1d38b8a1517 20647->20649 20648->20649 20650 1d38b8c7f5c _DllMainCRTStartup RtlFreeHeap 20648->20650 20649->20311 20650->20649 20652 1d38b8a1432 20651->20652 20653 1d38b8a1452 20652->20653 20654 1d38b8a14e3 20652->20654 20656 1d38b8a1463 20653->20656 20657 1d38b8a1477 20653->20657 20655 1d38b89f410 _DllMainCRTStartup RtlFreeHeap 20654->20655 20660 1d38b8a1475 20655->20660 20659 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20656->20659 20658 1d38b8c88c4 _DllMainCRTStartup RtlFreeHeap 20657->20658 20658->20660 20659->20660 20660->20311 21400 1d38b8a7278 20661->21400 20665 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20664->20665 20666 1d38b8a3c2c _DllMainCRTStartup 20665->20666 21420 1d38b8a3d98 20666->21420 20668 1d38b8a3d81 20669 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20668->20669 20670 1d38b8a3d8e 20669->20670 20670->20311 21433 1d38b8d8b48 20671->21433 20673 1d38b8a0d4f 20673->20311 20675 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20674->20675 20676 1d38b8a2def _DllMainCRTStartup 20675->20676 20677 1d38b8a2e83 20676->20677 20680 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20676->20680 20678 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20677->20678 20679 1d38b8a2e8d 20678->20679 20679->20311 20680->20677 20682 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20681->20682 20684 1d38b8a334b _DllMainCRTStartup 20682->20684 20683 1d38b8a33dc 20685 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20683->20685 20684->20683 20687 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20684->20687 20686 1d38b8a33e6 20685->20686 20686->20311 20687->20683 20690 1d38b8aa831 _DllMainCRTStartup 20688->20690 20689 1d38b8aa84a 20689->20311 20690->20689 20691 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20690->20691 20691->20689 20693 1d38b8a0c1e 20692->20693 20694 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20693->20694 20695 1d38b8a0c61 _DllMainCRTStartup 20694->20695 20695->20695 20696 1d38b8aa618 _DllMainCRTStartup RtlFreeHeap 20695->20696 20697 1d38b8a0d18 20696->20697 20698 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20697->20698 20699 1d38b8a0d22 _DllMainCRTStartup 20698->20699 20699->20311 20701 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 20700->20701 20702 1d38b8a15f9 20701->20702 20703 1d38b8a1603 _wcsupr_s 20702->20703 20704 1d38b8a1629 20702->20704 21632 1d38b8a17a8 20703->21632 20706 1d38b8a166b 20704->20706 20707 1d38b8a1646 20704->20707 20709 1d38b89f410 _DllMainCRTStartup RtlFreeHeap 20706->20709 20708 1d38b8a17a8 _DllMainCRTStartup RtlFreeHeap 20707->20708 20710 1d38b8a1622 _wcsupr_s _DllMainCRTStartup 20708->20710 20709->20710 20711 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20710->20711 20712 1d38b8a16b5 20711->20712 20712->20311 20714 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20713->20714 20715 1d38b8a06ee _DllMainCRTStartup 20714->20715 20716 1d38b8ca414 _DllMainCRTStartup RtlFreeHeap 20715->20716 20717 1d38b8a07c5 20716->20717 20718 1d38b8ca414 _DllMainCRTStartup RtlFreeHeap 20717->20718 20719 1d38b8a07df 20718->20719 20720 1d38b8a0846 20719->20720 20722 1d38b8a07ec _DllMainCRTStartup 20719->20722 20721 1d38b8a117c _DllMainCRTStartup RtlFreeHeap 20720->20721 20726 1d38b8a083a _DllMainCRTStartup 20721->20726 20722->20722 21636 1d38b8a117c 20722->21636 20723 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20725 1d38b8a0894 20723->20725 20725->20311 20726->20723 20728 1d38b8aa29f 20727->20728 20729 1d38b8aa2a1 _DllMainCRTStartup 20727->20729 20728->20311 20730 1d38b8c90d4 _DllMainCRTStartup RtlFreeHeap 20729->20730 20730->20728 20732 1d38b8a9069 _DllMainCRTStartup 20731->20732 20733 1d38b8a90ce 20732->20733 20734 1d38b8a9099 _DllMainCRTStartup 20732->20734 20735 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20733->20735 20737 1d38b8a8470 _DllMainCRTStartup RtlFreeHeap 20734->20737 20736 1d38b8a90cc 20735->20736 20736->20311 20737->20736 20739 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20738->20739 20740 1d38b89c7bf _DllMainCRTStartup 20739->20740 21645 1d38b89ca54 20740->21645 20742 1d38b89c85d _DllMainCRTStartup 20743 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20742->20743 20744 1d38b89c8b1 20743->20744 20744->20311 20746 1d38b8c9468 malloc RtlFreeHeap 20745->20746 20749 1d38b89c97c _DllMainCRTStartup 20746->20749 20747 1d38b8c9428 free RtlFreeHeap 20748 1d38b89ca4b 20747->20748 20748->20311 20749->20747 20751 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 20750->20751 20752 1d38b89c8dc 20751->20752 20753 1d38b89d338 _DllMainCRTStartup RtlFreeHeap 20752->20753 20754 1d38b89c920 _DllMainCRTStartup 20752->20754 20753->20752 20755 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20754->20755 20756 1d38b89c952 20755->20756 20756->20311 20760 1d38b8a75a2 _DllMainCRTStartup 20757->20760 20758 1d38b8a763e _DllMainCRTStartup 20761 1d38b8a6c54 _DllMainCRTStartup RtlFreeHeap 20758->20761 20759 1d38b8a762a 20762 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20759->20762 20760->20758 20760->20759 20763 1d38b8a763c 20761->20763 20762->20763 20763->20311 20765 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 20764->20765 20766 1d38b8a3f7f _DllMainCRTStartup 20765->20766 20767 1d38b8a3ff3 20766->20767 20769 1d38b8a4002 _DllMainCRTStartup 20766->20769 20768 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20767->20768 20779 1d38b8a3ffd _DllMainCRTStartup 20768->20779 20770 1d38b8a401b 20769->20770 20771 1d38b8a402a _DllMainCRTStartup 20769->20771 20772 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20770->20772 20773 1d38b8a4052 20771->20773 20774 1d38b8a4043 20771->20774 20772->20779 21649 1d38b8c7330 20773->21649 20775 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20774->20775 20775->20779 20777 1d38b8a40e2 20778 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 20777->20778 20778->20779 20779->20311 20780 1d38b8a407a _DllMainCRTStartup 20780->20777 20781 1d38b8a4708 _DllMainCRTStartup RtlFreeHeap 20780->20781 20781->20777 20783 1d38b8a4134 _DllMainCRTStartup 20782->20783 21654 1d38b8c739c 20783->21654 20786 1d38b8a4708 _DllMainCRTStartup RtlFreeHeap 20787 1d38b8a4200 _DllMainCRTStartup 20786->20787 20787->20311 21659 1d38b89e02c 20788->21659 20790 1d38b89d681 20793 1d38b89d685 _DllMainCRTStartup 20790->20793 21663 1d38b89dc28 20790->21663 20793->20311 20794 1d38b8a5154 _DllMainCRTStartup RtlFreeHeap 20794->20793 20813 1d38b8c7438 20795->20813 20797 1d38b8c72ca 20819 1d38b8aa870 20797->20819 20800 1d38b8a4708 20801 1d38b8a4750 _DllMainCRTStartup 20800->20801 20802 1d38b8a4811 20801->20802 20853 1d38b8a52b4 20801->20853 20804 1d38b8a4863 20802->20804 20806 1d38b8a482f 20802->20806 20805 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 20804->20805 20809 1d38b8a4886 _DllMainCRTStartup 20805->20809 20860 1d38b8a425c 20806->20860 20808 1d38b8a485e 20808->20357 20810 1d38b8a425c _DllMainCRTStartup RtlFreeHeap 20809->20810 20811 1d38b8a491f 20810->20811 20812 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 20811->20812 20812->20808 20814 1d38b8c7484 20813->20814 20815 1d38b8c7465 20813->20815 20817 1d38b8c7594 _DllMainCRTStartup RtlFreeHeap 20814->20817 20822 1d38b8c7594 20815->20822 20818 1d38b8c747f strstr 20817->20818 20818->20797 20834 1d38b8aa618 20819->20834 20824 1d38b8c764e 20822->20824 20825 1d38b8c75c9 20822->20825 20823 1d38b8c76ab _DllMainCRTStartup 20828 1d38b8c9700 _snprintf RtlFreeHeap 20823->20828 20824->20823 20830 1d38b8c768c 20824->20830 20826 1d38b8c7626 _DllMainCRTStartup 20825->20826 20827 1d38b8c7607 20825->20827 20829 1d38b8c9700 _snprintf RtlFreeHeap 20826->20829 20831 1d38b8c9700 _snprintf RtlFreeHeap 20827->20831 20832 1d38b8c7624 _DllMainCRTStartup 20828->20832 20829->20832 20833 1d38b8c9700 _snprintf RtlFreeHeap 20830->20833 20831->20832 20832->20818 20833->20832 20837 1d38b8aa378 20834->20837 20836 1d38b8a3922 20836->20357 20836->20800 20838 1d38b8aa39e _DllMainCRTStartup 20837->20838 20839 1d38b8aa3a9 20838->20839 20841 1d38b8aa3bb _DllMainCRTStartup 20838->20841 20844 1d38b8a2238 20839->20844 20842 1d38b8a2238 _DllMainCRTStartup RtlFreeHeap 20841->20842 20843 1d38b8aa3b6 _DllMainCRTStartup 20841->20843 20842->20843 20843->20836 20845 1d38b8a22e5 20844->20845 20847 1d38b8a2255 _DllMainCRTStartup 20844->20847 20846 1d38b8a1e58 _DllMainCRTStartup RtlFreeHeap 20845->20846 20852 1d38b8a22ac 20845->20852 20846->20852 20847->20845 20848 1d38b8a226b 20847->20848 20849 1d38b8a1e58 _DllMainCRTStartup RtlFreeHeap 20848->20849 20850 1d38b8a2295 20849->20850 20851 1d38b8a1fc8 _DllMainCRTStartup RtlFreeHeap 20850->20851 20851->20852 20852->20843 20854 1d38b8a52d1 _DllMainCRTStartup 20853->20854 20855 1d38b8a530c 20854->20855 20856 1d38b8a52eb 20854->20856 20874 1d38b8a54e8 20855->20874 20870 1d38b8a5330 20856->20870 20859 1d38b8a530a 20859->20802 20861 1d38b8a427f 20860->20861 20862 1d38b8a4294 20860->20862 20897 1d38b8a51dc 20861->20897 20864 1d38b8a52b4 _DllMainCRTStartup RtlFreeHeap 20862->20864 20865 1d38b8a428d 20864->20865 20866 1d38b8a42b5 20865->20866 20904 1d38b8a42f8 20865->20904 20866->20808 20869 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20869->20866 20872 1d38b8a5371 _DllMainCRTStartup 20870->20872 20871 1d38b8a53b7 20871->20859 20872->20871 20884 1d38b89f2ec 20872->20884 20875 1d38b8a5511 _DllMainCRTStartup 20874->20875 20876 1d38b8a557d 20875->20876 20877 1d38b8a555f 20875->20877 20879 1d38b8a55d8 20876->20879 20880 1d38b8a5576 20876->20880 20882 1d38b8a563a _DllMainCRTStartup 20876->20882 20894 1d38b89f310 20877->20894 20881 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20879->20881 20880->20859 20881->20880 20882->20880 20883 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20882->20883 20883->20880 20887 1d38b89f33c 20884->20887 20888 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 20887->20888 20889 1d38b89f361 _DllMainCRTStartup 20888->20889 20890 1d38b89d090 _DllMainCRTStartup RtlFreeHeap 20889->20890 20891 1d38b89f3fe 20890->20891 20895 1d38b89f33c _DllMainCRTStartup RtlFreeHeap 20894->20895 20896 1d38b89f336 20895->20896 20896->20880 20898 1d38b8a51fd _DllMainCRTStartup 20897->20898 20899 1d38b8a5264 20898->20899 20900 1d38b8a5249 20898->20900 20908 1d38b8a5154 20899->20908 20902 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 20900->20902 20903 1d38b8a5260 20902->20903 20903->20865 20907 1d38b8a431d _DllMainCRTStartup 20904->20907 20905 1d38b8a42d0 20905->20866 20905->20869 20907->20905 20912 1d38b8a4be4 20907->20912 20910 1d38b8a516c _DllMainCRTStartup 20908->20910 20909 1d38b8a5188 20909->20903 20910->20909 20911 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 20910->20911 20911->20909 20913 1d38b8a4caf 20912->20913 20915 1d38b8a4ccc 20913->20915 20916 1d38b8a4adc 20913->20916 20915->20907 20922 1d38b8ca110 20921->20922 20923 1d38b8ca13f 20922->20923 20925 1d38b8ca16a 20922->20925 20924 1d38b8cb714 _errno RtlFreeHeap 20923->20924 20935 1d38b8ca144 _invalid_parameter_noinfo _ioinit fseek 20924->20935 20949 1d38b8cfb9c 20925->20949 20927 1d38b8ca16f 20928 1d38b8ca17c 20927->20928 20929 1d38b8ca189 20927->20929 20930 1d38b8cb714 _errno RtlFreeHeap 20928->20930 20931 1d38b8ca1b0 20929->20931 20932 1d38b8ca18e 20929->20932 20930->20935 20957 1d38b8cfcd0 20931->20957 20934 1d38b8cb714 _errno RtlFreeHeap 20932->20934 20934->20935 20935->20379 20937 1d38b8ca3ae 20936->20937 20942 1d38b8ca3c4 _invalid_parameter_noinfo fseek 20936->20942 20938 1d38b8ca3bf 20937->20938 20939 1d38b8ca3d1 fseek 20937->20939 20937->20942 20940 1d38b8cb714 _errno RtlFreeHeap 20938->20940 21014 1d38b8ca1f4 20939->21014 20940->20942 20942->20386 20944 1d38b8ca0c9 20943->20944 20946 1d38b8ca0dd fseek 20943->20946 20945 1d38b8cb714 _errno RtlFreeHeap 20944->20945 20948 1d38b8ca0ce _invalid_parameter_noinfo fseek 20945->20948 20946->20948 21030 1d38b8ca02c 20946->21030 20948->20388 20950 1d38b8cd958 _lock RtlFreeHeap 20949->20950 20956 1d38b8cfbb5 20950->20956 20951 1d38b8cfc3d 20952 1d38b8ce378 _malloc_crt RtlFreeHeap 20951->20952 20953 1d38b8cfc31 _setmbcp 20952->20953 20953->20927 20954 1d38b8cda24 _mtinitlocknum RtlFreeHeap 20954->20956 20956->20951 20956->20953 20956->20954 20972 1d38b8cf784 20956->20972 20958 1d38b8cfd0a 20957->20958 20959 1d38b8cfd21 20958->20959 20971 1d38b8cfec2 20958->20971 20977 1d38b8d4a88 20958->20977 20960 1d38b8cb714 _errno RtlFreeHeap 20959->20960 20961 1d38b8cfd26 _invalid_parameter_noinfo 20960->20961 20961->20935 20962 1d38b8cff27 20992 1d38b8d4a54 20962->20992 20965 1d38b8cfe82 20965->20959 20983 1d38b8d4bbc 20965->20983 20967 1d38b8cfebe 20968 1d38b8d4bbc _openfile RtlFreeHeap 20967->20968 20967->20971 20969 1d38b8cfee1 20968->20969 20970 1d38b8d4bbc _openfile RtlFreeHeap 20969->20970 20969->20971 20970->20971 20971->20959 20971->20962 20973 1d38b8cf792 20972->20973 20974 1d38b8cf7a5 20972->20974 20975 1d38b8cd958 _lock RtlFreeHeap 20973->20975 20976 1d38b8cf79a 20975->20976 20976->20956 20978 1d38b8d4a90 20977->20978 20979 1d38b8cbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 20978->20979 20981 1d38b8d4ab4 _invalid_parameter_noinfo _openfile 20978->20981 20980 1d38b8d4ac8 20979->20980 20980->20981 20982 1d38b8cb714 _errno RtlFreeHeap 20980->20982 20981->20965 20982->20981 20984 1d38b8d4bc4 20983->20984 20985 1d38b8cbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 20984->20985 20986 1d38b8d4bed 20985->20986 20987 1d38b8d4c02 20986->20987 20989 1d38b8d4c15 20986->20989 20991 1d38b8d4c10 _invalid_parameter_noinfo 20986->20991 20995 1d38b8d5eac 20987->20995 20990 1d38b8cb714 _errno RtlFreeHeap 20989->20990 20989->20991 20990->20991 20991->20967 21000 1d38b8d48f0 20992->21000 20994 1d38b8d4a81 20994->20961 20996 1d38b8d5ee6 20995->20996 20997 1d38b8d5eb9 20995->20997 20997->20996 20998 1d38b8cb714 _errno RtlFreeHeap 20997->20998 20999 1d38b8d5ec3 _invalid_parameter_noinfo 20998->20999 20999->20991 21001 1d38b8d4931 21000->21001 21002 1d38b8d4919 21000->21002 21001->21002 21005 1d38b8d495e 21001->21005 21003 1d38b8cb714 _errno RtlFreeHeap 21002->21003 21004 1d38b8d491e _invalid_parameter_noinfo _unlock_fhandle 21003->21004 21004->20994 21007 1d38b8d49cc 21005->21007 21008 1d38b8c99d8 _sopen_nolock RtlFreeHeap 21007->21008 21009 1d38b8d49f6 21008->21009 21010 1d38b8d56a8 _wsopen_nolock RtlFreeHeap 21009->21010 21013 1d38b8d49fa 21009->21013 21011 1d38b8d4a33 21010->21011 21012 1d38b8c9428 free RtlFreeHeap 21011->21012 21012->21013 21013->21004 21017 1d38b8ca222 21014->21017 21019 1d38b8ca231 _invalid_parameter_noinfo 21014->21019 21015 1d38b8ca22c 21016 1d38b8cb714 _errno RtlFreeHeap 21015->21016 21016->21019 21017->21015 21017->21019 21022 1d38b8ca26e _setmbcp 21017->21022 21018 1d38b8cbd98 write_char RtlFreeHeap 21018->21022 21019->20942 21021 1d38b8cf624 _fileno RtlFreeHeap 21021->21022 21022->21018 21022->21019 21022->21021 21023 1d38b8d0504 _wsopen_nolock RtlFreeHeap 21022->21023 21024 1d38b8cfa2c 21022->21024 21023->21022 21025 1d38b8cfa49 21024->21025 21029 1d38b8cfa6e 21024->21029 21026 1d38b8cf624 _fileno RtlFreeHeap 21025->21026 21025->21029 21027 1d38b8cfa60 21026->21027 21028 1d38b8d0504 _wsopen_nolock RtlFreeHeap 21027->21028 21028->21029 21029->21022 21031 1d38b8ca041 21030->21031 21032 1d38b8ca055 21030->21032 21033 1d38b8cb714 _errno RtlFreeHeap 21031->21033 21034 1d38b8cfa2c _flush RtlFreeHeap 21032->21034 21042 1d38b8ca046 _invalid_parameter_noinfo 21032->21042 21033->21042 21035 1d38b8ca060 21034->21035 21044 1d38b8cf9a8 21035->21044 21038 1d38b8cf624 _fileno RtlFreeHeap 21039 1d38b8ca072 21038->21039 21048 1d38b8cf828 21039->21048 21042->20948 21045 1d38b8cf9b7 21044->21045 21046 1d38b8ca06a 21044->21046 21045->21046 21047 1d38b8c9428 free RtlFreeHeap 21045->21047 21046->21038 21047->21046 21049 1d38b8cf841 21048->21049 21050 1d38b8cf859 21048->21050 21052 1d38b8cb6a4 __doserrno RtlFreeHeap 21049->21052 21051 1d38b8cf8c2 21050->21051 21057 1d38b8cf88b 21050->21057 21053 1d38b8cb6a4 __doserrno RtlFreeHeap 21051->21053 21054 1d38b8cf846 21052->21054 21056 1d38b8cf8c7 21053->21056 21055 1d38b8cb714 _errno RtlFreeHeap 21054->21055 21058 1d38b8cb714 _errno RtlFreeHeap 21056->21058 21059 1d38b8d438c __lock_fhandle RtlFreeHeap 21057->21059 21061 1d38b8cf892 21059->21061 21062 1d38b8cf89e 21061->21062 21063 1d38b8cf8a9 21061->21063 21096 1d38b89f33c _DllMainCRTStartup RtlFreeHeap 21095->21096 21097 1d38b89f450 21096->21097 21097->20400 21099 1d38b8caaa1 21098->21099 21100 1d38b8caa8c 21098->21100 21099->21100 21102 1d38b8caaa7 fseek 21099->21102 21101 1d38b8cb714 _errno RtlFreeHeap 21100->21101 21104 1d38b8caa91 _invalid_parameter_noinfo fseek 21101->21104 21115 1d38b8ca9b8 21102->21115 21104->20401 21106 1d38b8cab0c fseek 21105->21106 21107 1d38b8caaf6 21105->21107 21177 1d38b8cab34 21106->21177 21108 1d38b8cb714 _errno RtlFreeHeap 21107->21108 21110 1d38b8caafb _invalid_parameter_noinfo fseek 21108->21110 21110->20404 21116 1d38b8ca9eb 21115->21116 21117 1d38b8ca9db 21115->21117 21122 1d38b8ca9fe 21116->21122 21127 1d38b8d186c 21116->21127 21118 1d38b8cb714 _errno RtlFreeHeap 21117->21118 21121 1d38b8ca9e0 21118->21121 21120 1d38b8cfa2c _flush RtlFreeHeap 21123 1d38b8caa0a 21120->21123 21121->21104 21122->21120 21124 1d38b8cf624 _fileno RtlFreeHeap 21123->21124 21125 1d38b8caa36 21124->21125 21149 1d38b8d1b60 21125->21149 21128 1d38b8d188e 21127->21128 21129 1d38b8d18ab 21128->21129 21130 1d38b8d18c3 21128->21130 21131 1d38b8cb714 _errno RtlFreeHeap 21129->21131 21132 1d38b8cf624 _fileno RtlFreeHeap 21130->21132 21148 1d38b8d18b0 _invalid_parameter_noinfo setSBUpLow 21131->21148 21133 1d38b8d18c8 21132->21133 21134 1d38b8d1b60 _ftell_nolock RtlFreeHeap 21133->21134 21135 1d38b8d18e2 21134->21135 21136 1d38b8d193e 21135->21136 21137 1d38b8d1a5a 21135->21137 21135->21148 21140 1d38b8d1953 21136->21140 21142 1d38b8d1a30 21136->21142 21138 1d38b8d1a5e 21137->21138 21137->21142 21139 1d38b8cb714 _errno RtlFreeHeap 21138->21139 21139->21148 21141 1d38b8d1cd8 _ftell_nolock RtlFreeHeap 21140->21141 21140->21148 21146 1d38b8d196f 21141->21146 21143 1d38b8d1b60 _ftell_nolock RtlFreeHeap 21142->21143 21142->21148 21144 1d38b8d1aa4 21143->21144 21145 1d38b8d1b60 _ftell_nolock RtlFreeHeap 21144->21145 21144->21148 21145->21148 21147 1d38b8d1b60 _ftell_nolock RtlFreeHeap 21146->21147 21146->21148 21147->21148 21148->21122 21150 1d38b8d1b83 21149->21150 21153 1d38b8d1b9b 21149->21153 21152 1d38b8cb6a4 __doserrno RtlFreeHeap 21150->21152 21151 1d38b8d1c12 21154 1d38b8cb6a4 __doserrno RtlFreeHeap 21151->21154 21155 1d38b8d1b88 21152->21155 21153->21151 21156 1d38b8d1bcd 21153->21156 21157 1d38b8d1c17 21154->21157 21158 1d38b8cb714 _errno RtlFreeHeap 21155->21158 21159 1d38b8d438c __lock_fhandle RtlFreeHeap 21156->21159 21160 1d38b8cb714 _errno RtlFreeHeap 21157->21160 21166 1d38b8d1b90 _invalid_parameter_noinfo _unlock_fhandle 21158->21166 21161 1d38b8d1bd4 21159->21161 21160->21166 21162 1d38b8d1be0 21161->21162 21163 1d38b8d1bf1 21161->21163 21169 1d38b8d1c40 21162->21169 21165 1d38b8cb714 _errno RtlFreeHeap 21163->21165 21167 1d38b8d1bf6 21165->21167 21166->21121 21168 1d38b8cb6a4 __doserrno RtlFreeHeap 21167->21168 21168->21166 21170 1d38b8d46c8 _chsize_nolock RtlFreeHeap 21169->21170 21171 1d38b8d1c5e 21170->21171 21172 1d38b8d1c64 21171->21172 21175 1d38b8d1c74 21171->21175 21173 1d38b8cb714 _errno RtlFreeHeap 21172->21173 21174 1d38b8d1c69 21173->21174 21174->21166 21175->21174 21176 1d38b8cb6c4 _dosmaperr RtlFreeHeap 21175->21176 21176->21174 21178 1d38b8cab56 21177->21178 21179 1d38b8cf624 _fileno RtlFreeHeap 21178->21179 21180 1d38b8cab73 21179->21180 21181 1d38b8d1cd8 _ftell_nolock RtlFreeHeap 21180->21181 21182 1d38b8cab8f 21181->21182 21183 1d38b8cad12 21182->21183 21184 1d38b8cabf7 21182->21184 21195 1d38b8cab97 setSBUpLow 21182->21195 21185 1d38b8cad16 21183->21185 21189 1d38b8cace7 21183->21189 21186 1d38b8cac0c 21184->21186 21184->21189 21187 1d38b8cb714 _errno RtlFreeHeap 21185->21187 21188 1d38b8d1cd8 _ftell_nolock RtlFreeHeap 21186->21188 21186->21195 21187->21195 21192 1d38b8cac24 21188->21192 21190 1d38b8d1cd8 _ftell_nolock RtlFreeHeap 21189->21190 21189->21195 21191 1d38b8cad61 21190->21191 21193 1d38b8d1cd8 _ftell_nolock RtlFreeHeap 21191->21193 21191->21195 21194 1d38b8d1cd8 _ftell_nolock RtlFreeHeap 21192->21194 21192->21195 21193->21195 21194->21195 21195->21110 21199 1d38b8a8470 21196->21199 21200 1d38b8c9468 malloc RtlFreeHeap 21199->21200 21201 1d38b8a8491 21200->21201 21201->20439 21203 1d38b8a8470 _DllMainCRTStartup RtlFreeHeap 21202->21203 21204 1d38b8a85d3 21203->21204 21204->20444 21216 1d38b8c88c4 21205->21216 21207 1d38b8c8825 _DllMainCRTStartup 21208 1d38b8c8856 21207->21208 21209 1d38b8c8836 21207->21209 21212 1d38b8c8854 21207->21212 21211 1d38b8c9700 _snprintf RtlFreeHeap 21208->21211 21210 1d38b8c9700 _snprintf RtlFreeHeap 21209->21210 21210->21212 21211->21212 21212->20474 21214 1d38b89f33c _DllMainCRTStartup RtlFreeHeap 21213->21214 21215 1d38b89f429 21214->21215 21215->20474 21217 1d38b8c88de 21216->21217 21218 1d38b8c896b 21217->21218 21219 1d38b8c9700 _snprintf RtlFreeHeap 21217->21219 21218->21207 21219->21218 21221 1d38b8ace98 21220->21221 21222 1d38b8c88c4 _DllMainCRTStartup RtlFreeHeap 21221->21222 21223 1d38b8ace9c 21221->21223 21222->21223 21223->20516 21225 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 21224->21225 21227 1d38b8a25da _DllMainCRTStartup 21225->21227 21226 1d38b8a27f2 21228 1d38b8a80f0 _DllMainCRTStartup RtlFreeHeap 21226->21228 21227->21226 21231 1d38b89f280 21227->21231 21229 1d38b8a2846 21228->21229 21229->20545 21236 1d38b8c990c 21231->21236 21234 1d38b89f33c _DllMainCRTStartup RtlFreeHeap 21235 1d38b89f2e2 21234->21235 21235->21226 21239 1d38b8c989c 21236->21239 21238 1d38b89f2c3 21238->21234 21240 1d38b8c98f1 21239->21240 21241 1d38b8c98aa 21239->21241 21242 1d38b8cb714 _errno RtlFreeHeap 21240->21242 21241->21240 21243 1d38b8c98b4 21241->21243 21246 1d38b8c98e9 _invalid_parameter_noinfo 21242->21246 21248 1d38b8c97b4 21243->21248 21245 1d38b8c98d8 21245->21246 21247 1d38b8cb714 _errno RtlFreeHeap 21245->21247 21246->21238 21247->21246 21251 1d38b8c97f0 memcpy_s 21248->21251 21249 1d38b8c97f5 21250 1d38b8cb714 _errno RtlFreeHeap 21249->21250 21252 1d38b8c97fa _invalid_parameter_noinfo 21250->21252 21251->21249 21253 1d38b8c9814 21251->21253 21252->21245 21253->21252 21254 1d38b8cbd98 write_char RtlFreeHeap 21253->21254 21254->21252 21256 1d38b8c9468 malloc RtlFreeHeap 21255->21256 21257 1d38b8a5fa9 _DllMainCRTStartup 21256->21257 21257->20549 21263 1d38b8c9924 21258->21263 21260 1d38b89d369 21261 1d38b89d395 21260->21261 21262 1d38b8c990c _DllMainCRTStartup RtlFreeHeap 21260->21262 21261->20557 21262->21261 21264 1d38b8c993c memcpy_s 21263->21264 21265 1d38b8cb714 _errno RtlFreeHeap 21264->21265 21266 1d38b8c997a _invalid_parameter_noinfo 21264->21266 21265->21266 21266->21260 21270 1d38b8a6331 21267->21270 21268 1d38b8a5c0e 21268->20311 21269 1d38b8c9428 RtlFreeHeap free 21269->21270 21270->21268 21270->21269 21272 1d38b8c826c _DllMainCRTStartup RtlFreeHeap 21271->21272 21273 1d38b8c860d 21272->21273 21274 1d38b8c8640 21273->21274 21275 1d38b8c8657 21273->21275 21278 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 21274->21278 21276 1d38b8c867f 21275->21276 21277 1d38b8c8668 21275->21277 21279 1d38b8a7f80 _DllMainCRTStartup RtlFreeHeap 21276->21279 21280 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 21277->21280 21283 1d38b8c825a 21278->21283 21281 1d38b8c8689 _DllMainCRTStartup 21279->21281 21280->21283 21282 1d38b8c88c4 _DllMainCRTStartup RtlFreeHeap 21281->21282 21282->21283 21283->20576 21287 1d38b8ca427 21284->21287 21285 1d38b8ca42c 21286 1d38b8cb714 _errno RtlFreeHeap 21285->21286 21289 1d38b8ca431 _invalid_parameter_noinfo 21285->21289 21286->21289 21287->21285 21288 1d38b8ca47a 21287->21288 21288->21289 21290 1d38b8cb714 _errno RtlFreeHeap 21288->21290 21289->20592 21290->21289 21292 1d38b89f33c _DllMainCRTStartup RtlFreeHeap 21291->21292 21293 1d38b89f47f 21292->21293 21293->20603 21295 1d38b8c9468 malloc RtlFreeHeap 21294->21295 21296 1d38b8a844a _DllMainCRTStartup 21295->21296 21296->20613 21298 1d38b8caf12 21297->21298 21299 1d38b8caf1c 21297->21299 21305 1d38b8c99d8 21298->21305 21304 1d38b8a3323 21299->21304 21319 1d38b8d22e0 21299->21319 21303 1d38b8c9428 free RtlFreeHeap 21303->21304 21304->20616 21306 1d38b8c99fe 21305->21306 21307 1d38b8c9a16 21305->21307 21308 1d38b8cb714 _errno RtlFreeHeap 21306->21308 21307->21306 21310 1d38b8c9a1b __crtIsPackagedApp 21307->21310 21309 1d38b8c9a03 _invalid_parameter_noinfo 21308->21309 21309->21299 21311 1d38b8c9a5d 21310->21311 21312 1d38b8c9a6e 21310->21312 21314 1d38b8cb6c4 _dosmaperr RtlFreeHeap 21311->21314 21313 1d38b8ce378 _malloc_crt RtlFreeHeap 21312->21313 21315 1d38b8c9a79 21313->21315 21314->21309 21315->21309 21316 1d38b8cb6c4 _dosmaperr RtlFreeHeap 21315->21316 21317 1d38b8c9aac 21316->21317 21318 1d38b8c9428 free RtlFreeHeap 21317->21318 21318->21309 21320 1d38b8d22ec 21319->21320 21321 1d38b8caf32 21320->21321 21322 1d38b8cb6c4 _dosmaperr RtlFreeHeap 21320->21322 21321->21303 21322->21321 21342 1d38b8acf00 21323->21342 21326 1d38b8caf48 21327 1d38b8caf5a 21326->21327 21331 1d38b8caf64 21326->21331 21329 1d38b8c99d8 _sopen_nolock RtlFreeHeap 21327->21329 21329->21331 21333 1d38b8caf68 21331->21333 21363 1d38b8d2314 21331->21363 21332 1d38b8c9428 free RtlFreeHeap 21332->21333 21333->20635 21335 1d38b8cae44 21334->21335 21336 1d38b8cae3a 21334->21336 21341 1d38b8cae48 21335->21341 21367 1d38b8d22b0 21335->21367 21337 1d38b8c99d8 _sopen_nolock RtlFreeHeap 21336->21337 21337->21335 21340 1d38b8c9428 free RtlFreeHeap 21340->21341 21341->20635 21343 1d38b8c9468 malloc RtlFreeHeap 21342->21343 21344 1d38b8acf1d 21343->21344 21345 1d38b8c9700 _snprintf RtlFreeHeap 21344->21345 21346 1d38b8acf3d 21345->21346 21347 1d38b8c9428 free RtlFreeHeap 21346->21347 21352 1d38b8acf5c 21347->21352 21348 1d38b8a2ee8 21348->21326 21349 1d38b8c9468 malloc RtlFreeHeap 21349->21352 21350 1d38b8c9700 _snprintf RtlFreeHeap 21350->21352 21352->21348 21352->21349 21352->21350 21353 1d38b8c9428 free RtlFreeHeap 21352->21353 21354 1d38b8ad08c 21352->21354 21353->21352 21355 1d38b8c9468 malloc RtlFreeHeap 21354->21355 21356 1d38b8ad0ae 21355->21356 21357 1d38b8c9700 _snprintf RtlFreeHeap 21356->21357 21358 1d38b8ad0d8 21357->21358 21359 1d38b8acf00 _DllMainCRTStartup RtlFreeHeap 21358->21359 21360 1d38b8ad0ec 21359->21360 21361 1d38b8c9428 free RtlFreeHeap 21360->21361 21362 1d38b8ad0f6 21361->21362 21362->21352 21364 1d38b8d231e 21363->21364 21365 1d38b8caf7a 21364->21365 21366 1d38b8cb6c4 _dosmaperr RtlFreeHeap 21364->21366 21365->21332 21366->21365 21368 1d38b8d22ba 21367->21368 21369 1d38b8cae5a 21368->21369 21370 1d38b8cb6c4 _dosmaperr RtlFreeHeap 21368->21370 21369->21340 21370->21369 21372 1d38b8c90fd _DllMainCRTStartup 21371->21372 21373 1d38b8c8ff9 21372->21373 21377 1d38b8c92bc 21372->21377 21373->20311 21378 1d38b8c9468 malloc RtlFreeHeap 21377->21378 21379 1d38b8c92db 21378->21379 21380 1d38b8c9468 malloc RtlFreeHeap 21379->21380 21381 1d38b8c92fa 21380->21381 21382 1d38b8c9468 malloc RtlFreeHeap 21381->21382 21383 1d38b8c9331 21382->21383 21384 1d38b8c9700 _snprintf RtlFreeHeap 21383->21384 21385 1d38b8c935d 21384->21385 21386 1d38b8c9468 malloc RtlFreeHeap 21385->21386 21387 1d38b8c91b9 21386->21387 21388 1d38b8c7f5c 21387->21388 21389 1d38b8c7f82 _DllMainCRTStartup 21388->21389 21391 1d38b8c7f99 21389->21391 21392 1d38b8c7eb4 21389->21392 21391->21373 21393 1d38b8c7ee4 21392->21393 21396 1d38b8c8078 21393->21396 21397 1d38b8c8088 21396->21397 21398 1d38b8c7f19 21396->21398 21399 1d38b8a51dc _DllMainCRTStartup RtlFreeHeap 21397->21399 21398->21391 21399->21398 21403 1d38b8a7291 21400->21403 21401 1d38b8a731e 21406 1d38b8a7335 21401->21406 21407 1d38b8a7329 21401->21407 21402 1d38b8a734c 21404 1d38b8a7375 21402->21404 21405 1d38b8a7377 _DllMainCRTStartup 21402->21405 21403->21401 21403->21402 21411 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 21404->21411 21413 1d38b8a6c54 21405->21413 21410 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 21406->21410 21408 1d38b89f410 _DllMainCRTStartup RtlFreeHeap 21407->21408 21412 1d38b8a6fd1 21408->21412 21410->21412 21411->21412 21412->20311 21415 1d38b8a6c99 21413->21415 21414 1d38b8a6e80 21417 1d38b89f410 _DllMainCRTStartup RtlFreeHeap 21414->21417 21415->21414 21416 1d38b8a6d14 21415->21416 21419 1d38b8a6c9d _DllMainCRTStartup 21415->21419 21418 1d38b8c9468 malloc RtlFreeHeap 21416->21418 21416->21419 21417->21419 21418->21419 21419->21412 21421 1d38b8a3dbf _DllMainCRTStartup 21420->21421 21422 1d38b8c72a0 _DllMainCRTStartup RtlFreeHeap 21421->21422 21423 1d38b8a3e8c 21422->21423 21424 1d38b8a3e90 _DllMainCRTStartup 21423->21424 21425 1d38b8a4708 _DllMainCRTStartup RtlFreeHeap 21423->21425 21424->20668 21426 1d38b8a3ef6 _DllMainCRTStartup 21425->21426 21428 1d38b8a60bc 21426->21428 21429 1d38b8c9468 malloc RtlFreeHeap 21428->21429 21430 1d38b8a60e0 21429->21430 21431 1d38b8c9700 _snprintf RtlFreeHeap 21430->21431 21432 1d38b8a6182 _DllMainCRTStartup 21431->21432 21432->21424 21434 1d38b8cd958 _lock RtlFreeHeap 21433->21434 21435 1d38b8d8b5b 21434->21435 21438 1d38b8d8b7c 21435->21438 21437 1d38b8d8b66 _setmbcp 21437->20673 21439 1d38b8d8bab 21438->21439 21443 1d38b8d8ba3 _invalid_parameter_noinfo 21438->21443 21440 1d38b8d8bb0 21439->21440 21442 1d38b8d8bc7 21439->21442 21445 1d38b8d8c26 _putenv_helper 21439->21445 21441 1d38b8cb714 _errno RtlFreeHeap 21440->21441 21441->21443 21471 1d38b8d9728 21442->21471 21443->21437 21445->21440 21449 1d38b8d8c51 21445->21449 21446 1d38b8d8bf8 21448 1d38b8ce2f8 _calloc_crt RtlFreeHeap 21446->21448 21447 1d38b8d8bd3 _putenv_helper 21447->21440 21447->21446 21454 1d38b8d8c11 21448->21454 21450 1d38b8ce2f8 _calloc_crt RtlFreeHeap 21449->21450 21451 1d38b8d8c65 21450->21451 21451->21443 21477 1d38b8d4fbc 21451->21477 21452 1d38b8d4fbc _putenv_helper RtlFreeHeap 21455 1d38b8d8ca6 21452->21455 21454->21443 21454->21452 21484 1d38b8d8fb8 21455->21484 21457 1d38b8d8cb4 21458 1d38b8d8cb8 21457->21458 21461 1d38b8d8ccf 21457->21461 21458->21443 21459 1d38b8c9428 free RtlFreeHeap 21458->21459 21459->21443 21460 1d38b8d8d07 21462 1d38b8cb714 _errno RtlFreeHeap 21460->21462 21461->21443 21461->21460 21463 1d38b8ce2f8 _calloc_crt RtlFreeHeap 21461->21463 21462->21443 21468 1d38b8d8d50 _putenv_helper 21463->21468 21464 1d38b8d8d77 21466 1d38b8c9428 free RtlFreeHeap 21464->21466 21465 1d38b8d8dc5 21522 1d38b8d9350 21465->21522 21466->21460 21468->21443 21468->21464 21468->21465 21472 1d38b8d9730 21471->21472 21473 1d38b8cbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21472->21473 21474 1d38b8d9751 21473->21474 21475 1d38b8cb714 _errno RtlFreeHeap 21474->21475 21476 1d38b8d975d _invalid_parameter_noinfo strchr 21474->21476 21475->21476 21476->21447 21478 1d38b8d4fc7 21477->21478 21479 1d38b8d4fd1 21477->21479 21478->21479 21481 1d38b8d4fed 21478->21481 21480 1d38b8cb714 _errno RtlFreeHeap 21479->21480 21483 1d38b8d4fd9 _invalid_parameter_noinfo 21480->21483 21482 1d38b8cb714 _errno RtlFreeHeap 21481->21482 21481->21483 21482->21483 21483->21454 21485 1d38b8d8fe1 21484->21485 21486 1d38b8d8ff6 21484->21486 21488 1d38b8cb714 _errno RtlFreeHeap 21485->21488 21487 1d38b8d90d8 21486->21487 21490 1d38b8d9728 _putenv_helper RtlFreeHeap 21486->21490 21489 1d38b8cb714 _errno RtlFreeHeap 21487->21489 21515 1d38b8d8fe6 _invalid_parameter_noinfo 21488->21515 21489->21515 21492 1d38b8d900f 21490->21492 21491 1d38b8d904f 21493 1d38b8d90fe 21491->21493 21494 1d38b8d90cf 21491->21494 21499 1d38b8d9133 21491->21499 21492->21487 21492->21491 21495 1d38b8ce2f8 _calloc_crt RtlFreeHeap 21492->21495 21497 1d38b8ce378 _malloc_crt RtlFreeHeap 21493->21497 21493->21515 21559 1d38b8d9c2c 21494->21559 21504 1d38b8d906e 21495->21504 21500 1d38b8d9111 21497->21500 21509 1d38b8d9199 21499->21509 21499->21515 21567 1d38b8d9d20 21499->21567 21500->21499 21508 1d38b8ce378 _malloc_crt RtlFreeHeap 21500->21508 21500->21515 21501 1d38b8d923d 21503 1d38b8d932b 21501->21503 21511 1d38b8d9234 21501->21511 21505 1d38b8c9428 free RtlFreeHeap 21503->21505 21504->21491 21553 1d38b8d9bbc 21504->21553 21513 1d38b8d9333 _invoke_watson 21505->21513 21506 1d38b8c9428 free RtlFreeHeap 21506->21509 21508->21499 21509->21501 21509->21506 21509->21511 21510 1d38b8d9314 21512 1d38b8c9428 free RtlFreeHeap 21510->21512 21510->21515 21511->21510 21514 1d38b8ce2f8 _calloc_crt RtlFreeHeap 21511->21514 21511->21515 21512->21515 21516 1d38b8d92b6 21514->21516 21515->21457 21516->21510 21517 1d38b8d4fbc _putenv_helper RtlFreeHeap 21516->21517 21518 1d38b8d92d5 21517->21518 21518->21513 21519 1d38b8cb714 _errno RtlFreeHeap 21518->21519 21521 1d38b8d9306 21518->21521 21519->21521 21526 1d38b8d938d wcschr 21522->21526 21523 1d38b8d9483 21524 1d38b8cb714 _errno RtlFreeHeap 21523->21524 21525 1d38b8d8dd0 21524->21525 21525->21443 21526->21523 21527 1d38b8d94a9 21526->21527 21528 1d38b8d94e3 21526->21528 21529 1d38b8d9465 21526->21529 21527->21525 21531 1d38b8ce378 _malloc_crt RtlFreeHeap 21527->21531 21536 1d38b8d94be 21527->21536 21528->21525 21541 1d38b8d9553 21528->21541 21616 1d38b8d9ea0 21528->21616 21601 1d38b8da264 21529->21601 21531->21536 21532 1d38b8d960d 21544 1d38b8d9601 _putenv_helper 21532->21544 21533 1d38b8ce378 _malloc_crt RtlFreeHeap 21533->21528 21536->21525 21536->21528 21536->21533 21539 1d38b8c9428 free RtlFreeHeap 21539->21541 21541->21532 21541->21539 21541->21544 21544->21525 21554 1d38b8d9bd3 21553->21554 21558 1d38b8d9bfb _invoke_watson 21553->21558 21555 1d38b8c9468 malloc RtlFreeHeap 21554->21555 21556 1d38b8d9be4 21555->21556 21557 1d38b8d4fbc _putenv_helper RtlFreeHeap 21556->21557 21556->21558 21557->21558 21558->21504 21560 1d38b8d90d4 21559->21560 21562 1d38b8d9c54 21559->21562 21560->21487 21560->21499 21561 1d38b8ce2f8 _calloc_crt RtlFreeHeap 21561->21562 21562->21560 21562->21561 21563 1d38b8d9d10 21562->21563 21565 1d38b8d8fb8 __crtsetenv RtlFreeHeap 21562->21565 21566 1d38b8c9428 free RtlFreeHeap 21562->21566 21564 1d38b8c9428 free RtlFreeHeap 21563->21564 21564->21560 21565->21562 21566->21562 21568 1d38b8d9d28 21567->21568 21569 1d38b8cbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21568->21569 21570 1d38b8d9d59 21569->21570 21571 1d38b8d9d6f 21570->21571 21572 1d38b8d9d86 21570->21572 21574 1d38b8d9d5e _invalid_parameter_noinfo 21570->21574 21573 1d38b8cb714 _errno RtlFreeHeap 21571->21573 21575 1d38b8d9d90 21572->21575 21576 1d38b8d9da2 21572->21576 21573->21574 21574->21499 21577 1d38b8cb714 _errno RtlFreeHeap 21575->21577 21578 1d38b8d9dc2 21576->21578 21579 1d38b8d9dad 21576->21579 21577->21574 21598 1d38b8dad60 21578->21598 21602 1d38b8da27e 21601->21602 21633 1d38b8a17f6 _DllMainCRTStartup 21632->21633 21634 1d38b8a18e1 21633->21634 21635 1d38b89d338 _DllMainCRTStartup RtlFreeHeap 21633->21635 21634->20710 21635->21633 21637 1d38b8a11f1 21636->21637 21638 1d38b8aa870 _DllMainCRTStartup RtlFreeHeap 21637->21638 21639 1d38b8a1265 21638->21639 21640 1d38b8a1269 21639->21640 21642 1d38b8a648c 21639->21642 21640->20726 21643 1d38b8a60bc _DllMainCRTStartup RtlFreeHeap 21642->21643 21644 1d38b8a64d3 21643->21644 21644->21640 21646 1d38b89ca6a 21645->21646 21647 1d38b89caa8 21646->21647 21648 1d38b8c9468 malloc RtlFreeHeap 21646->21648 21647->20742 21648->21647 21650 1d38b8c7438 _DllMainCRTStartup RtlFreeHeap 21649->21650 21651 1d38b8c735b 21650->21651 21652 1d38b8a25a8 _DllMainCRTStartup RtlFreeHeap 21651->21652 21653 1d38b8c7392 21652->21653 21653->20780 21655 1d38b8c7438 _DllMainCRTStartup RtlFreeHeap 21654->21655 21656 1d38b8c73c6 21655->21656 21657 1d38b8aa618 _DllMainCRTStartup RtlFreeHeap 21656->21657 21658 1d38b8a41fc 21657->21658 21658->20786 21658->20787 21661 1d38b89e053 _DllMainCRTStartup 21659->21661 21660 1d38b89e55a _DllMainCRTStartup 21660->20790 21661->21660 21662 1d38b89f310 _DllMainCRTStartup RtlFreeHeap 21661->21662 21662->21660 21669 1d38b89dc5e _DllMainCRTStartup 21663->21669 21664 1d38b89f2ec _DllMainCRTStartup RtlFreeHeap 21664->21669 21665 1d38b89d9e4 RtlFreeHeap _DllMainCRTStartup 21665->21669 21666 1d38b89d691 21666->20793 21666->20794 21667 1d38b89df39 21668 1d38b89f280 _DllMainCRTStartup RtlFreeHeap 21667->21668 21668->21666 21669->21664 21669->21665 21669->21666 21669->21667 21670 1d38b89df7f 21669->21670 21671 1d38b89f410 _DllMainCRTStartup RtlFreeHeap 21670->21671 21671->21666 21677 1d38b8a9323 _DllMainCRTStartup 21672->21677 21673 1d38b8a9625 21673->19634 21674 1d38b8a6c54 _DllMainCRTStartup RtlFreeHeap 21674->21677 21675 1d38b8a8470 _DllMainCRTStartup RtlFreeHeap 21675->21677 21676 1d38b89d2bc _DllMainCRTStartup RtlFreeHeap 21676->21677 21677->21673 21677->21674 21677->21675 21677->21676 21678 1d38b89d280 _DllMainCRTStartup RtlFreeHeap 21677->21678 21678->21677 21680 1d38b8a9964 21679->21680 21682 1d38b8a996e _DllMainCRTStartup 21679->21682 21681 1d38b8c9468 malloc RtlFreeHeap 21680->21681 21681->21682 21682->19634 21685 1d38b8a9bea 21683->21685 21684 1d38b8a92e1 21684->19551 21685->21684 21686 1d38b8c9428 RtlFreeHeap free 21685->21686 21686->21685

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: NameSocketUser_snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 1789932928-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 110b57a5cd811d7914c46092459dd239e4124b6e5e9583b423328f619c06bba5
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: 6F71CA70618B888FE794EF28C494B9ABBE1FBD9301F50596DB499C32A1CB74D941DB03
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: DCBA
                                      • API String ID: 544645111-2222620526
                                      • Opcode ID: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction ID: dd20b11e773b60bc7511c0c58c81a6ba4fd452fda5816f19ae452803e9a06e9e
                                      • Opcode Fuzzy Hash: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction Fuzzy Hash: 4841F776302B858EDB24CF69D8807DC37A1F748BACF119216FA1D87B98DA34DA459740

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ($0
                                      • API String ID: 0-506339136
                                      • Opcode ID: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction ID: 4167811511accef8891ecc47332018e5575a77d14fe76dd032e29df52ef65958
                                      • Opcode Fuzzy Hash: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction Fuzzy Hash: B7411230118786CFE7B8DB18D0547AAB7E1FB98305F605A2EB099C32A1DB74D945DB03

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: IoctlSocketclosesocket
                                      • String ID:
                                      • API String ID: 3445158922-0
                                      • Opcode ID: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction ID: 24a2d00feb2ba6bcd6c0b42d28e6b5723bc1c1ebbf4dbf830a1bc5355f7197a5
                                      • Opcode Fuzzy Hash: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction Fuzzy Hash: C7310A70618785CFE354DF68C44479AFBE4FB88344F605A2EF49AC22A0D7B8D5459B03

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: InternetOpen
                                      • String ID:
                                      • API String ID: 2038078732-0
                                      • Opcode ID: 170dc46f2207cb387e16a0227af4bff50695bdbce6e0c670e9cf9a8f94b52204
                                      • Instruction ID: 75e9cc4a69972c7644b4ea5f3484a4a6b50c8bd79e45e1ee004272074d4aeb31
                                      • Opcode Fuzzy Hash: 170dc46f2207cb387e16a0227af4bff50695bdbce6e0c670e9cf9a8f94b52204
                                      • Instruction Fuzzy Hash: 8C5169702186858FF79CEB28C8197AA77E1FB89305F50062EF196D32E1CB789941DB03
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_invalid_parameter_noinfo
                                      • String ID: U
                                      • API String ID: 3902385426-4171548499
                                      • Opcode ID: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction ID: a599add7f1017f25aa237cd8dc261db09062a84de536c03a3a7420d098c5aee9
                                      • Opcode Fuzzy Hash: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction Fuzzy Hash: 581203322146C686EB288F24D4443DE77A1F799744F400317FAAD476A5DB3ECB45EB22
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                      • String ID: -$@
                                      • API String ID: 3246410048-1222683799
                                      • Opcode ID: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction ID: bbc718a277f7f434cf0e2c95ef17c59eed2da63fb1c4154d7bd41bfa61d37dad
                                      • Opcode Fuzzy Hash: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction Fuzzy Hash: 72B1F5B2604EC289EB6DCB5594403EE7BA0F7C8790F140217FE6D476D9DB38CA40A752

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction ID: f438ee967c8b53bebbb98c77a74283165bffe5f99ce03f9c29c0cbe3ce0137d0
                                      • Opcode Fuzzy Hash: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction Fuzzy Hash: F231EA71108F8A4FE75CAF68D8527E936D0EB41360F29035BF436872E3D6709A019753
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$ExitProcess__crt_errno
                                      • String ID:
                                      • API String ID: 1362684943-0
                                      • Opcode ID: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction ID: 54696564fb181883bbc3199714f1ad40143ee3d116ece3c531c75a7974305b99
                                      • Opcode Fuzzy Hash: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction Fuzzy Hash: 6B411031611ACB85FE5CAB11F8553E82350AB8E7A1F080717B93D062E2DF7DC644A323
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction ID: d203778542184dd9107b2f39279e76931a809526a22f8ba6ca50279d7cb87cdf
                                      • Opcode Fuzzy Hash: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction Fuzzy Hash: 3D31F2323102C687E70EAF659D813EE3A91AB847A0F454317BA35073E2C67CC741E726

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction ID: 4bfcc0c563a3a4d48f758a79feb021b4a5f55ade09563ea6733bd372852d6262
                                      • Opcode Fuzzy Hash: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction Fuzzy Hash: 0E21F132608E8A4EF75CBB58D8527EA72D0EF81320F19035BF03AC71D3CB605A019663

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction ID: c70b66e767ea24c3e7af2f1a9a12070489348f6721688f2d25c75d2ed8d877fc
                                      • Opcode Fuzzy Hash: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction Fuzzy Hash: 2A212472608A864FF35C7B58D8927FA72D0EF82360F19031BF176872D3D7645A41A663
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction ID: aa6718443902801d3cbae6b2e36cac81a18d3a29f0a7e44df6499b7482739703
                                      • Opcode Fuzzy Hash: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction Fuzzy Hash: 9421DE327102C246FA0E6F159C013EE6A51BB95BF1F095716BA390B3D2CB3C8741A722
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction ID: 1d7236472899c9a02bf12a773a0f6269cd1ce97a9307beee9760d7f5a21f4a54
                                      • Opcode Fuzzy Hash: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction Fuzzy Hash: 3321C3727106C285F71D6F2598423EE6A51BB947A1F194316BA390B3D2CB7C8B41E723

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1241 1d38b8d9ea0-1d38b8d9eb4 1242 1d38b8d9f29-1d38b8d9f5b 1241->1242 1243 1d38b8d9eb6-1d38b8d9eb9 1241->1243 1249 1d38b8d9f5d-1d38b8d9f5f 1242->1249 1250 1d38b8d9f64-1d38b8d9f67 1242->1250 1244 1d38b8d9ebb-1d38b8d9ed4 call 1d38b8cb714 call 1d38b8cbd3c 1243->1244 1245 1d38b8d9ed5-1d38b8d9ed8 1243->1245 1245->1244 1247 1d38b8d9eda-1d38b8d9ee1 1245->1247 1247->1244 1254 1d38b8d9ee3-1d38b8d9ee4 1247->1254 1251 1d38b8da049-1d38b8da063 1249->1251 1252 1d38b8d9f69-1d38b8d9f7e call 1d38b8cb714 call 1d38b8cbd3c 1250->1252 1253 1d38b8d9f83-1d38b8d9f86 1250->1253 1252->1251 1253->1252 1259 1d38b8d9f88-1d38b8d9f90 1253->1259 1258 1d38b8d9ee6-1d38b8d9ef2 1254->1258 1262 1d38b8d9ef8-1d38b8d9f03 1258->1262 1263 1d38b8d9ef4 1258->1263 1264 1d38b8d9f92-1d38b8d9fa2 call 1d38b8cb714 call 1d38b8cbd3c 1259->1264 1265 1d38b8d9fa7-1d38b8d9fc3 call 1d38b8cbf24 1259->1265 1267 1d38b8d9f09-1d38b8d9f10 1262->1267 1268 1d38b8d9f05 1262->1268 1263->1262 1286 1d38b8da047 1264->1286 1276 1d38b8da007-1d38b8da022 call 1d38b8dadec 1265->1276 1277 1d38b8d9fc5-1d38b8d9fc6 1265->1277 1272 1d38b8d9f12-1d38b8d9f15 1267->1272 1273 1d38b8d9f1c-1d38b8d9f28 1267->1273 1268->1267 1272->1273 1278 1d38b8d9f17-1d38b8d9f1a 1272->1278 1289 1d38b8da031 1276->1289 1290 1d38b8da024-1d38b8da02f call 1d38b8cb714 1276->1290 1280 1d38b8d9fc8-1d38b8d9fd4 1277->1280 1278->1258 1278->1273 1283 1d38b8d9fda-1d38b8d9fe4 1280->1283 1284 1d38b8d9fd6 1280->1284 1287 1d38b8d9fea-1d38b8d9ff1 1283->1287 1288 1d38b8d9fe6 1283->1288 1284->1283 1286->1251 1292 1d38b8d9ffd-1d38b8da005 1287->1292 1293 1d38b8d9ff3-1d38b8d9ff6 1287->1293 1288->1287 1291 1d38b8da034-1d38b8da039 1289->1291 1290->1291 1291->1286 1295 1d38b8da03b-1d38b8da040 1291->1295 1292->1291 1293->1292 1296 1d38b8d9ff8-1d38b8d9ffb 1293->1296 1295->1286 1296->1280 1296->1292
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction ID: 6155ab8d645250c9cf370b8d6fa481052102bef2f6747907f5b87118251a811b
                                      • Opcode Fuzzy Hash: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction Fuzzy Hash: 37512131114A8B8FEBACAB5884413F932D0EB143A1F68072BB4B5C31D6EB74CE41A253
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction ID: bb9dffecb8a2c220f005471cc184311022e6a90bc457ab05ffaa7f0b86d4ed8d
                                      • Opcode Fuzzy Hash: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction Fuzzy Hash: 0741F3B16003D38AFF78AB5184403ED32D1E7A5BA4F904323FAB8676C5D728CB41A712

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction ID: cc93cfd282800072d37edc4e1d9fb23f379a5ff3f840cb4dc5857ca7b7e74cbb
                                      • Opcode Fuzzy Hash: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction Fuzzy Hash: C5214972608A864FF35C6B58D8623F932E0DB45320F19030FF436871E3C7649A0196A7
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction ID: 732e2a53eadd12a11b4b302f874418deeea58d2fe618c9e910c2ce79903b31e0
                                      • Opcode Fuzzy Hash: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction Fuzzy Hash: D121C3B2504E864FF79CAB64C8A53E876D0EB41320F25072FB42A871D3C6748A04976B
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction ID: bb0d6a9f54f31b8f38172c13a9908f76f7194b6ac57568cb0e38e09d9f56af06
                                      • Opcode Fuzzy Hash: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction Fuzzy Hash: C921C2323102C256FA0D6F2598613ED6651A7C87A1F154317BE3D0B3D2CA7C8A41E772
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction ID: 4541133a32e7a1b1eb78d64cd1793f5f5e6514a0e75eeb0a3d1f6030b314630d
                                      • Opcode Fuzzy Hash: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction Fuzzy Hash: 0211E6323206C686F71D6F259C453EC6A51A7D87A2F1D0726B93D073D2C678CA42A336
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$FreeHeap_errno
                                      • String ID:
                                      • API String ID: 2737118440-0
                                      • Opcode ID: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction ID: 205c9ef6cefccd68ff2c2302c793211bb2676ee3a84146171612cedc57158145
                                      • Opcode Fuzzy Hash: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction Fuzzy Hash: F941A570224D4FDFFBE9EB58D8E5BEC32D1F758311F5442A9A025C22D2CA2C9941D712
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction ID: 62ffbe7cb90927f96cab7e0296cc2f8e0487c26ed82dc2bbce472ab0d1a5aa7a
                                      • Opcode Fuzzy Hash: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction Fuzzy Hash: 2591A770328B8F4BEB6DAA6C94517F973D5EB85700F54035FE49AD3283EE209D069683
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction ID: 4e5a6f844676187256107d98e5efb2fc4ff3fcc4fcbf29b6fd0aa7c4fdb4b43a
                                      • Opcode Fuzzy Hash: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction Fuzzy Hash: BE71E5323147C646EB299B2794407EE7791F789BC8F404626FD5A87B86DB38C607E702
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _time64$strtok$malloc
                                      • String ID:
                                      • API String ID: 2141844861-0
                                      • Opcode ID: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction ID: 530e9288273eb6432d095f8997fd76f15849ca3b6bee9d0d354eac89d0c66803
                                      • Opcode Fuzzy Hash: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction Fuzzy Hash: 68911A31109ACB8AE768CB19E88839977A0F389754F24031BF5BD437A5CB7CC244EB12
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-3916222277
                                      • Opcode ID: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction ID: 896e9e07dbba1b763551760a112d7b1598249395cf1f7731d16d06f853c2550a
                                      • Opcode Fuzzy Hash: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction Fuzzy Hash: D941F1B2610BC68AEB5C9F24C4913AC36A0E7D8B50F144317FA7E473C5DA78CA51E762
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction ID: ee4c53b31b1dfb1fc0610fab18de6854d1f87e37c31f3368c9b86ec658c0ba1e
                                      • Opcode Fuzzy Hash: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction Fuzzy Hash: 49319E71208B8A8FD798DF1890857A972E0FB58360F5903AFB469C72D2DB70CE40D786
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction ID: bc406b51916c7f8ca3e974fc5913ebd73ec40ba520d7cf87fdcd4f950a48aa27
                                      • Opcode Fuzzy Hash: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction Fuzzy Hash: C031DB70614A4A8FFB98AF6994557A972D1FF88310F14439EF42AC32D1DB38C9419703
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                      • String ID:
                                      • API String ID: 4120058822-0
                                      • Opcode ID: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction ID: 6adf046d6014b49591693d8823919fceefcfedd8be01a481359f23cbfd993ec5
                                      • Opcode Fuzzy Hash: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction Fuzzy Hash: 9321D332704BC74FF79CABA898953E876D0EB45390F1D031BF426872D3C6645A40A663
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction ID: ff00ddf89692a670c04eafd6d68c39dcb125b0b31d4807adaaf79ee6d0c37b1f
                                      • Opcode Fuzzy Hash: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction Fuzzy Hash: 32318571700B868AFB18AB65D8043AD76E1BBC8B94F144726BA6D477D6DF3CC6009316
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction ID: c8a026f89e4c4c48895cd5fa65232467050b69b5a622740bb29e17de698b0bdc
                                      • Opcode Fuzzy Hash: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction Fuzzy Hash: A8318F723047C68AE7259B1194887DDB6A4F799BE0F544222FE6817B85CB38CB41E711
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction ID: 299089818d238c1706516cebcc6be376dbbcd4292788251a2987f666fdb5e9d7
                                      • Opcode Fuzzy Hash: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction Fuzzy Hash: CA61D470218F4B4BE7AC5A2C58652BA72D1F794720F24032FF4A6C36D9DA30DD52A6C7
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction ID: 39d75bff0e89f8d3ad02754676a86c61c60e8622fe08b1e00a1d81d59aa141a8
                                      • Opcode Fuzzy Hash: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction Fuzzy Hash: 9D7114301187898FE798EF18C455B9AB7E1FBD8340F505B2EB099C32A2CA74DA45DB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction ID: e64bb11118ff779e907d345797320cba9367979b6e2aafcb27f1d575a83985cc
                                      • Opcode Fuzzy Hash: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction Fuzzy Hash: 805126717042D282FA2C9A2655007E966D1B3C8BF4F184713BE3F43BD5DB38C692A662
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction ID: cde31aaeee21b970bd6d0f59f5d8248bf99af47a7525361c314bbb9e4f9ce4d8
                                      • Opcode Fuzzy Hash: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction Fuzzy Hash: 31610932219AC582EB64EB15E44139BBB61F7C9790F104216FAAE43BA9CF38C645DF41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction ID: c5e6b18b3144571e9179e69afa8a5b82a3a58701439bada18f836be54aef2720
                                      • Opcode Fuzzy Hash: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction Fuzzy Hash: 1821A7B0618B8F4FF7D8EB2854253A972D1EB59310F14075BB45AC3296EE34CE416753
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction ID: 001f0395953a40aa32d6c48aa90454e3ea54e0ca9730dea510750beba89dd2eb
                                      • Opcode Fuzzy Hash: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction Fuzzy Hash: BA313070518A89DFE788FB28C4557DA77E1FB98304F50172EB09AD32E2DA349A41DB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction ID: 7eea34714114aa922cb239165f940643be176d1dfeae75074f74fb0f03230392
                                      • Opcode Fuzzy Hash: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction Fuzzy Hash: 1921A5713157C345FF699B2198053DEA691A7CC7C0F044A22BDAE87796EB3CC681A732
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction ID: d61b2fa0b2bdc98f2fef13323f8fad9282fa612292bfa57fc66336604eced37d
                                      • Opcode Fuzzy Hash: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction Fuzzy Hash: 39212172519AC281EA24EB11E4513DE7760F7C8798F500317F6AE53AEADE3CC7419B42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_set_error_mode$__crt_errno$ExitMessageProcess_lock_malloc_crtmalloc
                                      • String ID:
                                      • API String ID: 2751257304-0
                                      • Opcode ID: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction ID: 0a75bef5b5e0b8f49a3e2aff74a68385d7b68c89b85d20fffd4582a92d668c97
                                      • Opcode Fuzzy Hash: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction Fuzzy Hash: B61173312157CA81F76CAB60E8453EA3251E7C8780F041623F57D466E2CF7C8654B723
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction ID: 0d281ac2b83b3a6caed81079182973c2de229d551c303fb584bdf80e94748368
                                      • Opcode Fuzzy Hash: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction Fuzzy Hash: 0351B730628F4B4BEB6D9B6894516F973D5FB49304F54036EE85BC3287EE50DD428682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction ID: 8242c09d79969c047c363355c1be9da34bf5ecf2c87c20f9458588aa1d2744ec
                                      • Opcode Fuzzy Hash: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction Fuzzy Hash: 1941AF313107D29BFA5D9B27D5542AA2790F749BC0F404A26EE7A07742DF38DA27E701
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc$_errno_snprintf$FreeHeap_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 1397185943-0
                                      • Opcode ID: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction ID: e9d84a55020ce1aaf2c5bb7371322ee498c420b2a95930f35b351a3e78a35903
                                      • Opcode Fuzzy Hash: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction Fuzzy Hash: EAE11F742146868FF798EB28C4617EAB7E1FB84300F50462FB1A9C72D2DB749A45DB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 74200508-0
                                      • Opcode ID: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction ID: b9fa9f9803c94fda85ecf4e165b6b7b33ed4ece3c57ca3c347f1d84331d7c37c
                                      • Opcode Fuzzy Hash: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction Fuzzy Hash: 61D150712186C38AF758AF64E4513DE76A1F7C8380F104227F6AD876D6CF38CA05AB52
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _lock$_calloc_crt_mtinitlocknum
                                      • String ID:
                                      • API String ID: 3962633935-0
                                      • Opcode ID: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction ID: 0a21c25f67ce513ed17c108636bdebb2d07fa4027e3d4d2171e269d49bf982af
                                      • Opcode Fuzzy Hash: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction Fuzzy Hash: D6510671514A4B8FE7A89F58C8813A5B3E0FB58350F18035FF85AC72A2D674DD429B83
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction ID: 2f7538b25a390b90ee40bfec90fc19804d44f033266ca211d603f7e5731d5948
                                      • Opcode Fuzzy Hash: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction Fuzzy Hash: FE41EB30228F4E4BEB5E9B6884552FA37D5E795310F14426EE497C3243ED20E9079792
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-0
                                      • Opcode ID: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction ID: ae93fd7eff680dc44de180a529d557111396527b9a1dc64bb52e411d87c11d5b
                                      • Opcode Fuzzy Hash: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction Fuzzy Hash: AA51AFB0114E8E4FEB9CEF28C0A17A976D0EB44710F14035AF966CB2D6D734CB419B92
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 343393124-0
                                      • Opcode ID: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction ID: 894693eeb91ff7b0a02ce2dc03c60b0f1ccdc40220eb89e880d87bab2b5d269a
                                      • Opcode Fuzzy Hash: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction Fuzzy Hash: 13418A3021CA89CFE794EB28C854FAA77F1FB99304F50066DF499C32A1DA65DA45DB03
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction ID: a5684794ee017d60d468dbd52aea9c33c897e5b9eda20b43f8874ac32fe6e2ff
                                      • Opcode Fuzzy Hash: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction Fuzzy Hash: 984136323103C746FA0A9B2B54006DE6BA4F795BC8F484226FD254B742DE38CA07E306
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno_malloc_crt$_calloc_crt_calloc_impl_getptd_noexit_invalid_parameter_noinfo_invoke_watson_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 321378830-0
                                      • Opcode ID: 1af5591cc140629ef8a1eaab72b160ba28423dfa39d6b40620a42b0b9187e2b6
                                      • Instruction ID: ee01628a385174270883b0e2fb8198dc2c5de2d12f546dca4c94c1edf5a2fec5
                                      • Opcode Fuzzy Hash: 1af5591cc140629ef8a1eaab72b160ba28423dfa39d6b40620a42b0b9187e2b6
                                      • Instruction Fuzzy Hash: DE21B531314E8F4FE79CAF6998567E972C0FB84391F54426FA46AC31E2EA249A418643
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno_malloc_crt$_calloc_crt_calloc_impl_getptd_noexit_invalid_parameter_noinfo_invoke_watson_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 321378830-0
                                      • Opcode ID: 8a2acd4545fb3e1ff377b7186d7311079e6a4c6a1743b8f02e9e066f6884292d
                                      • Instruction ID: c3ae7e47945ac2ef55d7d99598cb24d9b9fcda37ccbc20f29add95c54c92ca1d
                                      • Opcode Fuzzy Hash: 8a2acd4545fb3e1ff377b7186d7311079e6a4c6a1743b8f02e9e066f6884292d
                                      • Instruction Fuzzy Hash: 0C21D171318E4B8FF7986F18D4527ED32C1EB843A1F54032BE46AC32D6EB2499119783
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_calloc_crt_errno_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 3700215360-0
                                      • Opcode ID: 5671fb06d6f05841401363cc8443e27ee7f0052eb4ca124240904de72179e6d7
                                      • Instruction ID: a2a6d7175ef5e3c08a9964f658f15b7b2ddb867ab4908f85f334fa1ce3f43798
                                      • Opcode Fuzzy Hash: 5671fb06d6f05841401363cc8443e27ee7f0052eb4ca124240904de72179e6d7
                                      • Instruction Fuzzy Hash: 4821A132718E5A4BF798AF18E4517ED72C1EB84391F48422BE46BC31D2EE2499019783
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_calloc_crt_errno_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 3700215360-0
                                      • Opcode ID: d21b9421d81b7aad527b41b40eb760196fdcb429390ac35a4901b8c372e18314
                                      • Instruction ID: d922a8d26a63e24670467ed3a3749431694fdad089c4fb84ca29f0bc8937d694
                                      • Opcode Fuzzy Hash: d21b9421d81b7aad527b41b40eb760196fdcb429390ac35a4901b8c372e18314
                                      • Instruction Fuzzy Hash: EA21C532314E8F4FF69CAB6998553E973C1EB84391F44426BB46AC31D2EE248A059243
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction ID: b2881899653bef5bfb149895e372c0baf54685db89f74d52e2177f74ac3ba815
                                      • Opcode Fuzzy Hash: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction Fuzzy Hash: 5901D131124DCF8EFADCAB24C8557D832E0EF16325F6C834BB42A870E2C7780640A623
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction ID: 6cd909421affb4df58697a5381db0f27d1ce6a83a8438f41c5bda71e8cf160a4
                                      • Opcode Fuzzy Hash: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction Fuzzy Hash: E001FFB0528B89DFE388EB18C455B99B7E1FBD4700F90166EB495C2291DB349644D743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction ID: 6ebf012ae306265b105061872fc59def83bb44089f2de2925406671b30f4abf2
                                      • Opcode Fuzzy Hash: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction Fuzzy Hash: 870169B2750AC685FE0D9B14C8813EC26919BA4BB1F594317F63E063D2C77C4600A223
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction ID: 7a4bddce0c0b47a69b358b00d244135e8656b8bf677c2c31d58f1accee2abe91
                                      • Opcode Fuzzy Hash: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction Fuzzy Hash: 39F0EC72528AC286D644AB51F85139EA364F7C4780F401217F69E53B5ADF38C6119B41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction ID: 3f8b9efb04b3317ce23228cf72a236e245f84de0210c3e4b135dfc588d15d9c4
                                      • Opcode Fuzzy Hash: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction Fuzzy Hash: 24912B70218785CFE7A8EB68C4657DEB7E1FB84300F504A2EB09AC3291DB759A45D743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction ID: c6f70f3f0283934acc1e346a778cc782ee873e4bf56b486e1d66c342f759e7ac
                                      • Opcode Fuzzy Hash: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction Fuzzy Hash: 548195322086C68AE768DB24E4443DEB7A1F3C9340F500626F69D87AE9DF7DD644DB12
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction ID: 046dcced6a180eafca9fa47aca73ce94a928ead95a3356ef074dae0f7917400f
                                      • Opcode Fuzzy Hash: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction Fuzzy Hash: 7931E974518B489FDB88EF18C054A5AB7E1FB9C315F100A6EB48DD33A1CB34DA41CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction ID: 1d31473a1ed0315b178c203d6248c57f2e1ec648c8ef3e741903e4e92aa89221
                                      • Opcode Fuzzy Hash: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction Fuzzy Hash: 9D21A276608B8486DA64DB16E49025AB7A0F3CCB94F104216EFED53BA9CF3CC652CF40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction ID: 42330c2842b02cb0a38b9f63f12248c58440cbcd45a33a9285cbbaeb8545325e
                                      • Opcode Fuzzy Hash: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction Fuzzy Hash: 0051F6B0208F4B4BE6AC5E6D54653B572C0E758310F14032FF4AAC31DAEA71DD429183
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction ID: 9a649ba6efafbf22a98a4c43f7531e64753588c9becac47851447418b4acc519
                                      • Opcode Fuzzy Hash: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction Fuzzy Hash: D94116313052C286FE6C5E269540399B681B7CCBD0F484326BE7F477D5E678C681A252
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: f04d4eff27f227221344d5a399c5ab83c54852bf6d4bc84bb4dc52c9d7309fd5
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: A521F63240C74A2AEB6CB9A894423A7B6C0E785350F15132FF8A683243E5509D4296C7
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction ID: 5bac68b110fdb7a4c5a97245c29a4ac807decbd3915eea5e1db033ef5d93f1c7
                                      • Opcode Fuzzy Hash: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction Fuzzy Hash: 3021DD72518AE78EE79CAF2840943BA76D1E745395F9C075BB0B6C71C1CB608A41E253
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction ID: c11455b89939a56ac17954cf50a6e34753f4ed8e735ffa29f2eae24313f73245
                                      • Opcode Fuzzy Hash: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction Fuzzy Hash: CB2127F22042E649EB68561590503FD66D0E384BD4F1C5727FAB60BAC7CAACC741E712
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 05cbe19735d6a4722a0bf573421b196704e4bc28a5dae99128ad25e6c379327c
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: BB110632504BDB45F7789EA674802EBB690FB843D0F191227FE7463292E974CA82D602
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 3587327836-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 3b151d7990a1addb7410c48346d7fd46e1239d8c5c5ecf5ddb7f587b2d55a060
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: 12612876219BC586E754DB15E88039ABBA0F3C9790F105226FAEE47BA9CF7CC541CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction ID: 074da69fc13e58fa7806523a5478ce0d814cbbead7764d375fa99eaa34f8d8dc
                                      • Opcode Fuzzy Hash: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction Fuzzy Hash: E6D1E870258BC6DFD7A4EB18C0547ABB7E1FB9A315F901A2EE58983250DB309981D707
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction ID: 130b0f5f69734f52f7f69108ec72144e9d5fc0397c1f1735a179a2a53a44d483
                                      • Opcode Fuzzy Hash: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction Fuzzy Hash: D9118270218F498FD798EF5994857A5B7E1FB98325F1047AEB42DC32A1CB74CA44CB82
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CaptureContextPrevious__crt__raise_securityfailure
                                      • String ID: sv-FI
                                      • API String ID: 37250909-2947700294
                                      • Opcode ID: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction ID: 90ba8ce312e6c02c37c5b92d5f924c62babf46ebe3e1215a21032fb56d3a5101
                                      • Opcode Fuzzy Hash: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction Fuzzy Hash: E721F234214B8A81EA189B18E8553D66BA4F385344F900327FAAD877A5EF3C9714E702
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction ID: d7ba0fdfd993d99315f88091a3445f3791f116ba158c945c2199118be5dd7d40
                                      • Opcode Fuzzy Hash: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction Fuzzy Hash: AE118EB2610A8086EB149B52E440399B6A1F798FE4F584322BB6C07B96CF38C240CB11
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_calloc_implcalloc
                                      • String ID:
                                      • API String ID: 4000150058-0
                                      • Opcode ID: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction ID: e884ddbb4d4d4f646e4a735860c4dd304b6e586a697e84d7291a6dcc17ce134e
                                      • Opcode Fuzzy Hash: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction Fuzzy Hash: 02C10932604B85CAE768DF65E48039E77B4F788B94F10422AEB8D87B58DF38C555DB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction ID: 4ab8bd08549144ee23af024517bf957da70b963a844895d5ed0bd069c284d3f3
                                      • Opcode Fuzzy Hash: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction Fuzzy Hash: ACC1D8B6219AC1CAD7B4CA15E08039FB7A0F789795F50112AFBDA43B58DB39C940DF06
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: 0e55fdf1e31888e8e5bc92a8df16bf82ac996fd54d4380c4a09cf591a53735a1
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: 13913470118B898FE7A8EF18D455B9BB7E1FB99301F50062EE49EC32A1DB749541CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction ID: 09a5690258138e636d06e6ab824a9d52c24d98e3f0d8ca1af3454f84f6dc696c
                                      • Opcode Fuzzy Hash: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction Fuzzy Hash: 1351B87022CA474BEF6CDF2894916AA73D1FB94300F14466EF86BC3287EE30DD529642
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: 94fdfe4ff6f794a7247da60b1db598034ba8f0f357a923d3f15b2da3885544e2
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: 2981E636208BC686E7249B51F8503DAB761F3897A4F504327EAAD43BA9DF3CC645DB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction ID: 47094b354730f14013c54c470a47150f6f6180dcf37076753b45a733c9f283d3
                                      • Opcode Fuzzy Hash: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction Fuzzy Hash: 18418C327047C287EB5DDB27A4006AD67A0F388BC4F444A26EE3A47785EF34DA06D701
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 40ff0c962953611e2ec08158fa3c2d936975316577c874da240df1d1ec0b2656
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: CC417F74118A89CFE799EB18D855BDA77E0F798310F60066AB49AC32E0DB38DA45C743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction ID: 4fc1f3f0bfd8718c1c98ad807f8bcbd273e3e2fa2db6744d2b4af121444cceea
                                      • Opcode Fuzzy Hash: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction Fuzzy Hash: E5317E70528B8D9FE7D4FB18C454BA97BE1FB99315F500A1EB09AC32A1DB34D942DB02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 7c656a0e0e11e5a9d1cef21bf46a2f8c2e218e92ea7bd51e6aab4ca9baf33152
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 63314B31118AC782E6298B15E8443DAA760F3C97A4F544327FABD43BE5DB3CC641DB12
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.1858149447.000001D38B81D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D38B800000, based on PE: true
                                      • Associated: 00000004.00000003.1858125731.000001D38B800000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.1858149447.000001D38B85C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1d38b800000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction ID: 6cf61d18785f40ebb780965641574c11d3facc04edb0dcc46e836a3c6f8fd560
                                      • Opcode Fuzzy Hash: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction Fuzzy Hash: 0F21F936115BCA85EA689F15F88439E6760F3CA7A4F501306FABE427E9CF3CC2409B01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.1861894923.000001D38B891000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D38B891000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1d38b891000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$FreeHeap_errno
                                      • String ID:
                                      • API String ID: 2737118440-0
                                      • Opcode ID: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction ID: e9ad9d5aa18d8e2b596e2083b12bffa39559969404e868b63045cac40e1060f6
                                      • Opcode Fuzzy Hash: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction Fuzzy Hash: ABF0457422CD89AFD6C9FB18C8A5E9977E1FF98300F801599B059C73A2DA24E940DB12

                                      Execution Graph

                                      Execution Coverage:0.2%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:9
                                      Total number of Limit Nodes:2
                                      execution_graph 17007 21a31bbb544 17010 21a31bbb560 _CRT_INIT _DllMainCRTStartup 17007->17010 17009 21a31bbb60e 17011 21a31b9d0fc _DllMainCRTStartup VirtualFree 17009->17011 17012 21a31bbb5ba _CRT_INIT 17009->17012 17010->17012 17013 21a31b9d0fc 17010->17013 17011->17012 17014 21a31b9d12a _DllMainCRTStartup 17013->17014 17015 21a31b9d123 _DllMainCRTStartup 17013->17015 17014->17009 17015->17014 17016 21a31b9d228 VirtualFree 17015->17016 17016->17014

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ($0
                                      • API String ID: 0-506339136
                                      • Opcode ID: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction ID: ac993ae998990f084226b803f2a2ac8bd0a5ea572e049315fbf0d56f22183ffb
                                      • Opcode Fuzzy Hash: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction Fuzzy Hash: B14183301197458FE7A8DF29C4987AAB7E0FBA8355F9049BDE099C32A1DB74C845CB03

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction ID: 980d9ceb90e58cd5ec4f6f1f09dbe45919e3773f8ff62e116b73510a36f689b5
                                      • Opcode Fuzzy Hash: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction Fuzzy Hash: 6E31E17420A7454FE71CBF68888A3E93694EBA6320F154299E472872D3D670AC428763

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction ID: 64e513cee7787355f0a88c446a8305f2fe0370b2e10e505d309f6b007b8c4876
                                      • Opcode Fuzzy Hash: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction Fuzzy Hash: 1F21E23161AA008FF71CBF5CD88A3E972D4EBA6321F1546D9E03A871D3C664580286A7

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction ID: 360bae6c78c7b610593a7943f443a78230709464e4768afa8d3bd8a90d00ed02
                                      • Opcode Fuzzy Hash: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction Fuzzy Hash: 7B21063160A6008FF71C6F5CD88A3FD7698EBA2321F250698F1768B2D3D66458428663

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction ID: e6aa23e8b9a315fcf05bcb049deddfcb918b5b9c5a4fc7fa8b047f77a1518a8f
                                      • Opcode Fuzzy Hash: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction Fuzzy Hash: 7421F43560A6000FF71CAF68D9CA3F97298EBB5321F15029DE076872D3D6A45C0286A7

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction ID: 395762b8a1893c1ae26ca75fc4b85ca0ddb46cd2fbd99f5a35f34e72f6cbadd8
                                      • Opcode Fuzzy Hash: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction Fuzzy Hash: 7421D532506A108FF71CAFA9CCCD3E87690EB61320F25459DE036875D3C67488018763

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1041 21a31bb9b34-21a31bb9b58 1043 21a31bb9b74-21a31bb9b8e call 21a31bb9428 1041->1043 1044 21a31bb9b5a-21a31bb9b60 1041->1044 1050 21a31bb9baa-21a31bb9be9 call 21a31bb9428 * 3 1043->1050 1051 21a31bb9b90-21a31bb9b96 1043->1051 1046 21a31bb9b62-21a31bb9b6b call 21a31bb9428 1044->1046 1047 21a31bb9b6d-21a31bb9b6e 1044->1047 1046->1044 1046->1047 1047->1043 1063 21a31bb9bfd-21a31bb9c17 1050->1063 1064 21a31bb9beb-21a31bb9bf3 1050->1064 1053 21a31bb9ba3-21a31bb9ba4 1051->1053 1054 21a31bb9b98-21a31bb9ba1 call 21a31bb9428 1051->1054 1053->1050 1054->1051 1054->1053 1068 21a31bb9c19-21a31bb9c1f call 21a31bb9428 1063->1068 1069 21a31bb9c26-21a31bb9c30 1063->1069 1064->1063 1065 21a31bb9bf5-21a31bb9bf8 call 21a31bb9428 1064->1065 1065->1063 1068->1069 1071 21a31bb9c32-21a31bb9c38 call 21a31bb9428 1069->1071 1072 21a31bb9c3f-21a31bb9c4e 1069->1072 1071->1072 1075 21a31bb9c50-21a31bb9c61 1072->1075 1076 21a31bb9c6f-21a31bb9c79 1072->1076 1075->1076 1078 21a31bb9c63-21a31bb9c69 call 21a31bb9428 1075->1078 1078->1076
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno
                                      • String ID:
                                      • API String ID: 2288870239-0
                                      • Opcode ID: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction ID: 545943f7218dccfe0dd9debce3310ba1db3cc798e234d09c36822e8f90fcc52f
                                      • Opcode Fuzzy Hash: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction Fuzzy Hash: E741F47016AD099FFBB8EF58D8D9BED32D1F768311F9480A89015C2691DA2CD845C712

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1081 21a31b8460c-21a31b8463f call 21a31b8411c 1084 21a31b848c5-21a31b848d5 1081->1084 1085 21a31b84645-21a31b84653 call 21a31b8448c 1081->1085 1085->1084 1088 21a31b84659-21a31b8468f 1085->1088 1089 21a31b84695-21a31b846a1 1088->1089 1090 21a31b848c0 1088->1090 1089->1090 1091 21a31b846a7-21a31b846c9 call 21a31bb9468 * 3 1089->1091 1090->1084 1098 21a31b8489f-21a31b848a2 1091->1098 1099 21a31b846cf-21a31b846d2 1091->1099 1100 21a31b848a4-21a31b848a7 call 21a31bb9428 1098->1100 1101 21a31b848ac-21a31b848af 1098->1101 1102 21a31b84897-21a31b8489a call 21a31bb9428 1099->1102 1103 21a31b846d8-21a31b846db 1099->1103 1100->1101 1105 21a31b848b9-21a31b848be 1101->1105 1106 21a31b848b1-21a31b848b4 call 21a31bb9428 1101->1106 1102->1098 1103->1102 1107 21a31b846e1-21a31b846f3 1103->1107 1105->1084 1106->1105 1110 21a31b846f5-21a31b8470a 1107->1110 1111 21a31b8470c-21a31b84718 1107->1111 1112 21a31b8471c-21a31b84727 call 21a31b818bc 1110->1112 1111->1112 1115 21a31b8487b-21a31b84895 call 21a31bb9428 * 3 1112->1115 1116 21a31b8472d-21a31b84795 call 21a31bbca50 call 21a31bc0020 1112->1116 1115->1084 1128 21a31b84797-21a31b8479c 1116->1128 1129 21a31b847a1-21a31b847c3 call 21a31b854f0 1116->1129 1128->1115 1129->1115 1132 21a31b847c9-21a31b847cc 1129->1132 1133 21a31b847e7-21a31b84800 call 21a31b854f0 1132->1133 1134 21a31b847ce-21a31b847d8 1132->1134 1133->1115 1138 21a31b84802-21a31b84808 1133->1138 1135 21a31b847da-21a31b847e5 1134->1135 1135->1133 1135->1135 1139 21a31b84823-21a31b8482d 1138->1139 1140 21a31b8480a-21a31b84814 1138->1140 1141 21a31b84838-21a31b84879 call 21a31bc0020 * 2 1139->1141 1142 21a31b8482f-21a31b84836 1139->1142 1143 21a31b84816-21a31b84821 1140->1143 1141->1115 1142->1115 1143->1139 1143->1143
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction ID: c64cac615b44380853d74bf087746519f0c0b833d34c35ed10c9fa2a89324b7d
                                      • Opcode Fuzzy Hash: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction Fuzzy Hash: CB91E970329B8C4BE76DAF6C94457FA73D1EBA5700F50429ED49AC3287EE24DC068683

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction ID: 4e24beb58b138c86fe2c217026c2078d8ad88b31db0a51280d4592f350db7a13
                                      • Opcode Fuzzy Hash: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction Fuzzy Hash: 7831EA70615B098FFB5CAF6994897A976D1FFA8310F14819DE06AC32E2DB78C8418703

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1179 21a31bc4818-21a31bc482f 1180 21a31bc4841-21a31bc4843 1179->1180 1181 21a31bc4831-21a31bc483c call 21a31bbb714 1179->1181 1183 21a31bc4849-21a31bc484f 1180->1183 1184 21a31bc48ce-21a31bc48d9 call 21a31bbb714 call 21a31bbbd3c 1180->1184 1190 21a31bc48de 1181->1190 1183->1184 1187 21a31bc4851-21a31bc4875 1183->1187 1184->1190 1187->1184 1188 21a31bc4877-21a31bc4888 call 21a31bc438c 1187->1188 1195 21a31bc48b5-21a31bc48c0 call 21a31bbb714 1188->1195 1196 21a31bc488a-21a31bc489c call 21a31bc46c8 1188->1196 1193 21a31bc48e1-21a31bc48ee 1190->1193 1201 21a31bc48c3-21a31bc48cc call 21a31bc47ec 1195->1201 1205 21a31bc48a8 1196->1205 1206 21a31bc489e-21a31bc48a6 1196->1206 1201->1193 1207 21a31bc48aa-21a31bc48ac 1205->1207 1206->1207 1207->1201 1209 21a31bc48ae-21a31bc48b3 call 21a31bbb6a4 1207->1209 1209->1195
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                      • String ID:
                                      • API String ID: 4120058822-0
                                      • Opcode ID: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction ID: da06243e5d70793a5e4ae0fb0fb35447e9a941156400e72c1747c1d2ba6ed8b7
                                      • Opcode Fuzzy Hash: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction Fuzzy Hash: F221C530606A804FF71CAFA898D93EA7694EBA5310F1506D8E427872D3D6645A02C663

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1212 21a31bba6d0-21a31bba700 1213 21a31bba702-21a31bba705 1212->1213 1214 21a31bba71c 1212->1214 1213->1214 1216 21a31bba707-21a31bba70a 1213->1216 1215 21a31bba71e-21a31bba732 1214->1215 1217 21a31bba733-21a31bba73e 1216->1217 1218 21a31bba70c-21a31bba711 call 21a31bbb714 1216->1218 1219 21a31bba740-21a31bba74c 1217->1219 1220 21a31bba74e-21a31bba752 1217->1220 1226 21a31bba717 call 21a31bbbd3c 1218->1226 1219->1220 1223 21a31bba776-21a31bba787 1219->1223 1224 21a31bba754-21a31bba75f call 21a31bbca50 1220->1224 1225 21a31bba763-21a31bba766 1220->1225 1229 21a31bba789-21a31bba78c 1223->1229 1230 21a31bba78e 1223->1230 1224->1225 1225->1218 1228 21a31bba768-21a31bba774 1225->1228 1226->1214 1228->1218 1228->1223 1231 21a31bba793-21a31bba79a 1229->1231 1230->1231 1234 21a31bba8aa-21a31bba8ad 1231->1234 1235 21a31bba7a0-21a31bba7ad 1231->1235 1234->1215 1236 21a31bba807-21a31bba80d 1235->1236 1237 21a31bba7af-21a31bba7b6 1235->1237 1240 21a31bba872-21a31bba87d call 21a31bc0d20 1236->1240 1241 21a31bba80f-21a31bba811 1236->1241 1238 21a31bba802-21a31bba803 1237->1238 1239 21a31bba7b8 1237->1239 1238->1236 1242 21a31bba8d5 1239->1242 1243 21a31bba7be-21a31bba7cb 1239->1243 1250 21a31bba8d9-21a31bba8e4 1240->1250 1258 21a31bba87f-21a31bba882 1240->1258 1245 21a31bba813-21a31bba818 1241->1245 1246 21a31bba832-21a31bba839 1241->1246 1242->1250 1248 21a31bba8b2-21a31bba8b6 1243->1248 1249 21a31bba7d1-21a31bba7f1 call 21a31bc0e64 1243->1249 1252 21a31bba824-21a31bba82b 1245->1252 1253 21a31bba81a-21a31bba822 1245->1253 1247 21a31bba83c-21a31bba842 1246->1247 1247->1248 1254 21a31bba844-21a31bba860 call 21a31bbf624 call 21a31bc1008 1247->1254 1255 21a31bba8c5-21a31bba8d0 call 21a31bbb714 1248->1255 1256 21a31bba8b8-21a31bba8c0 call 21a31bbca50 1248->1256 1267 21a31bba7f3-21a31bba7fd 1249->1267 1250->1215 1259 21a31bba82d-21a31bba830 1252->1259 1253->1259 1272 21a31bba8e9-21a31bba8ed 1254->1272 1273 21a31bba866-21a31bba869 1254->1273 1255->1226 1256->1255 1258->1248 1264 21a31bba884-21a31bba893 1258->1264 1259->1247 1268 21a31bba897-21a31bba89f 1264->1268 1267->1268 1268->1235 1270 21a31bba8a5-21a31bba8a6 1268->1270 1270->1234 1272->1250 1273->1242 1274 21a31bba86b-21a31bba870 1273->1274 1274->1267
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction ID: 390c52647d3b6414c8544522300ef4838b198d5b8f5ef9b0b26f9c9fd7d92ea8
                                      • Opcode Fuzzy Hash: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction Fuzzy Hash: 8661C730619F058BE76C5E3D888D3B97AD1E7A4720F1493AED466C3AD1DA60DC5386C3

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction ID: 353536a48b636134a3515f7fa8e0098e46aa6af8c10eeacbd8cb2d1c6fd9363f
                                      • Opcode Fuzzy Hash: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction Fuzzy Hash: 0E7101305197888FD398EF18C499B9AB7E1FBEC354F5049ADB09AC32A1DA34D945CB43

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction ID: 4b8ebeb334777386d8df049470b511a526c9b391257fae913884b3940d6a3c0c
                                      • Opcode Fuzzy Hash: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction Fuzzy Hash: 8B210A30A0AB4A8FF7D8FF3D84893AA76D1EBA9340F0489D99455C3692EE34CC414753

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction ID: 9ce68da67f8786968efb386266a90e6b61cb5c0ea4854021bd258cb9d0acf3d7
                                      • Opcode Fuzzy Hash: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction Fuzzy Hash: C7313070529B489FE388EF28C4997DA77E1FBA8314F504A5DB09AD32A1DA34D942C743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction ID: e4b5cb1036e9006efae2439113f002ca23e62b81d2d35b2bbc7efc82262dff60
                                      • Opcode Fuzzy Hash: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction Fuzzy Hash: 1F51D53062DE4A4BE75DEF2894597F973D1FB69704F5042ADD85AC3287EE20DC428682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc$_errno_snprintf$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 3710081536-0
                                      • Opcode ID: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction ID: b3e565feac6dd4861e41f6dd0cc44c45d9640862b8fefe426416dc31fe295993
                                      • Opcode Fuzzy Hash: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction Fuzzy Hash: 2AE12C702166848FF758FF24C4997EAB7E1FBA8300F5045ADA1AAC76D2DB349845CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _lock$_calloc_crt_mtinitlocknum
                                      • String ID:
                                      • API String ID: 3962633935-0
                                      • Opcode ID: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction ID: baf52b1fa3e20fece15de7bfd186b9f11e08fd826e3d265323eacc64b9d91c00
                                      • Opcode Fuzzy Hash: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction Fuzzy Hash: 30510470519A098BE7189F18C8893A5B7D4FB78310F1146ADD85BC72A2DA38DD43CB83
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction ID: c9283680e46430cb8dec6fc8662aad560be0e98a35866e808ce473c59f4112f8
                                      • Opcode Fuzzy Hash: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction Fuzzy Hash: E2410330219F4D4BE76DAF2898493FA37D5EBA6714F1441ADE897C3283ED24D8078792
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-0
                                      • Opcode ID: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction ID: 6cb584ca9e65b99a86defbaf83a97f809139bd120bee45cdd4a77204f269db81
                                      • Opcode Fuzzy Hash: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction Fuzzy Hash: C151E570115A084FEB9CEF28C5CA7E977D0FB68310F5486D9D866CB2D6D674C841CB92
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 761449704-0
                                      • Opcode ID: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction ID: ad34c25ce0cba9026de47f96ab830fcba17cd9730660a9d6a661bde1a0fba1bc
                                      • Opcode Fuzzy Hash: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction Fuzzy Hash: 71417B31218A444FE744FF28C899BAA77F1FBAE340F50456DE499C32A1EA25D945C703
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction ID: 8d5b97a65d31d6f54459bb488fd5d710edb9987791d34a4084fab8c3d78c7b8b
                                      • Opcode Fuzzy Hash: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction Fuzzy Hash: B001F4302269484FFA5CAF24CE8D7D43690EF36325FA482C9E02B874E2C67C0842C623
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction ID: e61463b57cd9eef539fca791fb2001d4c5cd8af4100cb1d111e36bf64d20dc0b
                                      • Opcode Fuzzy Hash: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction Fuzzy Hash: 6901FBB0528B489FE388EF28C499B99B7E1FBE8700F80596DB499C23A1DB349544C743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction ID: 8f1b48fed87441f64c06f504cfa5d65829894850bb789267fc45402d978a39d1
                                      • Opcode Fuzzy Hash: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction Fuzzy Hash: 0D910A701197848FEBA8EF28C4997EEB7E1FBA4300F50896DE09AC3691DB759845C743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction ID: 61e8a35267fc0d42b2564f80114ca838c4b4c63caa45d851992986142daccc88
                                      • Opcode Fuzzy Hash: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction Fuzzy Hash: DB31E974518B489FDB88EF18C084B5AB7E1FBAC315F104A6DA48DD33A1CB38D941CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction ID: 7c7554a04818e7130cc0e0e67cf5076fd113120fb8ebaa9d9a83550c2317d860
                                      • Opcode Fuzzy Hash: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction Fuzzy Hash: 79510B3071AF098FE66C6E7D54CD3B576C1E779310F1492ADD4AAC39D2EAA1DC424183
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 5ac208e2595b1a4b060cc1cb817a18e808d2232176cbef351ac60f4fcc98607c
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: F721273140F7490EE76CBEA9A48A3B6B7C0E7A5750F1512ADE8A6C3243E9509C4286C7
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction ID: 4e70e9b2bd9f09bb677040abefff4d6ecb8d318333cb35b203935007965ca0a6
                                      • Opcode Fuzzy Hash: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction Fuzzy Hash: 4721077061B6654BF7ACAF28C08C3BA76D5E765315F1406EAA0F6C75C1CB648842C253
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: CurrentImageNonwritable$FindSection_initp_misc_cfltcvt_tab_initterm_e
                                      • String ID:
                                      • API String ID: 1991439119-0
                                      • Opcode ID: 20d8fef81f8701dc950607fd9be9d74995b121df42281fa78a048c32d55c9c51
                                      • Instruction ID: fc0a713253209b8d190cb8ba2db665b24c28d20a8f551dcb8d2f59595cc8dc9e
                                      • Opcode Fuzzy Hash: 20d8fef81f8701dc950607fd9be9d74995b121df42281fa78a048c32d55c9c51
                                      • Instruction Fuzzy Hash: EE119131112A094BF71EAF25ECCD7E672A4FB68301F4089A6A413C68B2EF389954C746
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction ID: 07ed59943d4235ec9bba2e3eca960349985bcc43571219076fe8396ba3a4bb23
                                      • Opcode Fuzzy Hash: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction Fuzzy Hash: AFD1F9B02597859FD7B4DF18C048BABB7E1FBAA315F90196DA5C9C3290DB309881CB17
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction ID: a785bea3863d21dc7564336e985d52ff5227e0a940f56ef6262f155ff2e4a4d1
                                      • Opcode Fuzzy Hash: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction Fuzzy Hash: D711C430218B084FD748EF5CD4897A5B3D1FBA8324F1087AEA069C32A1CB74C840CB82
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction ID: 60fb2d5199b249e7f4e8c047ea77c9d48234191a8f49ce7333d69ed9d6e87726
                                      • Opcode Fuzzy Hash: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction Fuzzy Hash: 7B51B77021DA454BEB5CDF2CD4897BA73D1FBA5700F1445ADE8ABC3286EE30EC428642
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: a2a340f4b51eb104534c09a96cdc3bde5f12c0c25e27c1dd73717b88114bec29
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: A9417230118A488FF799EF18D898BDA77E0F7A8310F60456EA49AC36E0DB38D945C743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction ID: ce4dc2144313a671e82e881ebbac28aaf2a930326208a12d0a5733bc56be394a
                                      • Opcode Fuzzy Hash: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction Fuzzy Hash: 30314F70528B4C9FE7A4EF18C488BA977E1FBA9315F50465EA49AC37A1D734D841CB02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.1932212303.0000021A31B81000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000021A31B81000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_21a31b81000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno
                                      • String ID:
                                      • API String ID: 2288870239-0
                                      • Opcode ID: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction ID: b8647eb4cd895413e67ce1dc1e4123912332ec95b2387b4f1105cdaa38678505
                                      • Opcode Fuzzy Hash: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction Fuzzy Hash: 1AF02274239948AFD698FF18C895F9977E1FBA8300F805498B059C76A2DA24E840CB12

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ($0
                                      • API String ID: 0-506339136
                                      • Opcode ID: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction ID: ac790934a1e23912c924c4f4a2b63b0a0c48ff661b75880b9e10cbf7ba4b14ca
                                      • Opcode Fuzzy Hash: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction Fuzzy Hash: CA412F30118B45EFEBB4DF68D05876AB7E1FBA8305F50493EA489C76A1EB75C944CB02

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction ID: 03dbc5ed486738a7d48e8edd860001edd3788ba3e5b22dc535e2f80b9a98c0c2
                                      • Opcode Fuzzy Hash: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction Fuzzy Hash: C531EC70618744FFE7347FD8984AB7936A0EB62320F55025DE812472D3F6B29A098751

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction ID: fc44bc650d2b39ca39246e6ad55f467bceb7e6cadb3062c96ccf60a34b2cf78d
                                      • Opcode Fuzzy Hash: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction Fuzzy Hash: 3D213E31528600BFF7346FDCDC5A7BD72E0EB62320F15025DE825C71D3E6A159058661

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction ID: 3eed3dfb0f1c4a817ff74e0ce5d8769289e3f034d54a9d5d67095f3038689c81
                                      • Opcode Fuzzy Hash: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction Fuzzy Hash: 59213831A18600BFF3386FDCD85E77C72A0EB62320F15021CE8668B2D3F6E5594582A2

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction ID: 3f638a6d1270455e3e21b4dee9d0772426e759ff2272a16eef40774b7fd3095a
                                      • Opcode Fuzzy Hash: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction Fuzzy Hash: 9C212931608600BFF3347F98D88EB7D72A0EB66320F55025DE866872E3E6E5590586A5

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction ID: 5f2a0ae47955663fb015bdf72fd67f614ac2db50ed82829b864ac524b8949b16
                                      • Opcode Fuzzy Hash: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction Fuzzy Hash: 1321D832D04A00FFF734AFE4988D3B8B690EB63310F15056DE816C72D3E67699098761

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1041 2220bba9b34-2220bba9b58 1043 2220bba9b5a-2220bba9b60 1041->1043 1044 2220bba9b74-2220bba9b8e call 2220bba9428 1041->1044 1045 2220bba9b6d-2220bba9b6e 1043->1045 1046 2220bba9b62-2220bba9b6b call 2220bba9428 1043->1046 1051 2220bba9baa-2220bba9be9 call 2220bba9428 * 3 1044->1051 1052 2220bba9b90-2220bba9b96 1044->1052 1045->1044 1046->1043 1046->1045 1063 2220bba9bfd-2220bba9c17 1051->1063 1064 2220bba9beb-2220bba9bf3 1051->1064 1054 2220bba9ba3-2220bba9ba4 1052->1054 1055 2220bba9b98-2220bba9ba1 call 2220bba9428 1052->1055 1054->1051 1055->1052 1055->1054 1068 2220bba9c19-2220bba9c1f call 2220bba9428 1063->1068 1069 2220bba9c26-2220bba9c30 1063->1069 1064->1063 1065 2220bba9bf5-2220bba9bf8 call 2220bba9428 1064->1065 1065->1063 1068->1069 1071 2220bba9c3f-2220bba9c4e 1069->1071 1072 2220bba9c32-2220bba9c38 call 2220bba9428 1069->1072 1075 2220bba9c50-2220bba9c61 1071->1075 1076 2220bba9c6f-2220bba9c79 1071->1076 1072->1071 1075->1076 1078 2220bba9c63-2220bba9c69 call 2220bba9428 1075->1078 1078->1076
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno
                                      • String ID:
                                      • API String ID: 2288870239-0
                                      • Opcode ID: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction ID: 24b3fc5ade0dc93838ad476c679f8bd745f569741fb79b19a4a102b159abca88
                                      • Opcode Fuzzy Hash: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction Fuzzy Hash: 1F416030618E0AFFFBB4EF98D8D9BAD32D5F769311F9400289845C22D1EE2D9949DB10

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1081 2220bb7460c-2220bb7463f call 2220bb7411c 1084 2220bb748c5-2220bb748d5 1081->1084 1085 2220bb74645-2220bb74653 call 2220bb7448c 1081->1085 1085->1084 1088 2220bb74659-2220bb7468f 1085->1088 1089 2220bb74695-2220bb746a1 1088->1089 1090 2220bb748c0 1088->1090 1089->1090 1091 2220bb746a7-2220bb746c9 call 2220bba9468 * 3 1089->1091 1090->1084 1098 2220bb7489f-2220bb748a2 1091->1098 1099 2220bb746cf-2220bb746d2 1091->1099 1100 2220bb748a4-2220bb748a7 call 2220bba9428 1098->1100 1101 2220bb748ac-2220bb748af 1098->1101 1102 2220bb746d8-2220bb746db 1099->1102 1103 2220bb74897-2220bb7489a call 2220bba9428 1099->1103 1100->1101 1106 2220bb748b9-2220bb748be 1101->1106 1107 2220bb748b1-2220bb748b4 call 2220bba9428 1101->1107 1102->1103 1108 2220bb746e1-2220bb746f3 1102->1108 1103->1098 1106->1084 1107->1106 1110 2220bb746f5-2220bb7470a 1108->1110 1111 2220bb7470c-2220bb74718 1108->1111 1112 2220bb7471c-2220bb74727 call 2220bb718bc 1110->1112 1111->1112 1115 2220bb7472d-2220bb74795 call 2220bbaca50 call 2220bbb0020 1112->1115 1116 2220bb7487b-2220bb74895 call 2220bba9428 * 3 1112->1116 1128 2220bb74797-2220bb7479c 1115->1128 1129 2220bb747a1-2220bb747c3 call 2220bb754f0 1115->1129 1116->1084 1128->1116 1129->1116 1132 2220bb747c9-2220bb747cc 1129->1132 1133 2220bb747e7-2220bb74800 call 2220bb754f0 1132->1133 1134 2220bb747ce-2220bb747d8 1132->1134 1133->1116 1138 2220bb74802-2220bb74808 1133->1138 1135 2220bb747da-2220bb747e5 1134->1135 1135->1133 1135->1135 1139 2220bb74823-2220bb7482d 1138->1139 1140 2220bb7480a-2220bb74814 1138->1140 1142 2220bb74838-2220bb74879 call 2220bbb0020 * 2 1139->1142 1143 2220bb7482f-2220bb74836 1139->1143 1141 2220bb74816-2220bb74821 1140->1141 1141->1139 1141->1141 1142->1116 1143->1116
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction ID: cc3a6358231421808b1678eca9bdf5e7f3fc31325294be2008039392776cb2dd
                                      • Opcode Fuzzy Hash: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction Fuzzy Hash: B191FB30718B4CABD739AE9C94557BA73D5E7A5301F50025ED88AC37C3FE21DD0A8682

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction ID: 3cfae486f041617215923a20e5ba5c6d234ac40ccdde8636cb74ad95b869b018
                                      • Opcode Fuzzy Hash: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction Fuzzy Hash: 5431F830A14A08EFFB64AFACD40936972D1FFAA310F14016EE84AC32E1EB79C945C701

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1179 2220bbb4818-2220bbb482f 1180 2220bbb4841-2220bbb4843 1179->1180 1181 2220bbb4831-2220bbb483c call 2220bbab714 1179->1181 1183 2220bbb48ce-2220bbb48d9 call 2220bbab714 call 2220bbabd3c 1180->1183 1184 2220bbb4849-2220bbb484f 1180->1184 1188 2220bbb48de 1181->1188 1183->1188 1184->1183 1186 2220bbb4851-2220bbb4875 1184->1186 1186->1183 1189 2220bbb4877-2220bbb4888 call 2220bbb438c 1186->1189 1192 2220bbb48e1-2220bbb48ee 1188->1192 1195 2220bbb488a-2220bbb489c call 2220bbb46c8 1189->1195 1196 2220bbb48b5-2220bbb48c0 call 2220bbab714 1189->1196 1205 2220bbb489e-2220bbb48a6 1195->1205 1206 2220bbb48a8 1195->1206 1201 2220bbb48c3-2220bbb48cc call 2220bbb47ec 1196->1201 1201->1192 1207 2220bbb48aa-2220bbb48ac 1205->1207 1206->1207 1207->1201 1209 2220bbb48ae-2220bbb48b3 call 2220bbab6a4 1207->1209 1209->1196
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                      • String ID:
                                      • API String ID: 4120058822-0
                                      • Opcode ID: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction ID: 4d641ed88e3e6768680906e9d7bb2716d10863a1849e372757ccdb84afdf28d1
                                      • Opcode Fuzzy Hash: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction Fuzzy Hash: F921D320A04A80FFF634AFE89C8977976A0FB66310F15025CE816873D3E6E65A088661

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1212 2220bbaa6d0-2220bbaa700 1213 2220bbaa71c 1212->1213 1214 2220bbaa702-2220bbaa705 1212->1214 1216 2220bbaa71e-2220bbaa732 1213->1216 1214->1213 1215 2220bbaa707-2220bbaa70a 1214->1215 1217 2220bbaa70c-2220bbaa711 call 2220bbab714 1215->1217 1218 2220bbaa733-2220bbaa73e 1215->1218 1230 2220bbaa717 call 2220bbabd3c 1217->1230 1219 2220bbaa740-2220bbaa74c 1218->1219 1220 2220bbaa74e-2220bbaa752 1218->1220 1219->1220 1222 2220bbaa776-2220bbaa787 1219->1222 1223 2220bbaa754-2220bbaa75f call 2220bbaca50 1220->1223 1224 2220bbaa763-2220bbaa766 1220->1224 1228 2220bbaa78e 1222->1228 1229 2220bbaa789-2220bbaa78c 1222->1229 1223->1224 1224->1217 1227 2220bbaa768-2220bbaa774 1224->1227 1227->1217 1227->1222 1232 2220bbaa793-2220bbaa79a 1228->1232 1229->1232 1230->1213 1234 2220bbaa8aa-2220bbaa8ad 1232->1234 1235 2220bbaa7a0-2220bbaa7ad 1232->1235 1234->1216 1236 2220bbaa7af-2220bbaa7b6 1235->1236 1237 2220bbaa807-2220bbaa80d 1235->1237 1240 2220bbaa802-2220bbaa803 1236->1240 1241 2220bbaa7b8 1236->1241 1238 2220bbaa80f-2220bbaa811 1237->1238 1239 2220bbaa872-2220bbaa87d call 2220bbb0d20 1237->1239 1243 2220bbaa832-2220bbaa839 1238->1243 1244 2220bbaa813-2220bbaa818 1238->1244 1247 2220bbaa8d9-2220bbaa8e4 1239->1247 1255 2220bbaa87f-2220bbaa882 1239->1255 1240->1237 1245 2220bbaa7be-2220bbaa7cb 1241->1245 1246 2220bbaa8d5 1241->1246 1251 2220bbaa83c-2220bbaa842 1243->1251 1249 2220bbaa81a-2220bbaa822 1244->1249 1250 2220bbaa824-2220bbaa82b 1244->1250 1252 2220bbaa7d1-2220bbaa7f1 call 2220bbb0e64 1245->1252 1253 2220bbaa8b2-2220bbaa8b6 1245->1253 1246->1247 1247->1216 1256 2220bbaa82d-2220bbaa830 1249->1256 1250->1256 1251->1253 1257 2220bbaa844-2220bbaa860 call 2220bbaf624 call 2220bbb1008 1251->1257 1266 2220bbaa7f3-2220bbaa7fd 1252->1266 1258 2220bbaa8c5-2220bbaa8d0 call 2220bbab714 1253->1258 1259 2220bbaa8b8-2220bbaa8c0 call 2220bbaca50 1253->1259 1255->1253 1261 2220bbaa884-2220bbaa893 1255->1261 1256->1251 1272 2220bbaa8e9-2220bbaa8ed 1257->1272 1273 2220bbaa866-2220bbaa869 1257->1273 1258->1230 1259->1258 1267 2220bbaa897-2220bbaa89f 1261->1267 1266->1267 1267->1235 1269 2220bbaa8a5-2220bbaa8a6 1267->1269 1269->1234 1272->1247 1273->1246 1274 2220bbaa86b-2220bbaa870 1273->1274 1274->1266
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction ID: 2a86049e54493819b89a1db324ec9793e45e467e2c3ba441a275caee73803543
                                      • Opcode Fuzzy Hash: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction Fuzzy Hash: E961D830A18F09BBE77C5EAC444D23AB6D1E7A6720F14031ED856C32D1FA62ED5AC6D1

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction ID: 6f224aca16f927357825b8c9d2bf5237fd6fa98fd1e5d86e2b388319da9330bb
                                      • Opcode Fuzzy Hash: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction Fuzzy Hash: AD714070118748EFE7A4EF58C448B5AB7E1FFA9340F50492DB48AC36A1DB35DA49CB42

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction ID: 1c22da0a4cf6125f811077196a74ee577cb52ae9289a89fbed467baaa5b35e35
                                      • Opcode Fuzzy Hash: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction Fuzzy Hash: 65219B30A18B4EFFF7B0EFA8540936976D1EB6B310F04055A9C45C3292FE65DE4587A1

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction ID: a73b20b826ce5c0d9335d38a015503a307bd0d754de5836fb61d7f46db5413f4
                                      • Opcode Fuzzy Hash: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction Fuzzy Hash: A7315230518A44FFD764FF68C45975E77E1FBAC304F500A1DB88AD32A1EA359A49C742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction ID: 9d32f90e242cd6254bc470e25b83111258b45dc1772acb4977e184fd5c95433e
                                      • Opcode Fuzzy Hash: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction Fuzzy Hash: 3951E730728E09BFE769AFA894596B973D5FB59301F50012DDC8AC3387FE21DD5A8680
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc$_errno_snprintf$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 3710081536-0
                                      • Opcode ID: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction ID: fcc3f0a4cabaa30de5c0e72ed07c9268b45ff8d4de219bc1c951ca0283aa8776
                                      • Opcode Fuzzy Hash: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction Fuzzy Hash: 5FE16370614644FFF764EFA4C4597AAB7E1FBA5300F40042DA986C76D2EF369A09CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _lock$_calloc_crt_mtinitlocknum
                                      • String ID:
                                      • API String ID: 3962633935-0
                                      • Opcode ID: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction ID: 99d4bdafd6318c6e2d8db41ffdb8f1fe461cef9d4d117ff128baf690a6a56236
                                      • Opcode Fuzzy Hash: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction Fuzzy Hash: 8F511770514E09EFE7289F98C889B65B3E0FB68310F15056DDC4AC72A3E6B5DD46C782
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction ID: fe4fe60d019e12c43980159159a9271163146840afd1f76a0e03ada97d1dafaa
                                      • Opcode Fuzzy Hash: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction Fuzzy Hash: 1B41E930268B0DABE779DEA8444967A36D5E7B6310F14012DDCC7C3243FD22DA0B8791
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-0
                                      • Opcode ID: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction ID: 62b82cfcd1006e4a1bfabe70c7833395d1d17437ff74731395ca83403c0f92f2
                                      • Opcode Fuzzy Hash: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction Fuzzy Hash: E551E630914A08FFEB78DFA8C08976577E0FB66310F140659DC65CB2D6E676DA49C780
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 761449704-0
                                      • Opcode ID: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction ID: ec116ade9a736686390a4bb3a7fe0ec04b6aea6db6b72557d74716cd5e73212a
                                      • Opcode Fuzzy Hash: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction Fuzzy Hash: 67417B3021CA48EFEB50EF68C459F6A77F1FBA9344F50052DE4C9C32A1EA25D949C711
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction ID: 7a2c0652cd9f50f47fd8323c043b3dbae70296efa8aba9fc7807a7ed4cae78e2
                                      • Opcode Fuzzy Hash: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction Fuzzy Hash: 4601D630614944FFF674AFA8C949B9431B0FF37325F5442489815872E3E6BA4549C621
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction ID: 21ee17542fa15a85429f8f00ec58e5816b8c5a705e50a9901508fd4aaaac6475
                                      • Opcode Fuzzy Hash: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction Fuzzy Hash: 9401FF70528744FFE794EF58C459B69B7E1FBE4700F80052DB889C2291EB359648C742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction ID: ded07954fa7e447e82db6e32e2f74d24300b55f6e9a94ff0849d4cba33745593
                                      • Opcode Fuzzy Hash: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction Fuzzy Hash: 64915170508744EFE7B4EFA8C44979EB7E1FBA5300F54092DE48AC3291EB769A49C742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction ID: f344b8507d952d58e8dac7ea66744303ec71e71bbd04cb21274130cd54715899
                                      • Opcode Fuzzy Hash: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction Fuzzy Hash: 4C31E974518B48AFDB94EF18C044A5AB7E1FBAC315F100A6DA4CDD73A1DB34EA41CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction ID: 050b9a236047af52626b9ac317c138f3c59db328aa4a5caf77a1ab5c921f10ed
                                      • Opcode Fuzzy Hash: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction Fuzzy Hash: 1351D530A18F09ABE6786EAD545D33572D1E77A310F14022EDC9AC31D2FA62DD5AC191
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 2539a7d902c9da71e31172430ffd05efda55f66eb4d2e153f69d84b2b772717e
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: 3D215B3144C708BFE778ADEC944A776B3D0D7A5350F15022DEC86D7943F9528E4A82E2
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction ID: f2e1d0b617930ff43c583436359036bd188c5dfa1f2606f8b8da947d23338de5
                                      • Opcode Fuzzy Hash: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction Fuzzy Hash: A2219120518664FFE7B49FA9409CB3A36F0E765311F84055DEAD6C30D1EBE18A49C350
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: CurrentImageNonwritable$FindSection_initp_misc_cfltcvt_tab_initterm_e
                                      • String ID:
                                      • API String ID: 1991439119-0
                                      • Opcode ID: 20d8fef81f8701dc950607fd9be9d74995b121df42281fa78a048c32d55c9c51
                                      • Instruction ID: c66ed46484e8be53a1e54394ea7310311183084516ed68bee066483d25e033eb
                                      • Opcode Fuzzy Hash: 20d8fef81f8701dc950607fd9be9d74995b121df42281fa78a048c32d55c9c51
                                      • Instruction Fuzzy Hash: AE11C830510909FBF725AFA4DC9D7D572A0F76A300F5049269882C60A1FF358A8CD744
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction ID: c7e34e45548f05a02c99d951c8861d70df7c132a9a474f3d09e59119d694aa05
                                      • Opcode Fuzzy Hash: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction Fuzzy Hash: 1DD10970248785EFDBB0DF68C0547ABB7E1FB9A314F90192DA989C3650DB329844CB07
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction ID: e6cc2e9d793c5d46248daa991e986095e2d5f2f6c4fe9a08a023848d874b9af3
                                      • Opcode Fuzzy Hash: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction Fuzzy Hash: A411C430618B08AFD764EF5CD489765B7D1FBA8324F1047AEA459C32A1DB74C944CB82
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction ID: fb12fff4c6e9b4f10bde0ee9d1f48d0416b57f011f0b3f87e124d1bd8db57716
                                      • Opcode Fuzzy Hash: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction Fuzzy Hash: 9251D83061CA05ABEB68DF6C949927973D1FBA5301F10456DEC9BC3786FE31DD0A8641
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 5397e6d456d51d97b014cbba1d03d9ff13df33a02cd6019b236e5793be4bd5c0
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 3A41423051CA48EFE765EF5DD858B9A77E0F7A9310F500529A88AC32E0EB35DE49C742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction ID: ec5dc4f6d390c2c1d305dac269d98188e7b403b2e595e213c5e0379a322e8c97
                                      • Opcode Fuzzy Hash: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction Fuzzy Hash: 9E31F17091CB4CFFE7A0EF18C448B6977E1FBAA315F50061DA48AC32A1EB359945CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.1935017877.000002220BB71000.00000020.00001000.00020000.00000000.sdmp, Offset: 000002220BB71000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_2220bb71000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno
                                      • String ID:
                                      • API String ID: 2288870239-0
                                      • Opcode ID: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction ID: 95ae49148fb847bdfd8d958ec2bf3f35a870c02c8aa97f800edfc8909afd7fba
                                      • Opcode Fuzzy Hash: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction Fuzzy Hash: 5AF0A53462C948BFD6D8FF58C895E9977E1FFA9300F801458B489C73A2EA21E944CB02

                                      Callgraph

                                      • Executed
                                      • Not Executed
                                      • Opacity -> Relevance
                                      • Disassembly available
                                      callgraph 0 Function_00007FF8E7D7EBDF 27 Function_00007FF8E7DC06C0 0->27 1 Function_00007FF8E7DACC62 2 Function_00007FF8E7DB31E0 51 Function_00007FF8E7D913A4 2->51 53 Function_00007FF8E7D8EA27 2->53 3 Function_00007FF8E7D73C5D 3->27 4 Function_00007FF8E7D7115A 75 Function_00007FF8E7D71000 4->75 5 Function_00007FF8E7DC08E6 6 Function_00007FF8E7DC07E4 7 Function_00007FF8E7DABC65 8 Function_00007FF8E7DC0764 9 Function_00007FF8E7D773E6 9->0 9->3 14 Function_00007FF8E7D7146E 9->14 25 Function_00007FF8E7DB336D 9->25 26 Function_00007FF8E7D712BE 9->26 9->27 33 Function_00007FF8E7D9F9C5 9->33 43 Function_00007FF8E7D92FD5 9->43 10 Function_00007FF8E7DACEDB 11 Function_00007FF8E7D94A5B 11->3 11->27 79 Function_00007FF8E7D7B38D 11->79 12 Function_00007FF8E7DC0858 13 Function_00007FF8E7D755EE 14->4 14->43 14->53 15 Function_00007FF8E7D7876C 16 Function_00007FF8E7DAD4F4 17 Function_00007FF8E7DB1D75 17->27 28 Function_00007FF8E7DAEBC1 17->28 17->51 17->53 18 Function_00007FF8E7DC0874 19 Function_00007FF8E7DA52E8 19->3 19->27 39 Function_00007FF8E7D853CE 19->39 19->43 19->53 20 Function_00007FF8E7DAE1E8 20->51 20->53 21 Function_00007FF8E7DAD768 22 Function_00007FF8E7D84973 22->27 23 Function_00007FF8E7DAB9EC 24 Function_00007FF8E7DAC9EC 25->17 25->27 25->43 25->53 84 Function_00007FF8E7DB1F89 25->84 26->4 26->43 26->53 28->0 28->3 28->27 28->43 28->53 29 Function_00007FF8E7DAD3C1 30 Function_00007FF8E7DC07C0 31 Function_00007FF8E7DC31C0 32 Function_00007FF8E7DC0740 33->3 33->11 33->27 33->39 33->43 33->51 33->53 68 Function_00007FF8E7D7A87D 33->68 73 Function_00007FF8E7D86284 33->73 77 Function_00007FF8E7D98091 33->77 34 Function_00007FF8E7DAC3C5 35 Function_00007FF8E7DC0744 36 Function_00007FF8E7DAC63D 37 Function_00007FF8E7DC093C 38 Function_00007FF8E7DAD9D2 39->3 39->22 39->27 40 Function_00007FF8E7D764CC 40->3 40->27 41 Function_00007FF8E7DABED1 42 Function_00007FF8E7DC9AD0 43->3 43->27 44 Function_00007FF8E7DAD149 45 Function_00007FF8E7D75452 45->26 46 Function_00007FF8E7D788D2 46->27 47 Function_00007FF8E7DAC14D 48 Function_00007FF8E7DC07A2 49 Function_00007FF8E7D894A2 49->3 49->22 49->27 50 Function_00007FF8E7DC0820 51->3 51->27 52 Function_00007FF8E7DAB8A7 53->3 53->15 53->27 53->46 54 Function_00007FF8E7DAD89B 55 Function_00007FF8E7DC0718 56 Function_00007FF8E7DABD9E 57 Function_00007FF8E7DABB1F 58 Function_00007FF8E7DC071C 59 Function_00007FF8E7D96FB5 59->3 59->27 60 Function_00007FF8E7DAC8B5 61 Function_00007FF8E7DAD635 62 Function_00007FF8E7DC08A8 63 Function_00007FF8E7DC0728 64 Function_00007FF8E7D752B3 64->14 65 Function_00007FF8E7DACB2F 66 Function_00007FF8E7DAAF2D 66->9 66->27 67 Function_00007FF8E7DAC782 68->27 69 Function_00007FF8E7DAC280 70 Function_00007FF8E7D99902 70->27 70->68 71 Function_00007FF8E7DC0784 72 Function_00007FF8E7DAC4F8 73->3 73->27 74 Function_00007FF8E7DB477C 74->3 74->27 74->39 74->43 74->51 74->53 76 Function_00007FF8E7DAD012 77->3 77->27 77->59 78 Function_00007FF8E7DC0712 79->3 79->27 80 Function_00007FF8E7DC0690 80->33 81 Function_00007FF8E7DADB17 82 Function_00007FF8E7DACD95 83 Function_00007FF8E7DAC008 84->0 84->3 84->27 84->51 84->53 85 Function_00007FF8E7DB4E89 86 Function_00007FF8E7DAD28E
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000B.00000002.3531355107.00007FF8E7D71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF8E7D70000, based on PE: true
                                      • Associated: 0000000B.00000002.3531105903.00007FF8E7D70000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 0000000B.00000002.3532072918.00007FF8E7DCD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 0000000B.00000002.3532072918.00007FF8E7E29000.00000008.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 0000000B.00000002.3532797771.00007FF8E7E59000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_11_2_7ff8e7d70000_rundll32.jbxd
                                      Similarity
                                      • API ID: Section$OpenView
                                      • String ID: 64?t$74?t$74?t$74?t$s>F$t>F$t>F$t>F
                                      • API String ID: 2380476227-1607135101
                                      • Opcode ID: cdd7cb33f92d3cd4137b229b801e8123ff88596f322070d37470624a74b11fb1
                                      • Instruction ID: 78531e20d1a8a7a5f91a287f691863bd3a2a2aeaf577cddf419f80d783472bb6
                                      • Opcode Fuzzy Hash: cdd7cb33f92d3cd4137b229b801e8123ff88596f322070d37470624a74b11fb1
                                      • Instruction Fuzzy Hash: 5CB36072B04A868AEB658F69D8903EC33A5FB44BC8F104535DA5D8B798DF3CE641C706