Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
105vjMVwfJ.dll

Overview

General Information

Sample name:105vjMVwfJ.dll
renamed because original name is a hash value
Original sample name:e25e0bada18fdf7b3e954445179f5905267bf6d8331f7a9260a8f44c2f949da1.exe
Analysis ID:1568432
MD5:be5df0fee4e84ccc38a4ec67ad130759
SHA1:1b540a57166401c1b6dffc8c75378fbf83a7f58a
SHA256:e25e0bada18fdf7b3e954445179f5905267bf6d8331f7a9260a8f44c2f949da1
Tags:exeuser-JAMESWT_MHT
Infos:

Detection

CobaltStrike
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found direct / indirect Syscall (likely to bypass EDR)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file does not import any functions
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll64.exe (PID: 2268 cmdline: loaddll64.exe "C:\Users\user\Desktop\105vjMVwfJ.dll" MD5: 763455F9DCB24DFEECC2B9D9F8D46D52)
    • conhost.exe (PID: 2820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6416 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",#1 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • rundll32.exe (PID: 3212 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",#1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1588 cmdline: rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DAssemble MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2872 cmdline: rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DCompile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 7044 cmdline: rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DCompile2 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5112 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DAssemble MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6788 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2544 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompile2 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3352 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",IEX MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1948 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",DebugSetMute MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6976 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DWriteBlobToFile MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1060 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DStripShader MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3620 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DSetBlobPart MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3608 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReturnFailure1 MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4512 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReflectLibrary MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1292 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReflect MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6712 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReadFileToBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6600 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DPreprocess MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5328 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DLoadModule MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4904 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetTraceInstructionOffsets MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5536 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetOutputSignatureBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6260 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetInputSignatureBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6228 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetInputAndOutputSignatureBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1808 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetDebugInfo MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 5564 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetBlobPart MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3976 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassembleRegion MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6656 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble11Trace MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6184 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble10Effect MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 4916 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2852 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDecompressShaders MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3804 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateLinker MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 2724 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateFunctionLinkingGraph MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 6804 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateBlob MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 1208 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompressShaders MD5: EF3179D498793BF4234F708D3BE28633)
    • rundll32.exe (PID: 3424 cmdline: rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompileFromFile MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 18500, "MaxGetSize": 2140839, "Jitter": 35, "C2Server": "163.5.169.26,/broadcast", "HttpPostUri": "/1/events/com.amazon.csm.csa.prod", "Malleable_C2_Instructions": ["Remove 1308 bytes from the end", "Remove 1 bytes from the end", "Remove 194 bytes from the beginning", "Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\wermgr.exe", "Spawnto_x64": "%windir%\\sysnative\\wermgr.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 12345, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 24576, "ProcInject_PrependAppend_x86": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_PrependAppend_x64": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
00000000.00000002.4390842892.0000024BB68AC000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
    00000003.00000002.2635114835.0000012E5460C000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000008.00000002.2712283227.000001D327A8C000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        00000004.00000002.2645352424.000001EFEFB2C000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
          00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
            Click to see the 15 entries
            SourceRuleDescriptionAuthorStrings
            4.3.rundll32.exe.1efef930000.0.unpackJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
              4.3.rundll32.exe.1efef930000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
                4.3.rundll32.exe.1efef930000.0.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
                  0.3.loaddll64.exe.24bb66e0000.0.unpackJoeSecurity_CobaltStrike_2Yara detected CobaltStrikeJoe Security
                    0.3.loaddll64.exe.24bb66e0000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
                      Click to see the 10 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-12-04T16:19:56.729219+010020287653Unknown Traffic192.168.2.649826163.5.169.26443TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTPS"], "Port": 443, "SleepTime": 18500, "MaxGetSize": 2140839, "Jitter": 35, "C2Server": "163.5.169.26,/broadcast", "HttpPostUri": "/1/events/com.amazon.csm.csa.prod", "Malleable_C2_Instructions": ["Remove 1308 bytes from the end", "Remove 1 bytes from the end", "Remove 194 bytes from the beginning", "Base64 decode"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\wermgr.exe", "Spawnto_x64": "%windir%\\sysnative\\wermgr.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 12345, "bStageCleanup": "True", "bCFGCaution": "True", "KillDate": 0, "bProcInject_StartRWX": "False", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 24576, "ProcInject_PrependAppend_x86": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_PrependAppend_x64": ["REBLQ0xIkGaQDx8AZg8fBAAPHwQADx8ADx8A", "Empty"], "ProcInject_Execute": ["ntdll.dll:RtlUserThreadStart", "SetThreadContext", "NtQueueApcThread-s", "kernel32.dll:LoadLibraryA", "CreateRemoteThread", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "NtMapViewOfSection", "bUsesCookies": "False", "HostHeader": ""}
                      Source: 105vjMVwfJ.dllReversingLabs: Detection: 44%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
                      Source: 105vjMVwfJ.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 163.5.169.26
                      Source: Joe Sandbox ViewASN Name: EPITECHFR EPITECHFR
                      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49826 -> 163.5.169.26:443
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: unknownTCP traffic detected without corresponding DNS query: 163.5.169.26
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://ocsp.thawte.com0
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://s2.symcb.com0
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://sv.symcb.com/sv.crl0f
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://sv.symcb.com/sv.crt0
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://sv.symcd.com0&
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://www.symauth.com/cps0(
                      Source: 105vjMVwfJ.dllString found in binary or memory: http://www.symauth.com/rpa00
                      Source: loaddll64.exe, 00000000.00000003.3374781978.0000024BB67C5000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3822596909.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3374781978.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4387902884.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.5.169.26/
                      Source: loaddll64.exe, 00000000.00000003.3374781978.0000024BB67C5000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3374781978.0000024BB67DA000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4387902884.0000024BB67DA000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4387902884.0000024BB67C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.5.169.26/broadcast
                      Source: loaddll64.exe, 00000000.00000003.3374781978.0000024BB67C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.5.169.26/l
                      Source: loaddll64.exe, 00000000.00000003.3822596909.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3374781978.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4387902884.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://163.5.169.26/t
                      Source: 105vjMVwfJ.dllString found in binary or memory: https://d.symcb.com/cps0%
                      Source: 105vjMVwfJ.dllString found in binary or memory: https://d.symcb.com/rpa0
                      Source: rundll32.exe, 00000008.00000002.2710960968.000001D32619F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49863
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49863 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49899 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49899
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB67287500_3_0000024BB6728750
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB6719F340_3_0000024BB6719F34
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB671B5440_3_0000024BB671B544
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB66E96800_3_0000024BB66E9680
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB671AC600_3_0000024BB671AC60
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB67259000_3_0000024BB6725900
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB671F9E40_3_0000024BB671F9E4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB66E916C0_3_0000024BB66E916C
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB66FB1F40_3_0000024BB66FB1F4
                      Source: C:\Windows\System32\loaddll64.exeCode function: 0_3_0000024BB6724AA80_3_0000024BB6724AA8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52D99F343_3_0000012E52D99F34
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52DA87503_3_0000012E52DA8750
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52D696803_3_0000012E52D69680
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52D9AC603_3_0000012E52D9AC60
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52D9B5443_3_0000012E52D9B544
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52D7B1F43_3_0000012E52D7B1F4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52D9F9E43_3_0000012E52D9F9E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52DA4AA83_3_0000012E52DA4AA8
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52D6916C3_3_0000012E52D6916C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_3_0000012E52DA59003_3_0000012E52DA5900
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E545FBFCC3_2_0000012E545FBFCC
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E545FB8603_2_0000012E545FB860
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E545FCB5C3_2_0000012E545FCB5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E546005E43_2_0000012E546005E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E545F9D703_2_0000012E545F9D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF974AA84_3_000001EFEF974AA8
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF96F9E44_3_000001EFEF96F9E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF94B1F44_3_000001EFEF94B1F4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF93916C4_3_000001EFEF93916C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF9759004_3_000001EFEF975900
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF969F344_3_000001EFEF969F34
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF9787504_3_000001EFEF978750
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF9396804_3_000001EFEF939680
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF96B5444_3_000001EFEF96B544
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_3_000001EFEF96AC604_3_000001EFEF96AC60
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFB273D04_2_000001EFEFB273D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFB1CB5C4_2_000001EFEFB1CB5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFB1B8604_2_000001EFEFB1B860
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFB1BFCC4_2_000001EFEFB1BFCC
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFB205E44_2_000001EFEFB205E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFB27D404_2_000001EFEFB27D40
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFB19D704_2_000001EFEFB19D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC932B1F46_3_000001BFC932B1F4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC934F9E46_3_000001BFC934F9E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC9354AA86_3_000001BFC9354AA8
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC934B5446_3_000001BFC934B544
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC934AC606_3_000001BFC934AC60
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC93587506_3_000001BFC9358750
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC9349F346_3_000001BFC9349F34
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC93196806_3_000001BFC9319680
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC93559006_3_000001BFC9355900
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_3_000001BFC931916C6_3_000001BFC931916C
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001BFCABFB8606_2_000001BFCABFB860
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001BFCAC005E46_2_000001BFCAC005E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001BFCABFBFCC6_2_000001BFCABFBFCC
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D3260E96808_3_000001D3260E9680
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D3261287508_3_000001D326128750
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D326119F348_3_000001D326119F34
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D32611AC608_3_000001D32611AC60
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D32611B5448_3_000001D32611B544
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D32611F9E48_3_000001D32611F9E4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D3260FB1F48_3_000001D3260FB1F4
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D326124AA88_3_000001D326124AA8
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D3261259008_3_000001D326125900
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_3_000001D3260E916C8_3_000001D3260E916C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A79D708_2_000001D327A79D70
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A87D408_2_000001D327A87D40
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A873D08_2_000001D327A873D0
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A7CB5C8_2_000001D327A7CB5C
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A7B8608_2_000001D327A7B860
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A7BFCC8_2_000001D327A7BFCC
                      Source: 105vjMVwfJ.dllStatic PE information: invalid certificate
                      Source: 105vjMVwfJ.dllStatic PE information: No import functions for PE file found
                      Source: 105vjMVwfJ.dllBinary or memory string: OriginalFilenameiisexpress.exe\ vs 105vjMVwfJ.dll
                      Source: classification engineClassification label: mal92.troj.evad.winDLL@72/0@0/1
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2820:120:WilError_03
                      Source: 105vjMVwfJ.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Windows\System32\loaddll64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DAssemble
                      Source: 105vjMVwfJ.dllReversingLabs: Detection: 44%
                      Source: unknownProcess created: C:\Windows\System32\loaddll64.exe loaddll64.exe "C:\Users\user\Desktop\105vjMVwfJ.dll"
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DAssemble
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",#1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DCompile
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DCompile2
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DAssemble
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompile
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompile2
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",IEX
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",DebugSetMute
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DWriteBlobToFile
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DStripShader
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DSetBlobPart
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReturnFailure1
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReflectLibrary
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReflect
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReadFileToBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DPreprocess
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DLoadModule
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetTraceInstructionOffsets
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetOutputSignatureBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetInputSignatureBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetInputAndOutputSignatureBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetDebugInfo
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetBlobPart
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassembleRegion
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble11Trace
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble10Effect
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDecompressShaders
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateLinker
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateFunctionLinkingGraph
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateBlob
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompressShaders
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompileFromFile
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DAssembleJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DCompileJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DCompile2Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DAssembleJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompileJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompile2Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",IEXJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",DebugSetMuteJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DWriteBlobToFileJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DStripShaderJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DSetBlobPartJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReturnFailure1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReflectLibraryJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReflectJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReadFileToBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DPreprocessJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DLoadModuleJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetTraceInstructionOffsetsJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetOutputSignatureBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetInputSignatureBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetInputAndOutputSignatureBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetDebugInfoJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetBlobPartJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassembleRegionJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble11TraceJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble10EffectJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassembleJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDecompressShadersJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateLinkerJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateFunctionLinkingGraphJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateBlobJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompressShadersJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompileFromFileJump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                      Source: 105vjMVwfJ.dllStatic PE information: Image base 0x180000000 > 0x60000000
                      Source: 105vjMVwfJ.dllStatic file information: File size 1050144 > 1048576
                      Source: 105vjMVwfJ.dllStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E545CA35D push edi; iretd 3_2_0000012E545CA35E
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E5460252E push es; iretd 3_2_0000012E5460252F
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E545CBD58 push ebp; iretd 3_2_0000012E545CBD59
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E545CA71E push cs; retf 3_2_0000012E545CA71F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFAEA35D push edi; iretd 4_2_000001EFEFAEA35E
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFAEA71E push cs; retf 4_2_000001EFEFAEA71F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFB2A5D8 push ebp; iretd 4_2_000001EFEFB2A5DD
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFB2252E push es; iretd 4_2_000001EFEFB2252F
                      Source: C:\Windows\System32\rundll32.exeCode function: 4_2_000001EFEFAEBD58 push ebp; iretd 4_2_000001EFEFAEBD59
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001BFCABCBD58 push ebp; iretd 6_2_000001BFCABCBD59
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001BFCABCA35D push edi; iretd 6_2_000001BFCABCA35E
                      Source: C:\Windows\System32\rundll32.exeCode function: 6_2_000001BFCABCA71E push cs; retf 6_2_000001BFCABCA71F
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A4A71E push cs; retf 8_2_000001D327A4A71F
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A8252E push es; iretd 8_2_000001D327A8252F
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A4BD58 push ebp; iretd 8_2_000001D327A4BD59
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A4A35D push edi; iretd 8_2_000001D327A4A35E
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A85890 push ebp; iretd 8_2_000001D327A85891
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A85867 push ebp; iretd 8_2_000001D327A85868
                      Source: C:\Windows\System32\rundll32.exeCode function: 8_2_000001D327A85847 push ebp; iretd 8_2_000001D327A85848
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\loaddll64.exe TID: 5636Thread sleep time: -120000s >= -30000sJump to behavior
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\loaddll64.exeThread delayed: delay time: 120000Jump to behavior
                      Source: rundll32.exe, 00000004.00000002.2645242685.000001EFEF9FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll%KnQ
                      Source: rundll32.exe, 00000006.00000002.2701240727.000001BFC922F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll&Km
                      Source: loaddll64.exe, 00000000.00000003.3822596909.0000024BB67FA000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4387902884.0000024BB67FA000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3374781978.0000024BB67FA000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4354404600.0000024BB677C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: rundll32.exe, 00000003.00000002.2634991507.0000012E52B8F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                      Source: C:\Windows\System32\loaddll64.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x24BB68700E6Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtQueryVolumeInformationFile: Direct from: 0x24BB68A21A7Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtQuerySystemInformation: Direct from: 0x24BB687020BJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FFDA366FBDDJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x24BB68994C3Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FFDA3674543Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtQueryInformationToken: Direct from: 0x24BB6877DB0Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x24BB686F716Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x24BB66FD169Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FFDA3670E67Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FF79F1315F3Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtDelayExecution: Direct from: 0x7FFDA3671B34Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtSetSecurityObject: Direct from: 0x7FFDB43E26A1Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x24BB66FD0DCJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtClose: Direct from: 0x7FFDA36623B0
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FFDB4404B5EJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FF79F131CF4Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x24BB66FD1B2Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x7FFDA366EE28Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x24BB66FCBBBJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtSetInformationThread: Direct from: 0x7FF79F13D459Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x24BB68611BEJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtClose: Direct from: 0x24BB68701D0
                      Source: C:\Windows\System32\loaddll64.exeNtQueryInformationToken: Direct from: 0x24BB686FA82Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtProtectVirtualMemory: Direct from: 0x24BB686FB61Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtCreateThreadEx: Direct from: 0x7FFDA36745D2Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FF79F131957Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtDeviceIoControlFile: Direct from: 0x24BB6870141Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FFDA3673D00Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtAllocateVirtualMemory: Direct from: 0x7FF79F13154BJump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtQuerySystemInformation: Direct from: 0x24BB66FCD31Jump to behavior
                      Source: C:\Windows\System32\loaddll64.exeNtUnmapViewOfSection: Direct from: 0x7FFDA36633F2Jump to behavior
                      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\rundll32.exe rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",#1Jump to behavior
                      Source: C:\Windows\System32\rundll32.exeCode function: 3_2_0000012E545D7CFC GetUserNameA,strrchr,_snprintf,3_2_0000012E545D7CFC
                      Source: C:\Windows\System32\loaddll64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 4.3.rundll32.exe.1efef930000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.loaddll64.exe.24bb66e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.3.rundll32.exe.1d3260e0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.3.rundll32.exe.12e52d60000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.3.rundll32.exe.1bfc9310000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4390842892.0000024BB68AC000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000002.2635114835.0000012E5460C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.2712283227.000001D327A8C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.2645352424.000001EFEFB2C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.2701342655.000001BFCAC0C000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: loaddll64.exe PID: 2268, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 1588, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3212, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 2872, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 7044, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Disable or Modify Tools
                      OS Credential Dumping1
                      Security Software Discovery
                      Remote Services1
                      Archive Collected Data
                      12
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      Abuse Elevation Control Mechanism
                      11
                      Virtualization/Sandbox Evasion
                      LSASS Memory11
                      Virtualization/Sandbox Evasion
                      Remote Desktop ProtocolData from Removable Media11
                      Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      11
                      Process Injection
                      Security Account Manager1
                      Account Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      Abuse Elevation Control Mechanism
                      NTDS1
                      System Owner/User Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA Secrets2
                      System Information Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Rundll32
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      DLL Side-Loading
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1568432 Sample: 105vjMVwfJ.dll Startdate: 04/12/2024 Architecture: WINDOWS Score: 92 23 Found malware configuration 2->23 25 Multi AV Scanner detection for submitted file 2->25 27 Yara detected CobaltStrike 2->27 29 2 other signatures 2->29 7 loaddll64.exe 7 2->7         started        process3 dnsIp4 21 163.5.169.26, 443, 49826, 49863 EPITECHFR France 7->21 31 Found direct / indirect Syscall (likely to bypass EDR) 7->31 11 cmd.exe 1 7->11         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        17 32 other processes 7->17 signatures5 process6 process7 19 rundll32.exe 11->19         started       

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      105vjMVwfJ.dll45%ReversingLabsWin64.Backdoor.Cobeacon
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://163.5.169.26/0%Avira URL Cloudsafe
                      https://163.5.169.26/l0%Avira URL Cloudsafe
                      163.5.169.260%Avira URL Cloudsafe
                      https://163.5.169.26/broadcast0%Avira URL Cloudsafe
                      https://163.5.169.26/t0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      fp2e7a.wpc.phicdn.net
                      192.229.221.95
                      truefalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        163.5.169.26true
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://163.5.169.26/loaddll64.exe, 00000000.00000003.3374781978.0000024BB67C5000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3822596909.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3374781978.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4387902884.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://163.5.169.26/tloaddll64.exe, 00000000.00000003.3822596909.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3374781978.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4387902884.0000024BB67E9000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://163.5.169.26/broadcastloaddll64.exe, 00000000.00000003.3374781978.0000024BB67C5000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000003.3374781978.0000024BB67DA000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4387902884.0000024BB67DA000.00000004.00000020.00020000.00000000.sdmp, loaddll64.exe, 00000000.00000002.4387902884.0000024BB67C5000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.thawte.com/ThawteTimestampingCA.crl0105vjMVwfJ.dllfalse
                          high
                          http://www.symauth.com/cps0(105vjMVwfJ.dllfalse
                            high
                            http://www.symauth.com/rpa00105vjMVwfJ.dllfalse
                              high
                              https://www.amazon.comrundll32.exe, 00000008.00000002.2710960968.000001D32619F000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://163.5.169.26/lloaddll64.exe, 00000000.00000003.3374781978.0000024BB67C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ocsp.thawte.com0105vjMVwfJ.dllfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  163.5.169.26
                                  unknownFrance
                                  56339EPITECHFRtrue
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1568432
                                  Start date and time:2024-12-04 16:16:59 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 8m 56s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Run name:Run with higher sleep bypass
                                  Number of analysed new started processes analysed:42
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:105vjMVwfJ.dll
                                  renamed because original name is a hash value
                                  Original Sample Name:e25e0bada18fdf7b3e954445179f5905267bf6d8331f7a9260a8f44c2f949da1.exe
                                  Detection:MAL
                                  Classification:mal92.troj.evad.winDLL@72/0@0/1
                                  EGA Information:
                                  • Successful, ratio: 80%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 17
                                  • Number of non-executed functions: 338
                                  Cookbook Comments:
                                  • Found application associated with file extension: .dll
                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                  • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                  • Excluded domains from analysis (whitelisted): crl.edge.digicert.com, client.wns.windows.com, ts-crl.ws.symantec.com, crl-symcprod.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target loaddll64.exe, PID 2268 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report creation exceeded maximum time and may have missing disassembly code information.
                                  • Report size exceeded maximum capacity and may have missing behavior information.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • VT rate limit hit for: 105vjMVwfJ.dll
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  163.5.169.267RDTQuL8WF.exeGet hashmaliciousCobaltStrikeBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    fp2e7a.wpc.phicdn.net5LZZEXBpNE.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    • 192.229.221.95
                                    3861227PDF.exeGet hashmaliciousAZORultBrowse
                                    • 192.229.221.95
                                    Order_DEC2024.wsfGet hashmaliciousRemcosBrowse
                                    • 192.229.221.95
                                    lnvoice-1620804301.pdf .jsGet hashmaliciousRHADAMANTHYSBrowse
                                    • 192.229.221.95
                                    lnvoice-1620804301.pdf (1).jsGet hashmaliciousRHADAMANTHYSBrowse
                                    • 192.229.221.95
                                    P102462 INVOICE.exeGet hashmaliciousFormBookBrowse
                                    • 192.229.221.95
                                    30550107002876429834.jsGet hashmaliciousStrela DownloaderBrowse
                                    • 192.229.221.95
                                    file.exeGet hashmaliciousStealcBrowse
                                    • 192.229.221.95
                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                    • 192.229.221.95
                                    ft.exeGet hashmaliciousLummaC StealerBrowse
                                    • 192.229.221.95
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    EPITECHFR7RDTQuL8WF.exeGet hashmaliciousCobaltStrikeBrowse
                                    • 163.5.169.26
                                    botx.spc.elfGet hashmaliciousMiraiBrowse
                                    • 163.5.176.64
                                    spc.elfGet hashmaliciousMiraiBrowse
                                    • 163.5.130.180
                                    m68k.elfGet hashmaliciousMiraiBrowse
                                    • 163.5.176.71
                                    sora.sh4.elfGet hashmaliciousMiraiBrowse
                                    • 163.5.152.99
                                    SecuriteInfo.com.Win32.MalwareX-gen.20028.17631.exeGet hashmaliciousAsyncRATBrowse
                                    • 163.5.160.86
                                    jNA5BK2z12.exeGet hashmaliciousAsyncRATBrowse
                                    • 163.5.160.86
                                    la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                    • 163.5.63.254
                                    https://zupimages.net/up/24/42/ol13.jpg?d6mSMvU0ZvpGwffnuqPHYMR7NvlxIzVjDfTD4YJjdRSCOccGet hashmaliciousUnknownBrowse
                                    • 163.5.194.37
                                    Farahexperiences.com_Report_52288.pdfGet hashmaliciousUnknownBrowse
                                    • 163.5.194.34
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                    Entropy (8bit):6.47410437444631
                                    TrID:
                                    • Win64 Dynamic Link Library (generic) (102004/3) 86.43%
                                    • Win64 Executable (generic) (12005/4) 10.17%
                                    • Generic Win/DOS Executable (2004/3) 1.70%
                                    • DOS Executable Generic (2002/1) 1.70%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.01%
                                    File name:105vjMVwfJ.dll
                                    File size:1'050'144 bytes
                                    MD5:be5df0fee4e84ccc38a4ec67ad130759
                                    SHA1:1b540a57166401c1b6dffc8c75378fbf83a7f58a
                                    SHA256:e25e0bada18fdf7b3e954445179f5905267bf6d8331f7a9260a8f44c2f949da1
                                    SHA512:46bac30b70a819bbcf1240dcc99abcb6d626e1e34f2a7a71022049ea672c60324702f3f51dc894a69e9cad6cdbcba8cf8a0cce9ac10feec998cc99727411f424
                                    SSDEEP:12288:EIDvCzFdigSVXfIG1gb73dhbWK9WTHUIkM5QeLDoK5PLcJFihLt3A+Y:ZCF1G1gyb951LDnLSkhhZY
                                    TLSH:F5256A666E73C829E529A0BE645A43C145343F7919E412FB12E4176B2FF318C4B8F36B
                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....V(e.........." .........8......-........................................`............`........................................
                                    Icon Hash:1a1de1e5e1239e38
                                    Entrypoint:0x18003af2d
                                    Entrypoint Section:.text
                                    Digitally signed:true
                                    Imagebase:0x180000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DLL
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                                    Time Stamp:0x6528569E [Thu Oct 12 20:27:10 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:0
                                    File Version Major:6
                                    File Version Minor:0
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:0
                                    Import Hash:
                                    Signature Valid:false
                                    Signature Issuer:CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US
                                    Signature Validation Error:The digital signature of the object did not verify
                                    Error Number:-2146869232
                                    Not Before, Not After
                                    • 13/04/2015 20:00:00 13/04/2018 19:59:59
                                    Subject Chain
                                    • CN="Oracle America, Inc.", OU=Code Signing Bureau, O="Oracle America, Inc.", L=Redwood Shores, S=California, C=US
                                    Version:3
                                    Thumbprint MD5:7F2E08A290C8767AFAFAFFFE09BE1149
                                    Thumbprint SHA-1:3B75816D15A6D8F4598E9CF5603F1839EE84D73D
                                    Thumbprint SHA-256:9D9365087330DF525292796A656A389C13E4F37ADA62693F4A951C0CB1B8B0BC
                                    Serial:12F0277E0F233B39F9419B06E8CDE352
                                    Instruction
                                    push ebp
                                    inc ecx
                                    push edi
                                    inc ecx
                                    push esi
                                    inc ecx
                                    push ebp
                                    inc ecx
                                    push esp
                                    push esi
                                    push edi
                                    push ebx
                                    dec eax
                                    sub esp, 000000F8h
                                    dec eax
                                    lea ebp, dword ptr [esp+00000080h]
                                    mov dword ptr [ebp+5Ch], edx
                                    xorps xmm0, xmm0
                                    movups dqword ptr [ebp+3Ch], xmm0
                                    movaps ebp+30h, dqword ptr [xmm0]
                                    movaps ebp+20h, dqword ptr [xmm0]
                                    movaps ebp+10h, dqword ptr [xmm0]
                                    movaps ebp+00h, dqword ptr [xmm0]
                                    movaps ebp-10h, dqword ptr [xmm0]
                                    movaps ebp-20h, dqword ptr [xmm0]
                                    cmp dword ptr [000AB10Bh], 0Ah
                                    mov eax, dword ptr [000AB101h]
                                    setl cl
                                    lea edx, dword ptr [eax+01h]
                                    imul edx, eax
                                    test dl, 00000001h
                                    sete al
                                    mov edx, ecx
                                    and dl, al
                                    mov byte ptr [ebp+77h], dl
                                    xor cl, al
                                    mov byte ptr [ebp+76h], cl
                                    xor eax, eax
                                    dec eax
                                    lea ecx, dword ptr [0001EBA5h]
                                    dec eax
                                    arpl word ptr [eax+ecx], dx
                                    xor dword ptr [ebp+edx*4-20h], 00001E27h
                                    dec eax
                                    add eax, 04h
                                    dec eax
                                    cmp eax, 68h
                                    jne 00007F56711DFFECh
                                    mov eax, 000008C0h
                                    xor ecx, ecx
                                    dec eax
                                    mov dword ptr [ebp-58h], ecx
                                    dec eax
                                    lea esi, dword ptr [0001ECFDh]
                                    dec eax
                                    lea edi, dword ptr [0001ED5Ah]
                                    dec esp
                                    lea esi, dword ptr [0001ED5Bh]
                                    dec esp
                                    lea ecx, dword ptr [0001EAF8h]
                                    dec esp
                                    lea edx, dword ptr [0001EC31h]
                                    dec esp
                                    lea edi, dword ptr [0001ED36h]
                                    dec esp
                                    lea ebp, dword ptr [0001ED27h]
                                    dec esp
                                    lea esp, dword ptr [0001ED18h]
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x509c60x386.text
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xe90000x1b758.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50d4c0x4f8.text
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xfee000x1820.rsrc
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1050000x2c.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x5b5b00x140.text
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x5b1040x5b200d943478eebdc6fcb7301e02c5972a6aeFalse0.34970582561728397data5.890325051671784IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .data0x5d0000x8afd80x87c002cb1ccd3c6c9f43bdcd9e6c8ad27f56cFalse0.3396621057780847data6.105931540080737IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .sdata0xe80000x300x200f927ec16777b24dc4dfb58c1c73b2751False0.056640625data0.41911781941489346IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .rsrc0xe90000x1b7580x1b80028bd58503c3e58848ffcef5b44b72905False0.8856001420454546data7.577434366625928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1050000x2c0x200dd37af5637020c49f853952bd28448abFalse0.10546875data0.5163459669794561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xe96e80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3445121951219512
                                    RT_ICON0xe9d500x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.5067204301075269
                                    RT_ICON0xea0380x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.5676229508196722
                                    RT_ICON0xea2200x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.625
                                    RT_ICON0xea3480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.6284648187633263
                                    RT_ICON0xeb1f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.7766245487364621
                                    RT_ICON0xeba980x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.8358294930875576
                                    RT_ICON0xec1600x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.5939306358381503
                                    RT_ICON0xec6c80x13b8ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9997895570795474
                                    RT_ICON0x1002580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5776970954356846
                                    RT_ICON0x1028000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.6177298311444653
                                    RT_ICON0x1038a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6778688524590164
                                    RT_ICON0x1042300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6879432624113475
                                    RT_GROUP_ICON0x1046980xbcdataEnglishUnited States0.6170212765957447
                                    RT_VERSION0xe93400x3a4dataEnglishUnited States0.45493562231759654
                                    NameOrdinalAddress
                                    D3DAssemble10x18003d768
                                    D3DCompile20x18003d9d2
                                    D3DCompile230x18003d89b
                                    D3DCompileFromFile40x18003c63d
                                    D3DCompressShaders50x18003c3c5
                                    D3DCreateBlob60x18003d28e
                                    D3DCreateFunctionLinkingGraph70x18003b9ec
                                    D3DCreateLinker80x18003cc62
                                    D3DDecompressShaders90x18003c280
                                    D3DDisassemble100x18003d012
                                    D3DDisassemble10Effect110x18003bed1
                                    D3DDisassemble11Trace120x18003c008
                                    D3DDisassembleRegion130x18003c14d
                                    D3DGetBlobPart140x18003cedb
                                    D3DGetDebugInfo150x18003cb2f
                                    D3DGetInputAndOutputSignatureBlob160x18003b8a7
                                    D3DGetInputSignatureBlob170x18003bd9e
                                    D3DGetOutputSignatureBlob180x18003bc65
                                    D3DGetTraceInstructionOffsets190x18003bb1f
                                    D3DLoadModule200x18003d4f4
                                    D3DPreprocess210x18003d3c1
                                    D3DReadFileToBlob220x18003c9ec
                                    D3DReflect230x18003db17
                                    D3DReflectLibrary240x18003c782
                                    D3DReturnFailure1250x18003c8b5
                                    D3DSetBlobPart260x18003cd95
                                    D3DStripShader270x18003d149
                                    D3DWriteBlobToFile280x18003c4f8
                                    DebugSetMute290x18003d635
                                    IEX300x18003dc5a
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-12-04T16:19:56.729219+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649826163.5.169.26443TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Dec 4, 2024 16:19:11.640450954 CET49826443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:19:11.640515089 CET44349826163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:19:11.640602112 CET49826443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:19:12.684220076 CET49826443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:19:12.684252977 CET44349826163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:19:56.729146004 CET44349826163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:19:56.729218960 CET49826443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:19:57.340583086 CET49826443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:19:57.340635061 CET44349826163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:19:57.359637022 CET49863443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:19:57.359707117 CET44349863163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:19:57.359781027 CET49863443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:19:57.360069990 CET49863443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:19:57.360081911 CET44349863163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:20:41.433383942 CET44349863163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:20:41.433454990 CET49863443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:20:42.120392084 CET49863443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:20:42.120425940 CET44349863163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:20:42.125854015 CET49899443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:20:42.125886917 CET44349899163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:20:42.125952005 CET49899443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:20:42.126024008 CET49899443192.168.2.6163.5.169.26
                                    Dec 4, 2024 16:20:42.126086950 CET44349899163.5.169.26192.168.2.6
                                    Dec 4, 2024 16:20:42.126138926 CET49899443192.168.2.6163.5.169.26
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Dec 4, 2024 16:17:48.357119083 CET1.1.1.1192.168.2.60x77deNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                    Dec 4, 2024 16:17:48.357119083 CET1.1.1.1192.168.2.60x77deNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to jump to process

                                    Target ID:0
                                    Start time:10:17:53
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\loaddll64.exe
                                    Wow64 process (32bit):false
                                    Commandline:loaddll64.exe "C:\Users\user\Desktop\105vjMVwfJ.dll"
                                    Imagebase:0x7ff79f130000
                                    File size:165'888 bytes
                                    MD5 hash:763455F9DCB24DFEECC2B9D9F8D46D52
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.4390842892.0000024BB68AC000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:1
                                    Start time:10:17:53
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff66e660000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:2
                                    Start time:10:17:53
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",#1
                                    Imagebase:0x7ff7326c0000
                                    File size:289'792 bytes
                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:3
                                    Start time:10:17:53
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DAssemble
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000003.00000002.2635114835.0000012E5460C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:10:17:53
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",#1
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000004.00000002.2645352424.000001EFEFB2C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:10:17:56
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DCompile
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000006.00000002.2701342655.000001BFCAC0C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:10:17:59
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe C:\Users\user\Desktop\105vjMVwfJ.dll,D3DCompile2
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000008.00000002.2712283227.000001D327A8C000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:12
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DAssemble
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:13
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompile
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:14
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompile2
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:15
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",IEX
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:16
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",DebugSetMute
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:17
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DWriteBlobToFile
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:18
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DStripShader
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:19
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DSetBlobPart
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:20
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReturnFailure1
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:21
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReflectLibrary
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:22
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReflect
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:23
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DReadFileToBlob
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:24
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DPreprocess
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:25
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DLoadModule
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:26
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetTraceInstructionOffsets
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:27
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetOutputSignatureBlob
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:28
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetInputSignatureBlob
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:29
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetInputAndOutputSignatureBlob
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:30
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetDebugInfo
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:31
                                    Start time:10:18:51
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DGetBlobPart
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:32
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassembleRegion
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:33
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble11Trace
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:34
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble10Effect
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:35
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDisassemble
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:36
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DDecompressShaders
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:37
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateLinker
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:38
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateFunctionLinkingGraph
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:39
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCreateBlob
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:40
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompressShaders
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Target ID:41
                                    Start time:10:18:52
                                    Start date:04/12/2024
                                    Path:C:\Windows\System32\rundll32.exe
                                    Wow64 process (32bit):false
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\105vjMVwfJ.dll",D3DCompileFromFile
                                    Imagebase:0x7ff6439c0000
                                    File size:71'680 bytes
                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Has exited:false

                                    Reset < >
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: DCBA
                                      • API String ID: 544645111-2222620526
                                      • Opcode ID: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction ID: 4c904f155e75298daa491a866bb448199684d1f5135abbed3ae12335ec0b3928
                                      • Opcode Fuzzy Hash: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction Fuzzy Hash: F941E476206B858EDB21CF79D8847D837A1E748BACF119215EE1D87B98EB34DD448740
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_invalid_parameter_noinfo
                                      • String ID: U
                                      • API String ID: 3902385426-4171548499
                                      • Opcode ID: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction ID: addfcb3cb4c19bfcde7e1c001670ba036784bb0c7881d627b50224d5b807f2b3
                                      • Opcode Fuzzy Hash: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction Fuzzy Hash: 07121272214A8186FB228F3AD48C3AA77A1F786F5CF500116EE89477A5DB3DCC45CB52
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: write_multi_charwrite_string$write_char$_errno_invalid_parameter_noinfo_isleadbyte_l_malloc_crtfree
                                      • String ID:
                                      • API String ID: 2600834739-3916222277
                                      • Opcode ID: 95db6e67095b1cff7f5ed97d2d1907cd3ce88e16966fe85260d16a5165bf001e
                                      • Instruction ID: 02a9ab35319098613f10ea9c900553ca02c5bfa36e5d414320048a88237f3781
                                      • Opcode Fuzzy Hash: 95db6e67095b1cff7f5ed97d2d1907cd3ce88e16966fe85260d16a5165bf001e
                                      • Instruction Fuzzy Hash: 9D32CE6260868586FB7A8E37D19C37E6BA1F745F8CF241007DE4656AE8DB38CD418F42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: $<$Changing the code in this way will not affect the quality of the resulting optimized code.$uctDir
                                      • API String ID: 0-3812399124
                                      • Opcode ID: 8608a6510d78ded6d7b72b0d922fa4575634e3d77ec576b96213c711cfdf47ce
                                      • Instruction ID: 8add3fb97c254f8a7028640e26f48127781d8cd1cec9ecf2d5c291f3602e0bee
                                      • Opcode Fuzzy Hash: 8608a6510d78ded6d7b72b0d922fa4575634e3d77ec576b96213c711cfdf47ce
                                      • Instruction Fuzzy Hash: 6892EFB2325A8087DB58CB1DE4A573AB7A1F3C8B84F54512AEB9B87794CA3CC551CB04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: h
                                      • API String ID: 0-2439710439
                                      • Opcode ID: 17c874fdfca0e46784307bd0b6e64768fd4c1a3d89b12e191bda19c005753cbd
                                      • Instruction ID: ad79bb265cebb31afcfc61b66ed2dd0107e7ed98a01f53f1010eb15157f15529
                                      • Opcode Fuzzy Hash: 17c874fdfca0e46784307bd0b6e64768fd4c1a3d89b12e191bda19c005753cbd
                                      • Instruction Fuzzy Hash: 4A52FF35208140C7E672DB68E4596EEB760F3D6B4CF104612EE9B02AA9CB79CD45CF47
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 428beff660b2dd63aba7e3c02aee92ffa63a6193adce4ad15022cc3a3e5488b1
                                      • Instruction ID: b41fd1e42fd595cc97cfeab8719781f68d65cec9e3d5fad7a1511e83d65d326a
                                      • Opcode Fuzzy Hash: 428beff660b2dd63aba7e3c02aee92ffa63a6193adce4ad15022cc3a3e5488b1
                                      • Instruction Fuzzy Hash: 10F18572704A4296EB22CB35E4983EE77A1FB94B9CF500215EF4A87699EF34CD05CB41
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 1f6ea64bb700f135ef9746f642ebdda6f198d38bec0304a88397afe1d72f797d
                                      • Instruction ID: 0b4932cd6f7deb4f757078ebe020f4427d904ad8cdf36dd3d423dd7f1468b821
                                      • Opcode Fuzzy Hash: 1f6ea64bb700f135ef9746f642ebdda6f198d38bec0304a88397afe1d72f797d
                                      • Instruction Fuzzy Hash: 4DE1A172314A4291EF229A76D4983EE77A1FB95B8CF900212DF4F87699EB34CD05C742
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                      • String ID: -$@
                                      • API String ID: 3246410048-1222683799
                                      • Opcode ID: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction ID: 303ce88236fbf2da7aa2565abc9d6d96ba25fe837bee0d2ae9beb167b51e5d77
                                      • Opcode Fuzzy Hash: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction Fuzzy Hash: 26B1F372604A8085FB66CF7794883AE6BA1F785F98F240107DE4947AD9DB38CD418F42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$ExitProcess__crt_errno
                                      • String ID:
                                      • API String ID: 1362684943-0
                                      • Opcode ID: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction ID: 9a13a05d335a5accaeb179e6d7ab03ad909bd350bdb7af21e4231f1965bbd6dc
                                      • Opcode Fuzzy Hash: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction Fuzzy Hash: B3411C62621A0482FF579F33E96C3682361EB44FACF580666ED2A066D5CF7CCC458743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction ID: 87445cf059692fac9fb6cf1c0a1c418b3e7eb9a25bf490335501394a227a5d94
                                      • Opcode Fuzzy Hash: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction Fuzzy Hash: AB319E62310A8487E717AF77998976D3691FB82FA8F45421AAE21477D3CB78CC41C722
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction ID: 9feb5db4d573c981118839238f2b6a331a8ca2b198aa15f60a092b599c605661
                                      • Opcode Fuzzy Hash: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction Fuzzy Hash: D4219D62620A8086F6276F37984936D6651FB82FA9F1A4115AE150B3D3CB7CCC419726
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction ID: 4eb959a89e02ef0969039dd281e4b409bb2acc77531e6b74670d18f36b26489c
                                      • Opcode Fuzzy Hash: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction Fuzzy Hash: F8217C22620A8446FA136F3798493AD6A51EB91FB9F1A4315AE350B7D3C73CCC818626
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction ID: 619606878ecbab29a453aeb03ac86577904006545e0f45e9cb89ac1c5d43f31f
                                      • Opcode Fuzzy Hash: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction Fuzzy Hash: A741E771600B9982FF62EB3395483A936E1F756FACF984125EFA8436C6D728CC419712
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction ID: 13ef43b2fc70bf6281d9c4666d61c991a74ff4581a3275284dcf09ea416012b6
                                      • Opcode Fuzzy Hash: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction Fuzzy Hash: EA21CD6270068096F6136F37985936D6691EB80FA8F194216EE194B3D3CB7CCC41C7A2
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction ID: 0c1d4b278a752ad4a888aadb95e4133c75ea370cc23dcb1fe4ff7e0ac9883458
                                      • Opcode Fuzzy Hash: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction Fuzzy Hash: 6811D02271068082F617AF37AC8D36C7A52EB80FA9F190726AE1A073D3C778CC408716
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction ID: 906518769f2686682477d5c3a8a79d0ae0c204ce2e8ce07a3434b042cb2fdafd
                                      • Opcode Fuzzy Hash: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction Fuzzy Hash: 2671BD2271479546EB269E3694487EE7B91FB95FCCF404025DE4B6BB86DB38CC06CB02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _time64$strtok$malloc
                                      • String ID:
                                      • API String ID: 2141844861-0
                                      • Opcode ID: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction ID: 915ba175497ae88a0e2bd773c9321b67e58308550af64b949e0c030431497d98
                                      • Opcode Fuzzy Hash: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction Fuzzy Hash: 93911C72105B84CAE762CF26E8AC32577B0F344F5CF21422ADD99827A8DB7DC945DB02
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-3916222277
                                      • Opcode ID: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction ID: 1147b452acc7e456f0ade73d58601659af8fd52e44c4f3e1a6a87f554745060b
                                      • Opcode Fuzzy Hash: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction Fuzzy Hash: 1F41F772610B4486EB6ADF3AD45936C37A0E744F9CF144216DE6A473D6DB38CC51CB82
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction ID: 09063686a2f47f8471e62bc0b23b143a561c8d52c6f37a99a0cb2058abe0059b
                                      • Opcode Fuzzy Hash: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction Fuzzy Hash: F5315A62710B4486FB22AF77E80832966E1EB84F9CF14466A9E49477E6DF3CC9048706
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction ID: a3e095acc66ad6d2f29334e769e31577c2063220aaaa4e6c0d75d2f1d4f6d76b
                                      • Opcode Fuzzy Hash: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction Fuzzy Hash: 21319372604B8886E7229F23948C79DB6A9F745FE8F584125EF5807BC5DB34CC81C701
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction ID: ccf995e59cd409313c857fc7b8cd177823c1d5cc3e0eef36d439bdcac7ef93f0
                                      • Opcode Fuzzy Hash: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction Fuzzy Hash: C651F33170524082FA6A8E37550876966D2F794FFCF184726AF7943BD5CB38CC938642
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction ID: 0a1ec5f6b6d56895f06732d222480603eecd11ff14bb6ce4e0dfe11203c4b3e3
                                      • Opcode Fuzzy Hash: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction Fuzzy Hash: A4612D32218A8482E761DB26E45439EB761F7C5B98F104116FE9E43BA9DF3CC945CF42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction ID: 1b500a3d899257c3eb8f77739184ac067bd33d2a6c646677ed0659f1215314f0
                                      • Opcode Fuzzy Hash: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction Fuzzy Hash: 9C21756131578685FB639F33A80935EA695EB44FC8F044422AE89977D6EB3CCD828712
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction ID: 622c5b9692645c2aab3cf9f79b8d2fcda2cca19f3b06190fd8de1f9f29827f0f
                                      • Opcode Fuzzy Hash: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction Fuzzy Hash: 2D213872518A4081DA21EB22E45539E6761F7D4F9CF101216BEDF43AEADF3CC941CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_set_error_mode$__crt_errno$ExitMessageProcess_lock_malloc_crtmalloc
                                      • String ID:
                                      • API String ID: 2751257304-0
                                      • Opcode ID: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction ID: 67da883d038527e617eee726ce847b51ae266335c000f533a4b9b0b77e4de2b1
                                      • Opcode Fuzzy Hash: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction Fuzzy Hash: 4011A121220A8482F763AFB3E44E36923A1EB80F8CF041527ED4A466E2CF7CCD459753
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction ID: c1a39cadc0ad6cbcffe72f3a71cec99547bdf3bc19a06a6fb9cfe134874f59d8
                                      • Opcode Fuzzy Hash: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction Fuzzy Hash: BB41DC223107919BEB56AF37A9583AA2794F749F88F904825DE461B741DF38DC26C702
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 74200508-0
                                      • Opcode ID: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction ID: 2778853a5664b73b36ed3795ba271c3582493a81e7444d363866dcbf5ea24d9a
                                      • Opcode Fuzzy Hash: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction Fuzzy Hash: 37D12D712146808AF752EB76E4593EEB7A1E7C4B48F104126AE9A876D6DF3CCC05CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction ID: d19477e4331ea4c8c25e395f90c24eca088581253bed2b1ae586ed83c18a9261
                                      • Opcode Fuzzy Hash: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction Fuzzy Hash: 0241BC2222468547EB16AF3B64087AA6799F795F9CF494034DD068B749EF38CC0AC306
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction ID: 42fd43e0825d423e058e9978ed9067deff223a0b9350ecf90e868cdb5a76dab1
                                      • Opcode Fuzzy Hash: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction Fuzzy Hash: D50131A1715E8486FA175F3BC4893587792DF51F79F554315DE2A063D2C72CCC418613
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction ID: 7f9a3c723011956e4d91b16c378e0ba8b966a3a6b7c624a47a4b0f068d5bb62b
                                      • Opcode Fuzzy Hash: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction Fuzzy Hash: 87F0EC72538A8086D641EF62F45575EA364FBC4B84F401116BE8E53B59CF78C815CB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction ID: e179124e4645d7e598fa004959ef767af9f823e15c582279d759025aba7f3ca7
                                      • Opcode Fuzzy Hash: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction Fuzzy Hash: 568164726186808AE765DF36E44839EB7A1F384B48F500426EE8987A99DF7DCD45CF02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction ID: 9402ca7eda96e44352714a97f64c5a71600f257983ec71772409199ac1cc3c73
                                      • Opcode Fuzzy Hash: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction Fuzzy Hash: 1C21A276618B8486DB65DB16E49425AB7A0F3C8B98F104216EEDD47BA8CF38C952CF40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction ID: 74962387ad8ae9e60ce47dff64985116f1168b9b14285df19aac9233a6b31ee1
                                      • Opcode Fuzzy Hash: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction Fuzzy Hash: 4641162130038486FE6A9E73594C36AB691FB44FECF1842269F6647BC5EB78DD438642
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction ID: 1e063ebf01faf69a1150976bb972411b4e451cc3ca9dfc09688b4f591824896c
                                      • Opcode Fuzzy Hash: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction Fuzzy Hash: 68212792604AE4C1EB625637905833D66D1E342FDCF1C41A9EE8607BC5CB2DCC45C712
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: d03712ea6dff40dc61df695a72462f45a6042f5138b97e015bd1273f2220f335
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: F4112932904B4545F772DFB679843ABB6D0FB88B9CF191025EE4643245EB74CC95C602
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 3587327836-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 260200eb37a566cccabc5da04ea67aadb7ed8fa7dac637dac08793b86dd2773a
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: D261C632219A8486E751DF25F88439EBBA0F3C9B98F105115EECE47BA9DF79C845CB01
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CaptureContextPrevious__crt__raise_securityfailure
                                      • String ID: sv-FI
                                      • API String ID: 37250909-2947700294
                                      • Opcode ID: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction ID: 8ea26f0abc89613b1a96b5821853b6efa0751a775851e303e08b6b3d9813f085
                                      • Opcode Fuzzy Hash: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction Fuzzy Hash: 4B210D35225B0481FA029B2AE85D35573A4F385B8CFA00226EE8E867A2DF3CCC05C702
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction ID: 810128b37642b679146c95f9b922a056a38c7385eaa611e2dc869409fd8e5226
                                      • Opcode Fuzzy Hash: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction Fuzzy Hash: 1F11C472610B4486EB11DF63E444399B661F798FE8F684322AF5807BD6CF38C645CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_calloc_implcalloc
                                      • String ID:
                                      • API String ID: 4000150058-0
                                      • Opcode ID: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction ID: 0e651f792154893bda1e377a33ccc8d07863f73d8aca2d5c384e29d82833010c
                                      • Opcode Fuzzy Hash: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction Fuzzy Hash: 28C1FE32614B848AE765CF66E48439EB7E4F388B88F10412AEF8E47B58DF38C455CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction ID: 45b03f3912c896af96a79e41987ab887a8ded2ea1445999a0698978a5021a965
                                      • Opcode Fuzzy Hash: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction Fuzzy Hash: 0AC1DCB62196C0CAD771CA25E49439FB7A0F799B99F501129EFCA43B58DB39C840CF06
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: 2554e1112e6db96e70e5d3eddaf4dd8429cc2cab08b20975c7f0d3090f8239fc
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: 6781EA36208AC486EB21DB61F45839AB761F395B98F504216DE9E43BA9DF3CC845CB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction ID: f3d7fab3e7d0d70a64d5647fde064c486f7073cb745862cd4d7694ab0c9e8552
                                      • Opcode Fuzzy Hash: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction Fuzzy Hash: 65417C3261068097EB5ADF36A4187AE77A1F744F88F444825EE5BA7B85EF34DC05C701
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 6383a7835a4b65a47cfb1c067873db5a66ec93dca46c4c5e3f535797e85619d2
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: D0311032214A8482E622DF62E8583D97770F385B68F544227EEAD43BE9DF7CC945CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000003.2726426387.0000024BB66FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000024BB66E0000, based on PE: true
                                      • Associated: 00000000.00000003.2726394153.0000024BB66E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000000.00000003.2726426387.0000024BB673C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_3_24bb66e0000_loaddll64.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction ID: 7ecef2267cbeea8be8da09345ce9fe21223c3b7d6b11548f51480c33d94ccb6e
                                      • Opcode Fuzzy Hash: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction Fuzzy Hash: 4121DB32114B4485EA62DF26F86835A7761F3C5BA8F501316EE9E437E9CF38C9419701

                                      Execution Graph

                                      Execution Coverage:0.8%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0.4%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:25
                                      execution_graph 18761 12e545fb544 18762 12e545fb560 _DllMainCRTStartup 18761->18762 18763 12e545fb5f0 18762->18763 18771 12e545fb5ba 18762->18771 18773 12e545fb3e4 18762->18773 18763->18771 18802 12e545dd0fc 18763->18802 18766 12e545fb637 18769 12e545fb3e4 _CRT_INIT RtlFreeHeap 18766->18769 18766->18771 18768 12e545dd0fc _DllMainCRTStartup 7 API calls 18770 12e545fb62a 18768->18770 18769->18771 18772 12e545fb3e4 _CRT_INIT RtlFreeHeap 18770->18772 18772->18766 18774 12e545fb473 18773->18774 18777 12e545fb3f6 _heap_init 18773->18777 18775 12e545fb4c9 18774->18775 18778 12e545fb477 _CRT_INIT 18774->18778 18776 12e545fb52c 18775->18776 18783 12e545fb4ce _getptd_noexit 18775->18783 18789 12e545fb3ff _CRT_INIT 18776->18789 18884 12e545ff3d8 18776->18884 18777->18789 18810 12e545ff580 18777->18810 18778->18789 18850 12e545f9b34 18778->18850 18783->18789 18872 12e545fe2f8 18783->18872 18785 12e5460223c _ioterm RtlFreeHeap 18785->18789 18786 12e545fb40b _RTC_Initialize 18786->18789 18816 12e54602b90 18786->18816 18787 12e545fb4eb _mtinit 18787->18789 18790 12e545fb50c 18787->18790 18791 12e545fb522 18787->18791 18789->18763 18876 12e545ff4bc 18790->18876 18881 12e545f9428 18791->18881 18803 12e545dd134 18802->18803 18807 12e545dd123 _DllMainCRTStartup 18802->18807 19175 12e545f6f68 18803->19175 18804 12e545dd12a 18804->18766 18804->18768 18807->18804 18808 12e545dd228 VirtualFree 18807->18808 18809 12e545dd1d7 18807->18809 18808->18809 18809->18804 19129 12e545ccb50 18809->19129 18811 12e545ff58b _mtinit _mtinitlocks 18810->18811 18812 12e545ff5de 18811->18812 18813 12e545fe2f8 _calloc_crt RtlFreeHeap 18811->18813 18812->18786 18814 12e545ff5ba _mtinit 18813->18814 18814->18812 18815 12e545ff4bc _initptd RtlFreeHeap 18814->18815 18815->18812 18817 12e54602baf 18816->18817 18819 12e545fb42d 18817->18819 18888 12e545fe378 18817->18888 18822 12e54601f10 18819->18822 18821 12e545f9428 free RtlFreeHeap 18821->18819 18965 12e545fd958 18822->18965 18851 12e545f9b4b 18850->18851 18852 12e545f9b6d 18851->18852 18854 12e545f9428 free RtlFreeHeap 18851->18854 18853 12e545f9428 free RtlFreeHeap 18852->18853 18855 12e545f9b7c 18853->18855 18854->18851 18856 12e545f9ba3 18855->18856 18859 12e545f9428 free RtlFreeHeap 18855->18859 18857 12e545f9428 free RtlFreeHeap 18856->18857 18858 12e545f9bb2 18857->18858 18860 12e545f9428 free RtlFreeHeap 18858->18860 18859->18855 18861 12e545f9bc6 18860->18861 18862 12e545f9428 free RtlFreeHeap 18861->18862 18863 12e545f9bd2 18862->18863 18864 12e545f9bfd 18863->18864 18865 12e545f9428 free RtlFreeHeap 18863->18865 18866 12e545f9c1e 18864->18866 18867 12e545f9428 free RtlFreeHeap 18864->18867 18865->18864 18868 12e545f9c37 18866->18868 18869 12e545f9428 free RtlFreeHeap 18866->18869 18867->18866 18870 12e545f9c68 18868->18870 18871 12e545f9428 free RtlFreeHeap 18868->18871 18869->18868 18870->18785 18870->18789 18871->18870 18873 12e545fe31d 18872->18873 18875 12e545fe35a 18873->18875 19099 12e54603a60 18873->19099 18875->18787 18877 12e545fd958 _lock RtlFreeHeap 18876->18877 18878 12e545ff522 __updatetmbcinfo 18877->18878 18879 12e545fd958 _lock RtlFreeHeap 18878->18879 18880 12e545ff541 __updatetmbcinfo __addlocaleref 18879->18880 18880->18789 18882 12e545f942d RtlFreeHeap 18881->18882 18883 12e545f9448 _errno free 18881->18883 18882->18883 18883->18789 18885 12e545ff40e 18884->18885 18886 12e545ff3ec _mtinit _getptd_noexit 18884->18886 18885->18789 19103 12e545ff2a4 18886->19103 18891 12e545fe3a0 18888->18891 18890 12e545fe3d5 18890->18819 18890->18821 18891->18890 18892 12e545f9468 18891->18892 18893 12e545f94fc _callnewh 18892->18893 18899 12e545f9480 _callnewh _mtinitlocknum 18892->18899 18895 12e545fb714 _errno RtlFreeHeap 18893->18895 18896 12e545f94f1 18895->18896 18896->18891 18898 12e545f94e1 18928 12e545fb714 18898->18928 18899->18896 18899->18898 18901 12e545f94e6 18899->18901 18903 12e545fb7ec 18899->18903 18912 12e545fb860 18899->18912 18902 12e545fb714 _errno RtlFreeHeap 18901->18902 18902->18896 18931 12e54602f24 18903->18931 18905 12e545fb7fa 18906 12e54602f24 _set_error_mode RtlFreeHeap 18905->18906 18908 12e545fb809 18905->18908 18906->18908 18907 12e545fb860 _NMSG_WRITE RtlFreeHeap 18909 12e545fb820 18907->18909 18908->18907 18911 12e545fb82a 18908->18911 18910 12e545fb860 _NMSG_WRITE RtlFreeHeap 18909->18910 18910->18911 18911->18899 18913 12e545fb894 _NMSG_WRITE 18912->18913 18914 12e54602f24 _set_error_mode RtlFreeHeap 18913->18914 18916 12e545fb9b1 _setmbcp_nolock __crtMessageBoxW _invoke_watson 18913->18916 18915 12e545fb8aa 18914->18915 18915->18916 18917 12e54602f24 _set_error_mode RtlFreeHeap 18915->18917 18916->18899 18918 12e545fb8bb 18917->18918 18918->18916 18935 12e54602dd0 18918->18935 18920 12e545fb8f7 18920->18916 18921 12e54602dd0 _NMSG_WRITE RtlFreeHeap 18920->18921 18923 12e545fb937 _NMSG_WRITE 18920->18923 18921->18923 18922 12e545fb981 18922->18916 18949 12e54602d48 18922->18949 18923->18916 18923->18922 18942 12e54602e58 18923->18942 18925 12e545fb99b 18925->18916 18927 12e54602d48 _NMSG_WRITE RtlFreeHeap 18925->18927 18927->18916 18956 12e545ff438 18928->18956 18932 12e54602f2c 18931->18932 18933 12e545fb714 _errno RtlFreeHeap 18932->18933 18934 12e54602f36 _invalid_parameter_noinfo 18932->18934 18933->18934 18934->18905 18936 12e54602dde 18935->18936 18937 12e54602de8 18935->18937 18936->18937 18940 12e54602e05 18936->18940 18938 12e545fb714 _errno RtlFreeHeap 18937->18938 18939 12e54602df1 _invalid_parameter_noinfo 18938->18939 18939->18920 18940->18939 18941 12e545fb714 _errno RtlFreeHeap 18940->18941 18941->18939 18945 12e54602e65 18942->18945 18943 12e54602e6a 18944 12e545fb714 _errno RtlFreeHeap 18943->18944 18948 12e54602e6f _invalid_parameter_noinfo 18943->18948 18944->18948 18945->18943 18946 12e54602ea8 18945->18946 18945->18948 18947 12e545fb714 _errno RtlFreeHeap 18946->18947 18946->18948 18947->18948 18948->18922 18950 12e54602d63 18949->18950 18952 12e54602d59 18949->18952 18951 12e545fb714 _errno RtlFreeHeap 18950->18951 18953 12e54602d6c _invalid_parameter_noinfo 18951->18953 18952->18950 18954 12e54602d9a 18952->18954 18953->18925 18954->18953 18955 12e545fb714 _errno RtlFreeHeap 18954->18955 18955->18953 18958 12e545ff448 _getptd_noexit 18956->18958 18957 12e545fb71d 18957->18901 18958->18957 18959 12e545fe2f8 _calloc_crt RtlFreeHeap 18958->18959 18960 12e545ff46a _mtinit 18959->18960 18960->18957 18961 12e545ff487 18960->18961 18962 12e545ff49d 18960->18962 18964 12e545ff4bc _initptd RtlFreeHeap 18961->18964 18963 12e545f9428 free RtlFreeHeap 18962->18963 18963->18957 18964->18957 18966 12e545fd97b 18965->18966 18967 12e545fd976 18965->18967 18969 12e545fda24 18967->18969 18970 12e545fda41 18969->18970 18972 12e545fda50 _mtinitlocknum 18969->18972 18971 12e545fb7ec _FF_MSGBANNER RtlFreeHeap 18970->18971 18973 12e545fda46 18971->18973 18974 12e545fe378 _malloc_crt RtlFreeHeap 18972->18974 18981 12e545fda6b 18972->18981 18975 12e545fb860 _NMSG_WRITE RtlFreeHeap 18973->18975 18976 12e545fda7c 18974->18976 18975->18972 18977 12e545fda84 18976->18977 18978 12e545fda93 18976->18978 18979 12e545fb714 _errno RtlFreeHeap 18977->18979 18980 12e545fd958 _lock RtlFreeHeap 18978->18980 18979->18981 18982 12e545fda9d 18980->18982 18981->18966 18982->18981 18983 12e545f9428 free RtlFreeHeap 18982->18983 18983->18981 19100 12e54603a75 19099->19100 19102 12e54603a88 _callnewh 19099->19102 19101 12e545fb714 _errno RtlFreeHeap 19100->19101 19100->19102 19101->19102 19102->18873 19104 12e545ff3cc 19103->19104 19105 12e545ff2ad 19103->19105 19104->18885 19106 12e545ff2c8 19105->19106 19107 12e545f9428 free RtlFreeHeap 19105->19107 19108 12e545ff2d6 19106->19108 19110 12e545f9428 free RtlFreeHeap 19106->19110 19107->19106 19109 12e545ff2e4 19108->19109 19111 12e545f9428 free RtlFreeHeap 19108->19111 19112 12e545ff2f2 19109->19112 19113 12e545f9428 free RtlFreeHeap 19109->19113 19110->19108 19111->19109 19114 12e545ff300 19112->19114 19115 12e545f9428 free RtlFreeHeap 19112->19115 19113->19112 19116 12e545ff30e 19114->19116 19117 12e545f9428 free RtlFreeHeap 19114->19117 19115->19114 19118 12e545ff31f 19116->19118 19119 12e545f9428 free RtlFreeHeap 19116->19119 19117->19116 19120 12e545ff337 19118->19120 19121 12e545f9428 free RtlFreeHeap 19118->19121 19119->19118 19122 12e545fd958 _lock RtlFreeHeap 19120->19122 19121->19120 19124 12e545ff343 19122->19124 19123 12e545ff370 __updatetmbcinfo 19126 12e545fd958 _lock RtlFreeHeap 19123->19126 19124->19123 19125 12e545f9428 free RtlFreeHeap 19124->19125 19125->19123 19127 12e545ff382 __updatetmbcinfo _freefls 19126->19127 19128 12e545f9428 free RtlFreeHeap 19127->19128 19128->19104 19183 12e545d7f80 19129->19183 19131 12e545ccb6e _DllMainCRTStartup 19132 12e545f9468 malloc RtlFreeHeap 19131->19132 19133 12e545ccc53 _DllMainCRTStartup 19132->19133 19190 12e545f8aec 19133->19190 19136 12e545f8aec _DllMainCRTStartup RtlFreeHeap 19137 12e545ccd09 _DllMainCRTStartup 19136->19137 19139 12e545ccd17 _DllMainCRTStartup 19137->19139 19223 12e545f7fc8 19137->19223 19140 12e545ccd31 19139->19140 19141 12e545f7fc8 _DllMainCRTStartup RtlFreeHeap 19139->19141 19197 12e545d02c0 19140->19197 19141->19140 19143 12e545ccd49 19203 12e545d03ac 19143->19203 19145 12e545f7fc8 _DllMainCRTStartup RtlFreeHeap 19145->19143 19148 12e545f7fc8 _DllMainCRTStartup RtlFreeHeap 19149 12e545ccd57 _DllMainCRTStartup 19148->19149 19150 12e545f9468 malloc RtlFreeHeap 19149->19150 19151 12e545ccd87 19150->19151 19152 12e545ccd99 _DllMainCRTStartup 19151->19152 19153 12e545f7fc8 _DllMainCRTStartup RtlFreeHeap 19151->19153 19154 12e545f8aec _DllMainCRTStartup RtlFreeHeap 19152->19154 19153->19152 19155 12e545ccdc3 _DllMainCRTStartup 19154->19155 19213 12e545d7ac8 19155->19213 19157 12e545cd076 19158 12e545f9428 free RtlFreeHeap 19157->19158 19159 12e545cd080 19158->19159 19160 12e545f7fc8 _DllMainCRTStartup RtlFreeHeap 19159->19160 19161 12e545cd085 19160->19161 19161->18804 19162 12e545f7820 RtlFreeHeap _DllMainCRTStartup 19173 12e545ccdd9 _DllMainCRTStartup 19162->19173 19163 12e545f9700 RtlFreeHeap _snprintf 19163->19173 19164 12e545cf9c0 InternetOpenA _DllMainCRTStartup 19164->19173 19169 12e545d2b5c RtlFreeHeap _DllMainCRTStartup 19169->19173 19170 12e545f7fc8 RtlFreeHeap _DllMainCRTStartup 19170->19173 19172 12e545d3598 RtlFreeHeap _DllMainCRTStartup 19172->19173 19173->19157 19173->19162 19173->19163 19173->19164 19173->19169 19173->19170 19173->19172 19227 12e545cf978 19173->19227 19231 12e545f68d4 19173->19231 19250 12e545dc964 19173->19250 19254 12e545d9294 19173->19254 19261 12e545d6198 19173->19261 19269 12e545cfbec 19173->19269 19176 12e545f9468 malloc RtlFreeHeap 19175->19176 19177 12e545f6f8c 19176->19177 19178 12e545f8aec _DllMainCRTStartup RtlFreeHeap 19177->19178 19181 12e545f6fc9 _DllMainCRTStartup 19178->19181 19179 12e545f7045 19179->18804 19180 12e545f9468 malloc RtlFreeHeap 19180->19181 19181->19179 19181->19180 19182 12e545f8aec _DllMainCRTStartup RtlFreeHeap 19181->19182 19182->19181 19184 12e545f9468 malloc RtlFreeHeap 19183->19184 19185 12e545d7f9c 19184->19185 19186 12e545f9468 malloc RtlFreeHeap 19185->19186 19189 12e545d7fa9 _DllMainCRTStartup 19185->19189 19187 12e545d7fba 19186->19187 19188 12e545f9428 free RtlFreeHeap 19187->19188 19187->19189 19188->19189 19189->19131 19191 12e545f8b18 19190->19191 19192 12e545cccdb 19190->19192 19193 12e545f8b35 19191->19193 19194 12e545f8b22 19191->19194 19192->19136 19196 12e545fb310 realloc RtlFreeHeap 19193->19196 19195 12e545f9468 malloc RtlFreeHeap 19194->19195 19195->19192 19196->19192 19199 12e545d02dd _DllMainCRTStartup 19197->19199 19198 12e545ccd40 19198->19143 19198->19145 19199->19198 19289 12e545f6294 19199->19289 19201 12e545d036c 19293 12e545f62e0 19201->19293 19205 12e545d03d0 _DllMainCRTStartup 19203->19205 19204 12e545ccd4e 19204->19148 19204->19149 19205->19204 19206 12e545f9468 malloc RtlFreeHeap 19205->19206 19207 12e545d04ed _DllMainCRTStartup 19206->19207 19208 12e545d057c 19207->19208 19209 12e545f6294 _DllMainCRTStartup RtlFreeHeap 19207->19209 19210 12e545f9428 free RtlFreeHeap 19208->19210 19211 12e545d0553 19209->19211 19210->19204 19212 12e545f62e0 _DllMainCRTStartup RtlFreeHeap 19211->19212 19212->19208 19214 12e545d7add _DllMainCRTStartup 19213->19214 19477 12e545f6d54 19214->19477 19216 12e545d7b0e 19481 12e545fa014 19216->19481 19218 12e545d7b2d _DllMainCRTStartup 19484 12e545d7cfc 19218->19484 19220 12e545d7c3a _DllMainCRTStartup 19495 12e545f67bc 19220->19495 19222 12e545d7cb1 19222->19173 19224 12e545f7fd6 _DllMainCRTStartup 19223->19224 19601 12e545f8c40 19224->19601 19226 12e545f7fff 19226->19139 19228 12e545cf995 _wcsupr_s 19227->19228 19611 12e545cf484 19228->19611 19230 12e545cf9ae _wcsupr_s 19230->19173 19232 12e545f6908 19231->19232 19247 12e545f6901 19231->19247 19233 12e545f9468 malloc RtlFreeHeap 19232->19233 19234 12e545f691c 19233->19234 19235 12e545f6948 19234->19235 19236 12e545f6937 19234->19236 19656 12e545c198c 19235->19656 19238 12e545f9428 free RtlFreeHeap 19236->19238 19238->19247 19239 12e545f698d _DllMainCRTStartup 19240 12e545f69df 19239->19240 19242 12e545f69f0 _DllMainCRTStartup 19239->19242 19241 12e545f9428 free RtlFreeHeap 19240->19241 19241->19247 19243 12e545f6b19 19242->19243 19248 12e545f6b44 _DllMainCRTStartup 19242->19248 19244 12e545f9428 free RtlFreeHeap 19243->19244 19245 12e545f6b23 19244->19245 19666 12e545cf250 19245->19666 19247->19173 19248->19247 19249 12e545f9428 free RtlFreeHeap 19248->19249 19249->19247 19252 12e545dc97a 19250->19252 19251 12e545dc9d1 19251->19173 19252->19251 19758 12e545dbdf4 19252->19758 21276 12e545d92e8 19254->21276 19256 12e545d92a7 19258 12e545d92d7 19256->19258 21283 12e545d991c 19256->21283 21287 12e545d9bbc 19258->21287 19262 12e545d61d9 19261->19262 19263 12e545d61d4 19261->19263 19264 12e545f9468 malloc RtlFreeHeap 19262->19264 19263->19173 19268 12e545d61e6 _DllMainCRTStartup 19264->19268 19265 12e545f9428 free RtlFreeHeap 19266 12e545d6300 19265->19266 19267 12e545d630c _DllMainCRTStartup RtlFreeHeap 19266->19267 19267->19263 19268->19265 19270 12e545cfc7a 19269->19270 19284 12e545cfc75 _wcsupr_s 19269->19284 19271 12e545db828 _DllMainCRTStartup RtlFreeHeap 19270->19271 19272 12e545cfc8d 19271->19272 19273 12e545f9700 _snprintf RtlFreeHeap 19272->19273 19274 12e545cfcae 19273->19274 19275 12e545f9700 _snprintf RtlFreeHeap 19274->19275 19276 12e545cfcce _DllMainCRTStartup 19275->19276 19277 12e545dabbc _DllMainCRTStartup RtlFreeHeap 19276->19277 19278 12e545cfd49 19277->19278 19279 12e545cfd7e 19278->19279 19280 12e545cfda1 19278->19280 19281 12e545f9700 _snprintf RtlFreeHeap 19279->19281 19282 12e545f9700 _snprintf RtlFreeHeap 19280->19282 19285 12e545cfd9f _wcsupr_s _DllMainCRTStartup 19281->19285 19282->19285 19283 12e545db808 _DllMainCRTStartup RtlFreeHeap 19283->19284 19284->19173 19286 12e545d0038 _DllMainCRTStartup RtlFreeHeap 19285->19286 19287 12e545cfeb6 19285->19287 19286->19287 19287->19283 19288 12e545cfec9 19287->19288 19288->19173 19290 12e545f62b3 19289->19290 19292 12e545f62af _DllMainCRTStartup 19289->19292 19298 12e545f66ec 19290->19298 19292->19201 19294 12e545f9700 _snprintf RtlFreeHeap 19293->19294 19295 12e545f637c 19294->19295 19296 12e545f9700 _snprintf RtlFreeHeap 19295->19296 19297 12e545f639a _openfile _DllMainCRTStartup 19296->19297 19297->19198 19305 12e545f9700 19298->19305 19300 12e545f6712 19301 12e545f9700 _snprintf RtlFreeHeap 19300->19301 19302 12e545f67a2 19301->19302 19314 12e545f99cc 19302->19314 19309 12e545f9732 _snprintf 19305->19309 19306 12e545f9737 19307 12e545fb714 _errno RtlFreeHeap 19306->19307 19312 12e545f973c _invalid_parameter_noinfo 19307->19312 19308 12e545f9756 19318 12e545fbfcc 19308->19318 19309->19306 19309->19308 19311 12e545f9786 19311->19312 19335 12e545fbd98 19311->19335 19312->19300 19315 12e545fd8b8 19314->19315 19460 12e545fd67c 19315->19460 19317 12e545f67ac 19317->19292 19319 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19318->19319 19320 12e545fc032 19319->19320 19321 12e545fb714 _errno RtlFreeHeap 19320->19321 19322 12e545fc037 19321->19322 19323 12e545fc997 19322->19323 19331 12e545fc064 _snprintf 19322->19331 19356 12e545ff624 19322->19356 19324 12e545fb714 _errno RtlFreeHeap 19323->19324 19326 12e545fc99c _invalid_parameter_noinfo _setmbcp_nolock 19324->19326 19326->19311 19328 12e545fc9ec RtlFreeHeap write_char 19328->19331 19329 12e545f9428 free RtlFreeHeap 19329->19331 19330 12e545fe378 _malloc_crt RtlFreeHeap 19330->19331 19331->19323 19331->19326 19331->19328 19331->19329 19331->19330 19332 12e54603864 RtlFreeHeap _snprintf 19331->19332 19333 12e545fd594 RtlFreeHeap write_multi_char 19331->19333 19334 12e545fd5e8 RtlFreeHeap write_string 19331->19334 19360 12e54603634 19331->19360 19332->19331 19333->19331 19334->19331 19336 12e545ff624 _fileno RtlFreeHeap 19335->19336 19337 12e545fbdba 19336->19337 19338 12e545fbddc 19337->19338 19339 12e545fbdc5 19337->19339 19341 12e545fbde1 19338->19341 19349 12e545fbdee _snprintf 19338->19349 19340 12e545fb714 _errno RtlFreeHeap 19339->19340 19351 12e545fbdca 19340->19351 19342 12e545fb714 _errno RtlFreeHeap 19341->19342 19342->19351 19343 12e545fbe53 19344 12e545fbeeb 19343->19344 19345 12e545fbe60 19343->19345 19346 12e54600504 _wsopen_nolock RtlFreeHeap 19344->19346 19347 12e545fbe7c 19345->19347 19352 12e545fbe95 19345->19352 19346->19351 19372 12e54600504 19347->19372 19349->19343 19349->19351 19353 12e545fbe47 19349->19353 19363 12e546031dc 19349->19363 19351->19312 19352->19351 19392 12e54601cd8 19352->19392 19353->19343 19369 12e5460323c 19353->19369 19357 12e545ff62d 19356->19357 19359 12e545ff632 _invalid_parameter_noinfo 19356->19359 19358 12e545fb714 _errno RtlFreeHeap 19357->19358 19358->19359 19359->19331 19361 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19360->19361 19362 12e54603646 19361->19362 19362->19331 19364 12e546031e5 19363->19364 19366 12e546031f2 19363->19366 19365 12e545fb714 _errno RtlFreeHeap 19364->19365 19367 12e546031ea _invalid_parameter_noinfo 19365->19367 19366->19367 19368 12e545fb714 _errno RtlFreeHeap 19366->19368 19367->19353 19368->19367 19370 12e545fe378 _malloc_crt RtlFreeHeap 19369->19370 19371 12e54603255 19370->19371 19371->19343 19373 12e5460053f 19372->19373 19374 12e54600527 19372->19374 19376 12e546005b6 19373->19376 19380 12e54600571 19373->19380 19412 12e545fb6a4 19374->19412 19378 12e545fb6a4 __doserrno RtlFreeHeap 19376->19378 19381 12e546005bb 19378->19381 19379 12e545fb714 _errno RtlFreeHeap 19385 12e54600534 _invalid_parameter_noinfo _unlock_fhandle 19379->19385 19415 12e5460438c 19380->19415 19383 12e545fb714 _errno RtlFreeHeap 19381->19383 19383->19385 19384 12e54600578 19386 12e54600584 19384->19386 19387 12e54600595 19384->19387 19385->19351 19419 12e546005e4 19386->19419 19389 12e545fb714 _errno RtlFreeHeap 19387->19389 19390 12e5460059a 19389->19390 19391 12e545fb6a4 __doserrno RtlFreeHeap 19390->19391 19391->19385 19393 12e54601d13 19392->19393 19394 12e54601cfb 19392->19394 19396 12e54601d8d 19393->19396 19399 12e54601d45 19393->19399 19395 12e545fb6a4 __doserrno RtlFreeHeap 19394->19395 19397 12e54601d00 19395->19397 19398 12e545fb6a4 __doserrno RtlFreeHeap 19396->19398 19401 12e545fb714 _errno RtlFreeHeap 19397->19401 19400 12e54601d92 19398->19400 19402 12e5460438c __lock_fhandle RtlFreeHeap 19399->19402 19403 12e545fb714 _errno RtlFreeHeap 19400->19403 19411 12e54601d08 _invalid_parameter_noinfo _unlock_fhandle 19401->19411 19404 12e54601d4c 19402->19404 19403->19411 19405 12e54601d58 19404->19405 19406 12e54601d6a 19404->19406 19407 12e54601dbc _lseeki64_nolock RtlFreeHeap 19405->19407 19408 12e545fb714 _errno RtlFreeHeap 19406->19408 19407->19411 19409 12e54601d6f 19408->19409 19410 12e545fb6a4 __doserrno RtlFreeHeap 19409->19410 19410->19411 19411->19351 19413 12e545ff438 _getptd_noexit RtlFreeHeap 19412->19413 19414 12e545fb6ad 19413->19414 19414->19379 19416 12e546043c4 19415->19416 19418 12e546043ce __updatetmbcinfo 19415->19418 19417 12e545fd958 _lock RtlFreeHeap 19416->19417 19417->19418 19418->19384 19420 12e54600606 19419->19420 19421 12e5460063a 19420->19421 19423 12e54600696 19420->19423 19436 12e5460062e _invalid_parameter_noinfo _setmbcp_nolock 19420->19436 19422 12e545fb6a4 __doserrno RtlFreeHeap 19421->19422 19425 12e5460063f 19422->19425 19424 12e546006ab 19423->19424 19444 12e54601dbc 19423->19444 19427 12e546031dc _isatty RtlFreeHeap 19424->19427 19428 12e545fb714 _errno RtlFreeHeap 19425->19428 19429 12e546006b2 19427->19429 19428->19436 19430 12e545ff414 _getptd RtlFreeHeap 19429->19430 19443 12e54600943 19429->19443 19441 12e546006d6 _putwch_nolock 19430->19441 19431 12e54600cb1 19432 12e545fb714 _errno RtlFreeHeap 19431->19432 19431->19436 19433 12e54600cdd 19432->19433 19434 12e545fb6a4 __doserrno RtlFreeHeap 19433->19434 19434->19436 19435 12e54600ca3 19455 12e545fb6c4 19435->19455 19436->19385 19438 12e545fb714 _errno RtlFreeHeap 19439 12e54600c98 19438->19439 19440 12e545fb6a4 __doserrno RtlFreeHeap 19439->19440 19440->19435 19441->19443 19452 12e54603678 19441->19452 19443->19431 19443->19435 19443->19436 19443->19438 19445 12e546046c8 _lseeki64_nolock RtlFreeHeap 19444->19445 19446 12e54601ddb 19445->19446 19447 12e54601de1 19446->19447 19450 12e54601df2 19446->19450 19448 12e545fb714 _errno RtlFreeHeap 19447->19448 19449 12e54601de6 19448->19449 19449->19424 19450->19449 19451 12e545fb6c4 _dosmaperr RtlFreeHeap 19450->19451 19451->19449 19453 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19452->19453 19454 12e5460368c 19453->19454 19454->19441 19456 12e545ff438 _getptd_noexit RtlFreeHeap 19455->19456 19457 12e545fb6d5 19456->19457 19458 12e545ff438 _getptd_noexit RtlFreeHeap 19457->19458 19459 12e545fb6ee free 19458->19459 19459->19431 19461 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19460->19461 19463 12e545fd6a8 19461->19463 19462 12e545fd6c3 19464 12e545fb714 _errno RtlFreeHeap 19462->19464 19463->19462 19466 12e545fd6d8 19463->19466 19467 12e545fd6c8 _invalid_parameter_noinfo 19464->19467 19469 12e545fd72a 19466->19469 19470 12e54603878 19466->19470 19467->19317 19468 12e545fb714 _errno RtlFreeHeap 19468->19467 19469->19467 19469->19468 19471 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19470->19471 19472 12e5460389a 19471->19472 19473 12e54603634 _isleadbyte_l RtlFreeHeap 19472->19473 19476 12e546038a4 19472->19476 19474 12e546038c7 19473->19474 19475 12e54604268 _isctype_l RtlFreeHeap 19474->19475 19475->19476 19476->19466 19478 12e545f6d71 _DllMainCRTStartup 19477->19478 19501 12e545c18bc 19478->19501 19480 12e545f6da8 _DllMainCRTStartup 19480->19216 19482 12e545ff414 _getptd RtlFreeHeap 19481->19482 19483 12e545fa021 19482->19483 19483->19218 19485 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 19484->19485 19486 12e545d7d16 _DllMainCRTStartup 19485->19486 19487 12e545d7d7a GetUserNameA 19486->19487 19488 12e545d7dc8 19487->19488 19507 12e545d00a4 19488->19507 19490 12e545d7dcd strrchr _DllMainCRTStartup 19491 12e545f9700 _snprintf RtlFreeHeap 19490->19491 19492 12e545d7f11 _DllMainCRTStartup 19491->19492 19514 12e545d80f0 19492->19514 19496 12e545f67e3 _DllMainCRTStartup 19495->19496 19522 12e545c1cc4 19496->19522 19498 12e545f6838 19542 12e545c1b64 19498->19542 19500 12e545f68b0 19500->19222 19503 12e545c18ec _DllMainCRTStartup 19501->19503 19502 12e545c190d 19502->19480 19503->19502 19504 12e545f9468 malloc RtlFreeHeap 19503->19504 19506 12e545c1921 19504->19506 19505 12e545f9428 free RtlFreeHeap 19505->19502 19506->19502 19506->19505 19520 12e545d01dc 19507->19520 19509 12e545d00c0 WSASocketA 19510 12e545d00fa WSAIoctl 19509->19510 19511 12e545d00f3 19509->19511 19513 12e545d0145 closesocket 19510->19513 19511->19490 19513->19511 19515 12e545d8103 _DllMainCRTStartup 19514->19515 19516 12e545f9428 free RtlFreeHeap 19515->19516 19517 12e545d8110 19516->19517 19518 12e545f9428 free RtlFreeHeap 19517->19518 19519 12e545d7f78 19518->19519 19519->19220 19521 12e545d01ec _DllMainCRTStartup 19520->19521 19521->19509 19523 12e545c1d5e _DllMainCRTStartup 19522->19523 19541 12e545c1d77 _setmbcp_nolock _DllMainCRTStartup 19523->19541 19546 12e54608f58 19523->19546 19525 12e545c1d6f _DllMainCRTStartup 19526 12e545c1f0c 19525->19526 19531 12e545c1e6d 19525->19531 19525->19541 19527 12e545f9428 free RtlFreeHeap 19526->19527 19528 12e545c1f14 19527->19528 19530 12e545c4e64 _DllMainCRTStartup RtlFreeHeap 19528->19530 19537 12e545c1f40 19530->19537 19553 12e545c4e64 19531->19553 19533 12e545c1efd 19536 12e545f9428 free RtlFreeHeap 19533->19536 19534 12e545c1ef3 19535 12e545f9428 free RtlFreeHeap 19534->19535 19535->19541 19536->19541 19538 12e545c205c 19537->19538 19539 12e545c4e64 _DllMainCRTStartup RtlFreeHeap 19537->19539 19537->19541 19540 12e545c4e64 _DllMainCRTStartup RtlFreeHeap 19538->19540 19538->19541 19539->19538 19540->19541 19541->19498 19543 12e545c1ba5 _DllMainCRTStartup 19542->19543 19545 12e545c1b9b _DllMainCRTStartup 19542->19545 19543->19545 19559 12e545c460c 19543->19559 19545->19500 19547 12e54603a60 _calloc_impl RtlFreeHeap 19546->19547 19548 12e54608f6d 19547->19548 19549 12e54608f8a 19548->19549 19550 12e545fb714 _errno RtlFreeHeap 19548->19550 19549->19525 19551 12e54608f80 19550->19551 19551->19549 19552 12e545fb714 _errno RtlFreeHeap 19551->19552 19552->19549 19554 12e545c4e90 19553->19554 19555 12e54608f58 calloc RtlFreeHeap 19554->19555 19556 12e545c1eea 19554->19556 19557 12e545c4ecf _DllMainCRTStartup 19555->19557 19556->19533 19556->19534 19557->19556 19558 12e545f9428 free RtlFreeHeap 19557->19558 19558->19556 19560 12e545c463d _DllMainCRTStartup 19559->19560 19561 12e545f9468 malloc RtlFreeHeap 19560->19561 19580 12e545c4893 19560->19580 19562 12e545c46ae 19561->19562 19563 12e545f9468 malloc RtlFreeHeap 19562->19563 19564 12e545c46b8 19563->19564 19565 12e545f9468 malloc RtlFreeHeap 19564->19565 19566 12e545c46c3 19565->19566 19567 12e545c489f 19566->19567 19569 12e545c4897 19566->19569 19572 12e545c46e1 19566->19572 19568 12e545c48ac 19567->19568 19571 12e545f9428 free RtlFreeHeap 19567->19571 19573 12e545f9428 free RtlFreeHeap 19568->19573 19568->19580 19570 12e545f9428 free RtlFreeHeap 19569->19570 19570->19567 19571->19568 19574 12e545c18bc _DllMainCRTStartup RtlFreeHeap 19572->19574 19573->19580 19581 12e545c4723 memcpy_s _snprintf 19574->19581 19575 12e545f9428 free RtlFreeHeap 19576 12e545c4883 19575->19576 19577 12e545f9428 free RtlFreeHeap 19576->19577 19578 12e545c488b 19577->19578 19579 12e545f9428 free RtlFreeHeap 19578->19579 19579->19580 19580->19545 19585 12e545c4797 memcpy_s 19581->19585 19586 12e545c54f0 19581->19586 19583 12e545c47bf 19583->19583 19584 12e545c54f0 _DllMainCRTStartup RtlFreeHeap 19583->19584 19583->19585 19584->19585 19585->19575 19587 12e545c551c _DllMainCRTStartup 19586->19587 19588 12e545c5639 19587->19588 19589 12e545f9468 malloc RtlFreeHeap 19587->19589 19588->19583 19590 12e545c553f 19589->19590 19591 12e545f9468 malloc RtlFreeHeap 19590->19591 19592 12e545c554a 19591->19592 19593 12e545c5645 19592->19593 19594 12e545c563d 19592->19594 19597 12e545c555f 19592->19597 19593->19588 19595 12e545f9428 free RtlFreeHeap 19593->19595 19596 12e545f9428 free RtlFreeHeap 19594->19596 19595->19588 19596->19593 19598 12e545f9428 free RtlFreeHeap 19597->19598 19599 12e545c5631 19598->19599 19600 12e545f9428 free RtlFreeHeap 19599->19600 19600->19588 19602 12e545f8c5e 19601->19602 19604 12e545f8da7 19602->19604 19605 12e545f8c70 19602->19605 19603 12e545f8dbd 19607 12e545f8dd3 19603->19607 19609 12e545f9428 free RtlFreeHeap 19603->19609 19604->19603 19606 12e545f9428 free RtlFreeHeap 19604->19606 19608 12e545f8c88 19605->19608 19610 12e545f9428 free RtlFreeHeap 19605->19610 19606->19603 19607->19226 19608->19226 19609->19607 19610->19608 19629 12e545db828 19611->19629 19613 12e545cf52f 19614 12e545f9700 _snprintf RtlFreeHeap 19613->19614 19615 12e545cf550 _DllMainCRTStartup 19614->19615 19633 12e545dabbc 19615->19633 19618 12e545cf5db 19620 12e545f9700 _snprintf RtlFreeHeap 19618->19620 19619 12e545cf5fe 19621 12e545f9700 _snprintf RtlFreeHeap 19619->19621 19622 12e545cf5fc _DllMainCRTStartup 19620->19622 19621->19622 19639 12e545db808 19622->19639 19626 12e545cf70b 19626->19230 19627 12e545cf707 _DllMainCRTStartup 19627->19626 19646 12e545db940 19627->19646 19630 12e545db852 19629->19630 19631 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 19630->19631 19632 12e545db875 _DllMainCRTStartup 19631->19632 19632->19613 19638 12e545dac38 _DllMainCRTStartup 19633->19638 19634 12e545cf5a0 19634->19618 19634->19619 19635 12e545db752 19635->19634 19635->19635 19637 12e545f9700 _snprintf RtlFreeHeap 19635->19637 19636 12e545f9700 RtlFreeHeap _snprintf 19636->19638 19637->19634 19638->19634 19638->19635 19638->19636 19640 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 19639->19640 19641 12e545cf6fd 19640->19641 19642 12e545d0038 19641->19642 19643 12e545d0072 19642->19643 19644 12e545f99cc _DllMainCRTStartup RtlFreeHeap 19643->19644 19645 12e545d0076 19643->19645 19644->19645 19645->19627 19647 12e545f9468 malloc RtlFreeHeap 19646->19647 19653 12e545db9af _DllMainCRTStartup 19647->19653 19648 12e545dbdcb 19649 12e545f9428 free RtlFreeHeap 19648->19649 19655 12e545db9bc 19649->19655 19650 12e545dbdb3 19651 12e545f9428 free RtlFreeHeap 19650->19651 19651->19655 19652 12e545dba7f 19654 12e545f9428 free RtlFreeHeap 19652->19654 19653->19648 19653->19650 19653->19652 19653->19655 19654->19655 19655->19626 19658 12e545c19b8 _DllMainCRTStartup 19656->19658 19657 12e545c19d7 19657->19239 19658->19657 19659 12e545f9468 malloc RtlFreeHeap 19658->19659 19660 12e545c1a07 19659->19660 19660->19657 19670 12e545c4300 19660->19670 19662 12e545c1a52 19663 12e545f9428 free RtlFreeHeap 19662->19663 19663->19657 19664 12e545c1a24 _DllMainCRTStartup 19664->19662 19682 12e545c4170 19664->19682 19667 12e545cf262 19666->19667 19699 12e545cd090 19667->19699 19671 12e545c432f _DllMainCRTStartup 19670->19671 19672 12e545c4352 19671->19672 19673 12e545f9468 malloc RtlFreeHeap 19671->19673 19672->19664 19674 12e545c4368 19673->19674 19674->19672 19675 12e545f9468 malloc RtlFreeHeap 19674->19675 19676 12e545c4381 19675->19676 19677 12e545c438d 19676->19677 19679 12e545c18bc _DllMainCRTStartup RtlFreeHeap 19676->19679 19681 12e545c43c3 memcpy_s _DllMainCRTStartup 19676->19681 19678 12e545f9428 free RtlFreeHeap 19677->19678 19678->19672 19679->19681 19680 12e545f9428 free RtlFreeHeap 19680->19677 19681->19677 19681->19680 19681->19681 19683 12e545c419d _DllMainCRTStartup 19682->19683 19684 12e545c42c4 19683->19684 19685 12e545f9468 malloc RtlFreeHeap 19683->19685 19684->19662 19686 12e545c41c2 19685->19686 19687 12e545f9468 malloc RtlFreeHeap 19686->19687 19688 12e545c41cd 19687->19688 19689 12e545c42d0 19688->19689 19690 12e545c42c8 19688->19690 19696 12e545c41e2 19688->19696 19689->19684 19692 12e545f9428 free RtlFreeHeap 19689->19692 19691 12e545f9428 free RtlFreeHeap 19690->19691 19691->19689 19692->19684 19693 12e545f9428 free RtlFreeHeap 19694 12e545c42b4 19693->19694 19695 12e545f9428 free RtlFreeHeap 19694->19695 19697 12e545c42bc 19695->19697 19696->19693 19698 12e545f9428 free RtlFreeHeap 19697->19698 19698->19684 19700 12e545cd0ac _DllMainCRTStartup 19699->19700 19701 12e545cd0ef 19700->19701 19702 12e545cd0da 19700->19702 19713 12e545cd10c 19701->19713 19706 12e545cf128 19702->19706 19705 12e545cd0ed 19705->19247 19707 12e545cf144 _DllMainCRTStartup 19706->19707 19708 12e545cf14a 19707->19708 19709 12e545cf15f 19707->19709 19720 12e545cefdc 19708->19720 19711 12e545cd10c _DllMainCRTStartup RtlFreeHeap 19709->19711 19712 12e545cf15d 19711->19712 19712->19705 19736 12e545cf180 19713->19736 19716 12e545cd175 19719 12e545f9428 free RtlFreeHeap 19716->19719 19717 12e545cd14f 19717->19705 19719->19717 19721 12e545ceff8 _DllMainCRTStartup 19720->19721 19730 12e545cd2bc 19721->19730 19723 12e545cf016 _DllMainCRTStartup 19724 12e545cd10c _DllMainCRTStartup RtlFreeHeap 19723->19724 19725 12e545cf0ab 19724->19725 19733 12e545cd280 19725->19733 19727 12e545cf0b5 19728 12e545cf122 19727->19728 19729 12e545cd10c _DllMainCRTStartup RtlFreeHeap 19727->19729 19728->19712 19729->19727 19731 12e545f9468 malloc RtlFreeHeap 19730->19731 19732 12e545cd2d6 _DllMainCRTStartup 19731->19732 19732->19723 19734 12e545f9428 free RtlFreeHeap 19733->19734 19735 12e545cd2b6 19734->19735 19735->19727 19737 12e545f9468 malloc RtlFreeHeap 19736->19737 19738 12e545cf1a8 _DllMainCRTStartup 19737->19738 19739 12e545cf217 19738->19739 19740 12e545cf230 19738->19740 19743 12e545cd143 19738->19743 19741 12e545f9428 free RtlFreeHeap 19739->19741 19754 12e545f6bd8 19740->19754 19741->19743 19743->19716 19743->19717 19744 12e545cff10 19743->19744 19745 12e545cff3c 19744->19745 19746 12e545cff73 19744->19746 19748 12e545f9468 malloc RtlFreeHeap 19745->19748 19747 12e545cff84 19746->19747 19751 12e545cfbec _DllMainCRTStartup RtlFreeHeap 19746->19751 19752 12e545cffb1 19746->19752 19747->19716 19749 12e545cff46 19748->19749 19750 12e545f8aec _DllMainCRTStartup RtlFreeHeap 19749->19750 19750->19746 19751->19752 19752->19747 19753 12e545cfbec _DllMainCRTStartup RtlFreeHeap 19752->19753 19753->19747 19757 12e545f6c00 _DllMainCRTStartup 19754->19757 19755 12e545c198c _DllMainCRTStartup RtlFreeHeap 19756 12e545f6d2a 19755->19756 19756->19743 19757->19755 19759 12e545dc019 19758->19759 19760 12e545dbe19 19758->19760 19763 12e545dc024 19759->19763 19764 12e545dc111 19759->19764 19761 12e545dbe24 19760->19761 19762 12e545dc5f1 19760->19762 19768 12e545dbf37 19761->19768 19769 12e545dbe2f 19761->19769 20228 12e545d2f10 19762->20228 19770 12e545dc7cb 19763->19770 19771 12e545dc02f 19763->19771 19765 12e545dc18b 19764->19765 19766 12e545dc118 19764->19766 19779 12e545dc196 19765->19779 19780 12e545dc8c9 19765->19780 19786 12e545dc7de 19766->19786 19787 12e545dc12e 19766->19787 19920 12e545dbe99 _DllMainCRTStartup 19766->19920 19773 12e545dbf3e 19768->19773 19774 12e545dbfb1 19768->19774 19775 12e545dbe3a 19769->19775 19776 12e545dc407 19769->19776 20341 12e545d9038 19770->20341 19777 12e545dc036 19771->19777 19778 12e545dc0a9 19771->19778 19788 12e545dc4fd 19773->19788 19789 12e545dbf49 19773->19789 19783 12e545dbfbc 19774->19783 19784 12e545dc519 19774->19784 19793 12e545dbe45 19775->19793 19794 12e545dbecf 19775->19794 20089 12e545f82cc 19776->20089 19795 12e545dc6e7 19777->19795 19796 12e545dc041 19777->19796 19790 12e545dc706 19778->19790 19791 12e545dc0b4 19778->19791 19781 12e545dc8df 19779->19781 19782 12e545dc1a1 19779->19782 20374 12e545d3f60 19780->20374 19807 12e545d3f60 _DllMainCRTStartup RtlFreeHeap 19781->19807 19803 12e545dc1ac 19782->19803 19804 12e545dc8f8 19782->19804 19797 12e545dbfc7 19783->19797 19798 12e545dc539 19783->19798 20176 12e545d3ae0 19784->20176 20348 12e545cc7a8 19786->20348 19799 12e545dc139 19787->19799 19800 12e545dc7f1 19787->19800 19811 12e545d3870 _DllMainCRTStartup RtlFreeHeap 19788->19811 19808 12e545dbf54 19789->19808 19809 12e545dc430 19789->19809 19810 12e545d3c08 _DllMainCRTStartup RtlFreeHeap 19790->19810 19812 12e545dc722 19791->19812 19813 12e545dc0bf 19791->19813 19821 12e545dbe57 19793->19821 19822 12e545dbe9e 19793->19822 19793->19920 19826 12e545dbee5 19794->19826 19827 12e545dc33e 19794->19827 19794->19920 20274 12e545d3c08 19795->20274 19801 12e545dc60b 19796->19801 19802 12e545dc04c 19796->19802 19836 12e545dbfdd 19797->19836 19837 12e545dc56e 19797->19837 19797->19920 19823 12e545d3ae0 _DllMainCRTStartup RtlFreeHeap 19798->19823 19824 12e545dc804 19799->19824 19825 12e545dc144 19799->19825 20355 12e545cc958 19800->20355 20236 12e545d2e94 19801->20236 19815 12e545dc057 19802->19815 19816 12e545dc61e 19802->19816 19828 12e545dc1b7 19803->19828 19829 12e545dc90e 19803->19829 20392 12e545d4104 19804->20392 19807->19920 19830 12e545dc44a 19808->19830 19831 12e545dbf5f 19808->19831 20114 12e545dcad8 19809->20114 19810->19920 19811->19920 20281 12e545d0d38 19812->20281 19819 12e545dc0ca 19813->19819 19820 12e545dc735 19813->19820 19838 12e545dc636 19815->19838 19839 12e545dc062 19815->19839 20249 12e545d0eb0 19816->20249 19840 12e545dc748 19819->19840 19841 12e545dc0d5 19819->19841 20284 12e545d2dd8 19820->20284 19844 12e545dbe62 19821->19844 19845 12e545dc271 19821->19845 19847 12e545dc28b 19822->19847 19848 12e545dbea9 19822->19848 19823->19920 20360 12e545cc8b8 19824->20360 19849 12e545dc815 19825->19849 19850 12e545dc14f 19825->19850 19851 12e545dc358 19826->19851 19852 12e545dbef0 19826->19852 20056 12e545d8b54 19827->20056 19853 12e545dc1c2 19828->19853 19854 12e545dc921 19828->19854 19842 12e545d4104 _DllMainCRTStartup RtlFreeHeap 19829->19842 20129 12e545dca28 19830->20129 19855 12e545dbf6a 19831->19855 19856 12e545dc46c 19831->19856 19861 12e545dc588 19836->19861 19862 12e545dbfe8 19836->19862 20180 12e545f817c 19837->20180 20253 12e545f8f98 19838->20253 19865 12e545dc06d 19839->19865 19866 12e545dc649 19839->19866 20291 12e545d3334 19840->20291 19867 12e545dc75b 19841->19867 19868 12e545dc0e0 19841->19868 19842->19920 19869 12e545dc1f3 19844->19869 19934 12e545dbe6d 19844->19934 19981 12e545d1080 19845->19981 20000 12e545d2854 19847->20000 19874 12e545dc2a5 19848->19874 19875 12e545dbeb4 19848->19875 20367 12e545d757c 19849->20367 19876 12e545dc15a 19850->19876 19877 12e545dc82f 19850->19877 20060 12e545d3b70 19851->20060 19878 12e545dbefb 19852->19878 19879 12e545dc378 19852->19879 19880 12e545dc1cd 19853->19880 19881 12e545dc931 19853->19881 20398 12e545cd654 19854->20398 19882 12e545dbf75 19855->19882 19883 12e545dc47f 19855->19883 20133 12e545da30c 19856->20133 20187 12e545d8ea8 19861->20187 19908 12e545dbffe 19862->19908 19909 12e545dc5b1 19862->19909 19862->19920 19889 12e545dc65c 19865->19889 19890 12e545dc078 19865->19890 20257 12e545d14f8 19866->20257 20298 12e545da810 19867->20298 19891 12e545dc0eb 19868->19891 19892 12e545dc76e 19868->19892 19962 12e545d3870 19869->19962 20040 12e545d089c 19874->20040 19896 12e545dc2b8 19875->19896 19897 12e545dbebf 19875->19897 19899 12e545dc84b 19876->19899 19900 12e545dc165 19876->19900 19885 12e545d3c08 _DllMainCRTStartup RtlFreeHeap 19877->19885 19901 12e545dbf06 19878->19901 19902 12e545dc395 19878->19902 20064 12e545d2ae4 19879->20064 19903 12e545dc949 19880->19903 19904 12e545dc1d8 19880->19904 19893 12e545d5c14 _DllMainCRTStartup RtlFreeHeap 19881->19893 19882->19920 19921 12e545dbf8b 19882->19921 19922 12e545dc4aa 19882->19922 20139 12e545d0a44 19883->20139 19885->19920 20261 12e545d141c 19889->20261 19911 12e545dc66d 19890->19911 19912 12e545dc083 19890->19912 19913 12e545dc0f6 19891->19913 19914 12e545dc781 19891->19914 20302 12e545d0bc0 19892->20302 19893->19920 20044 12e545f71ac 19896->20044 19897->19920 20048 12e545d868c 19897->20048 19906 12e545d3c08 _DllMainCRTStartup RtlFreeHeap 19899->19906 19917 12e545dc864 19900->19917 19918 12e545dc170 19900->19918 19901->19920 19948 12e545dbf27 19901->19948 19949 12e545dc3e3 19901->19949 20068 12e545d6780 19902->20068 19915 12e545d8ea8 _DllMainCRTStartup RtlFreeHeap 19903->19915 19903->19920 19904->19920 20052 12e545d8934 19904->20052 19906->19920 19923 12e545dc009 19908->19923 19924 12e545dc5c4 19908->19924 20194 12e545d0dc4 19909->20194 19926 12e545d5c14 _DllMainCRTStartup RtlFreeHeap 19911->19926 19929 12e545dc69d 19912->19929 19930 12e545dc08e 19912->19930 19932 12e545dc79b 19913->19932 19933 12e545dc101 19913->19933 20310 12e545d15d8 19914->20310 19915->19920 19925 12e545d3870 _DllMainCRTStartup RtlFreeHeap 19917->19925 19936 12e545dc17b 19918->19936 19937 12e545dc880 19918->19937 19920->19252 19939 12e545dbf96 19921->19939 19940 12e545dc4c3 19921->19940 20158 12e545d5c14 19922->20158 19923->19920 20220 12e545d32e4 19923->20220 20198 12e545d2fb8 19924->20198 19925->19920 19926->19920 19942 12e545d1080 _DllMainCRTStartup RtlFreeHeap 19929->19942 19944 12e545dc6b7 19930->19944 19945 12e545dc099 19930->19945 20323 12e545d06d4 19932->20323 19933->19920 20337 12e545da288 19933->20337 19934->19920 19968 12e545d39a0 19934->19968 19936->19920 19952 12e545d3b70 _DllMainCRTStartup RtlFreeHeap 19936->19952 19941 12e545d3870 _DllMainCRTStartup RtlFreeHeap 19937->19941 19950 12e545dc4d4 19939->19950 19951 12e545dbfa1 19939->19951 20165 12e545d5dac 19940->20165 19941->19920 19942->19920 20271 12e545d6fb0 19944->20271 19945->19920 19959 12e545f71ac _DllMainCRTStartup RtlFreeHeap 19945->19959 19948->19920 20085 12e545f826c 19948->20085 20072 12e545f80bc 19949->20072 20172 12e545d5b98 19950->20172 19951->19920 19960 12e545d39a0 _DllMainCRTStartup RtlFreeHeap 19951->19960 19952->19920 19959->19920 19960->19920 19963 12e545d3897 _DllMainCRTStartup 19962->19963 20405 12e545f72a0 19963->20405 19967 12e545d3926 _DllMainCRTStartup 19967->19920 19969 12e545d39d5 _DllMainCRTStartup 19968->19969 19970 12e545d3a2c _DllMainCRTStartup 19969->19970 19971 12e545d3a10 19969->19971 19972 12e545d3a59 _DllMainCRTStartup 19970->19972 19975 12e545d3a44 19970->19975 19973 12e545cf310 _DllMainCRTStartup RtlFreeHeap 19971->19973 19976 12e545d3a71 19972->19976 19977 12e545d3a81 _DllMainCRTStartup 19972->19977 19974 12e545d3a27 19973->19974 19974->19920 19978 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 19975->19978 19979 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 19976->19979 19980 12e545d4708 _DllMainCRTStartup RtlFreeHeap 19977->19980 19978->19974 19979->19974 19980->19974 19982 12e545f9468 malloc RtlFreeHeap 19981->19982 19983 12e545d109c _DllMainCRTStartup 19982->19983 19984 12e545d10db 19983->19984 19985 12e545d10ea 19983->19985 19994 12e545d10a9 19983->19994 19986 12e545f9428 free RtlFreeHeap 19984->19986 20531 12e545fa1e8 19985->20531 19986->19994 19988 12e545d10f9 19989 12e545d110e 19988->19989 19992 12e545d112c _DllMainCRTStartup 19988->19992 19990 12e545f9428 free RtlFreeHeap 19989->19990 19991 12e545d1118 19990->19991 19993 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 19991->19993 20546 12e545fa384 19992->20546 19993->19994 19994->19920 19996 12e545d1161 20553 12e545fa0a8 19996->20553 19998 12e545d116b 19999 12e545f9428 free RtlFreeHeap 19998->19999 19999->19994 20001 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20000->20001 20002 12e545d287c _DllMainCRTStartup 20001->20002 20003 12e545fa1e8 _DllMainCRTStartup RtlFreeHeap 20002->20003 20004 12e545d28e9 20003->20004 20005 12e545d28fe 20004->20005 20006 12e545d291c 20004->20006 20705 12e545cf430 20005->20705 20708 12e545faa64 20006->20708 20010 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20012 12e545d2917 20010->20012 20011 12e545d292e 20715 12e545faad8 20011->20715 20012->19920 20014 12e545d2938 20015 12e545faa64 fseek RtlFreeHeap 20014->20015 20016 12e545d294c 20015->20016 20017 12e545d2960 20016->20017 20018 12e545d2988 20016->20018 20019 12e545cf430 _DllMainCRTStartup RtlFreeHeap 20017->20019 20023 12e545d29b5 20018->20023 20025 12e545d29dd 20018->20025 20020 12e545d296f 20019->20020 20021 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20020->20021 20022 12e545d2979 20021->20022 20024 12e545fa0a8 fclose RtlFreeHeap 20022->20024 20026 12e545cf430 _DllMainCRTStartup RtlFreeHeap 20023->20026 20024->20012 20027 12e545f9468 malloc RtlFreeHeap 20025->20027 20028 12e545d29c4 20026->20028 20029 12e545d29e7 20027->20029 20030 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20028->20030 20031 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 20029->20031 20032 12e545d29ce 20030->20032 20034 12e545d2a4c _DllMainCRTStartup 20031->20034 20033 12e545fa0a8 fclose RtlFreeHeap 20032->20033 20033->20012 20035 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20034->20035 20036 12e545d2ab7 20035->20036 20037 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20036->20037 20038 12e545d2ac1 20037->20038 20038->20012 20721 12e545d2c54 20038->20721 20041 12e545d08e2 20040->20041 20042 12e545da870 _DllMainCRTStartup RtlFreeHeap 20041->20042 20043 12e545d0928 _DllMainCRTStartup 20041->20043 20042->20043 20043->19920 20045 12e545f71ca 20044->20045 20046 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20045->20046 20047 12e545f71de _DllMainCRTStartup 20045->20047 20046->20047 20047->19920 20049 12e545d8723 _DllMainCRTStartup 20048->20049 20050 12e545d87d5 20049->20050 20806 12e545d8558 20049->20806 20050->19920 20053 12e545d89c2 _DllMainCRTStartup 20052->20053 20054 12e545d8a74 20053->20054 20812 12e545d8598 20053->20812 20054->19920 20058 12e545d8b88 _DllMainCRTStartup 20056->20058 20057 12e545d8bbc 20057->19920 20058->20057 20059 12e545d8470 _DllMainCRTStartup RtlFreeHeap 20058->20059 20059->20057 20061 12e545d3bc0 20060->20061 20062 12e545d3870 _DllMainCRTStartup RtlFreeHeap 20061->20062 20063 12e545d3bde 20062->20063 20063->19920 20065 12e545d2b11 20064->20065 20066 12e545d2b54 20065->20066 20067 12e545fa0a8 fclose RtlFreeHeap 20065->20067 20066->19920 20067->20065 20069 12e545d67d7 _DllMainCRTStartup 20068->20069 20071 12e545d67ea _DllMainCRTStartup 20068->20071 20070 12e545f9468 malloc RtlFreeHeap 20069->20070 20070->20071 20071->19920 20073 12e545f80d4 20072->20073 20074 12e545f810a 20073->20074 20075 12e545f80ee 20073->20075 20077 12e545f8127 20074->20077 20078 12e545f8143 20074->20078 20815 12e545f87fc 20075->20815 20079 12e545f87fc _DllMainCRTStartup RtlFreeHeap 20077->20079 20080 12e545f814d _wcsupr_s 20078->20080 20081 12e545f816a 20078->20081 20083 12e545f80fd _wcsupr_s 20079->20083 20084 12e545f87fc _DllMainCRTStartup RtlFreeHeap 20080->20084 20823 12e545cf410 20081->20823 20083->19920 20084->20083 20086 12e545f827c 20085->20086 20087 12e545f82b0 20086->20087 20088 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20086->20088 20087->19920 20088->20087 20090 12e545f8305 20089->20090 20091 12e545f8374 20090->20091 20092 12e545f8390 20090->20092 20113 12e545f830f 20090->20113 20095 12e545cf310 _DllMainCRTStartup RtlFreeHeap 20091->20095 20093 12e545f8397 20092->20093 20094 12e545f83ce 20092->20094 20097 12e545f83cc 20093->20097 20098 12e545f83b0 20093->20098 20096 12e545f83e6 20094->20096 20094->20097 20095->20113 20102 12e545cf310 _DllMainCRTStartup RtlFreeHeap 20096->20102 20099 12e545f826c _DllMainCRTStartup RtlFreeHeap 20097->20099 20101 12e545cf310 _DllMainCRTStartup RtlFreeHeap 20098->20101 20100 12e545f8407 20099->20100 20103 12e545f8416 20100->20103 20104 12e545f8432 20100->20104 20101->20113 20102->20113 20105 12e545cf310 _DllMainCRTStartup RtlFreeHeap 20103->20105 20106 12e545f8463 20104->20106 20107 12e545f847f 20104->20107 20105->20113 20110 12e545cf310 _DllMainCRTStartup RtlFreeHeap 20106->20110 20108 12e545f84ac 20107->20108 20109 12e545f8490 20107->20109 20112 12e545f88c4 _DllMainCRTStartup RtlFreeHeap 20108->20112 20111 12e545cf310 _DllMainCRTStartup RtlFreeHeap 20109->20111 20110->20113 20111->20113 20112->20113 20113->19920 20115 12e545dcb45 _DllMainCRTStartup 20114->20115 20116 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 20115->20116 20117 12e545dcb65 _DllMainCRTStartup 20116->20117 20118 12e545dcbf2 20117->20118 20119 12e545dcc01 20117->20119 20120 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20118->20120 20122 12e545dcc22 20119->20122 20126 12e545dcc3c _DllMainCRTStartup 20119->20126 20121 12e545dcbfc 20120->20121 20121->19920 20123 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20122->20123 20123->20121 20125 12e545cd338 RtlFreeHeap _DllMainCRTStartup 20125->20126 20126->20125 20127 12e545dcd97 _DllMainCRTStartup 20126->20127 20830 12e545dce70 20126->20830 20128 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20127->20128 20128->20121 20130 12e545dca6d _DllMainCRTStartup 20129->20130 20131 12e545dcaab 20130->20131 20132 12e545cf310 _DllMainCRTStartup RtlFreeHeap 20130->20132 20131->19920 20132->20131 20134 12e545da325 20133->20134 20135 12e545da331 20133->20135 20136 12e545f9428 free RtlFreeHeap 20134->20136 20137 12e545f9468 malloc RtlFreeHeap 20135->20137 20136->20135 20138 12e545da341 20137->20138 20138->19920 20140 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20139->20140 20141 12e545d0a63 _DllMainCRTStartup 20140->20141 20142 12e545d0aeb 20141->20142 20143 12e545d0afa _DllMainCRTStartup 20141->20143 20144 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20142->20144 20145 12e545d0b13 20143->20145 20146 12e545d0b22 _DllMainCRTStartup 20143->20146 20157 12e545d0af5 _DllMainCRTStartup 20144->20157 20147 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20145->20147 20148 12e545d0b3b 20146->20148 20149 12e545d0b47 _DllMainCRTStartup 20146->20149 20147->20157 20150 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20148->20150 20151 12e545d0b6c _wcsupr_s 20149->20151 20152 12e545d0b60 20149->20152 20150->20157 20834 12e545d25a8 20151->20834 20153 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20152->20153 20153->20157 20155 12e545d0b9c _wcsupr_s 20156 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20155->20156 20156->20157 20157->19920 20159 12e545d5c84 _wcsupr_s _DllMainCRTStartup 20158->20159 20160 12e545d5d90 20159->20160 20162 12e545d5d42 _DllMainCRTStartup 20159->20162 20164 12e545d5ccd 20159->20164 20161 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20160->20161 20161->20164 20865 12e545d5f88 20162->20865 20164->19920 20166 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 20165->20166 20167 12e545d5dd0 20166->20167 20169 12e545d5e18 _DllMainCRTStartup 20167->20169 20868 12e545cd338 20167->20868 20170 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20169->20170 20171 12e545d5e4d 20170->20171 20171->19920 20173 12e545d5bc5 _DllMainCRTStartup 20172->20173 20877 12e545d630c 20173->20877 20177 12e545d3b30 20176->20177 20178 12e545d39a0 _DllMainCRTStartup RtlFreeHeap 20177->20178 20179 12e545d3b48 20178->20179 20179->19920 20181 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20180->20181 20183 12e545f8198 _DllMainCRTStartup 20181->20183 20182 12e545f8206 20182->19920 20183->20182 20881 12e545f85f0 20183->20881 20186 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20186->20182 20189 12e545d8ede _DllMainCRTStartup 20187->20189 20188 12e545d8efb 20188->19920 20189->20188 20190 12e545d8f58 20189->20190 20191 12e545d8f23 _DllMainCRTStartup 20189->20191 20192 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20190->20192 20193 12e545d8470 _DllMainCRTStartup RtlFreeHeap 20191->20193 20192->20188 20193->20188 20195 12e545d0de0 _DllMainCRTStartup 20194->20195 20196 12e545cf410 _DllMainCRTStartup RtlFreeHeap 20195->20196 20197 12e545d0e70 20195->20197 20196->20197 20197->19920 20199 12e545f9468 malloc RtlFreeHeap 20198->20199 20200 12e545d2fec _DllMainCRTStartup 20199->20200 20201 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 20200->20201 20204 12e545d3057 _openfile _DllMainCRTStartup 20201->20204 20202 12e545d30af 20203 12e545cd338 _DllMainCRTStartup RtlFreeHeap 20202->20203 20205 12e545d30c8 20203->20205 20204->20202 20894 12e545fa414 20204->20894 20207 12e545d30e8 20205->20207 20208 12e545d3152 20205->20208 20901 12e545cf458 20207->20901 20209 12e545f9428 free RtlFreeHeap 20208->20209 20213 12e545d315c 20209->20213 20211 12e545d3100 _DllMainCRTStartup 20214 12e545f9428 free RtlFreeHeap 20211->20214 20212 12e545cd338 RtlFreeHeap _DllMainCRTStartup 20212->20213 20213->20212 20218 12e545d328d _DllMainCRTStartup 20213->20218 20215 12e545d313e 20214->20215 20216 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20215->20216 20217 12e545d314b 20216->20217 20217->19920 20219 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20218->20219 20219->20217 20221 12e545d3305 _DllMainCRTStartup 20220->20221 20904 12e545d8430 20221->20904 20223 12e545d3314 20907 12e545faf00 20223->20907 20226 12e545f9428 free RtlFreeHeap 20227 12e545d332d 20226->20227 20227->19920 20229 12e545d2f36 _DllMainCRTStartup 20228->20229 20230 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 20229->20230 20231 12e545d2f45 _DllMainCRTStartup 20230->20231 20232 12e545cd338 _DllMainCRTStartup RtlFreeHeap 20231->20232 20233 12e545d2f7b _DllMainCRTStartup 20232->20233 20234 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20233->20234 20235 12e545d2fb3 20234->20235 20235->19920 20237 12e545d2eb5 _DllMainCRTStartup 20236->20237 20238 12e545d8430 _DllMainCRTStartup RtlFreeHeap 20237->20238 20239 12e545d2ec4 _DllMainCRTStartup 20238->20239 20240 12e545d2ed7 20239->20240 20241 12e545d2ef4 20239->20241 20933 12e545dcecc 20240->20933 20944 12e545fae28 20241->20944 20244 12e545d2ef2 20246 12e545f9428 free RtlFreeHeap 20244->20246 20248 12e545d2f08 20246->20248 20248->19920 20250 12e545d0ece _wcsupr_s _DllMainCRTStartup 20249->20250 20250->19920 20251 12e545cf458 _DllMainCRTStartup RtlFreeHeap 20250->20251 20252 12e545d0f59 20250->20252 20251->20252 20252->19920 20254 12e545f8fb9 _DllMainCRTStartup 20253->20254 20981 12e545f90d4 20254->20981 20258 12e545d151c 20257->20258 20259 12e545d1517 20257->20259 20258->20259 20260 12e545f7f5c _DllMainCRTStartup RtlFreeHeap 20258->20260 20259->19920 20260->20259 20262 12e545d1432 20261->20262 20263 12e545d14e3 20262->20263 20264 12e545d1452 20262->20264 20265 12e545cf410 _DllMainCRTStartup RtlFreeHeap 20263->20265 20266 12e545d1477 20264->20266 20267 12e545d1463 20264->20267 20270 12e545d1475 20265->20270 20268 12e545f88c4 _DllMainCRTStartup RtlFreeHeap 20266->20268 20269 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20267->20269 20268->20270 20269->20270 20270->19920 21010 12e545d7278 20271->21010 20275 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20274->20275 20276 12e545d3c2c _DllMainCRTStartup 20275->20276 21030 12e545d3d98 20276->21030 20278 12e545d3d81 20279 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20278->20279 20280 12e545d3d8e 20279->20280 20280->19920 21043 12e54608b48 20281->21043 20283 12e545d0d4f 20283->19920 20285 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20284->20285 20287 12e545d2def _DllMainCRTStartup 20285->20287 20286 12e545d2e83 20288 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20286->20288 20287->20286 20290 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20287->20290 20289 12e545d2e8d 20288->20289 20289->19920 20290->20286 20292 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20291->20292 20295 12e545d334b _DllMainCRTStartup 20292->20295 20293 12e545d33dc 20294 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20293->20294 20296 12e545d33e6 20294->20296 20295->20293 20297 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20295->20297 20296->19920 20297->20293 20300 12e545da831 _DllMainCRTStartup 20298->20300 20299 12e545da84a 20299->19920 20300->20299 20301 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20300->20301 20301->20299 20303 12e545d0c1e 20302->20303 20304 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20303->20304 20305 12e545d0c61 _DllMainCRTStartup 20304->20305 20305->20305 20306 12e545da618 _DllMainCRTStartup RtlFreeHeap 20305->20306 20307 12e545d0d18 20306->20307 20308 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20307->20308 20309 12e545d0d22 _DllMainCRTStartup 20308->20309 20309->19920 20311 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 20310->20311 20312 12e545d15f9 20311->20312 20313 12e545d1603 _wcsupr_s 20312->20313 20314 12e545d1629 20312->20314 21235 12e545d17a8 20313->21235 20316 12e545d166b 20314->20316 20317 12e545d1646 20314->20317 20318 12e545cf410 _DllMainCRTStartup RtlFreeHeap 20316->20318 20319 12e545d17a8 _DllMainCRTStartup RtlFreeHeap 20317->20319 20320 12e545d1622 _wcsupr_s _DllMainCRTStartup 20318->20320 20319->20320 20321 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20320->20321 20322 12e545d16b5 20321->20322 20322->19920 20324 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20323->20324 20325 12e545d06ee _DllMainCRTStartup 20324->20325 20326 12e545fa414 _DllMainCRTStartup RtlFreeHeap 20325->20326 20327 12e545d07c5 20326->20327 20328 12e545fa414 _DllMainCRTStartup RtlFreeHeap 20327->20328 20329 12e545d07df 20328->20329 20330 12e545d0846 20329->20330 20332 12e545d07ec _DllMainCRTStartup 20329->20332 20331 12e545d117c _DllMainCRTStartup RtlFreeHeap 20330->20331 20336 12e545d083a _DllMainCRTStartup 20331->20336 20332->20332 21239 12e545d117c 20332->21239 20333 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20335 12e545d0894 20333->20335 20335->19920 20336->20333 20338 12e545da29f 20337->20338 20339 12e545da2a1 _DllMainCRTStartup 20337->20339 20338->19920 20340 12e545f90d4 _DllMainCRTStartup RtlFreeHeap 20339->20340 20340->20338 20342 12e545d9069 _DllMainCRTStartup 20341->20342 20343 12e545d9099 _DllMainCRTStartup 20342->20343 20344 12e545d90ce 20342->20344 20347 12e545d8470 _DllMainCRTStartup RtlFreeHeap 20343->20347 20345 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20344->20345 20346 12e545d90cc 20345->20346 20346->19920 20347->20346 20349 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20348->20349 20350 12e545cc7bf _DllMainCRTStartup 20349->20350 21248 12e545cca54 20350->21248 20352 12e545cc85d _DllMainCRTStartup 20353 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20352->20353 20354 12e545cc8b1 20353->20354 20354->19920 20356 12e545f9468 malloc RtlFreeHeap 20355->20356 20359 12e545cc97c _DllMainCRTStartup 20356->20359 20357 12e545f9428 free RtlFreeHeap 20358 12e545cca4b 20357->20358 20358->19920 20359->20357 20361 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 20360->20361 20362 12e545cc8dc 20361->20362 20363 12e545cd338 _DllMainCRTStartup RtlFreeHeap 20362->20363 20364 12e545cc920 _DllMainCRTStartup 20362->20364 20363->20362 20365 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20364->20365 20366 12e545cc952 20365->20366 20366->19920 20370 12e545d75a2 _DllMainCRTStartup 20367->20370 20368 12e545d762a 20372 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20368->20372 20369 12e545d763e _DllMainCRTStartup 20371 12e545d6c54 _DllMainCRTStartup RtlFreeHeap 20369->20371 20370->20368 20370->20369 20373 12e545d763c 20371->20373 20372->20373 20373->19920 20375 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20374->20375 20376 12e545d3f7f _DllMainCRTStartup 20375->20376 20377 12e545d3ff3 20376->20377 20378 12e545d4002 _DllMainCRTStartup 20376->20378 20379 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20377->20379 20380 12e545d401b 20378->20380 20381 12e545d402a _DllMainCRTStartup 20378->20381 20389 12e545d3ffd _DllMainCRTStartup 20379->20389 20382 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20380->20382 20383 12e545d4043 20381->20383 20384 12e545d4052 20381->20384 20382->20389 20385 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20383->20385 21252 12e545f7330 20384->21252 20385->20389 20387 12e545d40e2 20388 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20387->20388 20388->20389 20389->19920 20390 12e545d407a _DllMainCRTStartup 20390->20387 20391 12e545d4708 _DllMainCRTStartup RtlFreeHeap 20390->20391 20391->20387 20393 12e545d4134 _DllMainCRTStartup 20392->20393 21257 12e545f739c 20393->21257 20396 12e545d4708 _DllMainCRTStartup RtlFreeHeap 20397 12e545d4200 _DllMainCRTStartup 20396->20397 20397->19920 21262 12e545ce02c 20398->21262 20400 12e545cd681 20403 12e545cd685 _DllMainCRTStartup 20400->20403 21266 12e545cdc28 20400->21266 20403->19920 20404 12e545d5154 _DllMainCRTStartup RtlFreeHeap 20404->20403 20423 12e545f7438 20405->20423 20407 12e545f72ca 20429 12e545da870 20407->20429 20410 12e545d4708 20411 12e545d4750 _DllMainCRTStartup 20410->20411 20412 12e545d4811 20411->20412 20463 12e545d52b4 20411->20463 20414 12e545d4863 20412->20414 20415 12e545d482f 20412->20415 20416 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 20414->20416 20470 12e545d425c 20415->20470 20419 12e545d4886 _DllMainCRTStartup 20416->20419 20418 12e545d485e 20418->19967 20420 12e545d425c _DllMainCRTStartup RtlFreeHeap 20419->20420 20421 12e545d491f 20420->20421 20422 12e545cd280 _DllMainCRTStartup RtlFreeHeap 20421->20422 20422->20418 20424 12e545f7465 20423->20424 20425 12e545f7484 20423->20425 20432 12e545f7594 20424->20432 20427 12e545f7594 _DllMainCRTStartup RtlFreeHeap 20425->20427 20428 12e545f747f strstr 20427->20428 20428->20407 20444 12e545da618 20429->20444 20433 12e545f75c9 20432->20433 20434 12e545f764e 20432->20434 20436 12e545f7626 _DllMainCRTStartup 20433->20436 20439 12e545f7607 20433->20439 20435 12e545f76ab _DllMainCRTStartup 20434->20435 20438 12e545f768c 20434->20438 20440 12e545f9700 _snprintf RtlFreeHeap 20435->20440 20437 12e545f9700 _snprintf RtlFreeHeap 20436->20437 20443 12e545f7624 _DllMainCRTStartup 20437->20443 20441 12e545f9700 _snprintf RtlFreeHeap 20438->20441 20442 12e545f9700 _snprintf RtlFreeHeap 20439->20442 20440->20443 20441->20443 20442->20443 20443->20428 20447 12e545da378 20444->20447 20446 12e545d3922 20446->19967 20446->20410 20448 12e545da39e _DllMainCRTStartup 20447->20448 20449 12e545da3a9 20448->20449 20453 12e545da3bb _DllMainCRTStartup 20448->20453 20454 12e545d2238 20449->20454 20451 12e545d2238 _DllMainCRTStartup RtlFreeHeap 20452 12e545da3b6 _DllMainCRTStartup 20451->20452 20452->20446 20453->20451 20453->20452 20455 12e545d22e5 20454->20455 20458 12e545d2255 _DllMainCRTStartup 20454->20458 20456 12e545d1e58 _DllMainCRTStartup RtlFreeHeap 20455->20456 20457 12e545d22ac 20456->20457 20457->20452 20458->20455 20459 12e545d226b 20458->20459 20460 12e545d1e58 _DllMainCRTStartup RtlFreeHeap 20459->20460 20461 12e545d2295 20460->20461 20462 12e545d1fc8 _DllMainCRTStartup RtlFreeHeap 20461->20462 20462->20457 20464 12e545d52d1 _DllMainCRTStartup 20463->20464 20465 12e545d530c 20464->20465 20466 12e545d52eb 20464->20466 20484 12e545d54e8 20465->20484 20480 12e545d5330 20466->20480 20469 12e545d530a 20469->20412 20471 12e545d4294 20470->20471 20472 12e545d427f 20470->20472 20474 12e545d52b4 _DllMainCRTStartup RtlFreeHeap 20471->20474 20507 12e545d51dc 20472->20507 20475 12e545d428d 20474->20475 20476 12e545d42b5 20475->20476 20514 12e545d42f8 20475->20514 20476->20418 20479 12e545cf310 _DllMainCRTStartup RtlFreeHeap 20479->20476 20481 12e545d5371 _DllMainCRTStartup 20480->20481 20482 12e545d53b7 20481->20482 20494 12e545cf2ec 20481->20494 20482->20469 20485 12e545d5511 _DllMainCRTStartup 20484->20485 20486 12e545d557d 20485->20486 20487 12e545d555f 20485->20487 20489 12e545d55d8 20486->20489 20490 12e545d5576 20486->20490 20492 12e545d563a _DllMainCRTStartup 20486->20492 20504 12e545cf310 20487->20504 20491 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20489->20491 20490->20469 20491->20490 20492->20490 20493 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20492->20493 20493->20490 20497 12e545cf33c 20494->20497 20498 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 20497->20498 20499 12e545cf361 _DllMainCRTStartup 20498->20499 20500 12e545cd090 _DllMainCRTStartup RtlFreeHeap 20499->20500 20501 12e545cf3fe 20500->20501 20505 12e545cf33c _DllMainCRTStartup RtlFreeHeap 20504->20505 20506 12e545cf336 20505->20506 20506->20490 20508 12e545d51fd _DllMainCRTStartup 20507->20508 20509 12e545d5249 20508->20509 20510 12e545d5264 20508->20510 20512 12e545cf310 _DllMainCRTStartup RtlFreeHeap 20509->20512 20518 12e545d5154 20510->20518 20513 12e545d5260 20512->20513 20513->20475 20517 12e545d431d _DllMainCRTStartup 20514->20517 20515 12e545d42d0 20515->20476 20515->20479 20517->20515 20522 12e545d4be4 20517->20522 20519 12e545d516c _DllMainCRTStartup 20518->20519 20520 12e545d5188 20519->20520 20521 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20519->20521 20520->20513 20521->20520 20523 12e545d4caf 20522->20523 20525 12e545d4ccc 20523->20525 20526 12e545d4adc 20523->20526 20525->20517 20532 12e545fa110 20531->20532 20533 12e545fa13f 20532->20533 20535 12e545fa16a 20532->20535 20534 12e545fb714 _errno RtlFreeHeap 20533->20534 20543 12e545fa144 _invalid_parameter_noinfo _ioinit _ftelli64 20534->20543 20559 12e545ffb9c 20535->20559 20537 12e545fa16f 20538 12e545fa17c 20537->20538 20539 12e545fa189 20537->20539 20540 12e545fb714 _errno RtlFreeHeap 20538->20540 20541 12e545fa1b0 20539->20541 20542 12e545fa18e 20539->20542 20540->20543 20567 12e545ffcd0 20541->20567 20544 12e545fb714 _errno RtlFreeHeap 20542->20544 20543->19988 20544->20543 20547 12e545fa3ae 20546->20547 20552 12e545fa3c4 _invalid_parameter_noinfo _ftelli64 20546->20552 20548 12e545fa3d1 _ftelli64 20547->20548 20549 12e545fa3bf 20547->20549 20547->20552 20624 12e545fa1f4 20548->20624 20550 12e545fb714 _errno RtlFreeHeap 20549->20550 20550->20552 20552->19996 20554 12e545fa0c9 20553->20554 20556 12e545fa0dd _ftelli64 20553->20556 20555 12e545fb714 _errno RtlFreeHeap 20554->20555 20558 12e545fa0ce _invalid_parameter_noinfo _ftelli64 20555->20558 20556->20558 20640 12e545fa02c 20556->20640 20558->19998 20560 12e545fd958 _lock RtlFreeHeap 20559->20560 20566 12e545ffbb5 20560->20566 20561 12e545ffc3d 20562 12e545fe378 _malloc_crt RtlFreeHeap 20561->20562 20563 12e545ffc31 __updatetmbcinfo 20562->20563 20563->20537 20564 12e545fda24 _mtinitlocknum RtlFreeHeap 20564->20566 20566->20561 20566->20563 20566->20564 20582 12e545ff784 20566->20582 20574 12e545ffd0a 20567->20574 20568 12e545ffd21 20569 12e545fb714 _errno RtlFreeHeap 20568->20569 20573 12e545ffd26 _invalid_parameter_noinfo 20569->20573 20570 12e545ffec2 20570->20568 20571 12e545fff27 20570->20571 20602 12e54604a54 20571->20602 20573->20543 20574->20568 20574->20570 20587 12e54604a88 20574->20587 20576 12e545ffe82 20576->20568 20593 12e54604bbc 20576->20593 20578 12e545ffebe 20578->20570 20579 12e54604bbc _openfile RtlFreeHeap 20578->20579 20580 12e545ffee1 20579->20580 20580->20570 20581 12e54604bbc _openfile RtlFreeHeap 20580->20581 20581->20570 20583 12e545ff792 20582->20583 20584 12e545ff7a5 20582->20584 20585 12e545fd958 _lock RtlFreeHeap 20583->20585 20586 12e545ff79a 20585->20586 20586->20566 20588 12e54604a90 20587->20588 20589 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 20588->20589 20592 12e54604ab4 _invalid_parameter_noinfo _openfile 20588->20592 20590 12e54604ac8 20589->20590 20591 12e545fb714 _errno RtlFreeHeap 20590->20591 20590->20592 20591->20592 20592->20576 20594 12e54604bc4 20593->20594 20595 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 20594->20595 20596 12e54604bed 20595->20596 20597 12e54604c02 20596->20597 20599 12e54604c15 20596->20599 20601 12e54604c10 _invalid_parameter_noinfo 20596->20601 20605 12e54605eac 20597->20605 20600 12e545fb714 _errno RtlFreeHeap 20599->20600 20599->20601 20600->20601 20601->20578 20610 12e546048f0 20602->20610 20604 12e54604a81 20604->20573 20606 12e54605ee6 20605->20606 20607 12e54605eb9 20605->20607 20607->20606 20608 12e545fb714 _errno RtlFreeHeap 20607->20608 20609 12e54605ec3 _invalid_parameter_noinfo 20608->20609 20609->20601 20611 12e54604931 20610->20611 20612 12e54604919 20610->20612 20611->20612 20614 12e5460495e 20611->20614 20613 12e545fb714 _errno RtlFreeHeap 20612->20613 20616 12e5460491e _invalid_parameter_noinfo _unlock_fhandle 20613->20616 20617 12e546049cc 20614->20617 20616->20604 20618 12e545f99d8 remove RtlFreeHeap 20617->20618 20619 12e546049f6 20618->20619 20620 12e546049fa 20619->20620 20621 12e546056a8 _wsopen_nolock RtlFreeHeap 20619->20621 20620->20616 20622 12e54604a33 20621->20622 20623 12e545f9428 free RtlFreeHeap 20622->20623 20623->20620 20625 12e545fa231 _invalid_parameter_noinfo 20624->20625 20628 12e545fa222 20624->20628 20625->20552 20626 12e545fa22c 20627 12e545fb714 _errno RtlFreeHeap 20626->20627 20627->20625 20628->20625 20628->20626 20630 12e545fa26e memcpy_s 20628->20630 20629 12e545fbd98 _snprintf RtlFreeHeap 20629->20630 20630->20625 20630->20629 20632 12e545ff624 _fileno RtlFreeHeap 20630->20632 20633 12e54600504 _wsopen_nolock RtlFreeHeap 20630->20633 20634 12e545ffa2c 20630->20634 20632->20630 20633->20630 20635 12e545ffa49 20634->20635 20639 12e545ffa6e 20634->20639 20636 12e545ff624 _fileno RtlFreeHeap 20635->20636 20635->20639 20637 12e545ffa60 20636->20637 20638 12e54600504 _wsopen_nolock RtlFreeHeap 20637->20638 20638->20639 20639->20630 20641 12e545fa055 20640->20641 20642 12e545fa041 20640->20642 20644 12e545ffa2c _flush RtlFreeHeap 20641->20644 20652 12e545fa046 _invalid_parameter_noinfo 20641->20652 20643 12e545fb714 _errno RtlFreeHeap 20642->20643 20643->20652 20645 12e545fa060 20644->20645 20654 12e545ff9a8 20645->20654 20648 12e545ff624 _fileno RtlFreeHeap 20649 12e545fa072 20648->20649 20658 12e545ff828 20649->20658 20652->20558 20655 12e545ff9b7 20654->20655 20656 12e545fa06a 20654->20656 20655->20656 20657 12e545f9428 free RtlFreeHeap 20655->20657 20656->20648 20657->20656 20659 12e545ff841 20658->20659 20660 12e545ff859 20658->20660 20661 12e545fb6a4 __doserrno RtlFreeHeap 20659->20661 20662 12e545ff8c2 20660->20662 20667 12e545ff88b 20660->20667 20663 12e545ff846 20661->20663 20664 12e545fb6a4 __doserrno RtlFreeHeap 20662->20664 20669 12e5460438c __lock_fhandle RtlFreeHeap 20667->20669 20706 12e545cf33c _DllMainCRTStartup RtlFreeHeap 20705->20706 20707 12e545cf450 20706->20707 20707->20010 20709 12e545faa8c 20708->20709 20710 12e545faaa1 20708->20710 20711 12e545fb714 _errno RtlFreeHeap 20709->20711 20710->20709 20712 12e545faaa7 _ftelli64 20710->20712 20714 12e545faa91 _invalid_parameter_noinfo _ftelli64 20711->20714 20725 12e545fa9b8 20712->20725 20714->20011 20716 12e545faaf6 20715->20716 20718 12e545fab0c _ftelli64 20715->20718 20717 12e545fb714 _errno RtlFreeHeap 20716->20717 20720 12e545faafb _invalid_parameter_noinfo _ftelli64 20717->20720 20787 12e545fab34 20718->20787 20720->20014 20726 12e545fa9eb 20725->20726 20727 12e545fa9db 20725->20727 20729 12e545fa9fe 20726->20729 20737 12e5460186c 20726->20737 20728 12e545fb714 _errno RtlFreeHeap 20727->20728 20736 12e545fa9e0 20728->20736 20731 12e545ffa2c _flush RtlFreeHeap 20729->20731 20733 12e545faa0a 20731->20733 20732 12e545ff624 _fileno RtlFreeHeap 20734 12e545faa36 20732->20734 20733->20732 20759 12e54601b60 20734->20759 20736->20714 20738 12e5460188e 20737->20738 20739 12e546018c3 20738->20739 20740 12e546018ab 20738->20740 20742 12e545ff624 _fileno RtlFreeHeap 20739->20742 20741 12e545fb714 _errno RtlFreeHeap 20740->20741 20758 12e546018b0 _invalid_parameter_noinfo _setmbcp_nolock 20741->20758 20743 12e546018c8 20742->20743 20744 12e54601b60 _fseek_nolock RtlFreeHeap 20743->20744 20745 12e546018e2 20744->20745 20746 12e5460193e 20745->20746 20747 12e54601a5a 20745->20747 20745->20758 20750 12e54601953 20746->20750 20752 12e54601a30 20746->20752 20748 12e54601a5e 20747->20748 20747->20752 20749 12e545fb714 _errno RtlFreeHeap 20748->20749 20749->20758 20751 12e54601cd8 _ftelli64_nolock RtlFreeHeap 20750->20751 20750->20758 20756 12e5460196f 20751->20756 20753 12e54601b60 _fseek_nolock RtlFreeHeap 20752->20753 20752->20758 20754 12e54601aa4 20753->20754 20755 12e54601b60 _fseek_nolock RtlFreeHeap 20754->20755 20754->20758 20755->20758 20757 12e54601b60 _fseek_nolock RtlFreeHeap 20756->20757 20756->20758 20757->20758 20758->20729 20760 12e54601b83 20759->20760 20761 12e54601b9b 20759->20761 20762 12e545fb6a4 __doserrno RtlFreeHeap 20760->20762 20763 12e54601c12 20761->20763 20766 12e54601bcd 20761->20766 20765 12e54601b88 20762->20765 20764 12e545fb6a4 __doserrno RtlFreeHeap 20763->20764 20767 12e54601c17 20764->20767 20768 12e545fb714 _errno RtlFreeHeap 20765->20768 20769 12e5460438c __lock_fhandle RtlFreeHeap 20766->20769 20770 12e545fb714 _errno RtlFreeHeap 20767->20770 20776 12e54601b90 _invalid_parameter_noinfo _unlock_fhandle 20768->20776 20771 12e54601bd4 20769->20771 20770->20776 20772 12e54601be0 20771->20772 20773 12e54601bf1 20771->20773 20779 12e54601c40 20772->20779 20775 12e545fb714 _errno RtlFreeHeap 20773->20775 20777 12e54601bf6 20775->20777 20776->20736 20778 12e545fb6a4 __doserrno RtlFreeHeap 20777->20778 20778->20776 20780 12e546046c8 _lseeki64_nolock RtlFreeHeap 20779->20780 20781 12e54601c5e 20780->20781 20782 12e54601c64 20781->20782 20784 12e54601c74 20781->20784 20783 12e545fb714 _errno RtlFreeHeap 20782->20783 20785 12e54601c69 20783->20785 20784->20785 20786 12e545fb6c4 _dosmaperr RtlFreeHeap 20784->20786 20785->20776 20786->20785 20788 12e545fab56 20787->20788 20789 12e545ff624 _fileno RtlFreeHeap 20788->20789 20790 12e545fab73 20789->20790 20791 12e54601cd8 _ftelli64_nolock RtlFreeHeap 20790->20791 20792 12e545fab8f 20791->20792 20793 12e545fabf7 20792->20793 20794 12e545fad12 20792->20794 20805 12e545fab97 _setmbcp_nolock 20792->20805 20797 12e545fac0c 20793->20797 20799 12e545face7 20793->20799 20795 12e545fad16 20794->20795 20794->20799 20796 12e545fb714 _errno RtlFreeHeap 20795->20796 20796->20805 20798 12e54601cd8 _ftelli64_nolock RtlFreeHeap 20797->20798 20797->20805 20803 12e545fac24 20798->20803 20800 12e54601cd8 _ftelli64_nolock RtlFreeHeap 20799->20800 20799->20805 20801 12e545fad61 20800->20801 20802 12e54601cd8 _ftelli64_nolock RtlFreeHeap 20801->20802 20801->20805 20802->20805 20804 12e54601cd8 _ftelli64_nolock RtlFreeHeap 20803->20804 20803->20805 20804->20805 20805->20720 20809 12e545d8470 20806->20809 20810 12e545f9468 malloc RtlFreeHeap 20809->20810 20811 12e545d8491 20810->20811 20811->20050 20813 12e545d8470 _DllMainCRTStartup RtlFreeHeap 20812->20813 20814 12e545d85d3 20813->20814 20814->20054 20826 12e545f88c4 20815->20826 20817 12e545f8854 20817->20083 20818 12e545f8825 _DllMainCRTStartup 20818->20817 20819 12e545f8856 20818->20819 20820 12e545f8836 20818->20820 20822 12e545f9700 _snprintf RtlFreeHeap 20819->20822 20821 12e545f9700 _snprintf RtlFreeHeap 20820->20821 20821->20817 20822->20817 20824 12e545cf33c _DllMainCRTStartup RtlFreeHeap 20823->20824 20825 12e545cf429 20824->20825 20825->20083 20827 12e545f88de 20826->20827 20828 12e545f896b 20827->20828 20829 12e545f9700 _snprintf RtlFreeHeap 20827->20829 20828->20818 20829->20828 20831 12e545dce98 20830->20831 20832 12e545dce9c 20831->20832 20833 12e545f88c4 _DllMainCRTStartup RtlFreeHeap 20831->20833 20832->20126 20833->20832 20835 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20834->20835 20837 12e545d25da _DllMainCRTStartup 20835->20837 20836 12e545d27f2 20838 12e545d80f0 _DllMainCRTStartup RtlFreeHeap 20836->20838 20837->20836 20841 12e545cf280 20837->20841 20840 12e545d2846 20838->20840 20840->20155 20846 12e545f990c 20841->20846 20844 12e545cf33c _DllMainCRTStartup RtlFreeHeap 20845 12e545cf2e2 20844->20845 20845->20836 20849 12e545f989c 20846->20849 20848 12e545cf2c3 20848->20844 20850 12e545f98aa 20849->20850 20851 12e545f98f1 20849->20851 20850->20851 20853 12e545f98b4 20850->20853 20852 12e545fb714 _errno RtlFreeHeap 20851->20852 20857 12e545f98e9 _invalid_parameter_noinfo 20852->20857 20858 12e545f97b4 20853->20858 20855 12e545f98d8 20856 12e545fb714 _errno RtlFreeHeap 20855->20856 20855->20857 20856->20857 20857->20848 20859 12e545f97f0 _snprintf 20858->20859 20860 12e545f97f5 20859->20860 20863 12e545f9814 20859->20863 20861 12e545fb714 _errno RtlFreeHeap 20860->20861 20862 12e545f97fa _invalid_parameter_noinfo 20861->20862 20862->20855 20863->20862 20864 12e545fbd98 _snprintf RtlFreeHeap 20863->20864 20864->20862 20866 12e545f9468 malloc RtlFreeHeap 20865->20866 20867 12e545d5fa9 _DllMainCRTStartup 20866->20867 20867->20164 20873 12e545f9924 20868->20873 20870 12e545cd369 20871 12e545cd395 20870->20871 20872 12e545f990c _DllMainCRTStartup RtlFreeHeap 20870->20872 20871->20167 20872->20871 20874 12e545f993c _snprintf 20873->20874 20875 12e545fb714 _errno RtlFreeHeap 20874->20875 20876 12e545f997a _invalid_parameter_noinfo 20874->20876 20875->20876 20876->20870 20879 12e545d6331 20877->20879 20878 12e545d5c0e 20878->19920 20879->20878 20880 12e545f9428 RtlFreeHeap free 20879->20880 20880->20879 20882 12e545f826c _DllMainCRTStartup RtlFreeHeap 20881->20882 20883 12e545f860d 20882->20883 20884 12e545f8657 20883->20884 20885 12e545f8640 20883->20885 20887 12e545f8668 20884->20887 20888 12e545f867f 20884->20888 20886 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20885->20886 20893 12e545f825a 20886->20893 20890 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 20887->20890 20889 12e545d7f80 _DllMainCRTStartup RtlFreeHeap 20888->20889 20891 12e545f8689 _DllMainCRTStartup 20889->20891 20890->20893 20892 12e545f88c4 _DllMainCRTStartup RtlFreeHeap 20891->20892 20892->20893 20893->20186 20898 12e545fa427 20894->20898 20895 12e545fa42c 20896 12e545fb714 _errno RtlFreeHeap 20895->20896 20897 12e545fa431 _invalid_parameter_noinfo 20895->20897 20896->20897 20897->20202 20898->20895 20899 12e545fa47a 20898->20899 20899->20897 20900 12e545fb714 _errno RtlFreeHeap 20899->20900 20900->20897 20902 12e545cf33c _DllMainCRTStartup RtlFreeHeap 20901->20902 20903 12e545cf47f 20902->20903 20903->20211 20905 12e545f9468 malloc RtlFreeHeap 20904->20905 20906 12e545d844a _DllMainCRTStartup 20905->20906 20906->20223 20908 12e545faf1c 20907->20908 20909 12e545faf12 20907->20909 20913 12e545d3323 20908->20913 20929 12e546022e0 20908->20929 20915 12e545f99d8 20909->20915 20913->20226 20914 12e545f9428 free RtlFreeHeap 20914->20913 20916 12e545f9a16 20915->20916 20917 12e545f99fe 20915->20917 20916->20917 20920 12e545f9a1b __crtIsPackagedApp 20916->20920 20918 12e545fb714 _errno RtlFreeHeap 20917->20918 20919 12e545f9a03 _invalid_parameter_noinfo 20918->20919 20919->20908 20921 12e545f9a5d 20920->20921 20922 12e545f9a6e 20920->20922 20924 12e545fb6c4 _dosmaperr RtlFreeHeap 20921->20924 20923 12e545fe378 _malloc_crt RtlFreeHeap 20922->20923 20925 12e545f9a79 20923->20925 20924->20919 20925->20919 20926 12e545fb6c4 _dosmaperr RtlFreeHeap 20925->20926 20927 12e545f9aac 20926->20927 20928 12e545f9428 free RtlFreeHeap 20927->20928 20928->20919 20930 12e546022ec 20929->20930 20931 12e545faf32 20930->20931 20932 12e545fb6c4 _dosmaperr RtlFreeHeap 20930->20932 20931->20914 20932->20931 20952 12e545dcf00 20933->20952 20936 12e545faf48 20937 12e545faf5a 20936->20937 20938 12e545faf64 20936->20938 20939 12e545f99d8 remove RtlFreeHeap 20937->20939 20943 12e545faf68 20938->20943 20973 12e54602314 20938->20973 20939->20938 20942 12e545f9428 free RtlFreeHeap 20942->20943 20943->20244 20945 12e545fae3a 20944->20945 20948 12e545fae44 20944->20948 20946 12e545f99d8 remove RtlFreeHeap 20945->20946 20946->20948 20950 12e545fae48 20948->20950 20977 12e546022b0 20948->20977 20950->20244 20951 12e545f9428 free RtlFreeHeap 20951->20950 20953 12e545f9468 malloc RtlFreeHeap 20952->20953 20954 12e545dcf1d 20953->20954 20955 12e545f9700 _snprintf RtlFreeHeap 20954->20955 20956 12e545dcf3d 20955->20956 20957 12e545f9428 free RtlFreeHeap 20956->20957 20959 12e545dcf5c 20957->20959 20958 12e545d2ee8 20958->20936 20959->20958 20960 12e545f9468 malloc RtlFreeHeap 20959->20960 20961 12e545f9700 _snprintf RtlFreeHeap 20959->20961 20963 12e545f9428 free RtlFreeHeap 20959->20963 20964 12e545dd08c 20959->20964 20960->20959 20961->20959 20963->20959 20965 12e545f9468 malloc RtlFreeHeap 20964->20965 20966 12e545dd0ae 20965->20966 20967 12e545f9700 _snprintf RtlFreeHeap 20966->20967 20968 12e545dd0d8 20967->20968 20969 12e545dcf00 _DllMainCRTStartup RtlFreeHeap 20968->20969 20970 12e545dd0ec 20969->20970 20971 12e545f9428 free RtlFreeHeap 20970->20971 20972 12e545dd0f6 20971->20972 20972->20959 20974 12e5460231e 20973->20974 20975 12e545faf7a 20974->20975 20976 12e545fb6c4 _dosmaperr RtlFreeHeap 20974->20976 20975->20942 20976->20975 20978 12e546022ba 20977->20978 20979 12e545fae5a 20978->20979 20980 12e545fb6c4 _dosmaperr RtlFreeHeap 20978->20980 20979->20951 20980->20979 20982 12e545f90fd _DllMainCRTStartup 20981->20982 20983 12e545f8ff9 20982->20983 20987 12e545f92bc 20982->20987 20983->19920 20988 12e545f9468 malloc RtlFreeHeap 20987->20988 20989 12e545f92db 20988->20989 20990 12e545f9468 malloc RtlFreeHeap 20989->20990 20991 12e545f92fa 20990->20991 20992 12e545f9468 malloc RtlFreeHeap 20991->20992 20993 12e545f9331 20992->20993 20994 12e545f9700 _snprintf RtlFreeHeap 20993->20994 20995 12e545f935d 20994->20995 20996 12e545f9468 malloc RtlFreeHeap 20995->20996 20997 12e545f91b9 20996->20997 20998 12e545f7f5c 20997->20998 20999 12e545f7f82 _DllMainCRTStartup 20998->20999 21000 12e545f7f99 20999->21000 21002 12e545f7eb4 20999->21002 21000->20983 21003 12e545f7ee4 21002->21003 21006 12e545f8078 21003->21006 21007 12e545f8088 21006->21007 21008 12e545f7f19 21006->21008 21009 12e545d51dc _DllMainCRTStartup RtlFreeHeap 21007->21009 21008->21000 21009->21008 21011 12e545d7291 21010->21011 21012 12e545d734c 21011->21012 21013 12e545d731e 21011->21013 21016 12e545d7377 _DllMainCRTStartup 21012->21016 21017 12e545d7375 21012->21017 21014 12e545d7329 21013->21014 21015 12e545d7335 21013->21015 21018 12e545cf410 _DllMainCRTStartup RtlFreeHeap 21014->21018 21020 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 21015->21020 21023 12e545d6c54 21016->21023 21021 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 21017->21021 21022 12e545d6fd1 21018->21022 21020->21022 21021->21022 21022->19920 21025 12e545d6c99 21023->21025 21024 12e545d6e80 21027 12e545cf410 _DllMainCRTStartup RtlFreeHeap 21024->21027 21025->21024 21026 12e545d6d14 21025->21026 21029 12e545d6c9d _DllMainCRTStartup 21025->21029 21028 12e545f9468 malloc RtlFreeHeap 21026->21028 21026->21029 21027->21029 21028->21029 21029->21022 21031 12e545d3dbf _DllMainCRTStartup 21030->21031 21032 12e545f72a0 _DllMainCRTStartup RtlFreeHeap 21031->21032 21033 12e545d3e8c 21032->21033 21034 12e545d3e90 _DllMainCRTStartup 21033->21034 21035 12e545d4708 _DllMainCRTStartup RtlFreeHeap 21033->21035 21034->20278 21036 12e545d3ef6 _DllMainCRTStartup 21035->21036 21038 12e545d60bc 21036->21038 21039 12e545f9468 malloc RtlFreeHeap 21038->21039 21040 12e545d60e0 21039->21040 21041 12e545f9700 _snprintf RtlFreeHeap 21040->21041 21042 12e545d6182 _DllMainCRTStartup 21041->21042 21042->21034 21044 12e545fd958 _lock RtlFreeHeap 21043->21044 21045 12e54608b5b 21044->21045 21048 12e54608b7c 21045->21048 21047 12e54608b66 __updatetmbcinfo 21047->20283 21049 12e54608bab 21048->21049 21053 12e54608ba3 _invalid_parameter_noinfo 21048->21053 21050 12e54608bb0 21049->21050 21052 12e54608bc7 21049->21052 21055 12e54608c26 _putenv_helper 21049->21055 21051 12e545fb714 _errno RtlFreeHeap 21050->21051 21051->21053 21081 12e54609728 21052->21081 21053->21047 21055->21050 21059 12e54608c51 21055->21059 21056 12e54608bf8 21058 12e545fe2f8 _calloc_crt RtlFreeHeap 21056->21058 21057 12e54608bd3 _putenv_helper 21057->21050 21057->21056 21064 12e54608c11 21058->21064 21060 12e545fe2f8 _calloc_crt RtlFreeHeap 21059->21060 21061 12e54608c65 21060->21061 21061->21053 21062 12e54604fbc _setenvp RtlFreeHeap 21061->21062 21062->21064 21063 12e54604fbc _setenvp RtlFreeHeap 21065 12e54608ca6 21063->21065 21064->21053 21064->21063 21087 12e54608fb8 21065->21087 21067 12e54608cb4 21068 12e54608cb8 21067->21068 21072 12e54608ccf 21067->21072 21068->21053 21069 12e545f9428 free RtlFreeHeap 21068->21069 21069->21053 21070 12e54608d07 21071 12e545fb714 _errno RtlFreeHeap 21070->21071 21071->21053 21072->21053 21072->21070 21073 12e545fe2f8 _calloc_crt RtlFreeHeap 21072->21073 21078 12e54608d50 _NMSG_WRITE 21073->21078 21074 12e54608d77 21075 12e545f9428 free RtlFreeHeap 21074->21075 21075->21070 21076 12e54608dc5 21125 12e54609350 21076->21125 21078->21053 21078->21074 21078->21076 21080 12e545f9428 free RtlFreeHeap 21080->21053 21082 12e54609730 21081->21082 21083 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21082->21083 21084 12e54609751 21083->21084 21085 12e545fb714 _errno RtlFreeHeap 21084->21085 21086 12e5460975d _invalid_parameter_noinfo strchr 21084->21086 21085->21086 21086->21057 21088 12e54608fe1 21087->21088 21089 12e54608ff6 21087->21089 21091 12e545fb714 _errno RtlFreeHeap 21088->21091 21090 12e546090d8 21089->21090 21093 12e54609728 __crtsetenv RtlFreeHeap 21089->21093 21092 12e545fb714 _errno RtlFreeHeap 21090->21092 21118 12e54608fe6 _invalid_parameter_noinfo 21091->21118 21092->21118 21094 12e5460900f 21093->21094 21094->21090 21095 12e5460904f 21094->21095 21098 12e545fe2f8 _calloc_crt RtlFreeHeap 21094->21098 21096 12e546090fe 21095->21096 21097 12e546090cf 21095->21097 21102 12e54609133 21095->21102 21100 12e545fe378 _malloc_crt RtlFreeHeap 21096->21100 21096->21118 21162 12e54609c2c 21097->21162 21108 12e5460906e 21098->21108 21103 12e54609111 21100->21103 21112 12e54609199 21102->21112 21102->21118 21170 12e54609d20 21102->21170 21103->21102 21111 12e545fe378 _malloc_crt RtlFreeHeap 21103->21111 21103->21118 21104 12e5460923d 21106 12e5460932b 21104->21106 21115 12e54609234 21104->21115 21107 12e545f9428 free RtlFreeHeap 21106->21107 21114 12e54609333 _invoke_watson 21107->21114 21108->21095 21156 12e54609bbc 21108->21156 21109 12e545f9428 free RtlFreeHeap 21109->21112 21111->21102 21112->21104 21112->21109 21112->21115 21113 12e54609314 21116 12e545f9428 free RtlFreeHeap 21113->21116 21113->21118 21115->21113 21117 12e545fe2f8 _calloc_crt RtlFreeHeap 21115->21117 21115->21118 21116->21118 21119 12e546092b6 21117->21119 21118->21067 21119->21113 21120 12e54604fbc _setenvp RtlFreeHeap 21119->21120 21121 12e546092d5 21120->21121 21121->21114 21122 12e54609306 21121->21122 21123 12e545fb714 _errno RtlFreeHeap 21121->21123 21124 12e545f9428 free RtlFreeHeap 21122->21124 21123->21122 21124->21113 21128 12e5460938d wcschr 21125->21128 21126 12e54609483 21127 12e545fb714 _errno RtlFreeHeap 21126->21127 21149 12e54608dd0 21127->21149 21128->21126 21129 12e546094a9 21128->21129 21130 12e54609465 21128->21130 21140 12e546094e3 21128->21140 21131 12e546094be 21129->21131 21133 12e545fe378 _malloc_crt RtlFreeHeap 21129->21133 21129->21149 21204 12e5460a264 21130->21204 21135 12e545fe378 _malloc_crt RtlFreeHeap 21131->21135 21131->21140 21131->21149 21133->21131 21134 12e5460960d 21138 12e54609700 21134->21138 21146 12e54609601 _NMSG_WRITE 21134->21146 21135->21140 21136 12e5460946a 21142 12e545f9428 free RtlFreeHeap 21138->21142 21143 12e54609553 21140->21143 21140->21149 21219 12e54609ea0 21140->21219 21141 12e545f9428 free RtlFreeHeap 21141->21143 21143->21134 21143->21141 21143->21146 21144 12e546096e9 21144->21149 21146->21144 21148 12e545fe2f8 _calloc_crt RtlFreeHeap 21146->21148 21146->21149 21149->21053 21149->21080 21157 12e54609bd3 21156->21157 21161 12e54609bfb _invoke_watson 21156->21161 21158 12e545f9468 malloc RtlFreeHeap 21157->21158 21159 12e54609be4 21158->21159 21160 12e54604fbc _setenvp RtlFreeHeap 21159->21160 21159->21161 21160->21161 21161->21108 21163 12e546090d4 21162->21163 21166 12e54609c54 21162->21166 21163->21090 21163->21102 21164 12e545fe2f8 _calloc_crt RtlFreeHeap 21164->21166 21165 12e54609d10 21167 12e545f9428 free RtlFreeHeap 21165->21167 21166->21163 21166->21164 21166->21165 21168 12e54608fb8 __crtsetenv RtlFreeHeap 21166->21168 21169 12e545f9428 free RtlFreeHeap 21166->21169 21167->21163 21168->21166 21169->21166 21171 12e54609d28 21170->21171 21172 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21171->21172 21173 12e54609d59 21172->21173 21174 12e54609d6f 21173->21174 21175 12e54609d86 21173->21175 21177 12e54609d5e _invalid_parameter_noinfo 21173->21177 21176 12e545fb714 _errno RtlFreeHeap 21174->21176 21178 12e54609d90 21175->21178 21179 12e54609da2 21175->21179 21176->21177 21177->21102 21182 12e545fb714 _errno RtlFreeHeap 21178->21182 21180 12e54609dc2 21179->21180 21181 12e54609dad 21179->21181 21201 12e5460ad60 21180->21201 21185 12e5460a918 21181->21185 21182->21177 21186 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21185->21186 21187 12e5460a941 21186->21187 21202 12e545fbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21201->21202 21203 12e5460ad85 __crtCompareStringA_stat 21202->21203 21203->21177 21206 12e5460a27e 21204->21206 21205 12e5460a288 memcpy_s 21205->21136 21206->21205 21206->21206 21207 12e545fe378 _malloc_crt RtlFreeHeap 21206->21207 21207->21205 21220 12e54609eb6 21219->21220 21223 12e54609f29 21219->21223 21221 12e545fb714 _errno RtlFreeHeap 21220->21221 21229 12e54609ee3 21220->21229 21222 12e54609ec0 _invalid_parameter_noinfo 21221->21222 21222->21140 21224 12e54609f69 21223->21224 21225 12e54609f88 21223->21225 21233 12e54609f5d _invalid_parameter_noinfo 21223->21233 21226 12e545fb714 _errno RtlFreeHeap 21224->21226 21227 12e54609f92 21225->21227 21228 12e54609fa7 21225->21228 21226->21233 21229->21140 21233->21140 21237 12e545d17f6 _DllMainCRTStartup 21235->21237 21236 12e545d18e1 21236->20320 21237->21236 21238 12e545cd338 _DllMainCRTStartup RtlFreeHeap 21237->21238 21238->21237 21240 12e545d11f1 21239->21240 21241 12e545da870 _DllMainCRTStartup RtlFreeHeap 21240->21241 21242 12e545d1265 21241->21242 21243 12e545d1269 21242->21243 21245 12e545d648c 21242->21245 21243->20336 21246 12e545d60bc _DllMainCRTStartup RtlFreeHeap 21245->21246 21247 12e545d64d3 21246->21247 21247->21243 21249 12e545cca6a 21248->21249 21250 12e545ccaa8 21249->21250 21251 12e545f9468 malloc RtlFreeHeap 21249->21251 21250->20352 21251->21250 21253 12e545f7438 _DllMainCRTStartup RtlFreeHeap 21252->21253 21254 12e545f735b 21253->21254 21255 12e545d25a8 _DllMainCRTStartup RtlFreeHeap 21254->21255 21256 12e545f7392 21255->21256 21256->20390 21258 12e545f7438 _DllMainCRTStartup RtlFreeHeap 21257->21258 21259 12e545f73c6 21258->21259 21260 12e545da618 _DllMainCRTStartup RtlFreeHeap 21259->21260 21261 12e545d41fc 21260->21261 21261->20396 21261->20397 21263 12e545ce053 _DllMainCRTStartup 21262->21263 21264 12e545ce55a _DllMainCRTStartup 21263->21264 21265 12e545cf310 _DllMainCRTStartup RtlFreeHeap 21263->21265 21264->20400 21265->21264 21273 12e545cdc5e _DllMainCRTStartup 21266->21273 21267 12e545cdd13 21268 12e545cf2ec _DllMainCRTStartup RtlFreeHeap 21267->21268 21269 12e545cd691 21268->21269 21269->20403 21269->20404 21270 12e545cd9e4 RtlFreeHeap _DllMainCRTStartup 21270->21273 21271 12e545cdf39 21272 12e545cf280 _DllMainCRTStartup RtlFreeHeap 21271->21272 21272->21269 21273->21267 21273->21269 21273->21270 21273->21271 21274 12e545cdf7f 21273->21274 21275 12e545cf410 _DllMainCRTStartup RtlFreeHeap 21274->21275 21275->21269 21281 12e545d9323 _DllMainCRTStartup 21276->21281 21277 12e545d9625 21277->19256 21278 12e545d6c54 _DllMainCRTStartup RtlFreeHeap 21278->21281 21279 12e545d8470 _DllMainCRTStartup RtlFreeHeap 21279->21281 21280 12e545cd2bc _DllMainCRTStartup RtlFreeHeap 21280->21281 21281->21277 21281->21278 21281->21279 21281->21280 21282 12e545cd280 _DllMainCRTStartup RtlFreeHeap 21281->21282 21282->21281 21284 12e545d9964 21283->21284 21286 12e545d996e _DllMainCRTStartup 21283->21286 21285 12e545f9468 malloc RtlFreeHeap 21284->21285 21285->21286 21286->19256 21289 12e545d9bea 21287->21289 21288 12e545d92e1 21288->19173 21289->21288 21290 12e545f9428 RtlFreeHeap free 21289->21290 21290->21289

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: NameSocketUser_snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 1789932928-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 2ba64ad800ae3ff22f48e4a9768e5814dca668214bab711b90010fab9ae01c5c
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: 1471ED74228B488FE394EF28C485B9AB7E1FBC9344F50496DF589C32A1CB74D851CB02
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: DCBA
                                      • API String ID: 544645111-2222620526
                                      • Opcode ID: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction ID: 7e98d1ba1d6d461be3d743730bc28cf053615c94fac7f4bc525e7004a297dd73
                                      • Opcode Fuzzy Hash: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction Fuzzy Hash: 1741E376201B858EDB20CF69D9807DC37E1E749BACF159216FE1D87B98DB38C9948740

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ($0
                                      • API String ID: 0-506339136
                                      • Opcode ID: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction ID: 81e9da950a7187221b7d08c36332dd6851953cfd3e1688357f7481d5e5bad5d5
                                      • Opcode Fuzzy Hash: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction Fuzzy Hash: 6C4132742287458FF7A4EF28D4947AAB7E1FF98349F50492DE089C32A1DB75C949CB02

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: IoctlSocketclosesocket
                                      • String ID:
                                      • API String ID: 3445158922-0
                                      • Opcode ID: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction ID: 7bc5b4569460b73eb03f73d9416982208fd2af54551871170bc2510928a55a73
                                      • Opcode Fuzzy Hash: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction Fuzzy Hash: DF31FD746187858FE350EF68C84579AFBE4FB88348F50492DE49AC6290D7B8D5558B02

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: InternetOpen
                                      • String ID:
                                      • API String ID: 2038078732-0
                                      • Opcode ID: 170dc46f2207cb387e16a0227af4bff50695bdbce6e0c670e9cf9a8f94b52204
                                      • Instruction ID: f35e93569bbcd679985d057f46f76907d09ab301cc993b842e59d75dd5ca712b
                                      • Opcode Fuzzy Hash: 170dc46f2207cb387e16a0227af4bff50695bdbce6e0c670e9cf9a8f94b52204
                                      • Instruction Fuzzy Hash: 4F5181756287448FF354EF18C859BABB7E1FB89309F40442DE286D36E5CB788855CB42
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_invalid_parameter_noinfo
                                      • String ID: U
                                      • API String ID: 3902385426-4171548499
                                      • Opcode ID: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction ID: ae7f653072e81e63b33835bd4376d5c3ff823f71432a4b10e0be498838f5059e
                                      • Opcode Fuzzy Hash: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction Fuzzy Hash: EA12E23B2246818AEB208F28D4847EEB7E1F78779CF504117FA89476A4DB3DC865CB10
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                      • String ID: -$@
                                      • API String ID: 3246410048-1222683799
                                      • Opcode ID: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction ID: 7ffa29cecbf057997b35bd4bcad20fa84c12b90cbc6ec027b27cbb2ea23a770c
                                      • Opcode Fuzzy Hash: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction Fuzzy Hash: D6B1E27B624A8485FB65CB6994403EE6BE1F787BDCF160107FE4907AD8DB38C9618B40

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction ID: def61a2412e3307febaf492ec754c7cabb0f87c7f8a9e5d4f24a88bdbb0d2aa6
                                      • Opcode Fuzzy Hash: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction Fuzzy Hash: 12315CB9338B44DFF716AF6998863FC32C0EB41324F11425DE816872D3E6B09C119752
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$ExitProcess__crt_errno
                                      • String ID:
                                      • API String ID: 1362684943-0
                                      • Opcode ID: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction ID: 5293ac90b3fcc0392f6d6dfeaee4ab518cdea294957ce92b8c3aa53169d8f29e
                                      • Opcode Fuzzy Hash: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction Fuzzy Hash: B9410A3D631A0485FE54AF11F9A53F863E0AB5BBADF081627FA19566D2CF3C84758310
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction ID: ce340201bed6397dc7b377ad46245fa54403332bc0dabb51e625efed5d51b2d9
                                      • Opcode Fuzzy Hash: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction Fuzzy Hash: 3F31D23A33828087E716AF659981BED37D1AB827ACF454217FA51177D2CB7CC861C710

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction ID: 3a0ecc39b876e909c502ece9971e8ef8ac5319c19bf964ef02f87fd573ee8cbd
                                      • Opcode Fuzzy Hash: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction Fuzzy Hash: A5213679738A009FF71AAF98DC863F972D0EB85328F15025EE01EC71D3C6F158218662

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction ID: b256633c37488837fcb5f3a475ed18a3e5a015fc3695014714cf7acd3b3fcf76
                                      • Opcode Fuzzy Hash: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction Fuzzy Hash: A32128B9728600CFF71A6F5CD8863FD72D4EB82328F15061CE15A872D3D7F898618262
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction ID: 78ed69b2dd215e0abac99c68acf4ccd85bdce9ffadecde4633c239e88a79fe11
                                      • Opcode Fuzzy Hash: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction Fuzzy Hash: E721323A33028046F7056F25D842BEC76D2AB837A9F690106FA151B3D2CB7CC861C325
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction ID: a928c70680548f8667c214721e88410942d32d6546574b7e3b2929623d39425e
                                      • Opcode Fuzzy Hash: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction Fuzzy Hash: D921F03B73424046FA056F159841BED6AD2AB82BF8F99471AFE350B3D2CB3CC4618724

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1186 12e54609ea0-12e54609eb4 1187 12e54609eb6-12e54609eb9 1186->1187 1188 12e54609f29-12e54609f5b 1186->1188 1189 12e54609ed5-12e54609ed8 1187->1189 1190 12e54609ebb-12e54609ed4 call 12e545fb714 call 12e545fbd3c 1187->1190 1193 12e54609f64-12e54609f67 1188->1193 1194 12e54609f5d-12e54609f5f 1188->1194 1189->1190 1195 12e54609eda-12e54609ee1 1189->1195 1198 12e54609f83-12e54609f86 1193->1198 1199 12e54609f69-12e54609f7e call 12e545fb714 call 12e545fbd3c 1193->1199 1197 12e5460a049-12e5460a063 1194->1197 1195->1190 1200 12e54609ee3-12e54609ee4 1195->1200 1198->1199 1201 12e54609f88-12e54609f90 1198->1201 1199->1197 1204 12e54609ee6-12e54609ef2 1200->1204 1207 12e54609f92-12e54609fa2 call 12e545fb714 call 12e545fbd3c 1201->1207 1208 12e54609fa7-12e54609fc3 call 12e545fbf24 1201->1208 1205 12e54609ef4 1204->1205 1206 12e54609ef8-12e54609f03 1204->1206 1205->1206 1211 12e54609f05 1206->1211 1212 12e54609f09-12e54609f10 1206->1212 1229 12e5460a047 1207->1229 1223 12e54609fc5-12e54609fc6 1208->1223 1224 12e5460a007-12e5460a022 call 12e5460adec 1208->1224 1211->1212 1216 12e54609f12-12e54609f15 1212->1216 1217 12e54609f1c-12e54609f28 1212->1217 1216->1217 1221 12e54609f17-12e54609f1a 1216->1221 1221->1204 1221->1217 1227 12e54609fc8-12e54609fd4 1223->1227 1232 12e5460a031 1224->1232 1233 12e5460a024-12e5460a02f call 12e545fb714 1224->1233 1230 12e54609fd6 1227->1230 1231 12e54609fda-12e54609fe4 1227->1231 1229->1197 1230->1231 1234 12e54609fe6 1231->1234 1235 12e54609fea-12e54609ff1 1231->1235 1239 12e5460a034-12e5460a039 1232->1239 1233->1239 1234->1235 1236 12e54609ff3-12e54609ff6 1235->1236 1237 12e54609ffd-12e5460a005 1235->1237 1236->1237 1240 12e54609ff8-12e54609ffb 1236->1240 1237->1239 1239->1229 1242 12e5460a03b-12e5460a040 1239->1242 1240->1227 1240->1237 1242->1229
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction ID: 7267c1dab3fe0b125fbea687fd050130d43541b656246bbb7b5b521d103ef1a6
                                      • Opcode Fuzzy Hash: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction Fuzzy Hash: DA516778335B0ACBFB65AF1884453F672D2FB6436DF54022AE09AC31D6E6B4CC618342
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction ID: f71edbd1215a42e0d9cd705217baaa40f1e3709d0ad2856c1815618c1009cd5d
                                      • Opcode Fuzzy Hash: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction Fuzzy Hash: 7C41047A63139186FF60EB2185C0BED76E1E757BACF908127FA94477C5D728C8618700

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction ID: f2015d47d1c0bc091e46251a26c092656c5b0965384fde1e6f17cff11942679c
                                      • Opcode Fuzzy Hash: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction Fuzzy Hash: CC213B797287009FF31B6F58E8463F872C0DB46324F15021DE01A871D3E6F49C2186A6

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction ID: 3d02baf57787b660d526663b0e99dbeaffb48b50044237b107bd734b18bd149d
                                      • Opcode Fuzzy Hash: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction Fuzzy Hash: BE213ABB725A80AFF715BF65C8853E876D0EF41328F65051EF016872D7C6B488108723
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction ID: ea61b64b4d46cb6ee62ce4ba7bdaa61e96c074f50e1652d2cbd7a59a68f31d93
                                      • Opcode Fuzzy Hash: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction Fuzzy Hash: 4A21C33B7346406EF6056F2599413EDA6D2AB83BADF194117BA190B3D2CB7CC861C721
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction ID: 2533aee8b737c87cd6a3c4b5d2ea3f087227b37b7853418fc884301d3ece3b6c
                                      • Opcode Fuzzy Hash: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction Fuzzy Hash: 5211083B33468046F70AAF2598813DC66D1A7837A9F190627FA55073D3C77CC861C714
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$FreeHeap_errno
                                      • String ID:
                                      • API String ID: 2737118440-0
                                      • Opcode ID: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction ID: 8a1e24905712a1c7297add39a3f92bf7d600e4db0ac441937768aa5354c4ad74
                                      • Opcode Fuzzy Hash: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction Fuzzy Hash: DF410F76378E0EAFFBA8EF58DCD5BE972D1F758319F5440289005C2291EA2C9865CB12
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction ID: 88c42e9adc2db6f148822f0fc7bdbfb47b4ba4f58a35c1ff2a0c170b6f9669eb
                                      • Opcode Fuzzy Hash: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction Fuzzy Hash: 1C91C974328B484BE759AF6C9851FF973D1FB96708F50021ED58AC32C3EE20DC128682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction ID: 0fc445f85f95b3515e56185072e4bfd21ce4c33d111add07f04074ba6577d6a7
                                      • Opcode Fuzzy Hash: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction Fuzzy Hash: 9C71E43A72478546EA689B2A94407EEB7D2F787FCCF414026FD4647B86DB38D466C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _time64$strtok$malloc
                                      • String ID:
                                      • API String ID: 2141844861-0
                                      • Opcode ID: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction ID: 827bd67fa2d4e0ebd8f03b6e6927f3820694718f6efda80e976c1e2d054472d5
                                      • Opcode Fuzzy Hash: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction Fuzzy Hash: DC910579129A448AE764CF19E8953A9B7E4F34A75CF10821BF69A937E4CF7DC060CB40
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-3916222277
                                      • Opcode ID: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction ID: 111f5497c97a9cd1a28ad9d08bc836a9e56f2be03008c1637e58d254c0fa7a06
                                      • Opcode Fuzzy Hash: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction Fuzzy Hash: BC41E57B620B444AEB58DF29C4513AC37E0E786B9CF158217FA66473D5DB38C861C740
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction ID: 57d6e4c5e331f6e0151763e1ddf022e88d711f531291be430a377fd83c7fcd94
                                      • Opcode Fuzzy Hash: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction Fuzzy Hash: 1E319C74368F088FD7A5DF1890857AA72D1FB58328F5502AEE44DC72D2DAB0CC54C786
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction ID: 3f93f41b1c052f7ce0fd9f85c6cf5744b84e67e4edc2c605e12fa772c1f4f190
                                      • Opcode Fuzzy Hash: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction Fuzzy Hash: D531E575724F099FFB58AF6998057A972D1FF88319F14466DA04AC32E2EB38C8518703
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                      • String ID:
                                      • API String ID: 4120058822-0
                                      • Opcode ID: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction ID: baf67da05eeba4c84b411ee2b594dab3955981f888a2a26a2b063cddf7a76f00
                                      • Opcode Fuzzy Hash: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction Fuzzy Hash: 2821D739724B80DFF736AFA998953FC76D0EB85318F150A5CE40A872D3D6F498209762
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction ID: 866b6e7111ff927e56996ea140c8231b8d65a11885d6f7da36dd798501517117
                                      • Opcode Fuzzy Hash: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction Fuzzy Hash: 3831A13A720B4086FB10AF26D8143A966E5BB96F9CF044526FA49877E5DF7CC4218304
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction ID: 573e4e583e433977857c372ee4411a5bec65174f724a25995dcb9299b3a212d3
                                      • Opcode Fuzzy Hash: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction Fuzzy Hash: A7315E7A62478485E7609F1194C8BDDB6E4F746BE8F548127FE5807B85CB79C861C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction ID: 2a90603545f5b9e9d45a1efda8399a7195f79d59bc53f6c2008df1788bda2cde
                                      • Opcode Fuzzy Hash: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction Fuzzy Hash: 7F61D47A338F096BE76C5E2C58457BA72D1E794724F64032EE456C32D6EA60DC6382C3
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction ID: b195a0b258ca06039c39963a95b818314084e5d8f06ea45dcb6f90f73d9cfcfa
                                      • Opcode Fuzzy Hash: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction Fuzzy Hash: 7671FF742287488FE394EF18C495B9AB7E1FFD8358F50492DB08AC32E2CA74D955CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction ID: 56d773177bfde57c1d79d783eca260e391b804e7ca686d56872b8792adb72812
                                      • Opcode Fuzzy Hash: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction Fuzzy Hash: 6C51143972424082FA249A6699C07E976D1B397BFCF144722BE3943BD4CB38C4B1C740
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction ID: 66533d8690459abcf9254515eeb4930ad9c0e32f48fd07ddd87e68d6398014c6
                                      • Opcode Fuzzy Hash: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction Fuzzy Hash: 1D611E3A228A8482EB60DB15E49139EB7A1F7C6798F144117FA8E43BA9DF3CC555CF40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction ID: e52a44cbf72a207e5531d5d4f5caf49a830181f97cd0d4468d443e167fffca20
                                      • Opcode Fuzzy Hash: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction Fuzzy Hash: 4D210ABA738B4A6FF790EF2C54057EA73D1EB89304F05095AA445C3296EF24CC518363
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction ID: 25a4d2c8c4a2530e07786674eb1051753a25fc5879f36890adc0d317a04b96c9
                                      • Opcode Fuzzy Hash: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction Fuzzy Hash: A8310F75628A449FE384FF28C455BDEB7E1FF98308F50061DB08AD32E2DA349A55C742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction ID: 9b2bcd9402efdf09d419671d30eff2d62a8c9f3c06e0137f10ec249b4338995d
                                      • Opcode Fuzzy Hash: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction Fuzzy Hash: DB21877933578285FBA19F2298413DFA6D5A7477C8F444423BE8987786EF3CC5618710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction ID: 4529da91ed302e3a0f17be0bdf1b092684f27e397f7ad42ca19f976c1f695d51
                                      • Opcode Fuzzy Hash: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction Fuzzy Hash: 70212F7A528A4081EA60EB11E4503DEA7E0F7C679CF541227B6DE43AEADF3CC5618B40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_set_error_mode$__crt_errno$ExitMessageProcess_lock_malloc_crtmalloc
                                      • String ID:
                                      • API String ID: 2751257304-0
                                      • Opcode ID: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction ID: 79b7108fcd73e4ce8d545bd8a9644b285051f82f7df08786f6a9e09cf1fd970e
                                      • Opcode Fuzzy Hash: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction Fuzzy Hash: D011A13E230A8881F760AB61E4447F922E5EB4BB88F441423F547476E6CF7C84B19751
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction ID: 5ee9baaa22be06cc453e74613a7ba55300a24d8fa59171aa490814a921578177
                                      • Opcode Fuzzy Hash: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction Fuzzy Hash: 9D51B534728E0A5BE75EAF289456AFD73D5FB5A308F50012DD94BC3287EE20DC628681
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction ID: 4259e11426cc3ddd62a9db608abd0c63cb99f85f6f1d52153f8c16ff9f085a44
                                      • Opcode Fuzzy Hash: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction Fuzzy Hash: 2641BC3A3247C19BFB98AB66A5502A967D0FB0AFC8F800426EF0647751DF34E436C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc$_errno_snprintf$FreeHeap_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 1397185943-0
                                      • Opcode ID: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction ID: fa57b02b6e02bb4888247ceebe9fc56245dcfa030d9e67bfc8405639a348e262
                                      • Opcode Fuzzy Hash: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction Fuzzy Hash: BBE12A793246449FF394FF28C451BEBB7E2FB85308F40452DA68AC72D2DA349955CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 74200508-0
                                      • Opcode ID: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction ID: fbf00d51ddc6b95bbb9d2a20116b1d87d295360eb8f12f1498ffad04d8160905
                                      • Opcode Fuzzy Hash: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction Fuzzy Hash: 76D16F7A2246848AF750EB60E4553DEB6E1E7C634CF40412BFA8987AD6CF3DD825CB50
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _lock$_calloc_crt_mtinitlocknum
                                      • String ID:
                                      • API String ID: 3962633935-0
                                      • Opcode ID: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction ID: 2211feec3a376fe164d81ac1fe63493f4c529dff5e5efaf7a30b630808228437
                                      • Opcode Fuzzy Hash: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction Fuzzy Hash: 9D512975638B098FE7699F58C8813B5B3D0FB98318F15025DD84EC72A2D6B4DC62CB82
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction ID: de103fa861c7b34c1287b9dcd10aa48fcd869dd9aeb580d540029282e8261461
                                      • Opcode Fuzzy Hash: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction Fuzzy Hash: 6B411535328F1D0BE769AE688809BFA73D5EBA5358F54013DD587C3283ED20D8578791
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-0
                                      • Opcode ID: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction ID: cf59769860a3156055c4e74c2406e43a3dd2e15a6262ac3f133b5bc302bb5919
                                      • Opcode Fuzzy Hash: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction Fuzzy Hash: 325106BA324A48DFEB98EF28C0C57E577D0FB58314F140199D95ACB2C6D674C861CB82
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 343393124-0
                                      • Opcode ID: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction ID: b895dcec999102b761b09725de2ca50c99f5b492ea843e290522ac633ee5c19c
                                      • Opcode Fuzzy Hash: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction Fuzzy Hash: C2417335338A458FE784FF28C894BEAB7F1FF99304F500529E48AC32A1DA25D945CB02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction ID: d543d9a91e2721867a4a3191f6c33dc04d7f9694cf9f264bc5209db30b7886d2
                                      • Opcode Fuzzy Hash: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction Fuzzy Hash: 2841E23A32838596FA65EB2664002BE67D8F756F8CF494026FE068B741DF39D826C310
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction ID: ba52ecf0e2ad90044be7d0ccbad79691b07e967f1c14111d671c9009350fc83d
                                      • Opcode Fuzzy Hash: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction Fuzzy Hash: 7D01F479735948CFFA6AAF28CC597D432D0EF1632EF644248E40AC70E2D6B81460C623
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction ID: dbe6c4056fa92cf32c71e1b1bd7797b8380739595410e1ad59407ecd7ed26e38
                                      • Opcode Fuzzy Hash: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction Fuzzy Hash: 0C01FBB4638B48AFE384EF18C449B99B7E1FFD4704F80092DB589C22A1DB749954CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction ID: f87c4355679bd08acc761070d339049c23dfb98071a951e7aa6a860421b872e8
                                      • Opcode Fuzzy Hash: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction Fuzzy Hash: 24018CBA736A4486FA49AF14C8813E836D39B53BBDF554307FA2A077E2C72C44218721
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction ID: 58cdb5c6f7ee357fbc6466be9d12285fa8dfb55fb2b7e0f6f56a6bfe4e779e14
                                      • Opcode Fuzzy Hash: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction Fuzzy Hash: 84F0F9BA538B8086DA40EB51F45139EA3A4FBC5B88F405117BA8E53BA9CF7CC421CB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction ID: 98f05c8613d12e6475fa847a0b4a778a613df8a378655a35ceec45b5f0baaf40
                                      • Opcode Fuzzy Hash: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction Fuzzy Hash: E3913A752287849FE7A4EF28C4557EEB7E1FB84304F50092DE08AC3291DB75996ACB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction ID: b8c259335d3cacf9428626c1c05d17ce3b68648e980c42d1505584a8e48dfeac
                                      • Opcode Fuzzy Hash: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction Fuzzy Hash: 37810F3A2286808AE760DF24E4543DEB7E1F786788F500526F78987AD9DB7DD854CF40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction ID: d16c73821eeefc66a4c9e2ad0007ac8dee2207002784e0954f2213fdfc95aacd
                                      • Opcode Fuzzy Hash: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction Fuzzy Hash: E931BA7461CB489FDB84EF18C054A5AB7E1FBAC319F500A6DA48DD73A1DB34E941CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction ID: 2e18cde7adc99d01c3680f39044a079f0f392ab9ba270747f5a63118551c551b
                                      • Opcode Fuzzy Hash: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction Fuzzy Hash: 0721A23A618B8486DA64DB16E49025EB7A0F3C9B98F504216FEDD43BA9CF38C552CF40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction ID: 225bece9a23727843b4ba20e2fa885ed20e5c5073ca67416133237ac7ace9e74
                                      • Opcode Fuzzy Hash: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction Fuzzy Hash: 7951FBB6338F095FE7689EAD54453B972C1E759318F14022EE49AC31D7EA61DC6282C3
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction ID: e2d63def0e922b5dd0514f039539b3c8ed1176ff015ffee9a70612454469c2c6
                                      • Opcode Fuzzy Hash: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction Fuzzy Hash: 8D4126393203C046FE688E23A5813EAB6D1B746FECF184626BE5547BC5DB79C4618700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: f2a5db909bb8a047368f1db4729ff010bdd6c69098909e7e2ee8d29f4243a031
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: F3213D39A1C70D4FE778EDA894427BAB7C0D785354F25122DE9CAC3283F5649C6286C6
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction ID: 37cd572283746604becb4d17862f86b6905c9d7e9ae712a802924f797a8650e7
                                      • Opcode Fuzzy Hash: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction Fuzzy Hash: E32149BA738664DFE7AA9F2840943BA36D2E74435DF040A6DE09EC71C1C9F08854C341
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 7d442303a5d3442178c42dfb0114d38584aeb689b7a1e6a7f9a13b8aa65f5ff9
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: 7911023A624B4445F770EEA6B4806ABF6D0BB86398F195027FE4483286EB74DCA1C701
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction ID: 5cfdecdf64f4f268a2f3e63bf5afe32f739bbc35c5bad464f48793b50ad07a1a
                                      • Opcode Fuzzy Hash: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction Fuzzy Hash: FE21E7FB6262E441EB6096159050BFE7AD1E346BDCF1C5123FE968BAC5CB6CC461C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnofree$FreeHeap_calloc_implcalloc
                                      • String ID:
                                      • API String ID: 2553729582-0
                                      • Opcode ID: 78c2e68d2c1b3242693463214cb6a7d91bdf562fc33a57e2f937b62e4c2d32d4
                                      • Instruction ID: bd29f4837b8abd897d89eaa91600ca0c27801e9f80e3a64524e3f90000b4cb9e
                                      • Opcode Fuzzy Hash: 78c2e68d2c1b3242693463214cb6a7d91bdf562fc33a57e2f937b62e4c2d32d4
                                      • Instruction Fuzzy Hash: 99E13B74A18B488FDB98DF5CD484BAABBE1FB98305F10452EE58DC3291DB70D845CB86
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 3587327836-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 83cee8ec6bad23b8f1372f17b89abbfc642db9e25c1a0e0968a3f006ad8f73f9
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: 4761EA36229A8486EB50DB55E88079AB7E0F3CA794F145516FBCE47BA9CF7CC451CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction ID: e3503da4dd4ae3f9faef7d8e5bb3323e183a2869cb2950b41a5e0e5925a6d3bc
                                      • Opcode Fuzzy Hash: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction Fuzzy Hash: 25D1E9B42587859FE7A4EF18C0447ABB7E1FF9A319F90192DA5CAC3250DB319980CB47
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction ID: 542e5dd093ef36db5330f5c57f34ac6353e8e0792ca2ef2cbc566fc2fe8f9103
                                      • Opcode Fuzzy Hash: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction Fuzzy Hash: C211C171228F088FD744EF5CD4857A6B3E1FB98328F1047AEA019C32A1DB34C980CB82
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CaptureContextPrevious__crt__raise_securityfailure
                                      • String ID: sv-FI
                                      • API String ID: 37250909-2947700294
                                      • Opcode ID: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction ID: 32fbd6fff7ed27dc112cd62501e64866b7a9884940b51d3e8146f52507924bae
                                      • Opcode Fuzzy Hash: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction Fuzzy Hash: 1021D3BC225B0485FB509B19E8553D977E5F38A388F940127FA8EA67A1DF3CC5648700
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction ID: b64b7b7310ef26a68dfcc897edab48d01298c3c33af3727bd17f4716fa2fcf2b
                                      • Opcode Fuzzy Hash: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction Fuzzy Hash: 2D11A177620A4086EB10DF56E4407D9B6A5FB9AFE8F584322BF5847B96CF38C150CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_calloc_implcalloc
                                      • String ID:
                                      • API String ID: 4000150058-0
                                      • Opcode ID: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction ID: 6e3b4f07ed026f6f4cbb75a3e7c860120f6ffd9dd1bc820da13623ebdcf7b257
                                      • Opcode Fuzzy Hash: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction Fuzzy Hash: 59C10E36614B858AEB64CF65E48079E77F4F789B88F10412AEB8D87B58DF38D465CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction ID: 065cc01f789515e7fb4407e790138ebdefd7db5c77191939090f3fdff64a5c61
                                      • Opcode Fuzzy Hash: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction Fuzzy Hash: 0FC1CA7A2286C08ADB70CA15E09039FB7A0F78A799F54111AFBCA83B59DB3DC451CF15
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: fa3c9c1ad28bd5b43475c9a1d9144639f79c0c4d989a959fd36aaabd7a5a8415
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: A3912E75218B888FE7A4EF18C455BABB7E1FB99305F40092DE48AC32E1DB749945CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction ID: 8a418ce05631262eeb4818a98064a5d2f83bdf7a13deeb833f5683661cfc4b26
                                      • Opcode Fuzzy Hash: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction Fuzzy Hash: 0551D47432CA054BEB5DDF289485ABA73D1FB95308F10456DE98BC32C6EE30EC628681
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: cc3cdb8168e26207c8178f3c30a90bb8766d78edb3b6108debfae6ea433b6de0
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: D281EB3A228AC489E7209B55F4503DAB7A1F3DA798F504217FA9E43BA9DF3DC455CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction ID: c17b7e956b8ac4efbe951f5a2c1cce7ac121a20f2b00842f2517edb8b7c0a476
                                      • Opcode Fuzzy Hash: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction Fuzzy Hash: 78418E3A62478087EB98DB26A4106ED77E1F746F8CF548426FE1A47B85DF34E825C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 5bdec7dc50a5295d6bbde147bef5ff3256c53dab6c8a91d25923a1859fa94813
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 01418575228A489FE751FF28D844BDA77E1F798314F50052EA48AC32E0DB38D955CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction ID: 960af02bd8424960d0496cf4b11bfdb13982d032f0f84ebba9b9f3df12f8e146
                                      • Opcode Fuzzy Hash: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction Fuzzy Hash: CE31E575628B4CAFE794FF28C444BA977E1FB99319F90061EA49AC32A1D734D851C702
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 3a82c80395e49d6d31a39384f797dff1d657f4377c097517151e761011017927
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 72315339238A8481E7219B11E4513DAA7E0F38A76CF544217FA9D43BE9DF3DC5A5CB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000003.2632014535.0000012E52D7D000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000012E52D60000, based on PE: true
                                      • Associated: 00000003.00000003.2631994187.0000012E52D60000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000003.00000003.2632014535.0000012E52DBC000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_3_12e52d60000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction ID: 83b69390035c1e6dbae63ee9ee66bc7a37eceb753b84d2f907898204a943820c
                                      • Opcode Fuzzy Hash: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction Fuzzy Hash: 8621F17A125B4885EA609B15F85139AA7F5F3867A8F501317FA9E537E9CF3CC061CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.2635071752.0000012E545C1000.00000020.00001000.00020000.00000000.sdmp, Offset: 0000012E545C1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_12e545c1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$FreeHeap_errno
                                      • String ID:
                                      • API String ID: 2737118440-0
                                      • Opcode ID: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction ID: 916668495f570e3e509baf912a09411b6991fc911e466fccca74a8f77ffa1123
                                      • Opcode Fuzzy Hash: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction Fuzzy Hash: FEF04C7523CD48AFD6C8FF18C895E99B7E1FFA8304F801458B049C73A2EA24E850CB12

                                      Execution Graph

                                      Execution Coverage:1.1%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:25
                                      execution_graph 19177 1efefb1b544 19180 1efefb1b560 _DllMainCRTStartup 19177->19180 19178 1efefb1b5f0 19187 1efefb1b5ba 19178->19187 19220 1efefafd0fc 19178->19220 19180->19178 19180->19187 19189 1efefb1b3e4 19180->19189 19182 1efefb1b637 19185 1efefb1b3e4 _CRT_INIT 2 API calls 19182->19185 19182->19187 19184 1efefafd0fc _DllMainCRTStartup 7 API calls 19186 1efefb1b62a 19184->19186 19185->19187 19188 1efefb1b3e4 _CRT_INIT 2 API calls 19186->19188 19188->19182 19190 1efefb1b473 19189->19190 19193 1efefb1b3f6 _heap_init 19189->19193 19191 1efefb1b4c9 19190->19191 19196 1efefb1b477 _CRT_INIT 19190->19196 19192 1efefb1b52c 19191->19192 19199 1efefb1b4ce _CRT_INIT 19191->19199 19212 1efefb1b3ff _CRT_INIT _mtterm 19192->19212 19293 1efefb1f3d8 19192->19293 19193->19212 19228 1efefb1f580 19193->19228 19196->19212 19255 1efefb19b34 19196->19255 19199->19212 19281 1efefb1e2f8 19199->19281 19202 1efefb1b40b _RTC_Initialize 19202->19212 19234 1efefb22b90 19202->19234 19203 1efefb1b4eb _mtinit 19205 1efefb1b522 19203->19205 19206 1efefb1b50c 19203->19206 19203->19212 19290 1efefb19428 19205->19290 19285 1efefb1f4bc 19206->19285 19212->19178 19221 1efefafd134 19220->19221 19225 1efefafd123 _DllMainCRTStartup 19220->19225 19553 1efefb16f68 19221->19553 19222 1efefafd12a 19222->19182 19222->19184 19225->19222 19226 1efefafd1d7 19225->19226 19227 1efefafd228 VirtualFree 19225->19227 19226->19222 19507 1efefaecb50 19226->19507 19227->19226 19230 1efefb1f58b _mtinit _mtinitlocks 19228->19230 19229 1efefb1f5de _mtterm 19229->19202 19230->19229 19231 1efefb1e2f8 _calloc_crt RtlFreeHeap 19230->19231 19232 1efefb1f5ba _mtinit 19231->19232 19232->19229 19233 1efefb1f4bc _initptd RtlFreeHeap 19232->19233 19233->19229 19235 1efefb22baf 19234->19235 19237 1efefb1b42d 19235->19237 19297 1efefb1e378 19235->19297 19240 1efefb21f10 19237->19240 19239 1efefb19428 free RtlFreeHeap 19239->19237 19374 1efefb1d958 19240->19374 19256 1efefb19b4b 19255->19256 19257 1efefb19b6d 19256->19257 19259 1efefb19428 free RtlFreeHeap 19256->19259 19258 1efefb19428 free RtlFreeHeap 19257->19258 19260 1efefb19b7c 19258->19260 19259->19256 19261 1efefb19ba3 19260->19261 19264 1efefb19428 free RtlFreeHeap 19260->19264 19262 1efefb19428 free RtlFreeHeap 19261->19262 19263 1efefb19bb2 19262->19263 19265 1efefb19428 free RtlFreeHeap 19263->19265 19264->19260 19266 1efefb19bc6 19265->19266 19267 1efefb19428 free RtlFreeHeap 19266->19267 19268 1efefb19bd2 19267->19268 19269 1efefb19bfd 19268->19269 19270 1efefb19428 free RtlFreeHeap 19268->19270 19271 1efefb19c1e 19269->19271 19273 1efefb19428 free RtlFreeHeap 19269->19273 19270->19269 19272 1efefb19c37 19271->19272 19274 1efefb19428 free RtlFreeHeap 19271->19274 19275 1efefb19c68 19272->19275 19276 1efefb19428 free RtlFreeHeap 19272->19276 19273->19271 19274->19272 19275->19212 19277 1efefb2223c 19275->19277 19276->19275 19280 1efefb22257 19277->19280 19278 1efefb2229f 19278->19212 19279 1efefb19428 free RtlFreeHeap 19279->19280 19280->19278 19280->19279 19283 1efefb1e31d 19281->19283 19284 1efefb1e35a 19283->19284 19477 1efefb23a60 19283->19477 19284->19203 19286 1efefb1d958 _lock RtlFreeHeap 19285->19286 19287 1efefb1f522 __lock_fhandle 19286->19287 19288 1efefb1d958 _lock RtlFreeHeap 19287->19288 19289 1efefb1f541 __addlocaleref __lock_fhandle 19288->19289 19289->19212 19291 1efefb19448 _errno free 19290->19291 19292 1efefb1942d RtlFreeHeap 19290->19292 19291->19212 19292->19291 19294 1efefb1f40e 19293->19294 19295 1efefb1f3ec _mtinit _CRT_INIT 19293->19295 19294->19212 19481 1efefb1f2a4 19295->19481 19299 1efefb1e3a0 19297->19299 19300 1efefb1e3d5 19299->19300 19301 1efefb19468 19299->19301 19300->19237 19300->19239 19302 1efefb19480 _callnewh malloc 19301->19302 19303 1efefb194fc _callnewh 19301->19303 19307 1efefb194f1 19302->19307 19308 1efefb194e1 19302->19308 19310 1efefb194e6 19302->19310 19312 1efefb1b7ec 19302->19312 19321 1efefb1b860 19302->19321 19305 1efefb1b714 _errno RtlFreeHeap 19303->19305 19305->19307 19307->19299 19337 1efefb1b714 19308->19337 19311 1efefb1b714 _errno RtlFreeHeap 19310->19311 19311->19307 19340 1efefb22f24 19312->19340 19314 1efefb1b7fa 19315 1efefb22f24 _set_error_mode RtlFreeHeap 19314->19315 19319 1efefb1b809 19314->19319 19315->19319 19316 1efefb1b860 _NMSG_WRITE RtlFreeHeap 19317 1efefb1b820 19316->19317 19320 1efefb1b860 _NMSG_WRITE RtlFreeHeap 19317->19320 19318 1efefb1b82a 19318->19302 19319->19316 19319->19318 19320->19318 19322 1efefb1b894 _NMSG_WRITE 19321->19322 19323 1efefb22f24 _set_error_mode RtlFreeHeap 19322->19323 19330 1efefb1b9b1 __crtLCMapStringA_stat __crtMessageBoxW _invoke_watson 19322->19330 19324 1efefb1b8aa 19323->19324 19325 1efefb22f24 _set_error_mode RtlFreeHeap 19324->19325 19324->19330 19326 1efefb1b8bb 19325->19326 19326->19330 19344 1efefb22dd0 19326->19344 19328 1efefb1b8f7 19329 1efefb22dd0 _wsetenvp RtlFreeHeap 19328->19329 19328->19330 19331 1efefb1b937 _wsetenvp 19328->19331 19329->19331 19330->19302 19331->19330 19332 1efefb1b981 19331->19332 19351 1efefb22e58 19331->19351 19332->19330 19358 1efefb22d48 19332->19358 19334 1efefb1b99b 19334->19330 19336 1efefb22d48 _NMSG_WRITE RtlFreeHeap 19334->19336 19336->19330 19365 1efefb1f438 19337->19365 19341 1efefb22f2c 19340->19341 19342 1efefb1b714 _errno RtlFreeHeap 19341->19342 19343 1efefb22f36 _invalid_parameter_noinfo 19341->19343 19342->19343 19343->19314 19345 1efefb22dde 19344->19345 19347 1efefb22de8 19344->19347 19345->19347 19348 1efefb22e05 19345->19348 19346 1efefb1b714 _errno RtlFreeHeap 19349 1efefb22df1 _invalid_parameter_noinfo 19346->19349 19347->19346 19348->19349 19350 1efefb1b714 _errno RtlFreeHeap 19348->19350 19349->19328 19350->19349 19355 1efefb22e65 19351->19355 19352 1efefb22e6a 19353 1efefb1b714 _errno RtlFreeHeap 19352->19353 19354 1efefb22e6f _invalid_parameter_noinfo 19352->19354 19353->19354 19354->19332 19355->19352 19355->19354 19356 1efefb22ea8 19355->19356 19356->19354 19357 1efefb1b714 _errno RtlFreeHeap 19356->19357 19357->19354 19360 1efefb22d59 19358->19360 19361 1efefb22d63 19358->19361 19359 1efefb1b714 _errno RtlFreeHeap 19364 1efefb22d6c _invalid_parameter_noinfo 19359->19364 19360->19361 19362 1efefb22d9a 19360->19362 19361->19359 19363 1efefb1b714 _errno RtlFreeHeap 19362->19363 19362->19364 19363->19364 19364->19334 19366 1efefb1f448 _CRT_INIT 19365->19366 19367 1efefb1e2f8 _calloc_crt RtlFreeHeap 19366->19367 19368 1efefb1b71d 19366->19368 19369 1efefb1f46a _mtinit 19367->19369 19368->19310 19369->19368 19370 1efefb1f487 19369->19370 19371 1efefb1f49d 19369->19371 19373 1efefb1f4bc _initptd RtlFreeHeap 19370->19373 19372 1efefb19428 free RtlFreeHeap 19371->19372 19372->19368 19373->19368 19375 1efefb1d976 19374->19375 19376 1efefb1d97b 19374->19376 19378 1efefb1da24 19375->19378 19379 1efefb1da41 19378->19379 19380 1efefb1da50 malloc 19378->19380 19382 1efefb1b7ec _FF_MSGBANNER RtlFreeHeap 19379->19382 19381 1efefb1da6b 19380->19381 19383 1efefb1e378 _malloc_crt RtlFreeHeap 19380->19383 19381->19376 19384 1efefb1da46 19382->19384 19385 1efefb1da7c 19383->19385 19386 1efefb1b860 _NMSG_WRITE RtlFreeHeap 19384->19386 19387 1efefb1da93 19385->19387 19388 1efefb1da84 19385->19388 19386->19380 19390 1efefb1d958 _lock RtlFreeHeap 19387->19390 19389 1efefb1b714 _errno RtlFreeHeap 19388->19389 19389->19381 19391 1efefb1da9d 19390->19391 19391->19381 19392 1efefb19428 free RtlFreeHeap 19391->19392 19392->19381 19478 1efefb23a75 19477->19478 19480 1efefb23a88 _callnewh 19477->19480 19479 1efefb1b714 _errno RtlFreeHeap 19478->19479 19478->19480 19479->19480 19480->19283 19482 1efefb1f2ad 19481->19482 19506 1efefb1f3cc 19481->19506 19483 1efefb1f2c8 19482->19483 19484 1efefb19428 free RtlFreeHeap 19482->19484 19485 1efefb1f2d6 19483->19485 19486 1efefb19428 free RtlFreeHeap 19483->19486 19484->19483 19487 1efefb1f2e4 19485->19487 19488 1efefb19428 free RtlFreeHeap 19485->19488 19486->19485 19489 1efefb1f2f2 19487->19489 19490 1efefb19428 free RtlFreeHeap 19487->19490 19488->19487 19491 1efefb1f300 19489->19491 19492 1efefb19428 free RtlFreeHeap 19489->19492 19490->19489 19493 1efefb1f30e 19491->19493 19494 1efefb19428 free RtlFreeHeap 19491->19494 19492->19491 19495 1efefb1f31f 19493->19495 19496 1efefb19428 free RtlFreeHeap 19493->19496 19494->19493 19497 1efefb1f337 19495->19497 19498 1efefb19428 free RtlFreeHeap 19495->19498 19496->19495 19499 1efefb1d958 _lock RtlFreeHeap 19497->19499 19498->19497 19500 1efefb1f343 19499->19500 19501 1efefb1f370 __lock_fhandle 19500->19501 19502 1efefb19428 free RtlFreeHeap 19500->19502 19503 1efefb1d958 _lock RtlFreeHeap 19501->19503 19502->19501 19504 1efefb1f382 _freefls __lock_fhandle 19503->19504 19505 1efefb19428 free RtlFreeHeap 19504->19505 19505->19506 19506->19294 19561 1efefaf7f80 19507->19561 19509 1efefaecb6e _DllMainCRTStartup 19510 1efefb19468 malloc RtlFreeHeap 19509->19510 19511 1efefaecc53 _DllMainCRTStartup 19510->19511 19568 1efefb18aec 19511->19568 19514 1efefb18aec _DllMainCRTStartup RtlFreeHeap 19515 1efefaecd09 _DllMainCRTStartup 19514->19515 19517 1efefaecd17 _DllMainCRTStartup 19515->19517 19601 1efefb17fc8 19515->19601 19518 1efefaecd31 19517->19518 19519 1efefb17fc8 _DllMainCRTStartup RtlFreeHeap 19517->19519 19575 1efefaf02c0 19518->19575 19519->19518 19522 1efefaecd49 19581 1efefaf03ac 19522->19581 19523 1efefb17fc8 _DllMainCRTStartup RtlFreeHeap 19523->19522 19526 1efefb17fc8 _DllMainCRTStartup RtlFreeHeap 19527 1efefaecd57 _DllMainCRTStartup 19526->19527 19528 1efefb19468 malloc RtlFreeHeap 19527->19528 19529 1efefaecd87 19528->19529 19530 1efefaecd99 _DllMainCRTStartup 19529->19530 19531 1efefb17fc8 _DllMainCRTStartup RtlFreeHeap 19529->19531 19532 1efefb18aec _DllMainCRTStartup RtlFreeHeap 19530->19532 19531->19530 19533 1efefaecdc3 _DllMainCRTStartup 19532->19533 19591 1efefaf7ac8 19533->19591 19535 1efefaed076 19537 1efefb19428 free RtlFreeHeap 19535->19537 19536 1efefb17820 RtlFreeHeap _DllMainCRTStartup 19551 1efefaecdd9 _DllMainCRTStartup 19536->19551 19538 1efefaed080 19537->19538 19540 1efefb17fc8 _DllMainCRTStartup RtlFreeHeap 19538->19540 19539 1efefb19700 RtlFreeHeap _snprintf 19539->19551 19541 1efefaed085 19540->19541 19541->19222 19542 1efefaef9c0 InternetOpenA _DllMainCRTStartup 19542->19551 19547 1efefaf2b5c RtlFreeHeap _DllMainCRTStartup 19547->19551 19548 1efefb17fc8 RtlFreeHeap _DllMainCRTStartup 19548->19551 19550 1efefaf3598 RtlFreeHeap _DllMainCRTStartup 19550->19551 19551->19535 19551->19536 19551->19539 19551->19542 19551->19547 19551->19548 19551->19550 19605 1efefaef978 19551->19605 19609 1efefb168d4 19551->19609 19628 1efefafc964 19551->19628 19632 1efefaf9294 19551->19632 19639 1efefaf6198 19551->19639 19647 1efefaefbec 19551->19647 19554 1efefb19468 malloc RtlFreeHeap 19553->19554 19555 1efefb16f8c 19554->19555 19556 1efefb18aec _DllMainCRTStartup RtlFreeHeap 19555->19556 19559 1efefb16fc9 _DllMainCRTStartup 19556->19559 19557 1efefb17045 19557->19222 19558 1efefb19468 malloc RtlFreeHeap 19558->19559 19559->19557 19559->19558 19560 1efefb18aec _DllMainCRTStartup RtlFreeHeap 19559->19560 19560->19559 19562 1efefb19468 malloc RtlFreeHeap 19561->19562 19563 1efefaf7f9c 19562->19563 19564 1efefb19468 malloc RtlFreeHeap 19563->19564 19566 1efefaf7fa9 _DllMainCRTStartup 19563->19566 19565 1efefaf7fba 19564->19565 19565->19566 19567 1efefb19428 free RtlFreeHeap 19565->19567 19566->19509 19567->19566 19569 1efefb18b18 19568->19569 19570 1efefaeccdb 19568->19570 19571 1efefb18b22 19569->19571 19572 1efefb18b35 19569->19572 19570->19514 19573 1efefb19468 malloc RtlFreeHeap 19571->19573 19667 1efefb1b310 19572->19667 19573->19570 19576 1efefaf02dd _DllMainCRTStartup 19575->19576 19576->19576 19577 1efefaecd40 19576->19577 19681 1efefb16294 19576->19681 19577->19522 19577->19523 19579 1efefaf036c 19685 1efefb162e0 19579->19685 19583 1efefaf03d0 _DllMainCRTStartup 19581->19583 19582 1efefaecd4e 19582->19526 19582->19527 19583->19582 19584 1efefb19468 malloc RtlFreeHeap 19583->19584 19586 1efefaf04ed _DllMainCRTStartup 19584->19586 19585 1efefaf057c 19587 1efefb19428 free RtlFreeHeap 19585->19587 19586->19585 19588 1efefb16294 _DllMainCRTStartup RtlFreeHeap 19586->19588 19587->19582 19589 1efefaf0553 19588->19589 19590 1efefb162e0 _DllMainCRTStartup RtlFreeHeap 19589->19590 19590->19585 19592 1efefaf7add _DllMainCRTStartup 19591->19592 19869 1efefb16d54 19592->19869 19594 1efefaf7b0e 19873 1efefb1a014 19594->19873 19596 1efefaf7b2d _DllMainCRTStartup 19876 1efefaf7cfc 19596->19876 19598 1efefaf7c3a _DllMainCRTStartup 19887 1efefb167bc 19598->19887 19600 1efefaf7cb1 19600->19551 19602 1efefb17fd6 _DllMainCRTStartup 19601->19602 19993 1efefb18c40 19602->19993 19604 1efefb17fff 19604->19517 19606 1efefaef995 _wcsupr_s 19605->19606 20003 1efefaef484 19606->20003 19608 1efefaef9ae _wcsupr_s 19608->19551 19610 1efefb16908 19609->19610 19625 1efefb16901 19609->19625 19611 1efefb19468 malloc RtlFreeHeap 19610->19611 19612 1efefb1691c 19611->19612 19613 1efefb16948 19612->19613 19614 1efefb16937 19612->19614 20047 1efefae198c 19613->20047 19615 1efefb19428 free RtlFreeHeap 19614->19615 19615->19625 19617 1efefb1698d _DllMainCRTStartup 19618 1efefb169f0 _DllMainCRTStartup 19617->19618 19619 1efefb169df 19617->19619 19621 1efefb16b19 19618->19621 19626 1efefb16b44 _DllMainCRTStartup 19618->19626 19620 1efefb19428 free RtlFreeHeap 19619->19620 19620->19625 19622 1efefb19428 free RtlFreeHeap 19621->19622 19623 1efefb16b23 19622->19623 20057 1efefaef250 19623->20057 19625->19551 19626->19625 19627 1efefb19428 free RtlFreeHeap 19626->19627 19627->19625 19630 1efefafc97a 19628->19630 19629 1efefafc9d1 19629->19551 19630->19629 20149 1efefafbdf4 19630->20149 21672 1efefaf92e8 19632->21672 19635 1efefaf92a7 19636 1efefaf92d7 19635->19636 21679 1efefaf991c 19635->21679 21683 1efefaf9bbc 19636->21683 19640 1efefaf61d9 19639->19640 19641 1efefaf61d4 19639->19641 19642 1efefb19468 malloc RtlFreeHeap 19640->19642 19641->19551 19646 1efefaf61e6 _DllMainCRTStartup 19642->19646 19643 1efefb19428 free RtlFreeHeap 19644 1efefaf6300 19643->19644 19645 1efefaf630c _DllMainCRTStartup RtlFreeHeap 19644->19645 19645->19641 19646->19643 19648 1efefaefc7a 19647->19648 19649 1efefaefc75 _wcsupr_s 19647->19649 19650 1efefafb828 _DllMainCRTStartup RtlFreeHeap 19648->19650 19649->19551 19651 1efefaefc8d 19650->19651 19652 1efefb19700 _snprintf RtlFreeHeap 19651->19652 19653 1efefaefcae 19652->19653 19654 1efefb19700 _snprintf RtlFreeHeap 19653->19654 19655 1efefaefcce _DllMainCRTStartup 19654->19655 19656 1efefafabbc _DllMainCRTStartup RtlFreeHeap 19655->19656 19657 1efefaefd49 19656->19657 19658 1efefaefd7e 19657->19658 19659 1efefaefda1 19657->19659 19660 1efefb19700 _snprintf RtlFreeHeap 19658->19660 19661 1efefb19700 _snprintf RtlFreeHeap 19659->19661 19663 1efefaefd9f _wcsupr_s _DllMainCRTStartup 19660->19663 19661->19663 19662 1efefafb808 _DllMainCRTStartup RtlFreeHeap 19662->19649 19664 1efefaf0038 _DllMainCRTStartup RtlFreeHeap 19663->19664 19665 1efefaefeb6 19663->19665 19664->19665 19665->19662 19666 1efefaefec9 19665->19666 19666->19551 19668 1efefb1b334 19667->19668 19669 1efefb1b32a 19667->19669 19670 1efefb1b339 19668->19670 19677 1efefb1b340 _callnewh 19668->19677 19671 1efefb19468 malloc RtlFreeHeap 19669->19671 19672 1efefb19428 free RtlFreeHeap 19670->19672 19673 1efefb1b332 free 19671->19673 19672->19673 19673->19570 19674 1efefb1b389 _callnewh 19675 1efefb1b714 _errno RtlFreeHeap 19674->19675 19675->19673 19676 1efefb1b3c7 19678 1efefb1b714 _errno RtlFreeHeap 19676->19678 19677->19673 19677->19674 19677->19676 19679 1efefb1b3ae 19677->19679 19678->19673 19680 1efefb1b714 _errno RtlFreeHeap 19679->19680 19680->19673 19682 1efefb162af _DllMainCRTStartup 19681->19682 19683 1efefb162b3 19681->19683 19682->19579 19690 1efefb166ec 19683->19690 19686 1efefb19700 _snprintf RtlFreeHeap 19685->19686 19687 1efefb1637c 19686->19687 19688 1efefb19700 _snprintf RtlFreeHeap 19687->19688 19689 1efefb1639a _openfile _DllMainCRTStartup 19688->19689 19689->19577 19697 1efefb19700 19690->19697 19692 1efefb16712 19692->19692 19693 1efefb19700 _snprintf RtlFreeHeap 19692->19693 19694 1efefb167a2 19693->19694 19706 1efefb199cc 19694->19706 19700 1efefb19732 _call_reportfault 19697->19700 19698 1efefb19737 19699 1efefb1b714 _errno RtlFreeHeap 19698->19699 19704 1efefb1973c _invalid_parameter_noinfo 19699->19704 19700->19698 19701 1efefb19756 19700->19701 19710 1efefb1bfcc 19701->19710 19703 1efefb19786 19703->19704 19727 1efefb1bd98 19703->19727 19704->19692 19707 1efefb1d8b8 19706->19707 19852 1efefb1d67c 19707->19852 19709 1efefb167ac 19709->19682 19711 1efefb1bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19710->19711 19712 1efefb1c032 19711->19712 19713 1efefb1b714 _errno RtlFreeHeap 19712->19713 19714 1efefb1c037 19713->19714 19715 1efefb1c997 19714->19715 19721 1efefb1c064 _snprintf 19714->19721 19748 1efefb1f624 19714->19748 19716 1efefb1b714 _errno RtlFreeHeap 19715->19716 19718 1efefb1c99c _invalid_parameter_noinfo __crtLCMapStringA_stat 19716->19718 19718->19703 19720 1efefb1c9ec RtlFreeHeap write_char 19720->19721 19721->19715 19721->19718 19721->19720 19722 1efefb19428 free RtlFreeHeap 19721->19722 19723 1efefb1e378 _malloc_crt RtlFreeHeap 19721->19723 19724 1efefb1d594 RtlFreeHeap write_multi_char 19721->19724 19725 1efefb23864 RtlFreeHeap _snprintf 19721->19725 19726 1efefb1d5e8 RtlFreeHeap write_string 19721->19726 19752 1efefb23634 19721->19752 19722->19721 19723->19721 19724->19721 19725->19721 19726->19721 19728 1efefb1f624 _fileno RtlFreeHeap 19727->19728 19729 1efefb1bdba 19728->19729 19730 1efefb1bdc5 19729->19730 19731 1efefb1bddc 19729->19731 19733 1efefb1b714 _errno RtlFreeHeap 19730->19733 19732 1efefb1bde1 19731->19732 19742 1efefb1bdee _vsnprintf_helper 19731->19742 19734 1efefb1b714 _errno RtlFreeHeap 19732->19734 19741 1efefb1bdca 19733->19741 19734->19741 19735 1efefb1be53 19736 1efefb1be60 19735->19736 19737 1efefb1beeb 19735->19737 19739 1efefb1be7c 19736->19739 19745 1efefb1be95 19736->19745 19738 1efefb20504 _wsopen_nolock RtlFreeHeap 19737->19738 19738->19741 19764 1efefb20504 19739->19764 19741->19704 19742->19735 19742->19741 19744 1efefb1be47 19742->19744 19755 1efefb231dc 19742->19755 19744->19735 19761 1efefb2323c 19744->19761 19745->19741 19784 1efefb21cd8 19745->19784 19749 1efefb1f62d 19748->19749 19751 1efefb1f632 _invalid_parameter_noinfo 19748->19751 19750 1efefb1b714 _errno RtlFreeHeap 19749->19750 19750->19751 19751->19721 19753 1efefb1bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19752->19753 19754 1efefb23646 19753->19754 19754->19721 19756 1efefb231f2 19755->19756 19757 1efefb231e5 19755->19757 19759 1efefb231ea _invalid_parameter_noinfo 19756->19759 19760 1efefb1b714 _errno RtlFreeHeap 19756->19760 19758 1efefb1b714 _errno RtlFreeHeap 19757->19758 19758->19759 19759->19744 19760->19759 19762 1efefb1e378 _malloc_crt RtlFreeHeap 19761->19762 19763 1efefb23255 19762->19763 19763->19735 19765 1efefb2053f 19764->19765 19766 1efefb20527 19764->19766 19768 1efefb205b6 19765->19768 19773 1efefb20571 19765->19773 19804 1efefb1b6a4 19766->19804 19770 1efefb1b6a4 __doserrno RtlFreeHeap 19768->19770 19772 1efefb205bb 19770->19772 19771 1efefb1b714 _errno RtlFreeHeap 19776 1efefb20534 _invalid_parameter_noinfo _unlock_fhandle 19771->19776 19774 1efefb1b714 _errno RtlFreeHeap 19772->19774 19807 1efefb2438c 19773->19807 19774->19776 19776->19741 19777 1efefb20578 19778 1efefb20595 19777->19778 19779 1efefb20584 19777->19779 19780 1efefb1b714 _errno RtlFreeHeap 19778->19780 19811 1efefb205e4 19779->19811 19782 1efefb2059a 19780->19782 19783 1efefb1b6a4 __doserrno RtlFreeHeap 19782->19783 19783->19776 19785 1efefb21d13 19784->19785 19786 1efefb21cfb 19784->19786 19787 1efefb21d8d 19785->19787 19791 1efefb21d45 19785->19791 19788 1efefb1b6a4 __doserrno RtlFreeHeap 19786->19788 19789 1efefb1b6a4 __doserrno RtlFreeHeap 19787->19789 19790 1efefb21d00 19788->19790 19792 1efefb21d92 19789->19792 19793 1efefb1b714 _errno RtlFreeHeap 19790->19793 19794 1efefb2438c __lock_fhandle RtlFreeHeap 19791->19794 19795 1efefb1b714 _errno RtlFreeHeap 19792->19795 19801 1efefb21d08 _invalid_parameter_noinfo _unlock_fhandle 19793->19801 19796 1efefb21d4c 19794->19796 19795->19801 19797 1efefb21d6a 19796->19797 19798 1efefb21d58 19796->19798 19800 1efefb1b714 _errno RtlFreeHeap 19797->19800 19799 1efefb21dbc _lseeki64_nolock RtlFreeHeap 19798->19799 19799->19801 19802 1efefb21d6f 19800->19802 19801->19741 19803 1efefb1b6a4 __doserrno RtlFreeHeap 19802->19803 19803->19801 19805 1efefb1f438 _getptd_noexit RtlFreeHeap 19804->19805 19806 1efefb1b6ad 19805->19806 19806->19771 19808 1efefb243c4 19807->19808 19810 1efefb243ce __lock_fhandle 19807->19810 19809 1efefb1d958 _lock RtlFreeHeap 19808->19809 19809->19810 19810->19777 19812 1efefb20606 19811->19812 19813 1efefb2063a 19812->19813 19814 1efefb20696 19812->19814 19822 1efefb2062e _invalid_parameter_noinfo __crtLCMapStringA_stat 19812->19822 19815 1efefb1b6a4 __doserrno RtlFreeHeap 19813->19815 19816 1efefb206ab 19814->19816 19836 1efefb21dbc 19814->19836 19817 1efefb2063f 19815->19817 19819 1efefb231dc _isatty RtlFreeHeap 19816->19819 19820 1efefb1b714 _errno RtlFreeHeap 19817->19820 19821 1efefb206b2 19819->19821 19820->19822 19823 1efefb1f414 _getptd RtlFreeHeap 19821->19823 19834 1efefb20943 19821->19834 19822->19776 19835 1efefb206d6 _putwch_nolock 19823->19835 19824 1efefb20cb1 19824->19822 19825 1efefb1b714 _errno RtlFreeHeap 19824->19825 19826 1efefb20cdd 19825->19826 19827 1efefb1b6a4 __doserrno RtlFreeHeap 19826->19827 19827->19822 19828 1efefb20ca3 19847 1efefb1b6c4 19828->19847 19829 1efefb1b714 _errno RtlFreeHeap 19831 1efefb20c98 19829->19831 19832 1efefb1b6a4 __doserrno RtlFreeHeap 19831->19832 19832->19828 19834->19822 19834->19824 19834->19828 19834->19829 19835->19834 19844 1efefb23678 19835->19844 19837 1efefb246c8 _lseek_nolock RtlFreeHeap 19836->19837 19838 1efefb21ddb 19837->19838 19839 1efefb21de1 19838->19839 19842 1efefb21df2 19838->19842 19840 1efefb1b714 _errno RtlFreeHeap 19839->19840 19841 1efefb21de6 19840->19841 19841->19816 19842->19841 19843 1efefb1b6c4 _dosmaperr RtlFreeHeap 19842->19843 19843->19841 19845 1efefb1bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19844->19845 19846 1efefb2368c 19845->19846 19846->19835 19848 1efefb1f438 _getptd_noexit RtlFreeHeap 19847->19848 19849 1efefb1b6d5 19848->19849 19850 1efefb1f438 _getptd_noexit RtlFreeHeap 19849->19850 19851 1efefb1b6ee free 19850->19851 19851->19824 19853 1efefb1bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19852->19853 19855 1efefb1d6a8 19853->19855 19854 1efefb1d6c3 19856 1efefb1b714 _errno RtlFreeHeap 19854->19856 19855->19854 19857 1efefb1d6d8 19855->19857 19859 1efefb1d6c8 _invalid_parameter_noinfo 19856->19859 19860 1efefb1d72a 19857->19860 19862 1efefb23878 19857->19862 19859->19709 19860->19859 19861 1efefb1b714 _errno RtlFreeHeap 19860->19861 19861->19859 19863 1efefb1bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 19862->19863 19864 1efefb2389a 19863->19864 19865 1efefb23634 _isleadbyte_l RtlFreeHeap 19864->19865 19868 1efefb238a4 19864->19868 19866 1efefb238c7 19865->19866 19867 1efefb24268 setSBUpLow RtlFreeHeap 19866->19867 19867->19868 19868->19857 19870 1efefb16d71 _DllMainCRTStartup 19869->19870 19893 1efefae18bc 19870->19893 19872 1efefb16da8 _DllMainCRTStartup 19872->19594 19874 1efefb1f414 _getptd RtlFreeHeap 19873->19874 19875 1efefb1a021 19874->19875 19875->19596 19877 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 19876->19877 19878 1efefaf7d16 _DllMainCRTStartup 19877->19878 19879 1efefaf7d7a GetUserNameA 19878->19879 19880 1efefaf7dc8 19879->19880 19899 1efefaf00a4 19880->19899 19882 1efefaf7dcd strrchr _DllMainCRTStartup 19883 1efefb19700 _snprintf RtlFreeHeap 19882->19883 19884 1efefaf7f11 _DllMainCRTStartup 19883->19884 19906 1efefaf80f0 19884->19906 19888 1efefb167e3 _DllMainCRTStartup 19887->19888 19914 1efefae1cc4 19888->19914 19890 1efefb16838 19934 1efefae1b64 19890->19934 19892 1efefb168b0 19892->19600 19895 1efefae18ec _DllMainCRTStartup 19893->19895 19894 1efefae190d 19894->19872 19895->19894 19896 1efefb19468 malloc RtlFreeHeap 19895->19896 19898 1efefae1921 19896->19898 19897 1efefb19428 free RtlFreeHeap 19897->19894 19898->19894 19898->19897 19912 1efefaf01dc 19899->19912 19901 1efefaf00c0 WSASocketA 19902 1efefaf00fa WSAIoctl 19901->19902 19903 1efefaf00f3 19901->19903 19905 1efefaf0145 closesocket 19902->19905 19903->19882 19905->19903 19907 1efefaf8103 _DllMainCRTStartup 19906->19907 19908 1efefb19428 free RtlFreeHeap 19907->19908 19909 1efefaf8110 19908->19909 19910 1efefb19428 free RtlFreeHeap 19909->19910 19911 1efefaf7f78 19910->19911 19911->19598 19913 1efefaf01ec _DllMainCRTStartup 19912->19913 19913->19901 19915 1efefae1d5e _DllMainCRTStartup 19914->19915 19933 1efefae1d77 __crtLCMapStringA_stat _DllMainCRTStartup 19915->19933 19938 1efefb28f58 19915->19938 19917 1efefae1d6f _DllMainCRTStartup 19918 1efefae1f0c 19917->19918 19922 1efefae1e6d 19917->19922 19917->19933 19919 1efefb19428 free RtlFreeHeap 19918->19919 19921 1efefae1f14 19919->19921 19924 1efefae4e64 _DllMainCRTStartup RtlFreeHeap 19921->19924 19945 1efefae4e64 19922->19945 19929 1efefae1f40 19924->19929 19925 1efefae1efd 19928 1efefb19428 free RtlFreeHeap 19925->19928 19926 1efefae1ef3 19927 1efefb19428 free RtlFreeHeap 19926->19927 19927->19933 19928->19933 19931 1efefae4e64 _DllMainCRTStartup RtlFreeHeap 19929->19931 19932 1efefae205c 19929->19932 19929->19933 19930 1efefae4e64 _DllMainCRTStartup RtlFreeHeap 19930->19933 19931->19932 19932->19930 19932->19933 19933->19890 19935 1efefae1ba5 _DllMainCRTStartup 19934->19935 19937 1efefae1b9b _DllMainCRTStartup 19934->19937 19935->19937 19951 1efefae460c 19935->19951 19937->19892 19939 1efefb23a60 _calloc_impl RtlFreeHeap 19938->19939 19940 1efefb28f6d 19939->19940 19941 1efefb1b714 _errno RtlFreeHeap 19940->19941 19944 1efefb28f8a 19940->19944 19942 1efefb28f80 19941->19942 19943 1efefb1b714 _errno RtlFreeHeap 19942->19943 19942->19944 19943->19944 19944->19917 19946 1efefae4e90 19945->19946 19947 1efefae1eea 19946->19947 19948 1efefb28f58 _DllMainCRTStartup RtlFreeHeap 19946->19948 19947->19925 19947->19926 19949 1efefae4ecf _DllMainCRTStartup 19948->19949 19949->19947 19950 1efefb19428 free RtlFreeHeap 19949->19950 19950->19947 19953 1efefae463d _DllMainCRTStartup 19951->19953 19952 1efefae4893 19952->19937 19953->19952 19954 1efefb19468 malloc RtlFreeHeap 19953->19954 19955 1efefae46ae 19954->19955 19956 1efefb19468 malloc RtlFreeHeap 19955->19956 19957 1efefae46b8 19956->19957 19958 1efefb19468 malloc RtlFreeHeap 19957->19958 19959 1efefae46c3 19958->19959 19960 1efefae489f 19959->19960 19961 1efefae4897 19959->19961 19964 1efefae46e1 19959->19964 19962 1efefae48ac 19960->19962 19963 1efefb19428 free RtlFreeHeap 19960->19963 19965 1efefb19428 free RtlFreeHeap 19961->19965 19962->19952 19966 1efefb19428 free RtlFreeHeap 19962->19966 19963->19962 19967 1efefae18bc _DllMainCRTStartup RtlFreeHeap 19964->19967 19965->19960 19966->19952 19973 1efefae4723 _setmbcp _call_reportfault 19967->19973 19968 1efefb19428 free RtlFreeHeap 19969 1efefae4883 19968->19969 19970 1efefb19428 free RtlFreeHeap 19969->19970 19971 1efefae488b 19970->19971 19972 1efefb19428 free RtlFreeHeap 19971->19972 19972->19952 19977 1efefae4797 _setmbcp 19973->19977 19978 1efefae54f0 19973->19978 19975 1efefae47bf 19975->19975 19976 1efefae54f0 _DllMainCRTStartup RtlFreeHeap 19975->19976 19975->19977 19976->19977 19977->19968 19979 1efefae551c _DllMainCRTStartup 19978->19979 19980 1efefb19468 malloc RtlFreeHeap 19979->19980 19992 1efefae5639 19979->19992 19981 1efefae553f 19980->19981 19982 1efefb19468 malloc RtlFreeHeap 19981->19982 19983 1efefae554a 19982->19983 19984 1efefae5645 19983->19984 19985 1efefae563d 19983->19985 19990 1efefae555f 19983->19990 19987 1efefb19428 free RtlFreeHeap 19984->19987 19984->19992 19986 1efefb19428 free RtlFreeHeap 19985->19986 19986->19984 19987->19992 19988 1efefb19428 free RtlFreeHeap 19989 1efefae5631 19988->19989 19991 1efefb19428 free RtlFreeHeap 19989->19991 19990->19988 19991->19992 19992->19975 19994 1efefb18c5e 19993->19994 19995 1efefb18c70 19994->19995 19996 1efefb18da7 19994->19996 20000 1efefb18c88 19995->20000 20002 1efefb19428 free RtlFreeHeap 19995->20002 19997 1efefb18dbd 19996->19997 19998 1efefb19428 free RtlFreeHeap 19996->19998 19999 1efefb18dd3 19997->19999 20001 1efefb19428 free RtlFreeHeap 19997->20001 19998->19997 19999->19604 20000->19604 20001->19999 20002->20000 20021 1efefafb828 20003->20021 20005 1efefaef52f 20006 1efefb19700 _snprintf RtlFreeHeap 20005->20006 20007 1efefaef550 _DllMainCRTStartup 20006->20007 20025 1efefafabbc 20007->20025 20010 1efefaef5fe 20012 1efefb19700 _snprintf RtlFreeHeap 20010->20012 20011 1efefaef5db 20013 1efefb19700 _snprintf RtlFreeHeap 20011->20013 20014 1efefaef5fc _DllMainCRTStartup 20012->20014 20013->20014 20014->20014 20031 1efefafb808 20014->20031 20018 1efefaef70b 20018->19608 20019 1efefaef707 _DllMainCRTStartup 20019->20018 20038 1efefafb940 20019->20038 20022 1efefafb852 20021->20022 20023 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20022->20023 20024 1efefafb875 _DllMainCRTStartup 20023->20024 20024->20005 20030 1efefafac38 _DllMainCRTStartup 20025->20030 20026 1efefaef5a0 20026->20010 20026->20011 20027 1efefafb752 20027->20026 20027->20027 20028 1efefb19700 _snprintf RtlFreeHeap 20027->20028 20028->20026 20029 1efefb19700 RtlFreeHeap _snprintf 20029->20030 20030->20026 20030->20027 20030->20029 20032 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20031->20032 20033 1efefaef6fd 20032->20033 20034 1efefaf0038 20033->20034 20035 1efefaf0072 20034->20035 20036 1efefb199cc _DllMainCRTStartup RtlFreeHeap 20035->20036 20037 1efefaf0076 20035->20037 20036->20037 20037->20019 20039 1efefb19468 malloc RtlFreeHeap 20038->20039 20044 1efefafb9af _DllMainCRTStartup 20039->20044 20040 1efefafb9bc 20040->20018 20041 1efefafbdcb 20042 1efefb19428 free RtlFreeHeap 20041->20042 20042->20040 20043 1efefb19428 free RtlFreeHeap 20043->20044 20044->20040 20044->20041 20044->20043 20045 1efefafba7f 20044->20045 20046 1efefb19428 free RtlFreeHeap 20045->20046 20046->20040 20049 1efefae19b8 _DllMainCRTStartup 20047->20049 20048 1efefae19d7 20048->19617 20049->20048 20050 1efefb19468 malloc RtlFreeHeap 20049->20050 20051 1efefae1a07 20050->20051 20051->20048 20061 1efefae4300 20051->20061 20053 1efefae1a52 20054 1efefb19428 free RtlFreeHeap 20053->20054 20054->20048 20055 1efefae1a24 _DllMainCRTStartup 20055->20053 20073 1efefae4170 20055->20073 20058 1efefaef262 20057->20058 20090 1efefaed090 20058->20090 20063 1efefae432f _DllMainCRTStartup 20061->20063 20062 1efefae4352 20062->20055 20063->20062 20064 1efefb19468 malloc RtlFreeHeap 20063->20064 20065 1efefae4368 20064->20065 20065->20062 20066 1efefb19468 malloc RtlFreeHeap 20065->20066 20067 1efefae4381 20066->20067 20068 1efefae438d 20067->20068 20069 1efefae18bc _DllMainCRTStartup RtlFreeHeap 20067->20069 20071 1efefae43c3 _setmbcp _DllMainCRTStartup 20067->20071 20070 1efefb19428 free RtlFreeHeap 20068->20070 20069->20071 20070->20062 20071->20068 20072 1efefb19428 free RtlFreeHeap 20071->20072 20072->20068 20074 1efefae419d _DllMainCRTStartup 20073->20074 20075 1efefae42c4 20074->20075 20076 1efefb19468 malloc RtlFreeHeap 20074->20076 20075->20053 20077 1efefae41c2 20076->20077 20078 1efefb19468 malloc RtlFreeHeap 20077->20078 20079 1efefae41cd 20078->20079 20080 1efefae42d0 20079->20080 20081 1efefae42c8 20079->20081 20089 1efefae41e2 20079->20089 20080->20075 20083 1efefb19428 free RtlFreeHeap 20080->20083 20082 1efefb19428 free RtlFreeHeap 20081->20082 20082->20080 20083->20075 20084 1efefb19428 free RtlFreeHeap 20085 1efefae42b4 20084->20085 20086 1efefb19428 free RtlFreeHeap 20085->20086 20087 1efefae42bc 20086->20087 20088 1efefb19428 free RtlFreeHeap 20087->20088 20088->20075 20089->20084 20091 1efefaed0ac _DllMainCRTStartup 20090->20091 20092 1efefaed0ef 20091->20092 20093 1efefaed0da 20091->20093 20104 1efefaed10c 20092->20104 20097 1efefaef128 20093->20097 20096 1efefaed0ed 20096->19625 20098 1efefaef144 _DllMainCRTStartup 20097->20098 20099 1efefaef14a 20098->20099 20100 1efefaef15f 20098->20100 20111 1efefaeefdc 20099->20111 20102 1efefaed10c _DllMainCRTStartup RtlFreeHeap 20100->20102 20103 1efefaef15d 20102->20103 20103->20096 20127 1efefaef180 20104->20127 20107 1efefaed14f 20107->20096 20108 1efefaed175 20110 1efefb19428 free RtlFreeHeap 20108->20110 20110->20107 20112 1efefaeeff8 _DllMainCRTStartup 20111->20112 20121 1efefaed2bc 20112->20121 20114 1efefaef016 _DllMainCRTStartup 20115 1efefaed10c _DllMainCRTStartup RtlFreeHeap 20114->20115 20116 1efefaef0ab 20115->20116 20124 1efefaed280 20116->20124 20118 1efefaef122 20118->20103 20119 1efefaef0b5 20119->20118 20120 1efefaed10c _DllMainCRTStartup RtlFreeHeap 20119->20120 20120->20119 20122 1efefb19468 malloc RtlFreeHeap 20121->20122 20123 1efefaed2d6 _DllMainCRTStartup 20122->20123 20123->20114 20125 1efefb19428 free RtlFreeHeap 20124->20125 20126 1efefaed2b6 20125->20126 20126->20119 20128 1efefb19468 malloc RtlFreeHeap 20127->20128 20130 1efefaef1a8 _DllMainCRTStartup 20128->20130 20129 1efefaed143 20129->20107 20129->20108 20135 1efefaeff10 20129->20135 20130->20129 20131 1efefaef217 20130->20131 20132 1efefaef230 20130->20132 20133 1efefb19428 free RtlFreeHeap 20131->20133 20145 1efefb16bd8 20132->20145 20133->20129 20136 1efefaeff3c 20135->20136 20137 1efefaeff73 20135->20137 20139 1efefb19468 malloc RtlFreeHeap 20136->20139 20138 1efefaeff84 20137->20138 20141 1efefaeffb1 20137->20141 20143 1efefaefbec _DllMainCRTStartup RtlFreeHeap 20137->20143 20138->20108 20140 1efefaeff46 20139->20140 20142 1efefb18aec _DllMainCRTStartup RtlFreeHeap 20140->20142 20141->20138 20144 1efefaefbec _DllMainCRTStartup RtlFreeHeap 20141->20144 20142->20137 20143->20141 20144->20138 20148 1efefb16c00 _DllMainCRTStartup 20145->20148 20146 1efefae198c _DllMainCRTStartup RtlFreeHeap 20147 1efefb16d2a 20146->20147 20147->20129 20148->20146 20150 1efefafc019 20149->20150 20151 1efefafbe19 20149->20151 20154 1efefafc024 20150->20154 20155 1efefafc111 20150->20155 20152 1efefafc5f1 20151->20152 20153 1efefafbe24 20151->20153 20618 1efefaf2f10 20152->20618 20159 1efefafbf37 20153->20159 20160 1efefafbe2f 20153->20160 20161 1efefafc7cb 20154->20161 20162 1efefafc02f 20154->20162 20156 1efefafc18b 20155->20156 20157 1efefafc118 20155->20157 20171 1efefafc196 20156->20171 20172 1efefafc8c9 20156->20172 20164 1efefafbe99 _DllMainCRTStartup 20157->20164 20178 1efefafc12e 20157->20178 20179 1efefafc7de 20157->20179 20165 1efefafbf3e 20159->20165 20166 1efefafbfb1 20159->20166 20167 1efefafbe3a 20160->20167 20168 1efefafc407 20160->20168 20731 1efefaf9038 20161->20731 20169 1efefafc0a9 20162->20169 20170 1efefafc036 20162->20170 20164->19630 20180 1efefafbf49 20165->20180 20181 1efefafc4fd 20165->20181 20175 1efefafbfbc 20166->20175 20176 1efefafc519 20166->20176 20185 1efefafbe45 20167->20185 20186 1efefafbecf 20167->20186 20479 1efefb182cc 20168->20479 20182 1efefafc706 20169->20182 20183 1efefafc0b4 20169->20183 20187 1efefafc6e7 20170->20187 20188 1efefafc041 20170->20188 20173 1efefafc8df 20171->20173 20174 1efefafc1a1 20171->20174 20764 1efefaf3f60 20172->20764 20193 1efefaf3f60 _DllMainCRTStartup RtlFreeHeap 20173->20193 20189 1efefafc1ac 20174->20189 20190 1efefafc8f8 20174->20190 20201 1efefafbfc7 20175->20201 20202 1efefafc539 20175->20202 20566 1efefaf3ae0 20176->20566 20203 1efefafc7f1 20178->20203 20204 1efefafc139 20178->20204 20738 1efefaec7a8 20179->20738 20194 1efefafc430 20180->20194 20195 1efefafbf54 20180->20195 20197 1efefaf3870 _DllMainCRTStartup RtlFreeHeap 20181->20197 20196 1efefaf3c08 _DllMainCRTStartup RtlFreeHeap 20182->20196 20198 1efefafc722 20183->20198 20199 1efefafc0bf 20183->20199 20185->20164 20213 1efefafbe9e 20185->20213 20214 1efefafbe57 20185->20214 20186->20164 20218 1efefafc33e 20186->20218 20219 1efefafbee5 20186->20219 20664 1efefaf3c08 20187->20664 20205 1efefafc04c 20188->20205 20206 1efefafc60b 20188->20206 20220 1efefafc1b7 20189->20220 20221 1efefafc90e 20189->20221 20782 1efefaf4104 20190->20782 20193->20164 20504 1efefafcad8 20194->20504 20222 1efefafc44a 20195->20222 20223 1efefafbf5f 20195->20223 20196->20164 20197->20164 20671 1efefaf0d38 20198->20671 20211 1efefafc0ca 20199->20211 20212 1efefafc735 20199->20212 20201->20164 20249 1efefafbfdd 20201->20249 20250 1efefafc56e 20201->20250 20215 1efefaf3ae0 _DllMainCRTStartup RtlFreeHeap 20202->20215 20745 1efefaec958 20203->20745 20216 1efefafc804 20204->20216 20217 1efefafc144 20204->20217 20207 1efefafc057 20205->20207 20208 1efefafc61e 20205->20208 20626 1efefaf2e94 20206->20626 20227 1efefafc636 20207->20227 20228 1efefafc062 20207->20228 20639 1efefaf0eb0 20208->20639 20229 1efefafc748 20211->20229 20230 1efefafc0d5 20211->20230 20674 1efefaf2dd8 20212->20674 20236 1efefafc28b 20213->20236 20237 1efefafbea9 20213->20237 20233 1efefafbe62 20214->20233 20234 1efefafc271 20214->20234 20215->20164 20750 1efefaec8b8 20216->20750 20238 1efefafc815 20217->20238 20239 1efefafc14f 20217->20239 20446 1efefaf8b54 20218->20446 20240 1efefafc358 20219->20240 20241 1efefafbef0 20219->20241 20242 1efefafc921 20220->20242 20243 1efefafc1c2 20220->20243 20231 1efefaf4104 _DllMainCRTStartup RtlFreeHeap 20221->20231 20519 1efefafca28 20222->20519 20244 1efefafbf6a 20223->20244 20245 1efefafc46c 20223->20245 20643 1efefb18f98 20227->20643 20251 1efefafc06d 20228->20251 20252 1efefafc649 20228->20252 20681 1efefaf3334 20229->20681 20253 1efefafc75b 20230->20253 20254 1efefafc0e0 20230->20254 20231->20164 20255 1efefafc1f3 20233->20255 20334 1efefafbe6d 20233->20334 20371 1efefaf1080 20234->20371 20390 1efefaf2854 20236->20390 20260 1efefafc2a5 20237->20260 20261 1efefafbeb4 20237->20261 20757 1efefaf757c 20238->20757 20262 1efefafc82f 20239->20262 20263 1efefafc15a 20239->20263 20450 1efefaf3b70 20240->20450 20264 1efefafbefb 20241->20264 20265 1efefafc378 20241->20265 20788 1efefaed654 20242->20788 20266 1efefafc1cd 20243->20266 20267 1efefafc931 20243->20267 20268 1efefafc47f 20244->20268 20293 1efefafbf75 20244->20293 20523 1efefafa30c 20245->20523 20272 1efefafbfe8 20249->20272 20273 1efefafc588 20249->20273 20570 1efefb1817c 20250->20570 20276 1efefafc078 20251->20276 20277 1efefafc65c 20251->20277 20647 1efefaf14f8 20252->20647 20688 1efefafa810 20253->20688 20278 1efefafc0eb 20254->20278 20279 1efefafc76e 20254->20279 20353 1efefaf3870 20255->20353 20430 1efefaf089c 20260->20430 20282 1efefafc2b8 20261->20282 20283 1efefafbebf 20261->20283 20294 1efefaf3c08 _DllMainCRTStartup RtlFreeHeap 20262->20294 20286 1efefafc165 20263->20286 20287 1efefafc84b 20263->20287 20288 1efefafbf06 20264->20288 20289 1efefafc395 20264->20289 20454 1efefaf2ae4 20265->20454 20290 1efefafc1d8 20266->20290 20291 1efefafc949 20266->20291 20280 1efefaf5c14 _DllMainCRTStartup RtlFreeHeap 20267->20280 20529 1efefaf0a44 20268->20529 20272->20164 20312 1efefafbffe 20272->20312 20313 1efefafc5b1 20272->20313 20577 1efefaf8ea8 20273->20577 20299 1efefafc083 20276->20299 20300 1efefafc66d 20276->20300 20651 1efefaf141c 20277->20651 20301 1efefafc781 20278->20301 20302 1efefafc0f6 20278->20302 20692 1efefaf0bc0 20279->20692 20280->20164 20434 1efefb171ac 20282->20434 20283->20164 20438 1efefaf868c 20283->20438 20305 1efefafc864 20286->20305 20306 1efefafc170 20286->20306 20310 1efefaf3c08 _DllMainCRTStartup RtlFreeHeap 20287->20310 20288->20164 20337 1efefafbf27 20288->20337 20338 1efefafc3e3 20288->20338 20458 1efefaf6780 20289->20458 20290->20164 20442 1efefaf8934 20290->20442 20291->20164 20303 1efefaf8ea8 _DllMainCRTStartup RtlFreeHeap 20291->20303 20293->20164 20308 1efefafbf8b 20293->20308 20309 1efefafc4aa 20293->20309 20294->20164 20315 1efefafc08e 20299->20315 20316 1efefafc69d 20299->20316 20329 1efefaf5c14 _DllMainCRTStartup RtlFreeHeap 20300->20329 20700 1efefaf15d8 20301->20700 20318 1efefafc79b 20302->20318 20319 1efefafc101 20302->20319 20303->20164 20326 1efefaf3870 _DllMainCRTStartup RtlFreeHeap 20305->20326 20321 1efefafc880 20306->20321 20322 1efefafc17b 20306->20322 20324 1efefafc4c3 20308->20324 20325 1efefafbf96 20308->20325 20548 1efefaf5c14 20309->20548 20310->20164 20327 1efefafc5c4 20312->20327 20328 1efefafc009 20312->20328 20584 1efefaf0dc4 20313->20584 20332 1efefafc099 20315->20332 20333 1efefafc6b7 20315->20333 20342 1efefaf1080 _DllMainCRTStartup RtlFreeHeap 20316->20342 20713 1efefaf06d4 20318->20713 20319->20164 20727 1efefafa288 20319->20727 20341 1efefaf3870 _DllMainCRTStartup RtlFreeHeap 20321->20341 20322->20164 20348 1efefaf3b70 _DllMainCRTStartup RtlFreeHeap 20322->20348 20555 1efefaf5dac 20324->20555 20339 1efefafc4d4 20325->20339 20340 1efefafbfa1 20325->20340 20326->20164 20588 1efefaf2fb8 20327->20588 20328->20164 20610 1efefaf32e4 20328->20610 20329->20164 20332->20164 20350 1efefb171ac _DllMainCRTStartup RtlFreeHeap 20332->20350 20661 1efefaf6fb0 20333->20661 20334->20164 20359 1efefaf39a0 20334->20359 20337->20164 20475 1efefb1826c 20337->20475 20462 1efefb180bc 20338->20462 20562 1efefaf5b98 20339->20562 20340->20164 20351 1efefaf39a0 _DllMainCRTStartup RtlFreeHeap 20340->20351 20341->20164 20342->20164 20348->20164 20350->20164 20351->20164 20354 1efefaf3897 _DllMainCRTStartup 20353->20354 20795 1efefb172a0 20354->20795 20358 1efefaf3926 _DllMainCRTStartup 20358->20164 20360 1efefaf39d5 _DllMainCRTStartup 20359->20360 20361 1efefaf3a2c _DllMainCRTStartup 20360->20361 20362 1efefaf3a10 20360->20362 20364 1efefaf3a44 20361->20364 20367 1efefaf3a59 _DllMainCRTStartup 20361->20367 20363 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20362->20363 20365 1efefaf3a27 20363->20365 20366 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20364->20366 20365->20164 20366->20365 20368 1efefaf3a7f _DllMainCRTStartup 20367->20368 20369 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20367->20369 20368->20365 20370 1efefaf4708 _DllMainCRTStartup RtlFreeHeap 20368->20370 20369->20368 20370->20365 20372 1efefb19468 malloc RtlFreeHeap 20371->20372 20373 1efefaf109c _DllMainCRTStartup 20372->20373 20374 1efefaf10db 20373->20374 20375 1efefaf10ea 20373->20375 20379 1efefaf10a9 20373->20379 20376 1efefb19428 free RtlFreeHeap 20374->20376 20921 1efefb1a1e8 20375->20921 20376->20379 20378 1efefaf10f9 20380 1efefaf110e 20378->20380 20383 1efefaf112c _DllMainCRTStartup 20378->20383 20379->20164 20381 1efefb19428 free RtlFreeHeap 20380->20381 20382 1efefaf1118 20381->20382 20384 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20382->20384 20936 1efefb1a384 20383->20936 20384->20379 20386 1efefaf1161 20943 1efefb1a0a8 20386->20943 20388 1efefaf116b 20389 1efefb19428 free RtlFreeHeap 20388->20389 20389->20379 20391 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20390->20391 20392 1efefaf287c _DllMainCRTStartup 20391->20392 20393 1efefb1a1e8 _DllMainCRTStartup RtlFreeHeap 20392->20393 20394 1efefaf28e9 20393->20394 20395 1efefaf28fe 20394->20395 20396 1efefaf291c 20394->20396 21095 1efefaef430 20395->21095 21098 1efefb1aa64 20396->21098 20400 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20402 1efefaf2917 20400->20402 20401 1efefaf292e 21105 1efefb1aad8 20401->21105 20402->20164 20404 1efefaf2938 20405 1efefb1aa64 fseek RtlFreeHeap 20404->20405 20406 1efefaf294c 20405->20406 20407 1efefaf2960 20406->20407 20408 1efefaf2988 20406->20408 20409 1efefaef430 _DllMainCRTStartup RtlFreeHeap 20407->20409 20413 1efefaf29b5 20408->20413 20415 1efefaf29dd 20408->20415 20410 1efefaf296f 20409->20410 20411 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20410->20411 20412 1efefaf2979 20411->20412 20414 1efefb1a0a8 fclose RtlFreeHeap 20412->20414 20416 1efefaef430 _DllMainCRTStartup RtlFreeHeap 20413->20416 20414->20402 20417 1efefb19468 malloc RtlFreeHeap 20415->20417 20418 1efefaf29c4 20416->20418 20419 1efefaf29e7 20417->20419 20420 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20418->20420 20421 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 20419->20421 20422 1efefaf29ce 20420->20422 20424 1efefaf2a4c _DllMainCRTStartup 20421->20424 20423 1efefb1a0a8 fclose RtlFreeHeap 20422->20423 20423->20402 20425 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20424->20425 20426 1efefaf2ab7 20425->20426 20427 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20426->20427 20428 1efefaf2ac1 20427->20428 20428->20402 21111 1efefaf2c54 20428->21111 20431 1efefaf08e2 20430->20431 20432 1efefafa870 _DllMainCRTStartup RtlFreeHeap 20431->20432 20433 1efefaf0928 _DllMainCRTStartup 20431->20433 20432->20433 20433->20164 20435 1efefb171ca 20434->20435 20436 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20435->20436 20437 1efefb171de _DllMainCRTStartup 20435->20437 20436->20437 20437->20164 20440 1efefaf8723 _DllMainCRTStartup 20438->20440 20439 1efefaf87d5 20439->20164 20440->20439 21196 1efefaf8558 20440->21196 20443 1efefaf89c2 _DllMainCRTStartup 20442->20443 20445 1efefaf8a74 20443->20445 21202 1efefaf8598 20443->21202 20445->20164 20448 1efefaf8b88 _DllMainCRTStartup 20446->20448 20447 1efefaf8bbc 20447->20164 20448->20447 20449 1efefaf8470 _DllMainCRTStartup RtlFreeHeap 20448->20449 20449->20447 20451 1efefaf3bc0 20450->20451 20452 1efefaf3870 _DllMainCRTStartup RtlFreeHeap 20451->20452 20453 1efefaf3bde 20452->20453 20453->20164 20456 1efefaf2b11 20454->20456 20455 1efefaf2b54 20455->20164 20456->20455 20457 1efefb1a0a8 fclose RtlFreeHeap 20456->20457 20457->20456 20459 1efefaf67d7 _DllMainCRTStartup 20458->20459 20461 1efefaf67ea _DllMainCRTStartup 20458->20461 20460 1efefb19468 malloc RtlFreeHeap 20459->20460 20460->20461 20461->20164 20463 1efefb180d4 20462->20463 20464 1efefb1810a 20463->20464 20465 1efefb180ee 20463->20465 20467 1efefb18143 20464->20467 20468 1efefb18127 20464->20468 21205 1efefb187fc 20465->21205 20470 1efefb1816a 20467->20470 20471 1efefb1814d _wcsupr_s 20467->20471 20469 1efefb187fc _DllMainCRTStartup RtlFreeHeap 20468->20469 20473 1efefb180fd _wcsupr_s 20469->20473 21213 1efefaef410 20470->21213 20474 1efefb187fc _DllMainCRTStartup RtlFreeHeap 20471->20474 20473->20164 20474->20473 20476 1efefb1827c 20475->20476 20477 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20476->20477 20478 1efefb182b0 20476->20478 20477->20478 20478->20164 20480 1efefb18305 20479->20480 20481 1efefb18390 20480->20481 20482 1efefb18374 20480->20482 20503 1efefb1830f 20480->20503 20483 1efefb18397 20481->20483 20484 1efefb183ce 20481->20484 20485 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20482->20485 20486 1efefb183cc 20483->20486 20488 1efefb183b0 20483->20488 20484->20486 20487 1efefb183e6 20484->20487 20485->20503 20489 1efefb1826c _DllMainCRTStartup RtlFreeHeap 20486->20489 20492 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20487->20492 20491 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20488->20491 20490 1efefb18407 20489->20490 20493 1efefb18432 20490->20493 20494 1efefb18416 20490->20494 20491->20503 20492->20503 20496 1efefb1847f 20493->20496 20497 1efefb18463 20493->20497 20495 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20494->20495 20495->20503 20498 1efefb18490 20496->20498 20499 1efefb184ac 20496->20499 20500 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20497->20500 20501 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20498->20501 20502 1efefb188c4 _DllMainCRTStartup RtlFreeHeap 20499->20502 20500->20503 20501->20503 20502->20503 20503->20164 20505 1efefafcb45 _DllMainCRTStartup 20504->20505 20506 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 20505->20506 20507 1efefafcb65 _DllMainCRTStartup 20506->20507 20508 1efefafcc01 20507->20508 20509 1efefafcbf2 20507->20509 20512 1efefafcc22 20508->20512 20516 1efefafcc3c _DllMainCRTStartup 20508->20516 20510 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20509->20510 20511 1efefafcbfc 20510->20511 20511->20164 20513 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20512->20513 20513->20511 20515 1efefaed338 RtlFreeHeap _DllMainCRTStartup 20515->20516 20516->20515 20517 1efefafcd97 _DllMainCRTStartup 20516->20517 21220 1efefafce70 20516->21220 20518 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20517->20518 20518->20511 20520 1efefafca6d _DllMainCRTStartup 20519->20520 20521 1efefafcaab 20520->20521 20522 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20520->20522 20521->20164 20522->20521 20524 1efefafa325 20523->20524 20525 1efefafa331 20523->20525 20526 1efefb19428 free RtlFreeHeap 20524->20526 20527 1efefb19468 malloc RtlFreeHeap 20525->20527 20526->20525 20528 1efefafa341 20527->20528 20528->20164 20530 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20529->20530 20531 1efefaf0a63 _DllMainCRTStartup 20530->20531 20532 1efefaf0aeb 20531->20532 20533 1efefaf0afa _DllMainCRTStartup 20531->20533 20534 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20532->20534 20535 1efefaf0b13 20533->20535 20536 1efefaf0b22 _DllMainCRTStartup 20533->20536 20547 1efefaf0af5 _DllMainCRTStartup 20534->20547 20537 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20535->20537 20538 1efefaf0b3b 20536->20538 20539 1efefaf0b47 _DllMainCRTStartup 20536->20539 20537->20547 20540 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20538->20540 20541 1efefaf0b6c _wcsupr_s 20539->20541 20542 1efefaf0b60 20539->20542 20540->20547 21224 1efefaf25a8 20541->21224 20543 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20542->20543 20543->20547 20545 1efefaf0b9c _wcsupr_s 20546 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20545->20546 20546->20547 20547->20164 20549 1efefaf5c84 _wcsupr_s _DllMainCRTStartup 20548->20549 20550 1efefaf5ccd 20549->20550 20551 1efefaf5d90 20549->20551 20553 1efefaf5d42 _DllMainCRTStartup 20549->20553 20550->20164 20551->20550 20552 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20551->20552 20552->20550 21255 1efefaf5f88 20553->21255 20556 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 20555->20556 20557 1efefaf5dd0 20556->20557 20559 1efefaf5e18 _DllMainCRTStartup 20557->20559 21258 1efefaed338 20557->21258 20560 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20559->20560 20561 1efefaf5e4d 20560->20561 20561->20164 20563 1efefaf5bc5 _DllMainCRTStartup 20562->20563 21267 1efefaf630c 20563->21267 20567 1efefaf3b30 20566->20567 20568 1efefaf39a0 _DllMainCRTStartup RtlFreeHeap 20567->20568 20569 1efefaf3b48 20568->20569 20569->20164 20571 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20570->20571 20572 1efefb18198 _DllMainCRTStartup 20571->20572 20573 1efefb18206 20572->20573 21271 1efefb185f0 20572->21271 20573->20164 20576 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20576->20573 20578 1efefaf8ede _DllMainCRTStartup 20577->20578 20579 1efefaf8efb 20578->20579 20580 1efefaf8f58 20578->20580 20581 1efefaf8f23 _DllMainCRTStartup 20578->20581 20579->20164 20582 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20580->20582 20583 1efefaf8470 _DllMainCRTStartup RtlFreeHeap 20581->20583 20582->20579 20583->20579 20586 1efefaf0de0 _DllMainCRTStartup 20584->20586 20585 1efefaef410 _DllMainCRTStartup RtlFreeHeap 20587 1efefaf0e70 20585->20587 20586->20585 20586->20587 20587->20164 20589 1efefb19468 malloc RtlFreeHeap 20588->20589 20590 1efefaf2fec _DllMainCRTStartup 20589->20590 20591 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 20590->20591 20594 1efefaf3057 _openfile _DllMainCRTStartup 20591->20594 20592 1efefaf30af 20593 1efefaed338 _DllMainCRTStartup RtlFreeHeap 20592->20593 20595 1efefaf30c8 20593->20595 20594->20592 21284 1efefb1a414 20594->21284 20597 1efefaf30e8 20595->20597 20598 1efefaf3152 20595->20598 21291 1efefaef458 20597->21291 20599 1efefaf315c 20598->20599 20600 1efefb19428 free RtlFreeHeap 20598->20600 20602 1efefaed338 RtlFreeHeap _DllMainCRTStartup 20599->20602 20608 1efefaf328d _DllMainCRTStartup 20599->20608 20600->20599 20602->20599 20603 1efefaf3100 _DllMainCRTStartup 20604 1efefb19428 free RtlFreeHeap 20603->20604 20605 1efefaf313e 20604->20605 20606 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20605->20606 20607 1efefaf314b 20606->20607 20607->20164 20609 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20608->20609 20609->20607 20611 1efefaf3305 _DllMainCRTStartup 20610->20611 21294 1efefaf8430 20611->21294 20613 1efefaf3314 21297 1efefb1af00 20613->21297 20616 1efefb19428 free RtlFreeHeap 20617 1efefaf332d 20616->20617 20617->20164 20619 1efefaf2f36 _DllMainCRTStartup 20618->20619 20620 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 20619->20620 20621 1efefaf2f45 _DllMainCRTStartup 20620->20621 20622 1efefaed338 _DllMainCRTStartup RtlFreeHeap 20621->20622 20623 1efefaf2f7b _DllMainCRTStartup 20622->20623 20624 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20623->20624 20625 1efefaf2fb3 20624->20625 20625->20164 20627 1efefaf2eb5 _DllMainCRTStartup 20626->20627 20628 1efefaf8430 _DllMainCRTStartup RtlFreeHeap 20627->20628 20629 1efefaf2ec4 _DllMainCRTStartup 20628->20629 20630 1efefaf2ed7 20629->20630 20631 1efefaf2ef4 20629->20631 21323 1efefafcecc 20630->21323 21334 1efefb1ae28 20631->21334 20635 1efefaf2ef2 20637 1efefb19428 free RtlFreeHeap 20635->20637 20638 1efefaf2f08 20637->20638 20638->20164 20640 1efefaf0ece _wcsupr_s _DllMainCRTStartup 20639->20640 20640->20164 20641 1efefaef458 _DllMainCRTStartup RtlFreeHeap 20640->20641 20642 1efefaf0f59 20640->20642 20641->20642 20642->20164 20644 1efefb18fb9 _DllMainCRTStartup 20643->20644 21371 1efefb190d4 20644->21371 20648 1efefaf151c 20647->20648 20649 1efefaf1517 20647->20649 20648->20649 20650 1efefb17f5c _DllMainCRTStartup RtlFreeHeap 20648->20650 20649->20164 20650->20649 20652 1efefaf1432 20651->20652 20653 1efefaf14e3 20652->20653 20654 1efefaf1452 20652->20654 20655 1efefaef410 _DllMainCRTStartup RtlFreeHeap 20653->20655 20656 1efefaf1477 20654->20656 20657 1efefaf1463 20654->20657 20660 1efefaf1475 20655->20660 20658 1efefb188c4 _DllMainCRTStartup RtlFreeHeap 20656->20658 20659 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20657->20659 20658->20660 20659->20660 20660->20164 21400 1efefaf7278 20661->21400 20665 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20664->20665 20666 1efefaf3c2c _DllMainCRTStartup 20665->20666 21420 1efefaf3d98 20666->21420 20668 1efefaf3d81 20669 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20668->20669 20670 1efefaf3d8e 20669->20670 20670->20164 21433 1efefb28b48 20671->21433 20673 1efefaf0d4f 20673->20164 20675 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20674->20675 20677 1efefaf2def _DllMainCRTStartup 20675->20677 20676 1efefaf2e83 20678 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20676->20678 20677->20676 20680 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20677->20680 20679 1efefaf2e8d 20678->20679 20679->20164 20680->20676 20682 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20681->20682 20684 1efefaf334b _DllMainCRTStartup 20682->20684 20683 1efefaf33dc 20685 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20683->20685 20684->20683 20687 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20684->20687 20686 1efefaf33e6 20685->20686 20686->20164 20687->20683 20690 1efefafa831 _DllMainCRTStartup 20688->20690 20689 1efefafa84a 20689->20164 20690->20689 20691 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20690->20691 20691->20689 20693 1efefaf0c1e 20692->20693 20694 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20693->20694 20695 1efefaf0c61 _DllMainCRTStartup 20694->20695 20695->20695 20696 1efefafa618 _DllMainCRTStartup RtlFreeHeap 20695->20696 20697 1efefaf0d18 20696->20697 20698 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20697->20698 20699 1efefaf0d22 _DllMainCRTStartup 20698->20699 20699->20164 20701 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 20700->20701 20702 1efefaf15f9 20701->20702 20703 1efefaf1603 _wcsupr_s 20702->20703 20705 1efefaf1629 20702->20705 21632 1efefaf17a8 20703->21632 20706 1efefaf166b 20705->20706 20707 1efefaf1646 20705->20707 20709 1efefaef410 _DllMainCRTStartup RtlFreeHeap 20706->20709 20708 1efefaf17a8 _DllMainCRTStartup RtlFreeHeap 20707->20708 20711 1efefaf1622 _wcsupr_s _DllMainCRTStartup 20708->20711 20709->20711 20710 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20712 1efefaf16b5 20710->20712 20711->20710 20712->20164 20714 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20713->20714 20715 1efefaf06ee _DllMainCRTStartup 20714->20715 20716 1efefb1a414 _DllMainCRTStartup RtlFreeHeap 20715->20716 20717 1efefaf07c5 20716->20717 20718 1efefb1a414 _DllMainCRTStartup RtlFreeHeap 20717->20718 20719 1efefaf07df 20718->20719 20720 1efefaf0846 20719->20720 20722 1efefaf07ec _DllMainCRTStartup 20719->20722 20721 1efefaf117c _DllMainCRTStartup RtlFreeHeap 20720->20721 20726 1efefaf083a _DllMainCRTStartup 20721->20726 21636 1efefaf117c 20722->21636 20723 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20725 1efefaf0894 20723->20725 20725->20164 20726->20723 20728 1efefafa29f 20727->20728 20729 1efefafa2a1 _DllMainCRTStartup 20727->20729 20728->20164 20729->20729 20730 1efefb190d4 _DllMainCRTStartup RtlFreeHeap 20729->20730 20730->20728 20732 1efefaf9069 _DllMainCRTStartup 20731->20732 20733 1efefaf90ce 20732->20733 20734 1efefaf9099 _DllMainCRTStartup 20732->20734 20735 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20733->20735 20737 1efefaf8470 _DllMainCRTStartup RtlFreeHeap 20734->20737 20736 1efefaf90cc 20735->20736 20736->20164 20737->20736 20739 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20738->20739 20740 1efefaec7bf _DllMainCRTStartup 20739->20740 21645 1efefaeca54 20740->21645 20742 1efefaec85d _DllMainCRTStartup 20743 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20742->20743 20744 1efefaec8b1 20743->20744 20744->20164 20746 1efefb19468 malloc RtlFreeHeap 20745->20746 20749 1efefaec97c _DllMainCRTStartup 20746->20749 20747 1efefb19428 free RtlFreeHeap 20748 1efefaeca4b 20747->20748 20748->20164 20749->20747 20751 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 20750->20751 20752 1efefaec8dc 20751->20752 20753 1efefaed338 _DllMainCRTStartup RtlFreeHeap 20752->20753 20754 1efefaec920 _DllMainCRTStartup 20752->20754 20753->20752 20755 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20754->20755 20756 1efefaec952 20755->20756 20756->20164 20758 1efefaf75a2 _DllMainCRTStartup 20757->20758 20759 1efefaf763e _DllMainCRTStartup 20758->20759 20760 1efefaf762a 20758->20760 20761 1efefaf6c54 _DllMainCRTStartup RtlFreeHeap 20759->20761 20762 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20760->20762 20763 1efefaf763c 20761->20763 20762->20763 20763->20164 20765 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 20764->20765 20766 1efefaf3f7f _DllMainCRTStartup 20765->20766 20767 1efefaf3ff3 20766->20767 20769 1efefaf4002 _DllMainCRTStartup 20766->20769 20768 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20767->20768 20770 1efefaf3ffd _DllMainCRTStartup 20768->20770 20771 1efefaf401b 20769->20771 20772 1efefaf402a _DllMainCRTStartup 20769->20772 20770->20164 20773 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20771->20773 20774 1efefaf4043 20772->20774 20775 1efefaf4052 20772->20775 20773->20770 20777 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20774->20777 21649 1efefb17330 20775->21649 20777->20770 20778 1efefaf40e2 20779 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 20778->20779 20779->20770 20780 1efefaf407a _DllMainCRTStartup 20780->20778 20781 1efefaf4708 _DllMainCRTStartup RtlFreeHeap 20780->20781 20781->20778 20783 1efefaf4134 _DllMainCRTStartup 20782->20783 21654 1efefb1739c 20783->21654 20786 1efefaf4708 _DllMainCRTStartup RtlFreeHeap 20787 1efefaf4200 _DllMainCRTStartup 20786->20787 20787->20164 21659 1efefaee02c 20788->21659 20790 1efefaed681 20791 1efefaed685 _DllMainCRTStartup 20790->20791 21663 1efefaedc28 20790->21663 20791->20164 20794 1efefaf5154 _DllMainCRTStartup RtlFreeHeap 20794->20791 20813 1efefb17438 20795->20813 20797 1efefb172ca 20819 1efefafa870 20797->20819 20800 1efefaf4708 20802 1efefaf4750 _DllMainCRTStartup 20800->20802 20801 1efefaf4811 20804 1efefaf4863 20801->20804 20806 1efefaf482f 20801->20806 20802->20801 20853 1efefaf52b4 20802->20853 20805 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 20804->20805 20809 1efefaf4886 _DllMainCRTStartup 20805->20809 20860 1efefaf425c 20806->20860 20808 1efefaf485e 20808->20358 20810 1efefaf425c _DllMainCRTStartup RtlFreeHeap 20809->20810 20811 1efefaf491f 20810->20811 20812 1efefaed280 _DllMainCRTStartup RtlFreeHeap 20811->20812 20812->20808 20814 1efefb17484 20813->20814 20815 1efefb17465 20813->20815 20817 1efefb17594 _DllMainCRTStartup RtlFreeHeap 20814->20817 20822 1efefb17594 20815->20822 20818 1efefb1747f strstr 20817->20818 20818->20797 20834 1efefafa618 20819->20834 20823 1efefb1764e 20822->20823 20825 1efefb175c9 20822->20825 20824 1efefb176ab _DllMainCRTStartup 20823->20824 20829 1efefb1768c 20823->20829 20827 1efefb19700 _snprintf RtlFreeHeap 20824->20827 20826 1efefb17626 _DllMainCRTStartup 20825->20826 20830 1efefb17607 20825->20830 20828 1efefb19700 _snprintf RtlFreeHeap 20826->20828 20831 1efefb17624 _DllMainCRTStartup 20827->20831 20828->20831 20832 1efefb19700 _snprintf RtlFreeHeap 20829->20832 20833 1efefb19700 _snprintf RtlFreeHeap 20830->20833 20831->20818 20832->20831 20833->20831 20837 1efefafa378 20834->20837 20836 1efefaf3922 20836->20358 20836->20800 20838 1efefafa39e _DllMainCRTStartup 20837->20838 20839 1efefafa3a9 20838->20839 20843 1efefafa3bb _DllMainCRTStartup 20838->20843 20844 1efefaf2238 20839->20844 20841 1efefafa3b6 _DllMainCRTStartup 20841->20836 20842 1efefaf2238 _DllMainCRTStartup RtlFreeHeap 20842->20841 20843->20841 20843->20842 20845 1efefaf22e5 20844->20845 20846 1efefaf2255 _DllMainCRTStartup 20844->20846 20847 1efefaf1e58 _DllMainCRTStartup RtlFreeHeap 20845->20847 20852 1efefaf22ac 20845->20852 20846->20845 20848 1efefaf226b 20846->20848 20847->20852 20849 1efefaf1e58 _DllMainCRTStartup RtlFreeHeap 20848->20849 20850 1efefaf2295 20849->20850 20851 1efefaf1fc8 _DllMainCRTStartup RtlFreeHeap 20850->20851 20851->20852 20852->20841 20854 1efefaf52d1 _DllMainCRTStartup 20853->20854 20855 1efefaf530c 20854->20855 20856 1efefaf52eb 20854->20856 20874 1efefaf54e8 20855->20874 20870 1efefaf5330 20856->20870 20859 1efefaf530a 20859->20801 20861 1efefaf4294 20860->20861 20862 1efefaf427f 20860->20862 20864 1efefaf52b4 _DllMainCRTStartup RtlFreeHeap 20861->20864 20897 1efefaf51dc 20862->20897 20865 1efefaf428d 20864->20865 20866 1efefaf42b5 20865->20866 20904 1efefaf42f8 20865->20904 20866->20808 20869 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20869->20866 20872 1efefaf5371 _DllMainCRTStartup 20870->20872 20871 1efefaf53b7 20871->20859 20872->20871 20884 1efefaef2ec 20872->20884 20875 1efefaf5511 _DllMainCRTStartup 20874->20875 20876 1efefaf557d 20875->20876 20877 1efefaf555f 20875->20877 20879 1efefaf55d8 20876->20879 20881 1efefaf563a _DllMainCRTStartup 20876->20881 20883 1efefaf5576 20876->20883 20894 1efefaef310 20877->20894 20880 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20879->20880 20880->20883 20882 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20881->20882 20881->20883 20882->20883 20883->20859 20887 1efefaef33c 20884->20887 20888 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 20887->20888 20889 1efefaef361 _DllMainCRTStartup 20888->20889 20890 1efefaed090 _DllMainCRTStartup RtlFreeHeap 20889->20890 20891 1efefaef3fe 20890->20891 20895 1efefaef33c _DllMainCRTStartup RtlFreeHeap 20894->20895 20896 1efefaef336 20895->20896 20896->20883 20898 1efefaf51fd _DllMainCRTStartup 20897->20898 20899 1efefaf5264 20898->20899 20901 1efefaf5249 20898->20901 20908 1efefaf5154 20899->20908 20902 1efefaef310 _DllMainCRTStartup RtlFreeHeap 20901->20902 20903 1efefaf5260 20902->20903 20903->20865 20905 1efefaf431d _DllMainCRTStartup 20904->20905 20907 1efefaf42d0 20905->20907 20912 1efefaf4be4 20905->20912 20907->20866 20907->20869 20910 1efefaf516c _DllMainCRTStartup 20908->20910 20909 1efefaf5188 20909->20903 20910->20909 20911 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 20910->20911 20911->20909 20913 1efefaf4caf 20912->20913 20915 1efefaf4ccc 20913->20915 20916 1efefaf4adc 20913->20916 20915->20905 20922 1efefb1a110 20921->20922 20923 1efefb1a13f 20922->20923 20925 1efefb1a16a 20922->20925 20924 1efefb1b714 _errno RtlFreeHeap 20923->20924 20927 1efefb1a144 _invalid_parameter_noinfo _ioinit fread_s 20924->20927 20949 1efefb1fb9c 20925->20949 20927->20378 20928 1efefb1a16f 20929 1efefb1a189 20928->20929 20930 1efefb1a17c 20928->20930 20932 1efefb1a1b0 20929->20932 20933 1efefb1a18e 20929->20933 20931 1efefb1b714 _errno RtlFreeHeap 20930->20931 20931->20927 20957 1efefb1fcd0 20932->20957 20934 1efefb1b714 _errno RtlFreeHeap 20933->20934 20934->20927 20937 1efefb1a3ae 20936->20937 20942 1efefb1a3c4 _invalid_parameter_noinfo fread_s 20936->20942 20938 1efefb1a3bf 20937->20938 20939 1efefb1a3d1 fread_s 20937->20939 20937->20942 20940 1efefb1b714 _errno RtlFreeHeap 20938->20940 21014 1efefb1a1f4 20939->21014 20940->20942 20942->20386 20944 1efefb1a0c9 20943->20944 20946 1efefb1a0dd fread_s 20943->20946 20945 1efefb1b714 _errno RtlFreeHeap 20944->20945 20948 1efefb1a0ce _invalid_parameter_noinfo fread_s 20945->20948 20946->20948 21030 1efefb1a02c 20946->21030 20948->20388 20950 1efefb1d958 _lock RtlFreeHeap 20949->20950 20951 1efefb1fbb5 20950->20951 20952 1efefb1fc3d 20951->20952 20954 1efefb1da24 _mtinitlocknum RtlFreeHeap 20951->20954 20956 1efefb1fc31 __lock_fhandle 20951->20956 20972 1efefb1f784 20951->20972 20953 1efefb1e378 _malloc_crt RtlFreeHeap 20952->20953 20953->20956 20954->20951 20956->20928 20963 1efefb1fd0a 20957->20963 20958 1efefb1fd21 20959 1efefb1b714 _errno RtlFreeHeap 20958->20959 20962 1efefb1fd26 _invalid_parameter_noinfo 20959->20962 20960 1efefb1ff27 20992 1efefb24a54 20960->20992 20962->20927 20963->20958 20971 1efefb1fec2 20963->20971 20977 1efefb24a88 20963->20977 20965 1efefb1fe82 20965->20958 20983 1efefb24bbc 20965->20983 20967 1efefb1febe 20968 1efefb24bbc _openfile RtlFreeHeap 20967->20968 20967->20971 20969 1efefb1fee1 20968->20969 20970 1efefb24bbc _openfile RtlFreeHeap 20969->20970 20969->20971 20970->20971 20971->20958 20971->20960 20973 1efefb1f792 20972->20973 20974 1efefb1f7a5 20972->20974 20975 1efefb1d958 _lock RtlFreeHeap 20973->20975 20976 1efefb1f79a 20975->20976 20976->20951 20978 1efefb24a90 20977->20978 20979 1efefb1bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 20978->20979 20982 1efefb24ab4 _invalid_parameter_noinfo _openfile 20978->20982 20980 1efefb24ac8 20979->20980 20981 1efefb1b714 _errno RtlFreeHeap 20980->20981 20980->20982 20981->20982 20982->20965 20984 1efefb24bc4 20983->20984 20985 1efefb1bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 20984->20985 20986 1efefb24bed 20985->20986 20987 1efefb24c02 20986->20987 20988 1efefb24c15 20986->20988 20991 1efefb24c10 _invalid_parameter_noinfo 20986->20991 20995 1efefb25eac 20987->20995 20990 1efefb1b714 _errno RtlFreeHeap 20988->20990 20988->20991 20990->20991 20991->20967 21000 1efefb248f0 20992->21000 20994 1efefb24a81 20994->20962 20997 1efefb25eb9 20995->20997 20999 1efefb25ee6 20995->20999 20996 1efefb1b714 _errno RtlFreeHeap 20998 1efefb25ec3 _invalid_parameter_noinfo 20996->20998 20997->20996 20997->20999 20998->20991 21001 1efefb24931 21000->21001 21002 1efefb24919 21000->21002 21001->21002 21005 1efefb2495e 21001->21005 21003 1efefb1b714 _errno RtlFreeHeap 21002->21003 21004 1efefb2491e _invalid_parameter_noinfo _unlock_fhandle 21003->21004 21004->20994 21007 1efefb249cc 21005->21007 21008 1efefb199d8 remove RtlFreeHeap 21007->21008 21009 1efefb249f6 21008->21009 21010 1efefb249fa 21009->21010 21011 1efefb256a8 _wsopen_nolock RtlFreeHeap 21009->21011 21010->21004 21012 1efefb24a33 21011->21012 21013 1efefb19428 free RtlFreeHeap 21012->21013 21013->21010 21015 1efefb1a231 _invalid_parameter_noinfo 21014->21015 21018 1efefb1a222 21014->21018 21015->20942 21016 1efefb1a22c 21017 1efefb1b714 _errno RtlFreeHeap 21016->21017 21017->21015 21018->21015 21018->21016 21019 1efefb1a26e _setmbcp 21018->21019 21019->21015 21020 1efefb1bd98 _vsnprintf_helper RtlFreeHeap 21019->21020 21022 1efefb1f624 _fileno RtlFreeHeap 21019->21022 21023 1efefb20504 _wsopen_nolock RtlFreeHeap 21019->21023 21024 1efefb1fa2c 21019->21024 21020->21019 21022->21019 21023->21019 21025 1efefb1fa6e 21024->21025 21026 1efefb1fa49 21024->21026 21025->21019 21026->21025 21027 1efefb1f624 _fileno RtlFreeHeap 21026->21027 21028 1efefb1fa60 21027->21028 21029 1efefb20504 _wsopen_nolock RtlFreeHeap 21028->21029 21029->21025 21031 1efefb1a041 21030->21031 21032 1efefb1a055 21030->21032 21033 1efefb1b714 _errno RtlFreeHeap 21031->21033 21034 1efefb1a046 _invalid_parameter_noinfo 21032->21034 21035 1efefb1fa2c _flush RtlFreeHeap 21032->21035 21033->21034 21034->20948 21036 1efefb1a060 21035->21036 21044 1efefb1f9a8 21036->21044 21039 1efefb1f624 _fileno RtlFreeHeap 21040 1efefb1a072 21039->21040 21048 1efefb1f828 21040->21048 21045 1efefb1a06a 21044->21045 21046 1efefb1f9b7 21044->21046 21045->21039 21046->21045 21047 1efefb19428 free RtlFreeHeap 21046->21047 21047->21045 21049 1efefb1f841 21048->21049 21050 1efefb1f859 21048->21050 21051 1efefb1b6a4 __doserrno RtlFreeHeap 21049->21051 21052 1efefb1f8c2 21050->21052 21057 1efefb1f88b 21050->21057 21053 1efefb1f846 21051->21053 21054 1efefb1b6a4 __doserrno RtlFreeHeap 21052->21054 21055 1efefb1b714 _errno RtlFreeHeap 21053->21055 21056 1efefb1f8c7 21054->21056 21058 1efefb1b714 _errno RtlFreeHeap 21056->21058 21059 1efefb2438c __lock_fhandle RtlFreeHeap 21057->21059 21061 1efefb1f892 21059->21061 21062 1efefb1f8a9 21061->21062 21063 1efefb1f89e 21061->21063 21096 1efefaef33c _DllMainCRTStartup RtlFreeHeap 21095->21096 21097 1efefaef450 21096->21097 21097->20400 21099 1efefb1aaa1 21098->21099 21100 1efefb1aa8c 21098->21100 21099->21100 21101 1efefb1aaa7 fread_s 21099->21101 21102 1efefb1b714 _errno RtlFreeHeap 21100->21102 21115 1efefb1a9b8 21101->21115 21103 1efefb1aa91 _invalid_parameter_noinfo fread_s 21102->21103 21103->20401 21106 1efefb1aaf6 21105->21106 21108 1efefb1ab0c fread_s 21105->21108 21107 1efefb1b714 _errno RtlFreeHeap 21106->21107 21109 1efefb1aafb _invalid_parameter_noinfo fread_s 21107->21109 21177 1efefb1ab34 21108->21177 21109->20404 21116 1efefb1a9eb 21115->21116 21117 1efefb1a9db 21115->21117 21119 1efefb1a9fe 21116->21119 21127 1efefb2186c 21116->21127 21118 1efefb1b714 _errno RtlFreeHeap 21117->21118 21120 1efefb1a9e0 21118->21120 21122 1efefb1fa2c _flush RtlFreeHeap 21119->21122 21120->21103 21123 1efefb1aa0a 21122->21123 21124 1efefb1f624 _fileno RtlFreeHeap 21123->21124 21125 1efefb1aa36 21124->21125 21149 1efefb21b60 21125->21149 21128 1efefb2188e 21127->21128 21129 1efefb218c3 21128->21129 21130 1efefb218ab 21128->21130 21132 1efefb1f624 _fileno RtlFreeHeap 21129->21132 21131 1efefb1b714 _errno RtlFreeHeap 21130->21131 21148 1efefb218b0 _invalid_parameter_noinfo __crtLCMapStringA_stat 21131->21148 21133 1efefb218c8 21132->21133 21134 1efefb21b60 _fseek_nolock RtlFreeHeap 21133->21134 21135 1efefb218e2 21134->21135 21136 1efefb21a5a 21135->21136 21137 1efefb2193e 21135->21137 21135->21148 21138 1efefb21a5e 21136->21138 21142 1efefb21a30 21136->21142 21140 1efefb21953 21137->21140 21137->21142 21139 1efefb1b714 _errno RtlFreeHeap 21138->21139 21139->21148 21141 1efefb21cd8 _ftelli64_nolock RtlFreeHeap 21140->21141 21140->21148 21146 1efefb2196f 21141->21146 21143 1efefb21b60 _fseek_nolock RtlFreeHeap 21142->21143 21142->21148 21144 1efefb21aa4 21143->21144 21145 1efefb21b60 _fseek_nolock RtlFreeHeap 21144->21145 21144->21148 21145->21148 21147 1efefb21b60 _fseek_nolock RtlFreeHeap 21146->21147 21146->21148 21147->21148 21148->21119 21150 1efefb21b83 21149->21150 21151 1efefb21b9b 21149->21151 21153 1efefb1b6a4 __doserrno RtlFreeHeap 21150->21153 21152 1efefb21c12 21151->21152 21158 1efefb21bcd 21151->21158 21155 1efefb1b6a4 __doserrno RtlFreeHeap 21152->21155 21154 1efefb21b88 21153->21154 21156 1efefb1b714 _errno RtlFreeHeap 21154->21156 21157 1efefb21c17 21155->21157 21161 1efefb21b90 _invalid_parameter_noinfo _unlock_fhandle 21156->21161 21159 1efefb1b714 _errno RtlFreeHeap 21157->21159 21160 1efefb2438c __lock_fhandle RtlFreeHeap 21158->21160 21159->21161 21162 1efefb21bd4 21160->21162 21161->21120 21163 1efefb21bf1 21162->21163 21164 1efefb21be0 21162->21164 21166 1efefb1b714 _errno RtlFreeHeap 21163->21166 21169 1efefb21c40 21164->21169 21167 1efefb21bf6 21166->21167 21168 1efefb1b6a4 __doserrno RtlFreeHeap 21167->21168 21168->21161 21170 1efefb246c8 _lseek_nolock RtlFreeHeap 21169->21170 21171 1efefb21c5e 21170->21171 21172 1efefb21c64 21171->21172 21174 1efefb21c74 21171->21174 21173 1efefb1b714 _errno RtlFreeHeap 21172->21173 21175 1efefb21c69 21173->21175 21174->21175 21176 1efefb1b6c4 _dosmaperr RtlFreeHeap 21174->21176 21175->21161 21176->21175 21178 1efefb1ab56 21177->21178 21179 1efefb1f624 _fileno RtlFreeHeap 21178->21179 21180 1efefb1ab73 21179->21180 21181 1efefb21cd8 _ftelli64_nolock RtlFreeHeap 21180->21181 21182 1efefb1ab8f 21181->21182 21183 1efefb1ad12 21182->21183 21184 1efefb1abf7 21182->21184 21195 1efefb1ab97 __crtLCMapStringA_stat 21182->21195 21185 1efefb1ad16 21183->21185 21189 1efefb1ace7 21183->21189 21187 1efefb1ac0c 21184->21187 21184->21189 21186 1efefb1b714 _errno RtlFreeHeap 21185->21186 21186->21195 21188 1efefb21cd8 _ftelli64_nolock RtlFreeHeap 21187->21188 21187->21195 21192 1efefb1ac24 21188->21192 21190 1efefb21cd8 _ftelli64_nolock RtlFreeHeap 21189->21190 21189->21195 21191 1efefb1ad61 21190->21191 21193 1efefb21cd8 _ftelli64_nolock RtlFreeHeap 21191->21193 21191->21195 21194 1efefb21cd8 _ftelli64_nolock RtlFreeHeap 21192->21194 21192->21195 21193->21195 21194->21195 21195->21109 21199 1efefaf8470 21196->21199 21200 1efefb19468 malloc RtlFreeHeap 21199->21200 21201 1efefaf8491 21200->21201 21201->20439 21203 1efefaf8470 _DllMainCRTStartup RtlFreeHeap 21202->21203 21204 1efefaf85d3 21203->21204 21204->20445 21216 1efefb188c4 21205->21216 21207 1efefb18854 21207->20473 21208 1efefb18825 _DllMainCRTStartup 21208->21207 21209 1efefb18856 21208->21209 21210 1efefb18836 21208->21210 21211 1efefb19700 _snprintf RtlFreeHeap 21209->21211 21212 1efefb19700 _snprintf RtlFreeHeap 21210->21212 21211->21207 21212->21207 21214 1efefaef33c _DllMainCRTStartup RtlFreeHeap 21213->21214 21215 1efefaef429 21214->21215 21215->20473 21217 1efefb188de 21216->21217 21218 1efefb19700 _snprintf RtlFreeHeap 21217->21218 21219 1efefb1896b 21217->21219 21218->21219 21219->21208 21221 1efefafce98 21220->21221 21222 1efefb188c4 _DllMainCRTStartup RtlFreeHeap 21221->21222 21223 1efefafce9c 21221->21223 21222->21223 21223->20516 21225 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 21224->21225 21227 1efefaf25da _DllMainCRTStartup 21225->21227 21226 1efefaf27f2 21228 1efefaf80f0 _DllMainCRTStartup RtlFreeHeap 21226->21228 21227->21226 21231 1efefaef280 21227->21231 21230 1efefaf2846 21228->21230 21230->20545 21236 1efefb1990c 21231->21236 21234 1efefaef33c _DllMainCRTStartup RtlFreeHeap 21235 1efefaef2e2 21234->21235 21235->21226 21239 1efefb1989c 21236->21239 21238 1efefaef2c3 21238->21234 21240 1efefb198f1 21239->21240 21241 1efefb198aa 21239->21241 21242 1efefb1b714 _errno RtlFreeHeap 21240->21242 21241->21240 21243 1efefb198b4 21241->21243 21246 1efefb198e9 _invalid_parameter_noinfo 21242->21246 21248 1efefb197b4 21243->21248 21245 1efefb198d8 21245->21246 21247 1efefb1b714 _errno RtlFreeHeap 21245->21247 21246->21238 21247->21246 21251 1efefb197f0 _call_reportfault 21248->21251 21249 1efefb197f5 21250 1efefb1b714 _errno RtlFreeHeap 21249->21250 21252 1efefb197fa _invalid_parameter_noinfo 21250->21252 21251->21249 21253 1efefb19814 21251->21253 21252->21245 21253->21252 21254 1efefb1bd98 _vsnprintf_helper RtlFreeHeap 21253->21254 21254->21252 21256 1efefb19468 malloc RtlFreeHeap 21255->21256 21257 1efefaf5fa9 _DllMainCRTStartup 21256->21257 21257->20550 21263 1efefb19924 21258->21263 21260 1efefaed369 21261 1efefaed395 21260->21261 21262 1efefb1990c _DllMainCRTStartup RtlFreeHeap 21260->21262 21261->20557 21262->21261 21264 1efefb1993c _call_reportfault 21263->21264 21265 1efefb1b714 _errno RtlFreeHeap 21264->21265 21266 1efefb1997a _invalid_parameter_noinfo 21264->21266 21265->21266 21266->21260 21270 1efefaf6331 21267->21270 21268 1efefaf5c0e 21268->20164 21269 1efefb19428 RtlFreeHeap free 21269->21270 21270->21268 21270->21269 21272 1efefb1826c _DllMainCRTStartup RtlFreeHeap 21271->21272 21273 1efefb1860d 21272->21273 21274 1efefb18640 21273->21274 21275 1efefb18657 21273->21275 21276 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 21274->21276 21277 1efefb1867f 21275->21277 21278 1efefb18668 21275->21278 21283 1efefb1825a 21276->21283 21279 1efefaf7f80 _DllMainCRTStartup RtlFreeHeap 21277->21279 21280 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 21278->21280 21281 1efefb18689 _DllMainCRTStartup 21279->21281 21280->21283 21282 1efefb188c4 _DllMainCRTStartup RtlFreeHeap 21281->21282 21282->21283 21283->20576 21285 1efefb1a427 21284->21285 21288 1efefb1a42c 21285->21288 21289 1efefb1a47a 21285->21289 21286 1efefb1b714 _errno RtlFreeHeap 21287 1efefb1a431 _invalid_parameter_noinfo 21286->21287 21287->20592 21288->21286 21288->21287 21289->21287 21290 1efefb1b714 _errno RtlFreeHeap 21289->21290 21290->21287 21292 1efefaef33c _DllMainCRTStartup RtlFreeHeap 21291->21292 21293 1efefaef47f 21292->21293 21293->20603 21295 1efefb19468 malloc RtlFreeHeap 21294->21295 21296 1efefaf844a _DllMainCRTStartup 21295->21296 21296->20613 21298 1efefb1af12 21297->21298 21299 1efefb1af1c 21297->21299 21305 1efefb199d8 21298->21305 21303 1efefaf3323 21299->21303 21319 1efefb222e0 21299->21319 21303->20616 21304 1efefb19428 free RtlFreeHeap 21304->21303 21306 1efefb19a16 21305->21306 21307 1efefb199fe 21305->21307 21306->21307 21309 1efefb19a1b __crtIsPackagedApp 21306->21309 21308 1efefb1b714 _errno RtlFreeHeap 21307->21308 21310 1efefb19a03 _invalid_parameter_noinfo 21308->21310 21311 1efefb19a6e 21309->21311 21312 1efefb19a5d 21309->21312 21310->21299 21313 1efefb1e378 _malloc_crt RtlFreeHeap 21311->21313 21314 1efefb1b6c4 _dosmaperr RtlFreeHeap 21312->21314 21315 1efefb19a79 21313->21315 21314->21310 21315->21310 21316 1efefb1b6c4 _dosmaperr RtlFreeHeap 21315->21316 21317 1efefb19aac 21316->21317 21318 1efefb19428 free RtlFreeHeap 21317->21318 21318->21310 21320 1efefb222ec 21319->21320 21321 1efefb1af32 21320->21321 21322 1efefb1b6c4 _dosmaperr RtlFreeHeap 21320->21322 21321->21304 21322->21321 21342 1efefafcf00 21323->21342 21326 1efefb1af48 21327 1efefb1af64 21326->21327 21328 1efefb1af5a 21326->21328 21332 1efefb1af68 21327->21332 21363 1efefb22314 21327->21363 21329 1efefb199d8 remove RtlFreeHeap 21328->21329 21329->21327 21332->20635 21333 1efefb19428 free RtlFreeHeap 21333->21332 21335 1efefb1ae3a 21334->21335 21341 1efefb1ae44 21334->21341 21337 1efefb199d8 remove RtlFreeHeap 21335->21337 21337->21341 21339 1efefb19428 free RtlFreeHeap 21340 1efefb1ae48 21339->21340 21340->20635 21341->21340 21367 1efefb222b0 21341->21367 21343 1efefb19468 malloc RtlFreeHeap 21342->21343 21344 1efefafcf1d 21343->21344 21345 1efefb19700 _snprintf RtlFreeHeap 21344->21345 21346 1efefafcf3d 21345->21346 21347 1efefb19428 free RtlFreeHeap 21346->21347 21349 1efefafcf5c 21347->21349 21348 1efefaf2ee8 21348->21326 21349->21348 21350 1efefb19468 malloc RtlFreeHeap 21349->21350 21351 1efefb19700 _snprintf RtlFreeHeap 21349->21351 21353 1efefb19428 free RtlFreeHeap 21349->21353 21354 1efefafd08c 21349->21354 21350->21349 21351->21349 21353->21349 21355 1efefb19468 malloc RtlFreeHeap 21354->21355 21356 1efefafd0ae 21355->21356 21357 1efefb19700 _snprintf RtlFreeHeap 21356->21357 21358 1efefafd0d8 21357->21358 21359 1efefafcf00 _DllMainCRTStartup RtlFreeHeap 21358->21359 21360 1efefafd0ec 21359->21360 21361 1efefb19428 free RtlFreeHeap 21360->21361 21362 1efefafd0f6 21361->21362 21362->21349 21364 1efefb2231e 21363->21364 21365 1efefb1b6c4 _dosmaperr RtlFreeHeap 21364->21365 21366 1efefb1af7a 21364->21366 21365->21366 21366->21333 21368 1efefb222ba 21367->21368 21369 1efefb1b6c4 _dosmaperr RtlFreeHeap 21368->21369 21370 1efefb1ae5a 21368->21370 21369->21370 21370->21339 21372 1efefb190fd _DllMainCRTStartup 21371->21372 21373 1efefb18ff9 21372->21373 21377 1efefb192bc 21372->21377 21373->20164 21378 1efefb19468 malloc RtlFreeHeap 21377->21378 21379 1efefb192db 21378->21379 21380 1efefb19468 malloc RtlFreeHeap 21379->21380 21381 1efefb192fa 21380->21381 21382 1efefb19468 malloc RtlFreeHeap 21381->21382 21383 1efefb19331 21382->21383 21384 1efefb19700 _snprintf RtlFreeHeap 21383->21384 21385 1efefb1935d 21384->21385 21386 1efefb19468 malloc RtlFreeHeap 21385->21386 21387 1efefb191b9 21386->21387 21388 1efefb17f5c 21387->21388 21389 1efefb17f82 _DllMainCRTStartup 21388->21389 21390 1efefb17f99 21389->21390 21392 1efefb17eb4 21389->21392 21390->21373 21393 1efefb17ee4 21392->21393 21396 1efefb18078 21393->21396 21397 1efefb18088 21396->21397 21399 1efefb17f19 21396->21399 21398 1efefaf51dc _DllMainCRTStartup RtlFreeHeap 21397->21398 21398->21399 21399->21390 21401 1efefaf7291 21400->21401 21402 1efefaf731e 21401->21402 21403 1efefaf734c 21401->21403 21404 1efefaf7329 21402->21404 21406 1efefaf7335 21402->21406 21407 1efefaf7377 _DllMainCRTStartup 21403->21407 21409 1efefaf7375 21403->21409 21405 1efefaef410 _DllMainCRTStartup RtlFreeHeap 21404->21405 21412 1efefaf6fd1 21405->21412 21408 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 21406->21408 21413 1efefaf6c54 21407->21413 21408->21412 21411 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 21409->21411 21411->21412 21412->20164 21416 1efefaf6c99 21413->21416 21414 1efefaf6e80 21417 1efefaef410 _DllMainCRTStartup RtlFreeHeap 21414->21417 21415 1efefaf6d14 21418 1efefb19468 malloc RtlFreeHeap 21415->21418 21419 1efefaf6c9d _DllMainCRTStartup 21415->21419 21416->21414 21416->21415 21416->21419 21417->21419 21418->21419 21419->21412 21421 1efefaf3dbf _DllMainCRTStartup 21420->21421 21422 1efefb172a0 _DllMainCRTStartup RtlFreeHeap 21421->21422 21423 1efefaf3e8c 21422->21423 21424 1efefaf4708 _DllMainCRTStartup RtlFreeHeap 21423->21424 21427 1efefaf3e90 _DllMainCRTStartup 21423->21427 21425 1efefaf3ef6 _DllMainCRTStartup 21424->21425 21428 1efefaf60bc 21425->21428 21427->20668 21429 1efefb19468 malloc RtlFreeHeap 21428->21429 21430 1efefaf60e0 21429->21430 21431 1efefb19700 _snprintf RtlFreeHeap 21430->21431 21432 1efefaf6182 _DllMainCRTStartup 21431->21432 21432->21427 21434 1efefb1d958 _lock RtlFreeHeap 21433->21434 21435 1efefb28b5b 21434->21435 21438 1efefb28b7c 21435->21438 21437 1efefb28b66 __lock_fhandle 21437->20673 21439 1efefb28bab 21438->21439 21443 1efefb28ba3 _invalid_parameter_noinfo 21438->21443 21440 1efefb28bb0 21439->21440 21442 1efefb28bc7 21439->21442 21446 1efefb28c26 _putenv_helper 21439->21446 21441 1efefb1b714 _errno RtlFreeHeap 21440->21441 21441->21443 21471 1efefb29728 21442->21471 21443->21437 21445 1efefb28bf8 21449 1efefb1e2f8 _calloc_crt RtlFreeHeap 21445->21449 21446->21440 21448 1efefb28c51 21446->21448 21447 1efefb28bd3 _putenv_helper 21447->21440 21447->21445 21450 1efefb1e2f8 _calloc_crt RtlFreeHeap 21448->21450 21454 1efefb28c11 21449->21454 21451 1efefb28c65 21450->21451 21451->21443 21477 1efefb24fbc 21451->21477 21453 1efefb24fbc _setenvp RtlFreeHeap 21455 1efefb28ca6 21453->21455 21454->21443 21454->21453 21484 1efefb28fb8 21455->21484 21457 1efefb28cb4 21458 1efefb28cb8 21457->21458 21460 1efefb28ccf 21457->21460 21458->21443 21459 1efefb19428 free RtlFreeHeap 21458->21459 21459->21443 21460->21443 21461 1efefb28d07 21460->21461 21463 1efefb1e2f8 _calloc_crt RtlFreeHeap 21460->21463 21462 1efefb1b714 _errno RtlFreeHeap 21461->21462 21462->21443 21464 1efefb28d50 _wsetenvp 21463->21464 21464->21443 21465 1efefb28d77 21464->21465 21467 1efefb28dc5 21464->21467 21466 1efefb19428 free RtlFreeHeap 21465->21466 21466->21461 21522 1efefb29350 21467->21522 21472 1efefb29730 21471->21472 21473 1efefb1bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21472->21473 21474 1efefb29751 21473->21474 21475 1efefb1b714 _errno RtlFreeHeap 21474->21475 21476 1efefb2975d _invalid_parameter_noinfo strchr 21474->21476 21475->21476 21476->21447 21478 1efefb24fd1 21477->21478 21479 1efefb24fc7 21477->21479 21480 1efefb1b714 _errno RtlFreeHeap 21478->21480 21479->21478 21482 1efefb24fed 21479->21482 21481 1efefb24fd9 _invalid_parameter_noinfo 21480->21481 21481->21454 21482->21481 21483 1efefb1b714 _errno RtlFreeHeap 21482->21483 21483->21481 21485 1efefb28fe1 21484->21485 21486 1efefb28ff6 21484->21486 21488 1efefb1b714 _errno RtlFreeHeap 21485->21488 21487 1efefb290d8 21486->21487 21489 1efefb29728 __crtsetenv RtlFreeHeap 21486->21489 21490 1efefb1b714 _errno RtlFreeHeap 21487->21490 21515 1efefb28fe6 _invalid_parameter_noinfo 21488->21515 21491 1efefb2900f 21489->21491 21490->21515 21491->21487 21492 1efefb2904f 21491->21492 21495 1efefb1e2f8 _calloc_crt RtlFreeHeap 21491->21495 21493 1efefb290fe 21492->21493 21494 1efefb290cf 21492->21494 21502 1efefb29133 21492->21502 21496 1efefb1e378 _malloc_crt RtlFreeHeap 21493->21496 21493->21515 21559 1efefb29c2c 21494->21559 21504 1efefb2906e 21495->21504 21499 1efefb29111 21496->21499 21499->21502 21508 1efefb1e378 _malloc_crt RtlFreeHeap 21499->21508 21499->21515 21500 1efefb2923d 21503 1efefb2932b 21500->21503 21512 1efefb29234 21500->21512 21509 1efefb29199 21502->21509 21502->21515 21567 1efefb29d20 21502->21567 21505 1efefb19428 free RtlFreeHeap 21503->21505 21504->21492 21553 1efefb29bbc 21504->21553 21511 1efefb29333 _invoke_watson 21505->21511 21506 1efefb19428 free RtlFreeHeap 21506->21509 21508->21502 21509->21500 21509->21506 21509->21512 21510 1efefb29314 21513 1efefb19428 free RtlFreeHeap 21510->21513 21510->21515 21512->21510 21514 1efefb1e2f8 _calloc_crt RtlFreeHeap 21512->21514 21512->21515 21513->21515 21516 1efefb292b6 21514->21516 21515->21457 21516->21510 21517 1efefb24fbc _setenvp RtlFreeHeap 21516->21517 21518 1efefb292d5 21517->21518 21518->21511 21519 1efefb29306 21518->21519 21520 1efefb1b714 _errno RtlFreeHeap 21518->21520 21520->21519 21525 1efefb2938d wcschr 21522->21525 21523 1efefb29483 21524 1efefb1b714 _errno RtlFreeHeap 21523->21524 21528 1efefb28dd0 21524->21528 21525->21523 21526 1efefb294a9 21525->21526 21527 1efefb29465 21525->21527 21540 1efefb294e3 21525->21540 21526->21528 21529 1efefb294be 21526->21529 21531 1efefb1e378 _malloc_crt RtlFreeHeap 21526->21531 21601 1efefb2a264 21527->21601 21528->21443 21529->21528 21529->21540 21531->21529 21532 1efefb2960d 21544 1efefb29601 _wsetenvp 21532->21544 21538 1efefb19428 free RtlFreeHeap 21541 1efefb29553 21538->21541 21540->21528 21540->21541 21616 1efefb29ea0 21540->21616 21541->21532 21541->21538 21541->21544 21544->21528 21554 1efefb29bd3 21553->21554 21558 1efefb29bfb _invoke_watson 21553->21558 21555 1efefb19468 malloc RtlFreeHeap 21554->21555 21556 1efefb29be4 21555->21556 21557 1efefb24fbc _setenvp RtlFreeHeap 21556->21557 21556->21558 21557->21558 21558->21504 21560 1efefb290d4 21559->21560 21562 1efefb29c54 21559->21562 21560->21487 21560->21502 21561 1efefb1e2f8 _calloc_crt RtlFreeHeap 21561->21562 21562->21560 21562->21561 21563 1efefb29d10 21562->21563 21565 1efefb28fb8 __crtsetenv RtlFreeHeap 21562->21565 21566 1efefb19428 free RtlFreeHeap 21562->21566 21564 1efefb19428 free RtlFreeHeap 21563->21564 21564->21560 21565->21562 21566->21562 21568 1efefb29d28 21567->21568 21569 1efefb1bf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 21568->21569 21570 1efefb29d59 21569->21570 21571 1efefb29d6f 21570->21571 21572 1efefb29d86 21570->21572 21581 1efefb29d5e _invalid_parameter_noinfo 21570->21581 21573 1efefb1b714 _errno RtlFreeHeap 21571->21573 21574 1efefb29da2 21572->21574 21575 1efefb29d90 21572->21575 21573->21581 21577 1efefb29dc2 21574->21577 21578 1efefb29dad 21574->21578 21576 1efefb1b714 _errno RtlFreeHeap 21575->21576 21576->21581 21598 1efefb2ad60 21577->21598 21582 1efefb2a918 21578->21582 21581->21502 21602 1efefb2a27e 21601->21602 21634 1efefaf17f6 _DllMainCRTStartup 21632->21634 21633 1efefaf18e1 21633->20711 21634->21633 21635 1efefaed338 _DllMainCRTStartup RtlFreeHeap 21634->21635 21635->21634 21637 1efefaf11f1 21636->21637 21638 1efefafa870 _DllMainCRTStartup RtlFreeHeap 21637->21638 21639 1efefaf1265 21638->21639 21640 1efefaf1269 21639->21640 21642 1efefaf648c 21639->21642 21640->20726 21643 1efefaf60bc _DllMainCRTStartup RtlFreeHeap 21642->21643 21644 1efefaf64d3 21643->21644 21644->21640 21646 1efefaeca6a 21645->21646 21647 1efefb19468 malloc RtlFreeHeap 21646->21647 21648 1efefaecaa8 21646->21648 21647->21648 21648->20742 21650 1efefb17438 _DllMainCRTStartup RtlFreeHeap 21649->21650 21651 1efefb1735b 21650->21651 21652 1efefaf25a8 _DllMainCRTStartup RtlFreeHeap 21651->21652 21653 1efefb17392 21652->21653 21653->20780 21655 1efefb17438 _DllMainCRTStartup RtlFreeHeap 21654->21655 21656 1efefb173c6 21655->21656 21657 1efefafa618 _DllMainCRTStartup RtlFreeHeap 21656->21657 21658 1efefaf41fc 21657->21658 21658->20786 21658->20787 21661 1efefaee053 _DllMainCRTStartup 21659->21661 21660 1efefaee55a _DllMainCRTStartup 21660->20790 21661->21660 21662 1efefaef310 _DllMainCRTStartup RtlFreeHeap 21661->21662 21662->21660 21669 1efefaedc5e _DllMainCRTStartup 21663->21669 21664 1efefaed691 21664->20791 21664->20794 21665 1efefaef2ec _DllMainCRTStartup RtlFreeHeap 21665->21669 21666 1efefaed9e4 RtlFreeHeap _DllMainCRTStartup 21666->21669 21667 1efefaedf39 21668 1efefaef280 _DllMainCRTStartup RtlFreeHeap 21667->21668 21668->21664 21669->21664 21669->21665 21669->21666 21669->21667 21670 1efefaedf7f 21669->21670 21671 1efefaef410 _DllMainCRTStartup RtlFreeHeap 21670->21671 21671->21664 21677 1efefaf9323 _DllMainCRTStartup 21672->21677 21673 1efefaf9625 21673->19635 21674 1efefaf6c54 _DllMainCRTStartup RtlFreeHeap 21674->21677 21675 1efefaf8470 _DllMainCRTStartup RtlFreeHeap 21675->21677 21676 1efefaed2bc _DllMainCRTStartup RtlFreeHeap 21676->21677 21677->21673 21677->21674 21677->21675 21677->21676 21678 1efefaed280 _DllMainCRTStartup RtlFreeHeap 21677->21678 21678->21677 21680 1efefaf9964 21679->21680 21682 1efefaf996e _DllMainCRTStartup 21679->21682 21681 1efefb19468 malloc RtlFreeHeap 21680->21681 21681->21682 21682->19635 21685 1efefaf9bea 21683->21685 21684 1efefaf92e1 21684->19551 21685->21684 21686 1efefb19428 RtlFreeHeap free 21685->21686 21686->21685

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: NameSocketUser_snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 1789932928-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: d7a95239ba58a363f5ccbfb2e63a34d367d364bda6f60ee3dcd7969f8b102a16
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: 8371DE31518B888FE790EB18C495B9EB7E1FBC9310F95496DB889C72A5C774E881CB02
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: DCBA
                                      • API String ID: 544645111-2222620526
                                      • Opcode ID: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction ID: 5c63de13ee241e6f82fe441d03dd6b064c2a2f02b22df3bbc11fe6bd08dc9dbc
                                      • Opcode Fuzzy Hash: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction Fuzzy Hash: 93412A77301B858EDB24CF65D8807DC37A2E748BACF118226EE0D47B68EA34D985C740

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ($0
                                      • API String ID: 0-506339136
                                      • Opcode ID: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction ID: 2d466a25dde8e0e8793a24a940b7410a37ee81fbaeed1e71e6effe8cf8845580
                                      • Opcode Fuzzy Hash: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction Fuzzy Hash: 54418E311187858FE7A5DF28C0547AEB7E1FB98315F54093DE88ADB2A1CB74D982CB42

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: IoctlSocketclosesocket
                                      • String ID:
                                      • API String ID: 3445158922-0
                                      • Opcode ID: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction ID: 3027af37680d2144ebe8bdcd3fe383b5c2102c550113c79ab99d31ec00ddb143
                                      • Opcode Fuzzy Hash: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction Fuzzy Hash: BB313D715187848FE350DF68C444B9EFBE4FBC8344F55893DE89ADA2A0D7B8D4858B06

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: InternetOpen
                                      • String ID:
                                      • API String ID: 2038078732-0
                                      • Opcode ID: 170dc46f2207cb387e16a0227af4bff50695bdbce6e0c670e9cf9a8f94b52204
                                      • Instruction ID: a39c336b63a6542a839d8a4149161fe30bdfc58fe9ee055d4c5b377a48707a17
                                      • Opcode Fuzzy Hash: 170dc46f2207cb387e16a0227af4bff50695bdbce6e0c670e9cf9a8f94b52204
                                      • Instruction Fuzzy Hash: F9515C316286848FF354EB18C8597AE77E5FB89305F41453EA986D72E1CB789882CB02
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_invalid_parameter_noinfo
                                      • String ID: U
                                      • API String ID: 3902385426-4171548499
                                      • Opcode ID: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction ID: a6a8396cad94a315469e39dce2287d1a678a94b741813ba7957708855209fdaa
                                      • Opcode Fuzzy Hash: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction Fuzzy Hash: BD12A2332157C586EB208F24D8443DE67A2F785798F52412AEEC9476B9FB39E486CB10
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                      • String ID: -$@
                                      • API String ID: 3246410048-1222683799
                                      • Opcode ID: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction ID: ffa03f5aa9ba2fef47408691c0672b35e762829ce179be11cbd3ac0c5073c39f
                                      • Opcode Fuzzy Hash: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction Fuzzy Hash: 4CB1D373604AC085FB698F65D8503ED67A2B785794F17012EDE89076F9FB38E9828740

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction ID: 478b0c6eaa251f325bc5caafdeb08064668f1024857f9d5a281133b3de8de4bb
                                      • Opcode Fuzzy Hash: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction Fuzzy Hash: A331A672A186864FF719AF68D8422ED3690EBD5360F12467DEC11872F3D670B9838751
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$ExitProcess__crt_errno
                                      • String ID:
                                      • API String ID: 1362684943-0
                                      • Opcode ID: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction ID: 41c1b9af8a92b0d4384ea4cde04b97aa894f25ad2dd4f8daee278c7949b24775
                                      • Opcode Fuzzy Hash: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction Fuzzy Hash: 14412C336516C181FE199B12EC603EC2393AF44765F0B453D9D99062B5FF3CA5C28340
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction ID: 419e14e84c28a052a44999a71fb067140bab90f0d51a89f4b12f118e53ea0191
                                      • Opcode Fuzzy Hash: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction Fuzzy Hash: 1F315E732113C086E6566F65DD813AD2653A784BE4F47423DAE910B7F2EB78A8838710

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction ID: c12185b8691f7d5020859d9e5fd9a1f8de1cbeeda385c94162ee7719e426e318
                                      • Opcode Fuzzy Hash: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction Fuzzy Hash: 0621E732B186868EF7186B5CDC423ED72D0EB85321F17466DEC15C71F3CA6468838666

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction ID: ac190ef3d052d196a142bb9f9f7974bb05f581329af84152e2ac4ca23d2150c5
                                      • Opcode Fuzzy Hash: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction Fuzzy Hash: DF21F936A086824EF7196B6CD8463FD7290DB82320F27467DED56CB1F3D66468838661
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction ID: 9c413f3d35fab74be26001057b5124028179cdf7d0f9f84d3b433b138735c870
                                      • Opcode Fuzzy Hash: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction Fuzzy Hash: 03215C336112C046FA256F25DC413ED6653A744BF0F1B423DAEA50B2F2EA38A8C38714
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction ID: 00a436fa2c5f5108a90dbf9a9d0197318dd74b3e414b9b06118e61a9d2b2cfbb
                                      • Opcode Fuzzy Hash: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction Fuzzy Hash: 8A2168336116C046F6156B25DC413ED6693AB84BE1F1B413DAE950B2F2EB78A8C39B24

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1241 1efefb29ea0-1efefb29eb4 1242 1efefb29eb6-1efefb29eb9 1241->1242 1243 1efefb29f29-1efefb29f5b 1241->1243 1244 1efefb29ed5-1efefb29ed8 1242->1244 1245 1efefb29ebb-1efefb29ed4 call 1efefb1b714 call 1efefb1bd3c 1242->1245 1248 1efefb29f64-1efefb29f67 1243->1248 1249 1efefb29f5d-1efefb29f5f 1243->1249 1244->1245 1250 1efefb29eda-1efefb29ee1 1244->1250 1253 1efefb29f83-1efefb29f86 1248->1253 1254 1efefb29f69-1efefb29f7e call 1efefb1b714 call 1efefb1bd3c 1248->1254 1252 1efefb2a049-1efefb2a063 1249->1252 1250->1245 1255 1efefb29ee3-1efefb29ee4 1250->1255 1253->1254 1259 1efefb29f88-1efefb29f90 1253->1259 1254->1252 1258 1efefb29ee6-1efefb29ef2 1255->1258 1264 1efefb29ef4 1258->1264 1265 1efefb29ef8-1efefb29f03 1258->1265 1260 1efefb29f92-1efefb29fa2 call 1efefb1b714 call 1efefb1bd3c 1259->1260 1261 1efefb29fa7-1efefb29fc3 call 1efefb1bf24 1259->1261 1284 1efefb2a047 1260->1284 1278 1efefb29fc5-1efefb29fc6 1261->1278 1279 1efefb2a007-1efefb2a022 call 1efefb2adec 1261->1279 1264->1265 1266 1efefb29f05 1265->1266 1267 1efefb29f09-1efefb29f10 1265->1267 1266->1267 1271 1efefb29f12-1efefb29f15 1267->1271 1272 1efefb29f1c-1efefb29f28 1267->1272 1271->1272 1276 1efefb29f17-1efefb29f1a 1271->1276 1276->1258 1276->1272 1282 1efefb29fc8-1efefb29fd4 1278->1282 1287 1efefb2a031 1279->1287 1288 1efefb2a024-1efefb2a02f call 1efefb1b714 1279->1288 1285 1efefb29fd6 1282->1285 1286 1efefb29fda-1efefb29fe4 1282->1286 1284->1252 1285->1286 1289 1efefb29fe6 1286->1289 1290 1efefb29fea-1efefb29ff1 1286->1290 1292 1efefb2a034-1efefb2a039 1287->1292 1288->1292 1289->1290 1293 1efefb29ff3-1efefb29ff6 1290->1293 1294 1efefb29ffd-1efefb2a005 1290->1294 1292->1284 1296 1efefb2a03b-1efefb2a040 1292->1296 1293->1294 1297 1efefb29ff8-1efefb29ffb 1293->1297 1294->1292 1296->1284 1297->1282 1297->1294
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction ID: 6247418e6c33b6004488fe31dc2a0b7e86788226740b03cf320054fa5ae8fde2
                                      • Opcode Fuzzy Hash: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction Fuzzy Hash: FB512632514A8B8AFBA8AB18C4413FD32D0FB94321F56467EAC59C31F5E724F9C39251
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction ID: 504066f43ed3a628adf639c7d682acdd3040919e96ecb6010b9142bf46313977
                                      • Opcode Fuzzy Hash: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction Fuzzy Hash: 7B41BF736023E186FB60AB22CD403ED3693E755BD4F924139AED4476E5F628A8C38600

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction ID: a10dd4ff10ded50a91f6d86a9ae91664fc2c2ed9ee05b3fd803f72e35d7f18a4
                                      • Opcode Fuzzy Hash: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction Fuzzy Hash: 2921E732A086824EF7186B68DC863ED72D0EBC5321F16426EEC15C71F3D664788387A6
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction ID: 9b5299f978278d115b1ffc10ce4f1037fa94c7447bd6a0d2c110162b6e963ab4
                                      • Opcode Fuzzy Hash: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction Fuzzy Hash: 7E21C333905A82CEF715AB64C8953EC7690EB51328F17457EAC1A871F3C674A882C761
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction ID: d2559ee674eca2aafb8c2e390506310d3e76ee215e7dff6afa3db8a1550a0ef9
                                      • Opcode Fuzzy Hash: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction Fuzzy Hash: C621AC332002C056F6016F25DC413ED6653AB80BA8F1B413DAF950B3F6FA78A8C3C620
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction ID: 0e114cfaef48c6ac35087cffdb966ecb4a951addc894bee66b8e6d721c9dd96b
                                      • Opcode Fuzzy Hash: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction Fuzzy Hash: C511AF336006C041F615AF35DC413EC6A53A7807A0F5B067DAE950B3F2E67CA8C38718
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$FreeHeap_errno
                                      • String ID:
                                      • API String ID: 2737118440-0
                                      • Opcode ID: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction ID: 8e8001bcffb74ca50eaf6944bad550478dc18f4f235719300710755e3df97b9a
                                      • Opcode Fuzzy Hash: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction Fuzzy Hash: 5E41303151498F8BFBB4EB58E8D5BED32E1F758319F55403D9C05C22A1EA2CA896C711
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction ID: 5017dcedf7f8dc3a6c831e24e899f276a61d1f4c6ce893a37a335228b71b0fc3
                                      • Opcode Fuzzy Hash: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction Fuzzy Hash: 2E91F835718B894BE729AA5CD8417FD73D5EB85700F45422EDC8BD7297EE20B8838682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction ID: a88ab79ba21d1fc127fdff0fe3754001cbfd0550f38a0c8d746e06ca47979929
                                      • Opcode Fuzzy Hash: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction Fuzzy Hash: BE71D4333057C447EA249A26D850BEE6692FB85FC8F42403D9D8647BA6FB38E5878700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _time64$strtok$malloc
                                      • String ID:
                                      • API String ID: 2141844861-0
                                      • Opcode ID: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction ID: 0267f24446eedc4a1ed0825067d5f438dec7d2295a5056f747f75e1355239fb8
                                      • Opcode Fuzzy Hash: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction Fuzzy Hash: 3D910472505AC486E7628B19EC9439D77A2F345B54F13823DEED9867B4EB3DE0D28B00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-3916222277
                                      • Opcode ID: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction ID: a2c526685d3d0c014fd47bc40816add14c547213c664338ebdf3eb9452ba41e8
                                      • Opcode Fuzzy Hash: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction Fuzzy Hash: CA41C173610B8446EB689F25C8513AD37A2E764B98F17412DDE99473E5FA34E8C3C740
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction ID: 73cdde2a46c75c9efa85caabdd304eeb0d4129ad25ad32aa2e8b625148201b95
                                      • Opcode Fuzzy Hash: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction Fuzzy Hash: 2F315232608A894FE754DF18D0857AD76D0FB98350F5246ADEC4DC72A2EA70EC82D785
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction ID: 30981b1276701d1cc13d9c29ab4592722a24c9db39a7e1844e05bcbf34b62a9e
                                      • Opcode Fuzzy Hash: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction Fuzzy Hash: 4431B731A14A4A8FFB54AF69D4057AD72D1FB88318F15467EEC46C32F1EB34D8828742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                      • String ID:
                                      • API String ID: 4120058822-0
                                      • Opcode ID: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction ID: 6ae6a41d512950023e8288af5d91feee1f01fbde61db1040f1c03d40d6bb501a
                                      • Opcode Fuzzy Hash: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction Fuzzy Hash: 7621C432614AC2CEF619AF68D8853ED6690EB85310F16467DAC06CF6F3C66468828661
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction ID: fba8222409169372f2fe53c59ce4eeed4e12f81ba7517082f3a0ef91d61c57b7
                                      • Opcode Fuzzy Hash: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction Fuzzy Hash: AA318C73200B8086FB11AF22DC043AC66E6AB84B94F074539AE85477F5FF3CE5828300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction ID: 990c5873bca45b3c045c9b37fd52a0a36cc96e14c7712b28a5a62824a481ac7a
                                      • Opcode Fuzzy Hash: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction Fuzzy Hash: 3D319C732067C485E7209F11D8887DDA6A6F349BE4F564139AE9807BE5FB34E892C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction ID: c1a5227a18b79807f37ea5c9a5d27b82145873f7046f923f44d3482020f90212
                                      • Opcode Fuzzy Hash: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction Fuzzy Hash: C961C232A18F4A4AE7285A2C88452BD76D5E794724F16033FDC56C32F5DB20BC9782C1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction ID: ba7472848cd0412131dac2f5a1048e1cf4da55a4703a13552d11df6d43cc8ab3
                                      • Opcode Fuzzy Hash: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction Fuzzy Hash: A97113325187848FD344EB18C455B9EB7E1FBD8314F55493DB88AD72B1CB34A986CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction ID: ce2b66a2b6a7605375c8f166ec901750739cf4f74aba68e409305df385be6701
                                      • Opcode Fuzzy Hash: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction Fuzzy Hash: D151C7337042C442EB148A26DD007ED66D2A744BF4F174639AEA947BE4F738E4D38641
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction ID: b2c639ea17b93ea929b2e9cc63dd12923fb89cd7ade04cb5b3d2c8502f766983
                                      • Opcode Fuzzy Hash: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction Fuzzy Hash: 77611C33218AC482E760DB15E88039EB762F7D5794F51412AEECD43BB9EE38D586CB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction ID: 2553df2284d0616160d2e3210208b082045902bed55d66d8e007d7984f81f55d
                                      • Opcode Fuzzy Hash: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction Fuzzy Hash: 7B219732A18B8B4FF754EB28C4053AD76D5EB55314F06457F9C45C32B5EB24EC828751
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction ID: 515f5323567d8548023b62a710eeddb793374292824c64eb07429a96fde590e8
                                      • Opcode Fuzzy Hash: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction Fuzzy Hash: 25319132918A848FE344EB28C4547DE77E0FF98314F41063DBC8AD72B1DA34A982CB46
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction ID: e072d4533409fee136c3c4e747543291516876374b2bc0005cf92a86af3e2351
                                      • Opcode Fuzzy Hash: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction Fuzzy Hash: DC2193733146C285FB619B32DC0139EA693A744BC4F074439ADC987BA6FB3DD4829711
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction ID: 62bc20fc73ceab2b19c7bbc3f0143c7a5a7cf3d1f1abe8c6797dcc48a81bd788
                                      • Opcode Fuzzy Hash: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction Fuzzy Hash: F421FF33518AC081DA20AB11E89039E6762F7D4794F510239BEDE43AFAEE3CD582CB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_set_error_mode$__crt_errno$ExitMessageProcess_lock_malloc_crtmalloc
                                      • String ID:
                                      • API String ID: 2751257304-0
                                      • Opcode ID: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction ID: d717009d50db3fcaf7df27e522a9a8643c856ebffdfd7b2f347bdb6c7224be04
                                      • Opcode Fuzzy Hash: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction Fuzzy Hash: CB116A332206C481F666AB60ED553ED22A3EB44781F43143CBDCA562F2EE78A8C28350
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction ID: cd096379ca6d516a14ef0fefd08e500e989d3b20cff278ec881bc8613a18b8f7
                                      • Opcode Fuzzy Hash: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction Fuzzy Hash: A1510435618F8A4BE759AB28D8512FD73D8FB49704F51413DEC4BC72A7EA20E8D38681
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction ID: 037ec4921645dfe87e9bacf85e6071b2d7ba075492043d6aaa19ed24585fddbe
                                      • Opcode Fuzzy Hash: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction Fuzzy Hash: 8441CD337516E19BFA189A22DD5169D27A2FB05F84F820438DE9607761EF38E4A3C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc$_errno_snprintf$FreeHeap_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 1397185943-0
                                      • Opcode ID: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction ID: 7fc33a5a21ff0e4ade9156213032903f9853892aee3a5f5b3d7309262ae5dc36
                                      • Opcode Fuzzy Hash: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction Fuzzy Hash: B6E14F726146858FF354FB24C8517EE77E2FB84704F55453EAC86DB2E2DA34A882CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 74200508-0
                                      • Opcode ID: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction ID: 0f7560bc02c27b51a1304bbcd3bfa1075a982ead47f24f7a5491b423633aa736
                                      • Opcode Fuzzy Hash: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction Fuzzy Hash: BCD139732156C086F750AB65EC517EE66A3E7C4344F52003DAEC9876F6EF38E8868B41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _lock$_calloc_crt_mtinitlocknum
                                      • String ID:
                                      • API String ID: 3962633935-0
                                      • Opcode ID: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction ID: 9c033a1a07401dcff29bf109f6ba17b44c683a4ac55e61f7148b86564a3399bc
                                      • Opcode Fuzzy Hash: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction Fuzzy Hash: F051D871524A4ACBF7549F58C8853A9B3D0FB98310F16456DEC8ACB1B7D674EC838682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction ID: d731c08880f9dc1c80b4a09dc3b0fbef8a285d34fc482499b12c994f7a7c566e
                                      • Opcode Fuzzy Hash: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction Fuzzy Hash: 3241FB32618B8D0FE769BA2CD8012BE72D5E795714F19053DDC8BC7263ED20E8838791
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-0
                                      • Opcode ID: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction ID: 66c2c04462f8cb0ca616be16a3d54ae014b4bfb096217e02e0295eebdd40a1cc
                                      • Opcode Fuzzy Hash: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction Fuzzy Hash: D851D532A14A8A4FEB58EF28C4C17AE77D0EB49314F15456EDC55CB2E6D634E8C2C780
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 343393124-0
                                      • Opcode ID: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction ID: 851aef037a718d535ee19652ea3a89be1dbb528adadcc36148bb08cb0c2e8c28
                                      • Opcode Fuzzy Hash: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction Fuzzy Hash: 1941AB32218A854FE750EF28C454BAEB7F1FB99354F55053DEC89D72B0DA25E982C702
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction ID: e6e231762fcb41981e65eb4368d43c6d56830b7ae78e76c30f4b4dbcb2f33ffe
                                      • Opcode Fuzzy Hash: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction Fuzzy Hash: CF41EF333152C146EA599B2ADC0029E6B96F755B88F5B8038DD958B761FF38E987C300
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno_malloc_crt$_calloc_crt_calloc_impl_getptd_noexit_invalid_parameter_noinfo_invoke_watson_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 321378830-0
                                      • Opcode ID: 1af5591cc140629ef8a1eaab72b160ba28423dfa39d6b40620a42b0b9187e2b6
                                      • Instruction ID: 12ffdf3b83692dde31aef7f246ac4b24e9aebfc6b7fdd0b030326e877b086b6e
                                      • Opcode Fuzzy Hash: 1af5591cc140629ef8a1eaab72b160ba28423dfa39d6b40620a42b0b9187e2b6
                                      • Instruction Fuzzy Hash: 5F21B732714E8E4EF754AF69D4467ED72C0FB94320F52453E9C4DC21F2EA24A8878682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno_malloc_crt$_calloc_crt_calloc_impl_getptd_noexit_invalid_parameter_noinfo_invoke_watson_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 321378830-0
                                      • Opcode ID: 8a2acd4545fb3e1ff377b7186d7311079e6a4c6a1743b8f02e9e066f6884292d
                                      • Instruction ID: 417e579dc360734a1c4d357716ab7e59db885e74fa9e87099cc230b3e848894b
                                      • Opcode Fuzzy Hash: 8a2acd4545fb3e1ff377b7186d7311079e6a4c6a1743b8f02e9e066f6884292d
                                      • Instruction Fuzzy Hash: A2218132718E8B4AF7656F18D8517ED72C0FBC4750F52053EDC5AC22F2EA64A8939682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_calloc_crt_errno_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 3700215360-0
                                      • Opcode ID: 5671fb06d6f05841401363cc8443e27ee7f0052eb4ca124240904de72179e6d7
                                      • Instruction ID: 5cc1b0c8d83a863f83c0dee679eab65e4a435e26d8be59e41c73cc2a37c345f2
                                      • Opcode Fuzzy Hash: 5671fb06d6f05841401363cc8443e27ee7f0052eb4ca124240904de72179e6d7
                                      • Instruction Fuzzy Hash: 7F21B332718E5B4AF765AB18D8517ED72C0FBC4350F42053EDC4BC21E2FE24A8839682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_calloc_crt_errno_recalloc_recalloc_crt
                                      • String ID:
                                      • API String ID: 3700215360-0
                                      • Opcode ID: d21b9421d81b7aad527b41b40eb760196fdcb429390ac35a4901b8c372e18314
                                      • Instruction ID: bc2036fe1a440b6b74789a1c326b0d344b8b4353ab69935c277c93587f2b06d9
                                      • Opcode Fuzzy Hash: d21b9421d81b7aad527b41b40eb760196fdcb429390ac35a4901b8c372e18314
                                      • Instruction Fuzzy Hash: 37219232718A8E4EF754AB69D8463ED73C1EBD4350F52453E9C4EC21F2FE24A8878242
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction ID: 0af3ea517ad16154015e506f21a293049134497c63f1a2c2de13f18dbd85ca9a
                                      • Opcode Fuzzy Hash: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction Fuzzy Hash: 1F01D6326149CACEF659AF28CD417DC3590EF56329F56C26D9C19CB4F3C67824C28622
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction ID: cb94ec7ff9e55770c08e43d93b7d2cc61838f73c2defc66d024379109e1c0a65
                                      • Opcode Fuzzy Hash: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction Fuzzy Hash: 05014B715287899FE384EB18C485B9EB7E1FBC8705F81083EBC89C22A1DB34A485C743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction ID: e6c337819db2d59254deff02dbfb8da1b49f01f989f9e5a9fa01e4c0f9f700de
                                      • Opcode Fuzzy Hash: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction Fuzzy Hash: 5D014B737127C441EA455B14CC813EC36939B54BB5F57433ADEAA0A3F2E72864938211
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction ID: 433d9fea216a96f2777ff6befad4498d75c08cfbe141041c3a6bda54f1296155
                                      • Opcode Fuzzy Hash: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction Fuzzy Hash: A9F0C972528AC086D644AB51F85169EA361FBC4780F42112ABECD56B79EB38D592CB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction ID: baf1bb0367ddf73bba9faef147640ddf517987ecada1a75c7599756ebb901295
                                      • Opcode Fuzzy Hash: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction Fuzzy Hash: A79143325187C58FE764EB28C4457DFB7E5FB84304F51093EA88AC72A2DB74A886C742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction ID: 7695a38c0f400f8c3641e073599bc0c34e29ea2b82011790fde1dfd55439fb1f
                                      • Opcode Fuzzy Hash: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction Fuzzy Hash: F68102331086C08AE760DB25E8513DE7762F7C5740F520439EEC987AB9EB79E586CB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction ID: 4206c62d69d4845769304387b83430c238a308bc1c8dddfee8d7b3adbf332685
                                      • Opcode Fuzzy Hash: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction Fuzzy Hash: 5B31DC7451CB889FDB84EF18C044A5AB7E1FB9C315F10066EA88DD73A1DB34E982CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction ID: 71d8e0cd21fde519baff49f86d1805e4c1068eecd0d4156c30398f344e3b7970
                                      • Opcode Fuzzy Hash: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction Fuzzy Hash: 4421E976608B8486CA24DB16E45025EB7A1F7CDB94F114225EEDD43BA8DF3CC682CF00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction ID: 76e227a2f021f97d8b6c2a97937821c32687c19df1948f7c9e215b7e9c57b8da
                                      • Opcode Fuzzy Hash: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction Fuzzy Hash: B051B831A18F4A4AE6686A6DE4453BD72C5EB59314F16023FDC5AC31F6EB61FC8381C1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction ID: 78c3748c531b41c343cfdd49331420262d5b061655f6d77c86819d08c7d787d5
                                      • Opcode Fuzzy Hash: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction Fuzzy Hash: 8E41C2337003C046EF659E22DD443AEB692B744BE4F1B42389ED647AE5FA78E5C38601
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 8ffb2876aded5dd2d9f0b2fa3919b1d5f7be1cffbdce7306ba7c756cf2c51de1
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: B221F97240C7590AE764B9E8D8423AEB6C0DB85750F1A023EEC87D7162E550ACC382C6
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction ID: dafd8fe4c5e51625a3683146e6e53894808d81042b5240af16ad6a66376cf01d
                                      • Opcode Fuzzy Hash: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction Fuzzy Hash: 1A212B725186E64AF7949E28C0943BE36D1E7C4395F060E7DAC9EC71F1EB2098C3E251
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction ID: e07a7eabcd1a3edcd82c98b7d912f58d52e3c6b269668c0aad11d3fa05635633
                                      • Opcode Fuzzy Hash: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction Fuzzy Hash: B121F3B36063E441EB605615D8503BD6BD3E384BD4F6E4139AEC60BAE5F92CD6C38710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 4f74204a94a95a44534630a26078d98ebab48d2b31f99bf34be1ac96c216eaa6
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: A811B2336057C446E6649EA6F8402AFB691B7843D8F1B1039EEC4436B1F975E8C28600
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 3587327836-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 12ccdbb53da02943dad4ec4b46c4532145adbf0aa7b6d8ff1945b00ae11fd1a2
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: FF61C932229BC486E750DB15E88039EB7A1F3C5790F515129EEC947BB9DF78D486CB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction ID: c1dfe804664f679f0a8e76c46b383d827713736ed1261fa2f8bdc066c752886e
                                      • Opcode Fuzzy Hash: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction Fuzzy Hash: F7D119712587858FD7A4DB18C0447AFB7E0FB8A764F95193DA9C9DB260DB30A881C707
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction ID: eb5dc3eca78e97f2576a27355f27e9b08970e09053b7e1a26a7203f6145ff8ba
                                      • Opcode Fuzzy Hash: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction Fuzzy Hash: 32110431618B8D8FD744EF1CD4857A9B3D1FB98328F1043AEA819C32A1DB34D981CB82
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CaptureContextPrevious__crt__raise_securityfailure
                                      • String ID: sv-FI
                                      • API String ID: 37250909-2947700294
                                      • Opcode ID: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction ID: 6ff646baf85d772e4ecb74f49ad0d18fb383bff472951b0654d63164f61e9727
                                      • Opcode Fuzzy Hash: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction Fuzzy Hash: AD21C476216B8482EA509B18EC5139E67A6F384384FA7013ADECD567B5FF38E4968300
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction ID: 850f22a3b87cbbec30c7917a3815a9931976fe76d81eb6506c6abbab7d44babf
                                      • Opcode Fuzzy Hash: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction Fuzzy Hash: 5D11827361068086EB109F52D84079DB662FB98FD4F564324AF98077A5EF38D286CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_calloc_implcalloc
                                      • String ID:
                                      • API String ID: 4000150058-0
                                      • Opcode ID: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction ID: abff4a8dd65d7522dc5673c75c45b4e7c999ff6b2333088bb52d203c6c22a83b
                                      • Opcode Fuzzy Hash: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction Fuzzy Hash: 34C1E933605B848BE764CF55E88079E77A5F788B84F11412AEE8D47B68EB38D495CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction ID: a5a585e57fa0eebceb729b91d56b8bb0b35db8c320a6d05dca08f6a8c8966829
                                      • Opcode Fuzzy Hash: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction Fuzzy Hash: FBC1D5762186C08AD7B0CE15E49039FB7A1F799799F41112AEFCA83B68DB39D481CF05
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: 6075c2b9620be62b660eb58fac2e3e42fcd3708b05f24780d92d91ebd21f9a73
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: FD914331118B888FE764EF18D854B9FB7E1FBD9341F40092DD88AD32A1DB74A985CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction ID: 9285530f560ca1217c474b70f2b7f1eebfc0a7978b8b8ff7780a9815ee8fb086
                                      • Opcode Fuzzy Hash: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction Fuzzy Hash: 1F51C63661CA854BEB58AF28D8812AE33D5FB94700F05457DEC4BD7296EA30FCC78681
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: 6484798f8a8f2b19313e32959fb7e14b3e38ea4d450ea6e152653e4e60b4c1cb
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: 7381CD36219AC486E7209B55F8503DEB762F785798F51022ADEDD43BA9EF3CD486CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction ID: ae123715673475491310650b84cf851e86fcd6aa3e041d5502222bf947e0a988
                                      • Opcode Fuzzy Hash: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction Fuzzy Hash: F141A2337016C087EB58DB26E810AAD67A2F744F84F468438DE9A47B65FF35E886C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 02726748547ca960b1b7dd73ad37504d1df82d1dcee52cfb7025f168ab0f7ff0
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: B0415331518A898FE751EB18D844BDA77E1FB98314FA1053EAC4AC32F1DB34E986C742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction ID: c6048d2187d013b595e50f2322d7d073ceb4907c152a1c0c098e7f3391679838
                                      • Opcode Fuzzy Hash: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction Fuzzy Hash: 8A310571918B8D9FE790FB18C444B6977E1F799319F91062EA88AC32B1D734E982C702
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 90088dbba0e872cd767d283bc57ab3659cf6a6511cc277b36a22be865f66edf4
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 4C313D73124AC481EA619B55EC403DE6762F3887A4F52423AAEED47BF4EB3CD582C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000003.2636693796.000001EFEF94D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001EFEF930000, based on PE: true
                                      • Associated: 00000004.00000003.2636672004.000001EFEF930000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000004.00000003.2636693796.000001EFEF98C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_3_1efef930000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction ID: 0f9d1c16acd85ff2ade5f6ddfc9528978b22f1ff656c0365e4b44387e2dbd4b1
                                      • Opcode Fuzzy Hash: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction Fuzzy Hash: A421B932114BC485DA619B15EC5039E6762F3857A4F53522AEEEE467F5EF3CE1828700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.2645317984.000001EFEFAE1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001EFEFAE1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_1efefae1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$FreeHeap_errno
                                      • String ID:
                                      • API String ID: 2737118440-0
                                      • Opcode ID: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction ID: 5e3cd979328ba58d7afb261798368a2faef81f79bb114376b49c5508f89b7a64
                                      • Opcode Fuzzy Hash: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction Fuzzy Hash: 35F0AC3552C989AFD6C8FB18D491E9D77E1FF98304F81146DB849C33B2EA20E851CB02

                                      Execution Graph

                                      Execution Coverage:0.9%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:16
                                      execution_graph 15479 1bfcabdd0fc 15480 1bfcabdd134 15479->15480 15483 1bfcabdd123 15479->15483 15532 1bfcabf6f68 15480->15532 15481 1bfcabdd12a 15483->15481 15485 1bfcabdd228 VirtualFree 15483->15485 15486 1bfcabdd1d7 15483->15486 15485->15486 15487 1bfcabccb50 15486->15487 15540 1bfcabd7f80 15487->15540 15489 1bfcabccb6e 15547 1bfcabf9468 15489->15547 15491 1bfcabccc53 15559 1bfcabf8aec 15491->15559 15494 1bfcabf8aec RtlFreeHeap 15495 1bfcabccd09 15494->15495 15497 1bfcabccd17 15495->15497 15592 1bfcabf7fc8 15495->15592 15498 1bfcabccd31 15497->15498 15499 1bfcabf7fc8 RtlFreeHeap 15497->15499 15566 1bfcabd02c0 15498->15566 15499->15498 15502 1bfcabccd49 15572 1bfcabd03ac 15502->15572 15503 1bfcabf7fc8 RtlFreeHeap 15503->15502 15506 1bfcabf7fc8 RtlFreeHeap 15507 1bfcabccd57 15506->15507 15508 1bfcabf9468 malloc RtlFreeHeap 15507->15508 15509 1bfcabccd87 15508->15509 15510 1bfcabccd99 15509->15510 15511 1bfcabf7fc8 RtlFreeHeap 15509->15511 15512 1bfcabf8aec RtlFreeHeap 15510->15512 15511->15510 15513 1bfcabccdc3 15512->15513 15582 1bfcabd7ac8 15513->15582 15515 1bfcabcd076 15658 1bfcabf9428 15515->15658 15517 1bfcabf7820 RtlFreeHeap 15530 1bfcabccdd9 15517->15530 15518 1bfcabcd080 15520 1bfcabf7fc8 RtlFreeHeap 15518->15520 15519 1bfcabf9700 RtlFreeHeap _snprintf 15519->15530 15521 1bfcabcd085 15520->15521 15521->15481 15526 1bfcabd2b5c RtlFreeHeap 15526->15530 15528 1bfcabf7fc8 RtlFreeHeap 15528->15530 15529 1bfcabd3598 RtlFreeHeap 15529->15530 15530->15515 15530->15517 15530->15519 15530->15526 15530->15528 15530->15529 15596 1bfcabcf978 15530->15596 15600 1bfcabf68d4 15530->15600 15619 1bfcabdc964 15530->15619 15623 1bfcabd9294 15530->15623 15630 1bfcabd6198 15530->15630 15638 1bfcabcfbec 15530->15638 15533 1bfcabf9468 malloc RtlFreeHeap 15532->15533 15534 1bfcabf6f8c 15533->15534 15535 1bfcabf8aec RtlFreeHeap 15534->15535 15538 1bfcabf6fc9 15535->15538 15536 1bfcabf7045 15536->15481 15537 1bfcabf9468 malloc RtlFreeHeap 15537->15538 15538->15536 15538->15537 15539 1bfcabf8aec RtlFreeHeap 15538->15539 15539->15538 15541 1bfcabf9468 malloc RtlFreeHeap 15540->15541 15542 1bfcabd7f9c 15541->15542 15543 1bfcabf9468 malloc RtlFreeHeap 15542->15543 15546 1bfcabd7fa9 15542->15546 15544 1bfcabd7fba 15543->15544 15545 1bfcabf9428 free RtlFreeHeap 15544->15545 15544->15546 15545->15546 15546->15489 15548 1bfcabf94fc _callnewh 15547->15548 15553 1bfcabf9480 _callnewh 15547->15553 15549 1bfcabfb714 _errno RtlFreeHeap 15548->15549 15558 1bfcabf94f1 15549->15558 15552 1bfcabf94e1 15708 1bfcabfb714 15552->15708 15553->15552 15556 1bfcabf94e6 15553->15556 15553->15558 15661 1bfcabfb7ec 15553->15661 15670 1bfcabfb860 15553->15670 15686 1bfcabf9b1c 15553->15686 15557 1bfcabfb714 _errno RtlFreeHeap 15556->15557 15557->15558 15558->15491 15560 1bfcabf8b18 15559->15560 15561 1bfcabcccdb 15559->15561 15562 1bfcabf8b35 15560->15562 15563 1bfcabf8b22 15560->15563 15561->15494 15783 1bfcabfb310 15562->15783 15564 1bfcabf9468 malloc RtlFreeHeap 15563->15564 15564->15561 15568 1bfcabd02dd 15566->15568 15567 1bfcabccd40 15567->15502 15567->15503 15568->15567 15797 1bfcabf6294 15568->15797 15570 1bfcabd036c 15801 1bfcabf62e0 15570->15801 15573 1bfcabd03d0 15572->15573 15574 1bfcabccd4e 15573->15574 15575 1bfcabf9468 malloc RtlFreeHeap 15573->15575 15574->15506 15574->15507 15577 1bfcabd04ed 15575->15577 15576 1bfcabd057c 15579 1bfcabf9428 free RtlFreeHeap 15576->15579 15577->15576 15578 1bfcabf6294 RtlFreeHeap 15577->15578 15580 1bfcabd0553 15578->15580 15579->15574 15581 1bfcabf62e0 RtlFreeHeap 15580->15581 15581->15576 15583 1bfcabd7add 15582->15583 16024 1bfcabf6d54 15583->16024 15585 1bfcabd7b0e 16028 1bfcabfa014 15585->16028 15587 1bfcabd7b2d 16031 1bfcabd7cfc 15587->16031 15589 1bfcabd7c3a 16042 1bfcabf67bc 15589->16042 15591 1bfcabd7cb1 15591->15530 15593 1bfcabf7fd6 15592->15593 16148 1bfcabf8c40 15593->16148 15597 1bfcabcf995 _wcsupr_s 15596->15597 16156 1bfcabcf484 15597->16156 15599 1bfcabcf9ae _wcsupr_s 15599->15530 15601 1bfcabf6908 15600->15601 15616 1bfcabf6901 15600->15616 15602 1bfcabf9468 malloc RtlFreeHeap 15601->15602 15603 1bfcabf691c 15602->15603 15604 1bfcabf6948 15603->15604 15605 1bfcabf6937 15603->15605 16200 1bfcabc198c 15604->16200 15606 1bfcabf9428 free RtlFreeHeap 15605->15606 15606->15616 15608 1bfcabf698d 15609 1bfcabf69df 15608->15609 15611 1bfcabf69f0 15608->15611 15610 1bfcabf9428 free RtlFreeHeap 15609->15610 15610->15616 15612 1bfcabf6b19 15611->15612 15617 1bfcabf6b44 15611->15617 15613 1bfcabf9428 free RtlFreeHeap 15612->15613 15614 1bfcabf6b23 15613->15614 16210 1bfcabcf250 15614->16210 15616->15530 15617->15616 15618 1bfcabf9428 free RtlFreeHeap 15617->15618 15618->15616 15621 1bfcabdc97a 15619->15621 15620 1bfcabdc9d1 15620->15530 15621->15620 16302 1bfcabdbdf4 15621->16302 17911 1bfcabd92e8 15623->17911 15626 1bfcabd92a7 15627 1bfcabd92d7 15626->15627 17918 1bfcabd991c 15626->17918 17922 1bfcabd9bbc 15627->17922 15631 1bfcabd61d9 15630->15631 15632 1bfcabd61d4 15630->15632 15633 1bfcabf9468 malloc RtlFreeHeap 15631->15633 15632->15530 15637 1bfcabd61e6 15633->15637 15634 1bfcabf9428 free RtlFreeHeap 15635 1bfcabd6300 15634->15635 15636 1bfcabd630c RtlFreeHeap 15635->15636 15636->15632 15637->15634 15639 1bfcabcfc7a 15638->15639 15653 1bfcabcfc75 _wcsupr_s 15638->15653 15640 1bfcabdb828 RtlFreeHeap 15639->15640 15641 1bfcabcfc8d 15640->15641 15642 1bfcabf9700 _snprintf RtlFreeHeap 15641->15642 15643 1bfcabcfcae 15642->15643 15644 1bfcabf9700 _snprintf RtlFreeHeap 15643->15644 15645 1bfcabcfcce 15644->15645 15646 1bfcabdabbc RtlFreeHeap 15645->15646 15647 1bfcabcfd49 15646->15647 15648 1bfcabcfd7e 15647->15648 15649 1bfcabcfda1 15647->15649 15650 1bfcabf9700 _snprintf RtlFreeHeap 15648->15650 15651 1bfcabf9700 _snprintf RtlFreeHeap 15649->15651 15654 1bfcabcfd9f _wcsupr_s 15650->15654 15651->15654 15652 1bfcabdb808 RtlFreeHeap 15652->15653 15653->15530 15655 1bfcabd0038 RtlFreeHeap 15654->15655 15656 1bfcabcfeb6 15654->15656 15655->15656 15656->15652 15657 1bfcabcfec9 15656->15657 15657->15530 15659 1bfcabf942d RtlFreeHeap 15658->15659 15660 1bfcabf9448 _errno _dosmaperr 15658->15660 15659->15660 15660->15518 15711 1bfcac02f24 15661->15711 15663 1bfcabfb7fa 15664 1bfcabfb809 15663->15664 15665 1bfcac02f24 _set_error_mode RtlFreeHeap 15663->15665 15666 1bfcabfb860 _NMSG_WRITE RtlFreeHeap 15664->15666 15668 1bfcabfb82a 15664->15668 15665->15664 15667 1bfcabfb820 15666->15667 15669 1bfcabfb860 _NMSG_WRITE RtlFreeHeap 15667->15669 15668->15553 15669->15668 15671 1bfcabfb894 _NMSG_WRITE 15670->15671 15672 1bfcac02f24 _set_error_mode RtlFreeHeap 15671->15672 15685 1bfcabfb9b1 __crtMessageBoxW _invoke_watson 15671->15685 15673 1bfcabfb8aa 15672->15673 15674 1bfcac02f24 _set_error_mode RtlFreeHeap 15673->15674 15673->15685 15675 1bfcabfb8bb 15674->15675 15675->15685 15715 1bfcac02dd0 15675->15715 15677 1bfcabfb8f7 15678 1bfcac02dd0 _wsetenvp RtlFreeHeap 15677->15678 15680 1bfcabfb937 _wsetenvp 15677->15680 15677->15685 15678->15680 15679 1bfcabfb981 15679->15685 15729 1bfcac02d48 15679->15729 15680->15679 15680->15685 15722 1bfcac02e58 15680->15722 15682 1bfcabfb99b 15684 1bfcac02d48 _NMSG_WRITE RtlFreeHeap 15682->15684 15682->15685 15684->15685 15685->15553 15687 1bfcabf9b29 __crtCorExitProcess 15686->15687 15688 1bfcabf9b6d 15687->15688 15690 1bfcabf9428 free RtlFreeHeap 15687->15690 15689 1bfcabf9428 free RtlFreeHeap 15688->15689 15691 1bfcabf9b7c 15689->15691 15690->15687 15692 1bfcabf9ba3 15691->15692 15694 1bfcabf9428 free RtlFreeHeap 15691->15694 15693 1bfcabf9428 free RtlFreeHeap 15692->15693 15695 1bfcabf9bb2 15693->15695 15694->15691 15696 1bfcabf9428 free RtlFreeHeap 15695->15696 15697 1bfcabf9bc6 15696->15697 15698 1bfcabf9428 free RtlFreeHeap 15697->15698 15699 1bfcabf9bd2 15698->15699 15700 1bfcabf9bfd 15699->15700 15701 1bfcabf9428 free RtlFreeHeap 15699->15701 15702 1bfcabf9c1e 15700->15702 15703 1bfcabf9428 free RtlFreeHeap 15700->15703 15701->15700 15704 1bfcabf9428 free RtlFreeHeap 15702->15704 15705 1bfcabf9c37 15702->15705 15703->15702 15704->15705 15706 1bfcabf9c68 15705->15706 15707 1bfcabf9428 free RtlFreeHeap 15705->15707 15706->15553 15707->15706 15736 1bfcabff438 15708->15736 15712 1bfcac02f2c 15711->15712 15713 1bfcabfb714 _errno RtlFreeHeap 15712->15713 15714 1bfcac02f36 _invalid_parameter_noinfo 15712->15714 15713->15714 15714->15663 15716 1bfcac02de8 15715->15716 15717 1bfcac02dde 15715->15717 15718 1bfcabfb714 _errno RtlFreeHeap 15716->15718 15717->15716 15720 1bfcac02e05 15717->15720 15719 1bfcac02df1 _invalid_parameter_noinfo 15718->15719 15719->15677 15720->15719 15721 1bfcabfb714 _errno RtlFreeHeap 15720->15721 15721->15719 15726 1bfcac02e65 15722->15726 15723 1bfcac02e6a 15724 1bfcac02e6f _invalid_parameter_noinfo 15723->15724 15725 1bfcabfb714 _errno RtlFreeHeap 15723->15725 15724->15679 15725->15724 15726->15723 15726->15724 15727 1bfcac02ea8 15726->15727 15727->15724 15728 1bfcabfb714 _errno RtlFreeHeap 15727->15728 15728->15724 15730 1bfcac02d63 15729->15730 15732 1bfcac02d59 15729->15732 15731 1bfcabfb714 _errno RtlFreeHeap 15730->15731 15735 1bfcac02d6c _invalid_parameter_noinfo 15731->15735 15732->15730 15733 1bfcac02d9a 15732->15733 15734 1bfcabfb714 _errno RtlFreeHeap 15733->15734 15733->15735 15734->15735 15735->15682 15737 1bfcabff448 _getptd_noexit 15736->15737 15744 1bfcabfb71d 15737->15744 15745 1bfcabfe2f8 15737->15745 15739 1bfcabff46a _getptd_noexit 15740 1bfcabff487 15739->15740 15741 1bfcabff49d 15739->15741 15739->15744 15749 1bfcabff4bc 15740->15749 15743 1bfcabf9428 free RtlFreeHeap 15741->15743 15743->15744 15744->15556 15747 1bfcabfe31d 15745->15747 15748 1bfcabfe35a 15747->15748 15754 1bfcac03a60 15747->15754 15748->15739 15758 1bfcabfd958 15749->15758 15755 1bfcac03a75 15754->15755 15757 1bfcac03a88 _callnewh 15754->15757 15756 1bfcabfb714 _errno RtlFreeHeap 15755->15756 15755->15757 15756->15757 15757->15747 15759 1bfcabfd976 15758->15759 15760 1bfcabfd97b 15758->15760 15762 1bfcabfda24 15759->15762 15763 1bfcabfda41 15762->15763 15764 1bfcabfda5a 15762->15764 15765 1bfcabfb7ec _FF_MSGBANNER RtlFreeHeap 15763->15765 15778 1bfcabfda6b 15764->15778 15779 1bfcabfe378 15764->15779 15767 1bfcabfda46 15765->15767 15768 1bfcabfb860 _NMSG_WRITE RtlFreeHeap 15767->15768 15770 1bfcabfda50 15768->15770 15773 1bfcabf9b1c _mtinitlocknum RtlFreeHeap 15770->15773 15771 1bfcabfda93 15775 1bfcabfd958 _lock RtlFreeHeap 15771->15775 15772 1bfcabfda84 15774 1bfcabfb714 _errno RtlFreeHeap 15772->15774 15773->15764 15774->15778 15776 1bfcabfda9d 15775->15776 15777 1bfcabf9428 free RtlFreeHeap 15776->15777 15776->15778 15777->15778 15778->15760 15781 1bfcabfe3a0 15779->15781 15780 1bfcabf9468 malloc RtlFreeHeap 15780->15781 15781->15780 15782 1bfcabfda7c 15781->15782 15782->15771 15782->15772 15784 1bfcabfb32a 15783->15784 15785 1bfcabfb334 15783->15785 15786 1bfcabf9468 malloc RtlFreeHeap 15784->15786 15787 1bfcabfb339 15785->15787 15791 1bfcabfb340 _callnewh 15785->15791 15794 1bfcabfb332 _dosmaperr 15786->15794 15788 1bfcabf9428 free RtlFreeHeap 15787->15788 15788->15794 15789 1bfcabfb389 _callnewh 15790 1bfcabfb714 _errno RtlFreeHeap 15789->15790 15790->15794 15791->15789 15792 1bfcabfb3c7 15791->15792 15791->15794 15795 1bfcabfb3ae 15791->15795 15793 1bfcabfb714 _errno RtlFreeHeap 15792->15793 15793->15794 15794->15561 15796 1bfcabfb714 _errno RtlFreeHeap 15795->15796 15796->15794 15798 1bfcabf62b3 15797->15798 15799 1bfcabf62af 15797->15799 15806 1bfcabf66ec 15798->15806 15799->15570 15802 1bfcabf9700 _snprintf RtlFreeHeap 15801->15802 15803 1bfcabf637c 15802->15803 15804 1bfcabf9700 _snprintf RtlFreeHeap 15803->15804 15805 1bfcabf639a _openfile 15804->15805 15805->15567 15813 1bfcabf9700 15806->15813 15808 1bfcabf6712 15809 1bfcabf9700 _snprintf RtlFreeHeap 15808->15809 15810 1bfcabf67a2 15809->15810 15822 1bfcabf99cc 15810->15822 15817 1bfcabf9732 memcpy_s 15813->15817 15814 1bfcabf9737 15815 1bfcabfb714 _errno RtlFreeHeap 15814->15815 15820 1bfcabf973c _invalid_parameter_noinfo 15815->15820 15816 1bfcabf9756 15826 1bfcabfbfcc 15816->15826 15817->15814 15817->15816 15819 1bfcabf9786 15819->15820 15843 1bfcabfbd98 15819->15843 15820->15808 15823 1bfcabfd8b8 15822->15823 16004 1bfcabfd67c 15823->16004 15825 1bfcabf67ac 15825->15799 15864 1bfcabfbf24 15826->15864 15829 1bfcabfb714 _errno RtlFreeHeap 15830 1bfcabfc037 15829->15830 15831 1bfcabfc997 15830->15831 15841 1bfcabfc064 _snprintf 15830->15841 15872 1bfcabff624 15830->15872 15832 1bfcabfb714 _errno RtlFreeHeap 15831->15832 15834 1bfcabfc99c _invalid_parameter_noinfo __crtMessageBoxW 15832->15834 15834->15819 15836 1bfcabfc9ec RtlFreeHeap write_char 15836->15841 15837 1bfcabf9428 free RtlFreeHeap 15837->15841 15838 1bfcac03864 RtlFreeHeap _snprintf 15838->15841 15839 1bfcabfe378 _malloc_crt RtlFreeHeap 15839->15841 15840 1bfcabfd594 RtlFreeHeap write_multi_char 15840->15841 15841->15831 15841->15834 15841->15836 15841->15837 15841->15838 15841->15839 15841->15840 15842 1bfcabfd5e8 RtlFreeHeap write_string 15841->15842 15876 1bfcac03634 15841->15876 15842->15841 15844 1bfcabff624 _fileno RtlFreeHeap 15843->15844 15845 1bfcabfbdba 15844->15845 15846 1bfcabfbddc 15845->15846 15847 1bfcabfbdc5 15845->15847 15848 1bfcabfbdee write_char 15846->15848 15849 1bfcabfbde1 15846->15849 15850 1bfcabfb714 _errno RtlFreeHeap 15847->15850 15852 1bfcabfbdca 15848->15852 15853 1bfcabfbe53 15848->15853 15860 1bfcabfbe47 15848->15860 15897 1bfcac031dc 15848->15897 15851 1bfcabfb714 _errno RtlFreeHeap 15849->15851 15850->15852 15851->15852 15852->15820 15854 1bfcabfbeeb 15853->15854 15855 1bfcabfbe60 15853->15855 15856 1bfcac00504 _flush RtlFreeHeap 15854->15856 15857 1bfcabfbe7c 15855->15857 15861 1bfcabfbe95 15855->15861 15856->15852 15906 1bfcac00504 15857->15906 15860->15853 15903 1bfcac0323c 15860->15903 15861->15852 15926 1bfcac01cd8 15861->15926 15865 1bfcabfbf3a 15864->15865 15871 1bfcabfbf9b 15864->15871 15879 1bfcabff414 15865->15879 15867 1bfcabfbf3f 15868 1bfcabfbf74 15867->15868 15882 1bfcac03558 15867->15882 15868->15871 15890 1bfcabfecdc 15868->15890 15871->15829 15873 1bfcabff62d 15872->15873 15875 1bfcabff632 _invalid_parameter_noinfo 15872->15875 15874 1bfcabfb714 _errno RtlFreeHeap 15873->15874 15874->15875 15875->15841 15877 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 15876->15877 15878 1bfcac03646 15877->15878 15878->15841 15880 1bfcabff438 _getptd_noexit RtlFreeHeap 15879->15880 15881 1bfcabff41f 15880->15881 15881->15867 15883 1bfcabff414 _getptd RtlFreeHeap 15882->15883 15884 1bfcac03563 15883->15884 15885 1bfcac0358c 15884->15885 15886 1bfcac0357e 15884->15886 15887 1bfcabfd958 _lock RtlFreeHeap 15885->15887 15888 1bfcabff414 _getptd RtlFreeHeap 15886->15888 15889 1bfcac03583 __updatetmbcinfo _updatetlocinfoEx_nolock 15887->15889 15888->15889 15889->15868 15891 1bfcabff414 _getptd RtlFreeHeap 15890->15891 15892 1bfcabfeceb 15891->15892 15893 1bfcabfd958 _lock RtlFreeHeap 15892->15893 15894 1bfcabfed06 __updatetmbcinfo 15892->15894 15895 1bfcabfed19 15893->15895 15894->15871 15895->15894 15896 1bfcabf9428 free RtlFreeHeap 15895->15896 15896->15894 15898 1bfcac031e5 15897->15898 15900 1bfcac031f2 15897->15900 15899 1bfcabfb714 _errno RtlFreeHeap 15898->15899 15901 1bfcac031ea _invalid_parameter_noinfo 15899->15901 15900->15901 15902 1bfcabfb714 _errno RtlFreeHeap 15900->15902 15901->15860 15902->15901 15904 1bfcabfe378 _malloc_crt RtlFreeHeap 15903->15904 15905 1bfcac03255 15904->15905 15905->15853 15907 1bfcac0053f 15906->15907 15908 1bfcac00527 15906->15908 15909 1bfcac005b6 15907->15909 15913 1bfcac00571 15907->15913 15946 1bfcabfb6a4 15908->15946 15911 1bfcabfb6a4 __doserrno RtlFreeHeap 15909->15911 15914 1bfcac005bb 15911->15914 15949 1bfcac0438c 15913->15949 15917 1bfcabfb714 _errno RtlFreeHeap 15914->15917 15915 1bfcabfb714 _errno RtlFreeHeap 15919 1bfcac00534 _invalid_parameter_noinfo _unlock_fhandle 15915->15919 15917->15919 15918 1bfcac00578 15920 1bfcac00584 15918->15920 15921 1bfcac00595 15918->15921 15919->15852 15953 1bfcac005e4 15920->15953 15923 1bfcabfb714 _errno RtlFreeHeap 15921->15923 15924 1bfcac0059a 15923->15924 15925 1bfcabfb6a4 __doserrno RtlFreeHeap 15924->15925 15925->15919 15927 1bfcac01d13 15926->15927 15928 1bfcac01cfb 15926->15928 15930 1bfcac01d8d 15927->15930 15934 1bfcac01d45 15927->15934 15929 1bfcabfb6a4 __doserrno RtlFreeHeap 15928->15929 15931 1bfcac01d00 15929->15931 15932 1bfcabfb6a4 __doserrno RtlFreeHeap 15930->15932 15933 1bfcabfb714 _errno RtlFreeHeap 15931->15933 15935 1bfcac01d92 15932->15935 15939 1bfcac01d08 _invalid_parameter_noinfo _unlock_fhandle 15933->15939 15936 1bfcac0438c __lock_fhandle RtlFreeHeap 15934->15936 15937 1bfcabfb714 _errno RtlFreeHeap 15935->15937 15938 1bfcac01d4c 15936->15938 15937->15939 15940 1bfcac01d58 15938->15940 15941 1bfcac01d6a 15938->15941 15939->15852 15942 1bfcac01dbc _lseeki64_nolock RtlFreeHeap 15940->15942 15943 1bfcabfb714 _errno RtlFreeHeap 15941->15943 15942->15939 15944 1bfcac01d6f 15943->15944 15945 1bfcabfb6a4 __doserrno RtlFreeHeap 15944->15945 15945->15939 15947 1bfcabff438 _getptd_noexit RtlFreeHeap 15946->15947 15948 1bfcabfb6ad 15947->15948 15948->15915 15950 1bfcac043c4 15949->15950 15952 1bfcac043ce __updatetmbcinfo 15949->15952 15951 1bfcabfd958 _lock RtlFreeHeap 15950->15951 15951->15952 15952->15918 15954 1bfcac00606 15953->15954 15955 1bfcac0063a 15954->15955 15956 1bfcac00696 15954->15956 15971 1bfcac0062e _invalid_parameter_noinfo __crtMessageBoxW 15954->15971 15957 1bfcabfb6a4 __doserrno RtlFreeHeap 15955->15957 15958 1bfcac006ab 15956->15958 15978 1bfcac01dbc 15956->15978 15959 1bfcac0063f 15957->15959 15961 1bfcac031dc _isatty RtlFreeHeap 15958->15961 15962 1bfcabfb714 _errno RtlFreeHeap 15959->15962 15963 1bfcac006b2 15961->15963 15962->15971 15964 1bfcabff414 _getptd RtlFreeHeap 15963->15964 15968 1bfcac00943 15963->15968 15976 1bfcac006d6 _putwch_nolock 15964->15976 15965 1bfcac00cb1 15966 1bfcabfb714 _errno RtlFreeHeap 15965->15966 15965->15971 15967 1bfcac00cdd 15966->15967 15969 1bfcabfb6a4 __doserrno RtlFreeHeap 15967->15969 15968->15965 15970 1bfcac00ca3 15968->15970 15968->15971 15973 1bfcabfb714 _errno RtlFreeHeap 15968->15973 15969->15971 15989 1bfcabfb6c4 15970->15989 15971->15919 15974 1bfcac00c98 15973->15974 15975 1bfcabfb6a4 __doserrno RtlFreeHeap 15974->15975 15975->15970 15976->15968 15986 1bfcac03678 15976->15986 15994 1bfcac046c8 15978->15994 15980 1bfcac01ddb 15981 1bfcac01de1 15980->15981 15984 1bfcac01df2 15980->15984 15982 1bfcabfb714 _errno RtlFreeHeap 15981->15982 15983 1bfcac01de6 15982->15983 15983->15958 15984->15983 15985 1bfcabfb6c4 _dosmaperr RtlFreeHeap 15984->15985 15985->15983 15987 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 15986->15987 15988 1bfcac0368c 15987->15988 15988->15976 15990 1bfcabff438 _getptd_noexit RtlFreeHeap 15989->15990 15991 1bfcabfb6d5 15990->15991 15992 1bfcabff438 _getptd_noexit RtlFreeHeap 15991->15992 15993 1bfcabfb6ee _dosmaperr 15992->15993 15993->15965 15995 1bfcac046d1 15994->15995 15996 1bfcac046e6 15994->15996 15997 1bfcabfb6a4 __doserrno RtlFreeHeap 15995->15997 15998 1bfcabfb6a4 __doserrno RtlFreeHeap 15996->15998 16003 1bfcac046de _invalid_parameter_noinfo 15996->16003 15999 1bfcac046d6 15997->15999 16001 1bfcac04720 15998->16001 16000 1bfcabfb714 _errno RtlFreeHeap 15999->16000 16000->16003 16002 1bfcabfb714 _errno RtlFreeHeap 16001->16002 16002->16003 16003->15980 16005 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 16004->16005 16007 1bfcabfd6a8 16005->16007 16006 1bfcabfd6c3 16008 1bfcabfb714 _errno RtlFreeHeap 16006->16008 16007->16006 16010 1bfcabfd6d8 16007->16010 16013 1bfcabfd6c8 _invalid_parameter_noinfo 16008->16013 16011 1bfcabfd72a 16010->16011 16014 1bfcac03878 16010->16014 16012 1bfcabfb714 _errno RtlFreeHeap 16011->16012 16011->16013 16012->16013 16013->15825 16015 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 16014->16015 16016 1bfcac0389a 16015->16016 16017 1bfcac03634 _isleadbyte_l RtlFreeHeap 16016->16017 16020 1bfcac038a4 16016->16020 16018 1bfcac038c7 16017->16018 16021 1bfcac04268 16018->16021 16020->16010 16022 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 16021->16022 16023 1bfcac0428c 16022->16023 16023->16020 16025 1bfcabf6d71 16024->16025 16048 1bfcabc18bc 16025->16048 16027 1bfcabf6da8 16027->15585 16029 1bfcabff414 _getptd RtlFreeHeap 16028->16029 16030 1bfcabfa021 16029->16030 16030->15587 16032 1bfcabd7f80 RtlFreeHeap 16031->16032 16033 1bfcabd7d16 16032->16033 16034 1bfcabd7d7a GetUserNameA 16033->16034 16035 1bfcabd7dc8 16034->16035 16054 1bfcabd00a4 16035->16054 16037 1bfcabd7dcd strrchr 16038 1bfcabf9700 _snprintf RtlFreeHeap 16037->16038 16039 1bfcabd7f11 16038->16039 16061 1bfcabd80f0 16039->16061 16043 1bfcabf67e3 16042->16043 16069 1bfcabc1cc4 16043->16069 16045 1bfcabf6838 16089 1bfcabc1b64 16045->16089 16047 1bfcabf68b0 16047->15591 16050 1bfcabc18ec 16048->16050 16049 1bfcabc190d 16049->16027 16050->16049 16051 1bfcabf9468 malloc RtlFreeHeap 16050->16051 16053 1bfcabc1921 16051->16053 16052 1bfcabf9428 free RtlFreeHeap 16052->16049 16053->16049 16053->16052 16067 1bfcabd01dc 16054->16067 16056 1bfcabd00c0 WSASocketA 16057 1bfcabd00fa WSAIoctl 16056->16057 16058 1bfcabd00f3 16056->16058 16059 1bfcabd0145 closesocket 16057->16059 16058->16037 16059->16058 16062 1bfcabd8103 16061->16062 16063 1bfcabf9428 free RtlFreeHeap 16062->16063 16064 1bfcabd8110 16063->16064 16065 1bfcabf9428 free RtlFreeHeap 16064->16065 16066 1bfcabd7f78 16065->16066 16066->15589 16068 1bfcabd01ec 16067->16068 16068->16056 16070 1bfcabc1d5e 16069->16070 16088 1bfcabc1d77 __crtMessageBoxW 16070->16088 16093 1bfcac08f58 16070->16093 16072 1bfcabc1d6f 16073 1bfcabc1f0c 16072->16073 16078 1bfcabc1e6d 16072->16078 16072->16088 16074 1bfcabf9428 free RtlFreeHeap 16073->16074 16075 1bfcabc1f14 16074->16075 16077 1bfcabc4e64 RtlFreeHeap 16075->16077 16084 1bfcabc1f40 16077->16084 16100 1bfcabc4e64 16078->16100 16080 1bfcabc1efd 16083 1bfcabf9428 free RtlFreeHeap 16080->16083 16081 1bfcabc1ef3 16082 1bfcabf9428 free RtlFreeHeap 16081->16082 16082->16088 16083->16088 16085 1bfcabc4e64 RtlFreeHeap 16084->16085 16087 1bfcabc205c 16084->16087 16084->16088 16085->16087 16086 1bfcabc4e64 RtlFreeHeap 16086->16088 16087->16086 16087->16088 16088->16045 16090 1bfcabc1b9b 16089->16090 16091 1bfcabc1ba5 16089->16091 16090->16047 16091->16090 16106 1bfcabc460c 16091->16106 16094 1bfcac03a60 _calloc_impl RtlFreeHeap 16093->16094 16096 1bfcac08f6d 16094->16096 16095 1bfcac08f8a 16095->16072 16096->16095 16097 1bfcabfb714 _errno RtlFreeHeap 16096->16097 16098 1bfcac08f80 16097->16098 16098->16095 16099 1bfcabfb714 _errno RtlFreeHeap 16098->16099 16099->16095 16101 1bfcabc4e90 16100->16101 16102 1bfcabc1eea 16101->16102 16103 1bfcac08f58 calloc RtlFreeHeap 16101->16103 16102->16080 16102->16081 16104 1bfcabc4ecf 16103->16104 16104->16102 16105 1bfcabf9428 free RtlFreeHeap 16104->16105 16105->16102 16107 1bfcabc463d 16106->16107 16108 1bfcabf9468 malloc RtlFreeHeap 16107->16108 16117 1bfcabc4893 16107->16117 16109 1bfcabc46ae 16108->16109 16110 1bfcabf9468 malloc RtlFreeHeap 16109->16110 16111 1bfcabc46b8 16110->16111 16112 1bfcabf9468 malloc RtlFreeHeap 16111->16112 16115 1bfcabc46c3 16112->16115 16113 1bfcabc489f 16116 1bfcabf9428 free RtlFreeHeap 16113->16116 16118 1bfcabc48ac 16113->16118 16114 1bfcabc4897 16120 1bfcabf9428 free RtlFreeHeap 16114->16120 16115->16113 16115->16114 16119 1bfcabc46e1 16115->16119 16116->16118 16117->16090 16118->16117 16121 1bfcabf9428 free RtlFreeHeap 16118->16121 16122 1bfcabc18bc RtlFreeHeap 16119->16122 16120->16113 16121->16117 16128 1bfcabc4723 memcpy_s 16122->16128 16123 1bfcabf9428 free RtlFreeHeap 16124 1bfcabc4883 16123->16124 16125 1bfcabf9428 free RtlFreeHeap 16124->16125 16126 1bfcabc488b 16125->16126 16127 1bfcabf9428 free RtlFreeHeap 16126->16127 16127->16117 16132 1bfcabc4797 memcpy_s 16128->16132 16133 1bfcabc54f0 16128->16133 16130 1bfcabc47bf 16130->16130 16131 1bfcabc54f0 RtlFreeHeap 16130->16131 16130->16132 16131->16132 16132->16123 16134 1bfcabc551c 16133->16134 16135 1bfcabf9468 malloc RtlFreeHeap 16134->16135 16146 1bfcabc5639 16134->16146 16136 1bfcabc553f 16135->16136 16137 1bfcabf9468 malloc RtlFreeHeap 16136->16137 16138 1bfcabc554a 16137->16138 16139 1bfcabc5645 16138->16139 16140 1bfcabc563d 16138->16140 16147 1bfcabc555f 16138->16147 16142 1bfcabf9428 free RtlFreeHeap 16139->16142 16139->16146 16141 1bfcabf9428 free RtlFreeHeap 16140->16141 16141->16139 16142->16146 16143 1bfcabf9428 free RtlFreeHeap 16144 1bfcabc5631 16143->16144 16145 1bfcabf9428 free RtlFreeHeap 16144->16145 16145->16146 16146->16130 16147->16143 16152 1bfcabf8c5e 16148->16152 16149 1bfcabf8dbd 16151 1bfcabf7fff 16149->16151 16154 1bfcabf9428 free RtlFreeHeap 16149->16154 16150 1bfcabf9428 free RtlFreeHeap 16150->16149 16151->15497 16153 1bfcabf8c88 16152->16153 16155 1bfcabf9428 free RtlFreeHeap 16152->16155 16153->16149 16153->16150 16154->16151 16155->16153 16174 1bfcabdb828 16156->16174 16158 1bfcabcf52f 16159 1bfcabf9700 _snprintf RtlFreeHeap 16158->16159 16160 1bfcabcf550 16159->16160 16178 1bfcabdabbc 16160->16178 16163 1bfcabcf5db 16165 1bfcabf9700 _snprintf RtlFreeHeap 16163->16165 16164 1bfcabcf5fe 16166 1bfcabf9700 _snprintf RtlFreeHeap 16164->16166 16167 1bfcabcf5fc 16165->16167 16166->16167 16184 1bfcabdb808 16167->16184 16171 1bfcabcf70b 16171->15599 16172 1bfcabcf707 16172->16171 16191 1bfcabdb940 16172->16191 16175 1bfcabdb852 16174->16175 16176 1bfcabd7f80 RtlFreeHeap 16175->16176 16177 1bfcabdb875 16176->16177 16177->16158 16183 1bfcabdac38 16178->16183 16179 1bfcabcf5a0 16179->16163 16179->16164 16180 1bfcabdb752 16180->16179 16180->16180 16181 1bfcabf9700 _snprintf RtlFreeHeap 16180->16181 16181->16179 16182 1bfcabf9700 RtlFreeHeap _snprintf 16182->16183 16183->16179 16183->16180 16183->16182 16185 1bfcabd80f0 RtlFreeHeap 16184->16185 16186 1bfcabcf6fd 16185->16186 16187 1bfcabd0038 16186->16187 16188 1bfcabd0072 16187->16188 16189 1bfcabf99cc RtlFreeHeap 16188->16189 16190 1bfcabd0076 16188->16190 16189->16190 16190->16172 16192 1bfcabf9468 malloc RtlFreeHeap 16191->16192 16198 1bfcabdb9af 16192->16198 16193 1bfcabdb9bc 16193->16171 16194 1bfcabdbdcb 16195 1bfcabf9428 free RtlFreeHeap 16194->16195 16195->16193 16196 1bfcabf9428 free RtlFreeHeap 16196->16198 16197 1bfcabdba7f 16199 1bfcabf9428 free RtlFreeHeap 16197->16199 16198->16193 16198->16194 16198->16196 16198->16197 16199->16193 16202 1bfcabc19b8 16200->16202 16201 1bfcabc19d7 16201->15608 16202->16201 16203 1bfcabf9468 malloc RtlFreeHeap 16202->16203 16204 1bfcabc1a07 16203->16204 16204->16201 16214 1bfcabc4300 16204->16214 16206 1bfcabf9428 free RtlFreeHeap 16206->16201 16207 1bfcabc1a24 16209 1bfcabc1a52 16207->16209 16226 1bfcabc4170 16207->16226 16209->16206 16211 1bfcabcf262 16210->16211 16243 1bfcabcd090 16211->16243 16215 1bfcabc432f 16214->16215 16216 1bfcabf9468 malloc RtlFreeHeap 16215->16216 16223 1bfcabc4352 16215->16223 16217 1bfcabc4368 16216->16217 16218 1bfcabf9468 malloc RtlFreeHeap 16217->16218 16217->16223 16219 1bfcabc4381 16218->16219 16220 1bfcabc438d 16219->16220 16221 1bfcabc18bc RtlFreeHeap 16219->16221 16225 1bfcabc43c3 memcpy_s 16219->16225 16222 1bfcabf9428 free RtlFreeHeap 16220->16222 16221->16225 16222->16223 16223->16207 16224 1bfcabf9428 free RtlFreeHeap 16224->16220 16225->16220 16225->16224 16225->16225 16227 1bfcabc419d 16226->16227 16228 1bfcabc42c4 16227->16228 16229 1bfcabf9468 malloc RtlFreeHeap 16227->16229 16228->16209 16230 1bfcabc41c2 16229->16230 16231 1bfcabf9468 malloc RtlFreeHeap 16230->16231 16232 1bfcabc41cd 16231->16232 16233 1bfcabc42d0 16232->16233 16234 1bfcabc42c8 16232->16234 16242 1bfcabc41e2 16232->16242 16233->16228 16236 1bfcabf9428 free RtlFreeHeap 16233->16236 16235 1bfcabf9428 free RtlFreeHeap 16234->16235 16235->16233 16236->16228 16237 1bfcabf9428 free RtlFreeHeap 16238 1bfcabc42b4 16237->16238 16239 1bfcabf9428 free RtlFreeHeap 16238->16239 16240 1bfcabc42bc 16239->16240 16241 1bfcabf9428 free RtlFreeHeap 16240->16241 16241->16228 16242->16237 16244 1bfcabcd0ac 16243->16244 16245 1bfcabcd0ef 16244->16245 16247 1bfcabcd0da 16244->16247 16257 1bfcabcd10c 16245->16257 16250 1bfcabcf128 16247->16250 16248 1bfcabcd0ed 16248->15616 16251 1bfcabcf144 16250->16251 16252 1bfcabcf14a 16251->16252 16253 1bfcabcf15f 16251->16253 16264 1bfcabcefdc 16252->16264 16254 1bfcabcd10c RtlFreeHeap 16253->16254 16256 1bfcabcf15d 16254->16256 16256->16248 16280 1bfcabcf180 16257->16280 16260 1bfcabcd14f 16260->16248 16261 1bfcabcd175 16263 1bfcabf9428 free RtlFreeHeap 16261->16263 16263->16260 16265 1bfcabceff8 16264->16265 16274 1bfcabcd2bc 16265->16274 16267 1bfcabcf016 16268 1bfcabcd10c RtlFreeHeap 16267->16268 16269 1bfcabcf0ab 16268->16269 16277 1bfcabcd280 16269->16277 16271 1bfcabcf122 16271->16256 16272 1bfcabcf0b5 16272->16271 16273 1bfcabcd10c RtlFreeHeap 16272->16273 16273->16272 16275 1bfcabf9468 malloc RtlFreeHeap 16274->16275 16276 1bfcabcd2d6 16275->16276 16276->16267 16278 1bfcabf9428 free RtlFreeHeap 16277->16278 16279 1bfcabcd2b6 16278->16279 16279->16272 16281 1bfcabf9468 malloc RtlFreeHeap 16280->16281 16282 1bfcabcf1a8 16281->16282 16283 1bfcabcf217 16282->16283 16284 1bfcabcf230 16282->16284 16287 1bfcabcd143 16282->16287 16285 1bfcabf9428 free RtlFreeHeap 16283->16285 16298 1bfcabf6bd8 16284->16298 16285->16287 16287->16260 16287->16261 16288 1bfcabcff10 16287->16288 16289 1bfcabcff3c 16288->16289 16293 1bfcabcff73 16288->16293 16290 1bfcabf9468 malloc RtlFreeHeap 16289->16290 16291 1bfcabcff46 16290->16291 16295 1bfcabf8aec RtlFreeHeap 16291->16295 16292 1bfcabcff84 16292->16261 16293->16292 16294 1bfcabcffb1 16293->16294 16296 1bfcabcfbec RtlFreeHeap 16293->16296 16294->16292 16297 1bfcabcfbec RtlFreeHeap 16294->16297 16295->16293 16296->16294 16297->16292 16301 1bfcabf6c00 16298->16301 16299 1bfcabc198c RtlFreeHeap 16300 1bfcabf6d2a 16299->16300 16300->16287 16301->16299 16303 1bfcabdc019 16302->16303 16304 1bfcabdbe19 16302->16304 16307 1bfcabdc024 16303->16307 16308 1bfcabdc111 16303->16308 16305 1bfcabdbe24 16304->16305 16306 1bfcabdc5f1 16304->16306 16310 1bfcabdbf37 16305->16310 16311 1bfcabdbe2f 16305->16311 16771 1bfcabd2f10 16306->16771 16312 1bfcabdc7cb 16307->16312 16313 1bfcabdc02f 16307->16313 16314 1bfcabdc18b 16308->16314 16315 1bfcabdc118 16308->16315 16316 1bfcabdbf3e 16310->16316 16317 1bfcabdbfb1 16310->16317 16318 1bfcabdc407 16311->16318 16319 1bfcabdbe3a 16311->16319 16884 1bfcabd9038 16312->16884 16320 1bfcabdc0a9 16313->16320 16321 1bfcabdc036 16313->16321 16322 1bfcabdc8c9 16314->16322 16323 1bfcabdc196 16314->16323 16325 1bfcabdbe99 16315->16325 16326 1bfcabdc7de 16315->16326 16327 1bfcabdc12e 16315->16327 16328 1bfcabdc4fd 16316->16328 16329 1bfcabdbf49 16316->16329 16339 1bfcabdbfbc 16317->16339 16340 1bfcabdc519 16317->16340 16632 1bfcabf82cc 16318->16632 16333 1bfcabdbe45 16319->16333 16334 1bfcabdbecf 16319->16334 16330 1bfcabdc0b4 16320->16330 16331 1bfcabdc706 16320->16331 16335 1bfcabdc6e7 16321->16335 16336 1bfcabdc041 16321->16336 16917 1bfcabd3f60 16322->16917 16337 1bfcabdc8df 16323->16337 16338 1bfcabdc1a1 16323->16338 16325->15621 16891 1bfcabcc7a8 16326->16891 16354 1bfcabdc139 16327->16354 16355 1bfcabdc7f1 16327->16355 16348 1bfcabd3870 RtlFreeHeap 16328->16348 16344 1bfcabdbf54 16329->16344 16345 1bfcabdc430 16329->16345 16349 1bfcabdc0bf 16330->16349 16350 1bfcabdc722 16330->16350 16347 1bfcabd3c08 RtlFreeHeap 16331->16347 16333->16325 16364 1bfcabdbe9e 16333->16364 16365 1bfcabdbe57 16333->16365 16334->16325 16369 1bfcabdc33e 16334->16369 16370 1bfcabdbee5 16334->16370 16817 1bfcabd3c08 16335->16817 16356 1bfcabdc04c 16336->16356 16357 1bfcabdc60b 16336->16357 16346 1bfcabd3f60 RtlFreeHeap 16337->16346 16358 1bfcabdc1ac 16338->16358 16359 1bfcabdc8f8 16338->16359 16352 1bfcabdbfc7 16339->16352 16353 1bfcabdc539 16339->16353 16719 1bfcabd3ae0 16340->16719 16373 1bfcabdc44a 16344->16373 16374 1bfcabdbf5f 16344->16374 16657 1bfcabdcad8 16345->16657 16346->16325 16347->16325 16348->16325 16361 1bfcabdc0ca 16349->16361 16362 1bfcabdc735 16349->16362 16824 1bfcabd0d38 16350->16824 16352->16325 16400 1bfcabdc56e 16352->16400 16401 1bfcabdbfdd 16352->16401 16366 1bfcabd3ae0 RtlFreeHeap 16353->16366 16367 1bfcabdc804 16354->16367 16368 1bfcabdc144 16354->16368 16898 1bfcabcc958 16355->16898 16378 1bfcabdc61e 16356->16378 16379 1bfcabdc057 16356->16379 16779 1bfcabd2e94 16357->16779 16371 1bfcabdc90e 16358->16371 16372 1bfcabdc1b7 16358->16372 16935 1bfcabd4104 16359->16935 16380 1bfcabdc748 16361->16380 16381 1bfcabdc0d5 16361->16381 16827 1bfcabd2dd8 16362->16827 16387 1bfcabdc28b 16364->16387 16388 1bfcabdbea9 16364->16388 16384 1bfcabdbe62 16365->16384 16385 1bfcabdc271 16365->16385 16366->16325 16903 1bfcabcc8b8 16367->16903 16389 1bfcabdc815 16368->16389 16390 1bfcabdc14f 16368->16390 16599 1bfcabd8b54 16369->16599 16391 1bfcabdc358 16370->16391 16392 1bfcabdbef0 16370->16392 16382 1bfcabd4104 RtlFreeHeap 16371->16382 16393 1bfcabdc1c2 16372->16393 16394 1bfcabdc921 16372->16394 16672 1bfcabdca28 16373->16672 16395 1bfcabdc46c 16374->16395 16396 1bfcabdbf6a 16374->16396 16792 1bfcabd0eb0 16378->16792 16402 1bfcabdc636 16379->16402 16403 1bfcabdc062 16379->16403 16834 1bfcabd3334 16380->16834 16404 1bfcabdc75b 16381->16404 16405 1bfcabdc0e0 16381->16405 16382->16325 16406 1bfcabdbe6d 16384->16406 16407 1bfcabdc1f3 16384->16407 16524 1bfcabd1080 16385->16524 16543 1bfcabd2854 16387->16543 16412 1bfcabdbeb4 16388->16412 16413 1bfcabdc2a5 16388->16413 16910 1bfcabd757c 16389->16910 16414 1bfcabdc15a 16390->16414 16415 1bfcabdc82f 16390->16415 16603 1bfcabd3b70 16391->16603 16416 1bfcabdbefb 16392->16416 16417 1bfcabdc378 16392->16417 16418 1bfcabdc1cd 16393->16418 16419 1bfcabdc931 16393->16419 16941 1bfcabcd654 16394->16941 16676 1bfcabda30c 16395->16676 16420 1bfcabdbf75 16396->16420 16421 1bfcabdc47f 16396->16421 16723 1bfcabf817c 16400->16723 16425 1bfcabdc588 16401->16425 16426 1bfcabdbfe8 16401->16426 16796 1bfcabf8f98 16402->16796 16429 1bfcabdc06d 16403->16429 16430 1bfcabdc649 16403->16430 16841 1bfcabda810 16404->16841 16431 1bfcabdc0eb 16405->16431 16432 1bfcabdc76e 16405->16432 16406->16325 16512 1bfcabd39a0 16406->16512 16506 1bfcabd3870 16407->16506 16435 1bfcabdc2b8 16412->16435 16436 1bfcabdbebf 16412->16436 16583 1bfcabd089c 16413->16583 16439 1bfcabdc84b 16414->16439 16440 1bfcabdc165 16414->16440 16446 1bfcabd3c08 RtlFreeHeap 16415->16446 16441 1bfcabdbf06 16416->16441 16442 1bfcabdc395 16416->16442 16607 1bfcabd2ae4 16417->16607 16443 1bfcabdc1d8 16418->16443 16444 1bfcabdc949 16418->16444 16433 1bfcabd5c14 RtlFreeHeap 16419->16433 16420->16325 16459 1bfcabdbf8b 16420->16459 16460 1bfcabdc4aa 16420->16460 16682 1bfcabd0a44 16421->16682 16730 1bfcabd8ea8 16425->16730 16426->16325 16463 1bfcabdbffe 16426->16463 16464 1bfcabdc5b1 16426->16464 16450 1bfcabdc65c 16429->16450 16451 1bfcabdc078 16429->16451 16800 1bfcabd14f8 16430->16800 16452 1bfcabdc0f6 16431->16452 16453 1bfcabdc781 16431->16453 16845 1bfcabd0bc0 16432->16845 16433->16325 16587 1bfcabf71ac 16435->16587 16436->16325 16591 1bfcabd868c 16436->16591 16461 1bfcabd3c08 RtlFreeHeap 16439->16461 16456 1bfcabdc864 16440->16456 16457 1bfcabdc170 16440->16457 16441->16325 16489 1bfcabdbf27 16441->16489 16490 1bfcabdc3e3 16441->16490 16611 1bfcabd6780 16442->16611 16443->16325 16595 1bfcabd8934 16443->16595 16444->16325 16454 1bfcabd8ea8 RtlFreeHeap 16444->16454 16446->16325 16804 1bfcabd141c 16450->16804 16466 1bfcabdc66d 16451->16466 16467 1bfcabdc083 16451->16467 16471 1bfcabdc79b 16452->16471 16485 1bfcabdc101 16452->16485 16853 1bfcabd15d8 16453->16853 16454->16325 16477 1bfcabd3870 RtlFreeHeap 16456->16477 16473 1bfcabdc880 16457->16473 16487 1bfcabdc17b 16457->16487 16475 1bfcabdc4c3 16459->16475 16476 1bfcabdbf96 16459->16476 16701 1bfcabd5c14 16460->16701 16461->16325 16478 1bfcabdc009 16463->16478 16479 1bfcabdc5c4 16463->16479 16737 1bfcabd0dc4 16464->16737 16480 1bfcabd5c14 RtlFreeHeap 16466->16480 16468 1bfcabdc08e 16467->16468 16469 1bfcabdc69d 16467->16469 16483 1bfcabdc6b7 16468->16483 16484 1bfcabdc099 16468->16484 16494 1bfcabd1080 RtlFreeHeap 16469->16494 16866 1bfcabd06d4 16471->16866 16493 1bfcabd3870 RtlFreeHeap 16473->16493 16708 1bfcabd5dac 16475->16708 16491 1bfcabdc4d4 16476->16491 16492 1bfcabdbfa1 16476->16492 16477->16325 16478->16325 16763 1bfcabd32e4 16478->16763 16741 1bfcabd2fb8 16479->16741 16480->16325 16814 1bfcabd6fb0 16483->16814 16484->16325 16505 1bfcabf71ac RtlFreeHeap 16484->16505 16485->16325 16880 1bfcabda288 16485->16880 16487->16325 16500 1bfcabd3b70 RtlFreeHeap 16487->16500 16489->16325 16628 1bfcabf826c 16489->16628 16615 1bfcabf80bc 16490->16615 16715 1bfcabd5b98 16491->16715 16492->16325 16503 1bfcabd39a0 RtlFreeHeap 16492->16503 16493->16325 16494->16325 16500->16325 16503->16325 16505->16325 16507 1bfcabd3897 16506->16507 16948 1bfcabf72a0 16507->16948 16511 1bfcabd3926 16511->16325 16513 1bfcabd39d5 16512->16513 16514 1bfcabd3a2c 16513->16514 16515 1bfcabd3a10 16513->16515 16517 1bfcabd3a44 16514->16517 16521 1bfcabd3a59 16514->16521 16516 1bfcabcf310 RtlFreeHeap 16515->16516 16518 1bfcabd3a27 16516->16518 16519 1bfcabcf2ec RtlFreeHeap 16517->16519 16518->16325 16519->16518 16520 1bfcabd3a7f 16520->16518 16523 1bfcabd4708 RtlFreeHeap 16520->16523 16521->16520 16522 1bfcabcf2ec RtlFreeHeap 16521->16522 16522->16520 16523->16518 16525 1bfcabf9468 malloc RtlFreeHeap 16524->16525 16527 1bfcabd109c 16525->16527 16526 1bfcabd10a9 16526->16325 16527->16526 16528 1bfcabd10db 16527->16528 16529 1bfcabd10ea 16527->16529 16530 1bfcabf9428 free RtlFreeHeap 16528->16530 17112 1bfcabfa1e8 16529->17112 16530->16526 16532 1bfcabd10f9 16533 1bfcabd110e 16532->16533 16536 1bfcabd112c 16532->16536 16534 1bfcabf9428 free RtlFreeHeap 16533->16534 16535 1bfcabd1118 16534->16535 16537 1bfcabcf2ec RtlFreeHeap 16535->16537 17127 1bfcabfa384 16536->17127 16537->16526 16539 1bfcabd1161 17134 1bfcabfa0a8 16539->17134 16541 1bfcabd116b 16542 1bfcabf9428 free RtlFreeHeap 16541->16542 16542->16526 16544 1bfcabd7f80 RtlFreeHeap 16543->16544 16545 1bfcabd287c 16544->16545 16546 1bfcabfa1e8 RtlFreeHeap 16545->16546 16547 1bfcabd28e9 16546->16547 16548 1bfcabd28fe 16547->16548 16549 1bfcabd291c 16547->16549 17338 1bfcabcf430 16548->17338 17341 1bfcabfaa64 16549->17341 16553 1bfcabd80f0 RtlFreeHeap 16555 1bfcabd2917 16553->16555 16554 1bfcabd292e 17348 1bfcabfaad8 16554->17348 16555->16325 16557 1bfcabd2938 16558 1bfcabfaa64 fseek RtlFreeHeap 16557->16558 16559 1bfcabd294c 16558->16559 16560 1bfcabd2960 16559->16560 16561 1bfcabd2988 16559->16561 16562 1bfcabcf430 RtlFreeHeap 16560->16562 16565 1bfcabd29b5 16561->16565 16567 1bfcabd29dd 16561->16567 16563 1bfcabd296f 16562->16563 16564 1bfcabd80f0 RtlFreeHeap 16563->16564 16566 1bfcabd2979 16564->16566 16568 1bfcabcf430 RtlFreeHeap 16565->16568 16569 1bfcabfa0a8 fclose RtlFreeHeap 16566->16569 16571 1bfcabf9468 malloc RtlFreeHeap 16567->16571 16570 1bfcabd29c4 16568->16570 16569->16555 16572 1bfcabd80f0 RtlFreeHeap 16570->16572 16573 1bfcabd29e7 16571->16573 16574 1bfcabd29ce 16572->16574 16575 1bfcabcd2bc RtlFreeHeap 16573->16575 16576 1bfcabfa0a8 fclose RtlFreeHeap 16574->16576 16577 1bfcabd2a4c 16575->16577 16576->16555 16578 1bfcabcd280 RtlFreeHeap 16577->16578 16579 1bfcabd2ab7 16578->16579 16580 1bfcabd80f0 RtlFreeHeap 16579->16580 16581 1bfcabd2ac1 16580->16581 16581->16555 17354 1bfcabd2c54 16581->17354 16584 1bfcabd08e2 16583->16584 16585 1bfcabda870 RtlFreeHeap 16584->16585 16586 1bfcabd0928 16584->16586 16585->16586 16586->16325 16588 1bfcabf71ca 16587->16588 16589 1bfcabd7f80 RtlFreeHeap 16588->16589 16590 1bfcabf71de 16588->16590 16589->16590 16590->16325 16593 1bfcabd8723 16591->16593 16592 1bfcabd87d5 16592->16325 16593->16592 17439 1bfcabd8558 16593->17439 16597 1bfcabd89c2 16595->16597 16596 1bfcabd8a74 16596->16325 16597->16596 17445 1bfcabd8598 16597->17445 16601 1bfcabd8b88 16599->16601 16600 1bfcabd8bbc 16600->16325 16601->16600 16602 1bfcabd8470 RtlFreeHeap 16601->16602 16602->16600 16604 1bfcabd3bc0 16603->16604 16605 1bfcabd3870 RtlFreeHeap 16604->16605 16606 1bfcabd3bde 16605->16606 16606->16325 16608 1bfcabd2b11 16607->16608 16609 1bfcabd2b54 16608->16609 16610 1bfcabfa0a8 fclose RtlFreeHeap 16608->16610 16609->16325 16610->16608 16612 1bfcabd67d7 16611->16612 16614 1bfcabd67ea 16611->16614 16613 1bfcabf9468 malloc RtlFreeHeap 16612->16613 16613->16614 16614->16325 16616 1bfcabf80d4 16615->16616 16617 1bfcabf80ee 16616->16617 16619 1bfcabf810a 16616->16619 17448 1bfcabf87fc 16617->17448 16620 1bfcabf8127 16619->16620 16621 1bfcabf8143 16619->16621 16622 1bfcabf87fc RtlFreeHeap 16620->16622 16623 1bfcabf814d _wcsupr_s 16621->16623 16624 1bfcabf816a 16621->16624 16626 1bfcabf80fd _wcsupr_s 16622->16626 16627 1bfcabf87fc RtlFreeHeap 16623->16627 17456 1bfcabcf410 16624->17456 16626->16325 16627->16626 16629 1bfcabf827c 16628->16629 16630 1bfcabf82b0 16629->16630 16631 1bfcabd80f0 RtlFreeHeap 16629->16631 16630->16325 16631->16630 16633 1bfcabf8305 16632->16633 16634 1bfcabf8374 16633->16634 16635 1bfcabf8390 16633->16635 16656 1bfcabf830f 16633->16656 16638 1bfcabcf310 RtlFreeHeap 16634->16638 16636 1bfcabf83ce 16635->16636 16637 1bfcabf8397 16635->16637 16639 1bfcabf83cc 16636->16639 16641 1bfcabf83e6 16636->16641 16637->16639 16640 1bfcabf83b0 16637->16640 16638->16656 16642 1bfcabf826c RtlFreeHeap 16639->16642 16645 1bfcabcf310 RtlFreeHeap 16640->16645 16644 1bfcabcf310 RtlFreeHeap 16641->16644 16643 1bfcabf8407 16642->16643 16646 1bfcabf8416 16643->16646 16647 1bfcabf8432 16643->16647 16644->16656 16645->16656 16650 1bfcabcf310 RtlFreeHeap 16646->16650 16648 1bfcabf8463 16647->16648 16649 1bfcabf847f 16647->16649 16651 1bfcabcf310 RtlFreeHeap 16648->16651 16652 1bfcabf84ac 16649->16652 16653 1bfcabf8490 16649->16653 16650->16656 16651->16656 16654 1bfcabf88c4 RtlFreeHeap 16652->16654 16655 1bfcabcf310 RtlFreeHeap 16653->16655 16654->16656 16655->16656 16656->16325 16658 1bfcabdcb45 16657->16658 16659 1bfcabcd2bc RtlFreeHeap 16658->16659 16660 1bfcabdcb65 16659->16660 16661 1bfcabdcc01 16660->16661 16662 1bfcabdcbf2 16660->16662 16665 1bfcabdcc22 16661->16665 16669 1bfcabdcc3c 16661->16669 16663 1bfcabcd280 RtlFreeHeap 16662->16663 16664 1bfcabdcbfc 16663->16664 16664->16325 16666 1bfcabcd280 RtlFreeHeap 16665->16666 16666->16664 16667 1bfcabcd338 RtlFreeHeap 16667->16669 16669->16667 16670 1bfcabdcd97 16669->16670 17463 1bfcabdce70 16669->17463 16671 1bfcabcd280 RtlFreeHeap 16670->16671 16671->16664 16673 1bfcabdca6d 16672->16673 16674 1bfcabdcaab 16673->16674 16675 1bfcabcf310 RtlFreeHeap 16673->16675 16674->16325 16675->16674 16677 1bfcabda325 16676->16677 16678 1bfcabda331 16676->16678 16679 1bfcabf9428 free RtlFreeHeap 16677->16679 16680 1bfcabf9468 malloc RtlFreeHeap 16678->16680 16679->16678 16681 1bfcabda341 16680->16681 16681->16325 16683 1bfcabd7f80 RtlFreeHeap 16682->16683 16684 1bfcabd0a63 16683->16684 16685 1bfcabd0aeb 16684->16685 16686 1bfcabd0afa 16684->16686 16687 1bfcabd80f0 RtlFreeHeap 16685->16687 16688 1bfcabd0b13 16686->16688 16689 1bfcabd0b22 16686->16689 16700 1bfcabd0af5 16687->16700 16690 1bfcabd80f0 RtlFreeHeap 16688->16690 16691 1bfcabd0b3b 16689->16691 16692 1bfcabd0b47 16689->16692 16690->16700 16693 1bfcabd80f0 RtlFreeHeap 16691->16693 16694 1bfcabd0b6c _wcsupr_s 16692->16694 16695 1bfcabd0b60 16692->16695 16693->16700 17467 1bfcabd25a8 16694->17467 16696 1bfcabd80f0 RtlFreeHeap 16695->16696 16696->16700 16698 1bfcabd0b9c _wcsupr_s 16699 1bfcabd80f0 RtlFreeHeap 16698->16699 16699->16700 16700->16325 16703 1bfcabd5c84 _wcsupr_s 16701->16703 16702 1bfcabd5d90 16704 1bfcabcf2ec RtlFreeHeap 16702->16704 16703->16702 16705 1bfcabd5d42 16703->16705 16707 1bfcabd5ccd 16703->16707 16704->16707 17498 1bfcabd5f88 16705->17498 16707->16325 16709 1bfcabcd2bc RtlFreeHeap 16708->16709 16710 1bfcabd5dd0 16709->16710 16712 1bfcabd5e18 16710->16712 17501 1bfcabcd338 16710->17501 16713 1bfcabcd280 RtlFreeHeap 16712->16713 16714 1bfcabd5e4d 16713->16714 16714->16325 16716 1bfcabd5bc5 16715->16716 17510 1bfcabd630c 16716->17510 16720 1bfcabd3b30 16719->16720 16721 1bfcabd39a0 RtlFreeHeap 16720->16721 16722 1bfcabd3b48 16721->16722 16722->16325 16724 1bfcabd7f80 RtlFreeHeap 16723->16724 16726 1bfcabf8198 16724->16726 16725 1bfcabf8206 16725->16325 16726->16725 17514 1bfcabf85f0 16726->17514 16729 1bfcabd80f0 RtlFreeHeap 16729->16725 16732 1bfcabd8ede 16730->16732 16731 1bfcabd8efb 16731->16325 16732->16731 16733 1bfcabd8f58 16732->16733 16734 1bfcabd8f23 16732->16734 16735 1bfcabcf2ec RtlFreeHeap 16733->16735 16736 1bfcabd8470 RtlFreeHeap 16734->16736 16735->16731 16736->16731 16739 1bfcabd0de0 16737->16739 16738 1bfcabcf410 RtlFreeHeap 16740 1bfcabd0e70 16738->16740 16739->16738 16739->16740 16740->16325 16742 1bfcabf9468 malloc RtlFreeHeap 16741->16742 16743 1bfcabd2fec 16742->16743 16744 1bfcabcd2bc RtlFreeHeap 16743->16744 16748 1bfcabd3057 _openfile 16744->16748 16745 1bfcabd30af 16746 1bfcabcd338 RtlFreeHeap 16745->16746 16747 1bfcabd30c8 16746->16747 16750 1bfcabd30e8 16747->16750 16751 1bfcabd3152 16747->16751 16748->16745 17527 1bfcabfa414 16748->17527 17534 1bfcabcf458 16750->17534 16752 1bfcabf9428 free RtlFreeHeap 16751->16752 16754 1bfcabd315c 16751->16754 16752->16754 16756 1bfcabcd338 RtlFreeHeap 16754->16756 16761 1bfcabd328d 16754->16761 16755 1bfcabd3100 16757 1bfcabf9428 free RtlFreeHeap 16755->16757 16756->16754 16758 1bfcabd313e 16757->16758 16759 1bfcabcd280 RtlFreeHeap 16758->16759 16760 1bfcabd314b 16759->16760 16760->16325 16762 1bfcabcd280 RtlFreeHeap 16761->16762 16762->16760 16764 1bfcabd3305 16763->16764 17537 1bfcabd8430 16764->17537 16766 1bfcabd3314 17540 1bfcabfaf00 16766->17540 16769 1bfcabf9428 free RtlFreeHeap 16770 1bfcabd332d 16769->16770 16770->16325 16772 1bfcabd2f36 16771->16772 16773 1bfcabcd2bc RtlFreeHeap 16772->16773 16774 1bfcabd2f45 16773->16774 16775 1bfcabcd338 RtlFreeHeap 16774->16775 16776 1bfcabd2f7b 16775->16776 16777 1bfcabcd280 RtlFreeHeap 16776->16777 16778 1bfcabd2fb3 16777->16778 16778->16325 16780 1bfcabd2eb5 16779->16780 16781 1bfcabd8430 RtlFreeHeap 16780->16781 16782 1bfcabd2ec4 16781->16782 16783 1bfcabd2ed7 16782->16783 16784 1bfcabd2ef4 16782->16784 17552 1bfcabdcecc 16783->17552 17563 1bfcabfae28 16784->17563 16788 1bfcabd2ef2 16790 1bfcabf9428 free RtlFreeHeap 16788->16790 16791 1bfcabd2f08 16790->16791 16791->16325 16794 1bfcabd0ece _wcsupr_s 16792->16794 16793 1bfcabcf458 RtlFreeHeap 16795 1bfcabd0f59 16793->16795 16794->16325 16794->16793 16794->16795 16795->16325 16797 1bfcabf8fb9 16796->16797 17600 1bfcabf90d4 16797->17600 16801 1bfcabd151c 16800->16801 16802 1bfcabd1517 16800->16802 16801->16802 16803 1bfcabf7f5c RtlFreeHeap 16801->16803 16802->16325 16803->16802 16805 1bfcabd1432 16804->16805 16806 1bfcabd14e3 16805->16806 16807 1bfcabd1452 16805->16807 16808 1bfcabcf410 RtlFreeHeap 16806->16808 16809 1bfcabd1477 16807->16809 16810 1bfcabd1463 16807->16810 16812 1bfcabd1475 16808->16812 16811 1bfcabf88c4 RtlFreeHeap 16809->16811 16813 1bfcabcf2ec RtlFreeHeap 16810->16813 16811->16812 16812->16325 16813->16812 17629 1bfcabd7278 16814->17629 16818 1bfcabd7f80 RtlFreeHeap 16817->16818 16819 1bfcabd3c2c 16818->16819 17649 1bfcabd3d98 16819->17649 16821 1bfcabd3d81 16822 1bfcabd80f0 RtlFreeHeap 16821->16822 16823 1bfcabd3d8e 16822->16823 16823->16325 17662 1bfcac08b48 16824->17662 16826 1bfcabd0d4f 16826->16325 16828 1bfcabd7f80 RtlFreeHeap 16827->16828 16830 1bfcabd2def 16828->16830 16829 1bfcabd2e83 16831 1bfcabd80f0 RtlFreeHeap 16829->16831 16830->16829 16833 1bfcabcf2ec RtlFreeHeap 16830->16833 16832 1bfcabd2e8d 16831->16832 16832->16325 16833->16829 16835 1bfcabd7f80 RtlFreeHeap 16834->16835 16836 1bfcabd334b 16835->16836 16837 1bfcabd33dc 16836->16837 16840 1bfcabcf2ec RtlFreeHeap 16836->16840 16838 1bfcabd80f0 RtlFreeHeap 16837->16838 16839 1bfcabd33e6 16838->16839 16839->16325 16840->16837 16843 1bfcabda831 16841->16843 16842 1bfcabda84a 16842->16325 16843->16842 16844 1bfcabcf2ec RtlFreeHeap 16843->16844 16844->16842 16846 1bfcabd0c1e 16845->16846 16847 1bfcabd7f80 RtlFreeHeap 16846->16847 16848 1bfcabd0c61 16847->16848 16848->16848 16849 1bfcabda618 RtlFreeHeap 16848->16849 16850 1bfcabd0d18 16849->16850 16851 1bfcabd80f0 RtlFreeHeap 16850->16851 16852 1bfcabd0d22 16851->16852 16852->16325 16854 1bfcabcd2bc RtlFreeHeap 16853->16854 16855 1bfcabd15f9 16854->16855 16856 1bfcabd1629 16855->16856 16857 1bfcabd1603 _wcsupr_s 16855->16857 16860 1bfcabd166b 16856->16860 16861 1bfcabd1646 16856->16861 17870 1bfcabd17a8 16857->17870 16859 1bfcabd1622 _wcsupr_s 16864 1bfcabcd280 RtlFreeHeap 16859->16864 16862 1bfcabcf410 RtlFreeHeap 16860->16862 16863 1bfcabd17a8 RtlFreeHeap 16861->16863 16862->16859 16863->16859 16865 1bfcabd16b5 16864->16865 16865->16325 16867 1bfcabd7f80 RtlFreeHeap 16866->16867 16868 1bfcabd06ee 16867->16868 16869 1bfcabfa414 RtlFreeHeap 16868->16869 16870 1bfcabd07c5 16869->16870 16871 1bfcabfa414 RtlFreeHeap 16870->16871 16872 1bfcabd07df 16871->16872 16873 1bfcabd0846 16872->16873 16874 1bfcabd07ec 16872->16874 16875 1bfcabd117c RtlFreeHeap 16873->16875 16874->16874 17874 1bfcabd117c 16874->17874 16879 1bfcabd083a 16875->16879 16877 1bfcabd80f0 RtlFreeHeap 16878 1bfcabd0894 16877->16878 16878->16325 16879->16877 16881 1bfcabda29f 16880->16881 16882 1bfcabda2a1 16880->16882 16881->16325 16883 1bfcabf90d4 RtlFreeHeap 16882->16883 16883->16881 16885 1bfcabd9069 16884->16885 16886 1bfcabd90ce 16885->16886 16887 1bfcabd9099 16885->16887 16888 1bfcabcf2ec RtlFreeHeap 16886->16888 16890 1bfcabd8470 RtlFreeHeap 16887->16890 16889 1bfcabd90cc 16888->16889 16889->16325 16890->16889 16892 1bfcabd7f80 RtlFreeHeap 16891->16892 16893 1bfcabcc7bf 16892->16893 17883 1bfcabcca54 16893->17883 16895 1bfcabcc85d 16896 1bfcabd80f0 RtlFreeHeap 16895->16896 16897 1bfcabcc8b1 16896->16897 16897->16325 16899 1bfcabf9468 malloc RtlFreeHeap 16898->16899 16900 1bfcabcc97c 16899->16900 16901 1bfcabf9428 free RtlFreeHeap 16900->16901 16902 1bfcabcca4b 16901->16902 16902->16325 16904 1bfcabcd2bc RtlFreeHeap 16903->16904 16905 1bfcabcc8dc 16904->16905 16906 1bfcabcd338 RtlFreeHeap 16905->16906 16907 1bfcabcc920 16905->16907 16906->16905 16908 1bfcabcd280 RtlFreeHeap 16907->16908 16909 1bfcabcc952 16908->16909 16909->16325 16913 1bfcabd75a2 16910->16913 16911 1bfcabd763e 16914 1bfcabd6c54 RtlFreeHeap 16911->16914 16912 1bfcabd762a 16915 1bfcabcf2ec RtlFreeHeap 16912->16915 16913->16911 16913->16912 16916 1bfcabd763c 16914->16916 16915->16916 16916->16325 16918 1bfcabd7f80 RtlFreeHeap 16917->16918 16919 1bfcabd3f7f 16918->16919 16920 1bfcabd3ff3 16919->16920 16922 1bfcabd4002 16919->16922 16921 1bfcabd80f0 RtlFreeHeap 16920->16921 16932 1bfcabd3ffd 16921->16932 16923 1bfcabd401b 16922->16923 16924 1bfcabd402a 16922->16924 16925 1bfcabd80f0 RtlFreeHeap 16923->16925 16926 1bfcabd4043 16924->16926 16927 1bfcabd4052 16924->16927 16925->16932 16928 1bfcabd80f0 RtlFreeHeap 16926->16928 17887 1bfcabf7330 16927->17887 16928->16932 16930 1bfcabd40e2 16931 1bfcabd80f0 RtlFreeHeap 16930->16931 16931->16932 16932->16325 16933 1bfcabd407a 16933->16930 16934 1bfcabd4708 RtlFreeHeap 16933->16934 16934->16930 16936 1bfcabd4134 16935->16936 17892 1bfcabf739c 16936->17892 16939 1bfcabd4708 RtlFreeHeap 16940 1bfcabd4200 16939->16940 16940->16325 17897 1bfcabce02c 16941->17897 16943 1bfcabcd681 16944 1bfcabcd685 16943->16944 17901 1bfcabcdc28 16943->17901 16944->16325 16947 1bfcabd5154 RtlFreeHeap 16947->16944 16966 1bfcabf7438 16948->16966 16950 1bfcabf72ca 16950->16950 16972 1bfcabda870 16950->16972 16953 1bfcabd4708 16955 1bfcabd4750 16953->16955 16954 1bfcabd4811 16957 1bfcabd4863 16954->16957 16958 1bfcabd482f 16954->16958 16955->16954 17044 1bfcabd52b4 16955->17044 16959 1bfcabcd2bc RtlFreeHeap 16957->16959 17051 1bfcabd425c 16958->17051 16962 1bfcabd4886 16959->16962 16961 1bfcabd485e 16961->16511 16963 1bfcabd425c RtlFreeHeap 16962->16963 16964 1bfcabd491f 16963->16964 16965 1bfcabcd280 RtlFreeHeap 16964->16965 16965->16961 16967 1bfcabf7465 16966->16967 16968 1bfcabf7484 16966->16968 16975 1bfcabf7594 16967->16975 16970 1bfcabf7594 RtlFreeHeap 16968->16970 16971 1bfcabf747f strstr 16970->16971 16971->16950 16987 1bfcabda618 16972->16987 16976 1bfcabf75c9 16975->16976 16979 1bfcabf764e 16975->16979 16977 1bfcabf7626 16976->16977 16981 1bfcabf7607 16976->16981 16983 1bfcabf9700 _snprintf RtlFreeHeap 16977->16983 16978 1bfcabf76ab 16982 1bfcabf9700 _snprintf RtlFreeHeap 16978->16982 16979->16978 16980 1bfcabf768c 16979->16980 16984 1bfcabf9700 _snprintf RtlFreeHeap 16980->16984 16985 1bfcabf9700 _snprintf RtlFreeHeap 16981->16985 16986 1bfcabf7624 16982->16986 16983->16986 16984->16986 16985->16986 16986->16971 16990 1bfcabda378 16987->16990 16989 1bfcabd3922 16989->16511 16989->16953 16991 1bfcabda39e 16990->16991 16992 1bfcabda3a9 16991->16992 16996 1bfcabda3bb 16991->16996 16997 1bfcabd2238 16992->16997 16994 1bfcabd2238 RtlFreeHeap 16995 1bfcabda3b6 16994->16995 16995->16989 16996->16994 16996->16995 16998 1bfcabd22e5 16997->16998 16999 1bfcabd2255 16997->16999 17000 1bfcabd1e58 RtlFreeHeap 16998->17000 17005 1bfcabd22ac 16998->17005 16999->16998 17001 1bfcabd226b 16999->17001 17000->17005 17006 1bfcabd1e58 17001->17006 17005->16995 17007 1bfcabd1e6f 17006->17007 17009 1bfcabd1f40 17006->17009 17007->17009 17010 1bfcabd1e7e 17007->17010 17008 1bfcabd1ee7 17016 1bfcabd1fc8 17008->17016 17009->17008 17011 1bfcabcf458 RtlFreeHeap 17009->17011 17010->17008 17012 1bfcabd1f19 17010->17012 17013 1bfcabd1f0a 17010->17013 17011->17008 17015 1bfcabcf458 RtlFreeHeap 17012->17015 17014 1bfcabd23a8 RtlFreeHeap 17013->17014 17014->17008 17015->17008 17017 1bfcabd2002 17016->17017 17018 1bfcabd2017 17017->17018 17019 1bfcabd2006 17017->17019 17021 1bfcabd203d 17018->17021 17022 1bfcabd2056 17018->17022 17020 1bfcabcf410 RtlFreeHeap 17019->17020 17023 1bfcabd2010 17020->17023 17024 1bfcabcf2ec RtlFreeHeap 17021->17024 17025 1bfcabd208e 17022->17025 17026 1bfcabd20a7 17022->17026 17023->17005 17024->17023 17029 1bfcabcf2ec RtlFreeHeap 17025->17029 17027 1bfcabd20dc 17026->17027 17028 1bfcabd20f5 17026->17028 17030 1bfcabcf2ec RtlFreeHeap 17027->17030 17031 1bfcabd2127 17028->17031 17032 1bfcabd2140 17028->17032 17029->17023 17030->17023 17035 1bfcabcf2ec RtlFreeHeap 17031->17035 17033 1bfcabf9468 malloc RtlFreeHeap 17032->17033 17034 1bfcabd214c 17033->17034 17036 1bfcabd2190 17034->17036 17040 1bfcabd21c0 17034->17040 17035->17023 17040->17023 17045 1bfcabd52d1 17044->17045 17046 1bfcabd530c 17045->17046 17047 1bfcabd52eb 17045->17047 17065 1bfcabd54e8 17046->17065 17061 1bfcabd5330 17047->17061 17050 1bfcabd530a 17050->16954 17052 1bfcabd4294 17051->17052 17053 1bfcabd427f 17051->17053 17055 1bfcabd52b4 RtlFreeHeap 17052->17055 17088 1bfcabd51dc 17053->17088 17056 1bfcabd428d 17055->17056 17057 1bfcabd42b5 17056->17057 17095 1bfcabd42f8 17056->17095 17057->16961 17060 1bfcabcf310 RtlFreeHeap 17060->17057 17063 1bfcabd5371 17061->17063 17062 1bfcabd53b7 17062->17050 17063->17062 17075 1bfcabcf2ec 17063->17075 17066 1bfcabd5511 17065->17066 17067 1bfcabd557d 17066->17067 17068 1bfcabd555f 17066->17068 17070 1bfcabd55d8 17067->17070 17072 1bfcabd563a 17067->17072 17074 1bfcabd5576 17067->17074 17085 1bfcabcf310 17068->17085 17071 1bfcabcf2ec RtlFreeHeap 17070->17071 17071->17074 17073 1bfcabcf2ec RtlFreeHeap 17072->17073 17072->17074 17073->17074 17074->17050 17078 1bfcabcf33c 17075->17078 17079 1bfcabcd2bc RtlFreeHeap 17078->17079 17080 1bfcabcf361 17079->17080 17081 1bfcabcd090 RtlFreeHeap 17080->17081 17082 1bfcabcf3fe 17081->17082 17083 1bfcabcd280 RtlFreeHeap 17082->17083 17086 1bfcabcf33c RtlFreeHeap 17085->17086 17087 1bfcabcf336 17086->17087 17087->17074 17089 1bfcabd51fd 17088->17089 17090 1bfcabd5249 17089->17090 17091 1bfcabd5264 17089->17091 17093 1bfcabcf310 RtlFreeHeap 17090->17093 17099 1bfcabd5154 17091->17099 17094 1bfcabd5260 17093->17094 17094->17056 17096 1bfcabd431d 17095->17096 17098 1bfcabd42d0 17096->17098 17103 1bfcabd4be4 17096->17103 17098->17057 17098->17060 17101 1bfcabd516c 17099->17101 17100 1bfcabd5188 17100->17094 17101->17100 17102 1bfcabcf2ec RtlFreeHeap 17101->17102 17102->17100 17104 1bfcabd4caf 17103->17104 17106 1bfcabd4ccc 17104->17106 17107 1bfcabd4adc 17104->17107 17106->17096 17108 1bfcabf9468 malloc RtlFreeHeap 17107->17108 17113 1bfcabfa110 17112->17113 17114 1bfcabfa13f 17113->17114 17116 1bfcabfa16a 17113->17116 17115 1bfcabfb714 _errno RtlFreeHeap 17114->17115 17126 1bfcabfa144 _invalid_parameter_noinfo fseek 17115->17126 17140 1bfcabffb9c 17116->17140 17118 1bfcabfa16f 17119 1bfcabfa17c 17118->17119 17120 1bfcabfa189 17118->17120 17121 1bfcabfb714 _errno RtlFreeHeap 17119->17121 17122 1bfcabfa18e 17120->17122 17123 1bfcabfa1b0 17120->17123 17121->17126 17124 1bfcabfb714 _errno RtlFreeHeap 17122->17124 17148 1bfcabffcd0 17123->17148 17124->17126 17126->16532 17128 1bfcabfa3c4 _invalid_parameter_noinfo fseek 17127->17128 17129 1bfcabfa3ae 17127->17129 17128->16539 17129->17128 17130 1bfcabfa3d1 fseek 17129->17130 17131 1bfcabfa3bf 17129->17131 17267 1bfcabfa1f4 17130->17267 17132 1bfcabfb714 _errno RtlFreeHeap 17131->17132 17132->17128 17135 1bfcabfa0dd fseek 17134->17135 17136 1bfcabfa0c9 17134->17136 17138 1bfcabfa0ce _invalid_parameter_noinfo fseek 17135->17138 17283 1bfcabfa02c 17135->17283 17137 1bfcabfb714 _errno RtlFreeHeap 17136->17137 17137->17138 17138->16541 17141 1bfcabfd958 _lock RtlFreeHeap 17140->17141 17147 1bfcabffbb5 17141->17147 17142 1bfcabffc3d 17143 1bfcabfe378 _malloc_crt RtlFreeHeap 17142->17143 17144 1bfcabffc31 __updatetmbcinfo 17143->17144 17144->17118 17145 1bfcabfda24 _mtinitlocknum RtlFreeHeap 17145->17147 17147->17142 17147->17144 17147->17145 17163 1bfcabff784 17147->17163 17156 1bfcabffd0a 17148->17156 17149 1bfcabffd21 17151 1bfcabfb714 _errno RtlFreeHeap 17149->17151 17150 1bfcabffec2 17150->17149 17152 1bfcabfff27 17150->17152 17154 1bfcabffd26 _invalid_parameter_noinfo 17151->17154 17183 1bfcac04a54 17152->17183 17154->17126 17156->17149 17156->17150 17168 1bfcac04a88 17156->17168 17157 1bfcabffe82 17157->17149 17174 1bfcac04bbc 17157->17174 17159 1bfcabffebe 17159->17150 17160 1bfcac04bbc _openfile RtlFreeHeap 17159->17160 17161 1bfcabffee1 17160->17161 17161->17150 17162 1bfcac04bbc _openfile RtlFreeHeap 17161->17162 17162->17150 17164 1bfcabff792 17163->17164 17165 1bfcabff7a5 17163->17165 17166 1bfcabfd958 _lock RtlFreeHeap 17164->17166 17167 1bfcabff79a 17166->17167 17167->17147 17169 1bfcac04a90 17168->17169 17170 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 17169->17170 17173 1bfcac04ab4 _invalid_parameter_noinfo _openfile 17169->17173 17171 1bfcac04ac8 17170->17171 17172 1bfcabfb714 _errno RtlFreeHeap 17171->17172 17171->17173 17172->17173 17173->17157 17175 1bfcac04bc4 17174->17175 17176 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 17175->17176 17177 1bfcac04bed 17176->17177 17178 1bfcac04c02 17177->17178 17179 1bfcac04c15 17177->17179 17182 1bfcac04c10 _invalid_parameter_noinfo 17177->17182 17186 1bfcac05eac 17178->17186 17181 1bfcabfb714 _errno RtlFreeHeap 17179->17181 17179->17182 17181->17182 17182->17159 17191 1bfcac048f0 17183->17191 17185 1bfcac04a81 17185->17154 17187 1bfcac05eb9 17186->17187 17190 1bfcac05ee6 17186->17190 17188 1bfcabfb714 _errno RtlFreeHeap 17187->17188 17187->17190 17189 1bfcac05ec3 _invalid_parameter_noinfo 17188->17189 17189->17182 17192 1bfcac04931 17191->17192 17193 1bfcac04919 17191->17193 17192->17193 17195 1bfcac0495e 17192->17195 17194 1bfcabfb714 _errno RtlFreeHeap 17193->17194 17197 1bfcac0491e _invalid_parameter_noinfo _unlock_fhandle 17194->17197 17198 1bfcac049cc 17195->17198 17197->17185 17205 1bfcabf99d8 17198->17205 17200 1bfcac049f6 17202 1bfcac049fa 17200->17202 17219 1bfcac056a8 17200->17219 17202->17197 17206 1bfcabf99fe 17205->17206 17207 1bfcabf9a16 17205->17207 17208 1bfcabfb714 _errno RtlFreeHeap 17206->17208 17207->17206 17210 1bfcabf9a1b __crtIsPackagedApp 17207->17210 17209 1bfcabf9a03 _invalid_parameter_noinfo 17208->17209 17209->17200 17211 1bfcabf9a6e 17210->17211 17212 1bfcabf9a5d 17210->17212 17213 1bfcabfe378 _malloc_crt RtlFreeHeap 17211->17213 17214 1bfcabfb6c4 _dosmaperr RtlFreeHeap 17212->17214 17215 1bfcabf9a79 17213->17215 17214->17209 17215->17209 17216 1bfcabfb6c4 _dosmaperr RtlFreeHeap 17215->17216 17217 1bfcabf9aac 17216->17217 17220 1bfcac056f3 17219->17220 17269 1bfcabfa222 17267->17269 17271 1bfcabfa231 _invalid_parameter_noinfo 17267->17271 17268 1bfcabfa22c 17270 1bfcabfb714 _errno RtlFreeHeap 17268->17270 17269->17268 17269->17271 17275 1bfcabfa26e memcpy_s 17269->17275 17270->17271 17271->17128 17272 1bfcabfbd98 write_char RtlFreeHeap 17272->17275 17274 1bfcabff624 _fileno RtlFreeHeap 17274->17275 17275->17271 17275->17272 17275->17274 17276 1bfcac00504 _flush RtlFreeHeap 17275->17276 17277 1bfcabffa2c 17275->17277 17276->17275 17278 1bfcabffa49 17277->17278 17282 1bfcabffa6e 17277->17282 17279 1bfcabff624 _fileno RtlFreeHeap 17278->17279 17278->17282 17280 1bfcabffa60 17279->17280 17281 1bfcac00504 _flush RtlFreeHeap 17280->17281 17281->17282 17282->17275 17284 1bfcabfa055 17283->17284 17285 1bfcabfa041 17283->17285 17287 1bfcabffa2c _flush RtlFreeHeap 17284->17287 17295 1bfcabfa046 _invalid_parameter_noinfo 17284->17295 17286 1bfcabfb714 _errno RtlFreeHeap 17285->17286 17286->17295 17288 1bfcabfa060 17287->17288 17297 1bfcabff9a8 17288->17297 17291 1bfcabff624 _fileno RtlFreeHeap 17292 1bfcabfa072 17291->17292 17301 1bfcabff828 17292->17301 17295->17138 17298 1bfcabff9b7 17297->17298 17299 1bfcabfa06a 17297->17299 17298->17299 17300 1bfcabf9428 free RtlFreeHeap 17298->17300 17299->17291 17300->17299 17302 1bfcabff841 17301->17302 17305 1bfcabff859 17301->17305 17303 1bfcabfb6a4 __doserrno RtlFreeHeap 17302->17303 17306 1bfcabff846 17303->17306 17304 1bfcabff8c2 17307 1bfcabfb6a4 __doserrno RtlFreeHeap 17304->17307 17305->17304 17310 1bfcabff88b 17305->17310 17308 1bfcabfb714 _errno RtlFreeHeap 17306->17308 17309 1bfcabff8c7 17307->17309 17318 1bfcabff84e _invalid_parameter_noinfo _unlock_fhandle 17308->17318 17312 1bfcabfb714 _errno RtlFreeHeap 17309->17312 17311 1bfcac0438c __lock_fhandle RtlFreeHeap 17310->17311 17313 1bfcabff892 17311->17313 17312->17318 17314 1bfcabff8a9 17313->17314 17315 1bfcabff89e 17313->17315 17317 1bfcabfb714 _errno RtlFreeHeap 17314->17317 17317->17318 17339 1bfcabcf33c RtlFreeHeap 17338->17339 17340 1bfcabcf450 17339->17340 17340->16553 17342 1bfcabfaa8c 17341->17342 17343 1bfcabfaaa1 17341->17343 17344 1bfcabfb714 _errno RtlFreeHeap 17342->17344 17343->17342 17345 1bfcabfaaa7 fseek 17343->17345 17347 1bfcabfaa91 _invalid_parameter_noinfo fseek 17344->17347 17358 1bfcabfa9b8 17345->17358 17347->16554 17349 1bfcabfab0c fseek 17348->17349 17350 1bfcabfaaf6 17348->17350 17420 1bfcabfab34 17349->17420 17351 1bfcabfb714 _errno RtlFreeHeap 17350->17351 17353 1bfcabfaafb _invalid_parameter_noinfo fseek 17351->17353 17353->16557 17355 1bfcabd2c9f 17354->17355 17356 1bfcabd2c6d 17354->17356 17355->16555 17359 1bfcabfa9eb 17358->17359 17360 1bfcabfa9db 17358->17360 17361 1bfcabfa9fe 17359->17361 17370 1bfcac0186c 17359->17370 17362 1bfcabfb714 _errno RtlFreeHeap 17360->17362 17364 1bfcabffa2c _flush RtlFreeHeap 17361->17364 17365 1bfcabfa9e0 17362->17365 17366 1bfcabfaa0a 17364->17366 17365->17347 17367 1bfcabff624 _fileno RtlFreeHeap 17366->17367 17368 1bfcabfaa36 17367->17368 17392 1bfcac01b60 17368->17392 17371 1bfcac0188e 17370->17371 17372 1bfcac018c3 17371->17372 17373 1bfcac018ab 17371->17373 17375 1bfcabff624 _fileno RtlFreeHeap 17372->17375 17374 1bfcabfb714 _errno RtlFreeHeap 17373->17374 17391 1bfcac018b0 _invalid_parameter_noinfo __crtMessageBoxW 17374->17391 17376 1bfcac018c8 17375->17376 17377 1bfcac01b60 _fseek_nolock RtlFreeHeap 17376->17377 17378 1bfcac018e2 17377->17378 17379 1bfcac01a5a 17378->17379 17380 1bfcac0193e 17378->17380 17378->17391 17381 1bfcac01a5e 17379->17381 17385 1bfcac01a30 17379->17385 17383 1bfcac01953 17380->17383 17380->17385 17382 1bfcabfb714 _errno RtlFreeHeap 17381->17382 17382->17391 17384 1bfcac01cd8 _ftelli64_nolock RtlFreeHeap 17383->17384 17383->17391 17389 1bfcac0196f 17384->17389 17386 1bfcac01b60 _fseek_nolock RtlFreeHeap 17385->17386 17385->17391 17387 1bfcac01aa4 17386->17387 17388 1bfcac01b60 _fseek_nolock RtlFreeHeap 17387->17388 17387->17391 17388->17391 17390 1bfcac01b60 _fseek_nolock RtlFreeHeap 17389->17390 17389->17391 17390->17391 17391->17361 17393 1bfcac01b83 17392->17393 17394 1bfcac01b9b 17392->17394 17395 1bfcabfb6a4 __doserrno RtlFreeHeap 17393->17395 17396 1bfcac01c12 17394->17396 17400 1bfcac01bcd 17394->17400 17397 1bfcac01b88 17395->17397 17398 1bfcabfb6a4 __doserrno RtlFreeHeap 17396->17398 17399 1bfcabfb714 _errno RtlFreeHeap 17397->17399 17401 1bfcac01c17 17398->17401 17409 1bfcac01b90 _invalid_parameter_noinfo _unlock_fhandle 17399->17409 17402 1bfcac0438c __lock_fhandle RtlFreeHeap 17400->17402 17403 1bfcabfb714 _errno RtlFreeHeap 17401->17403 17404 1bfcac01bd4 17402->17404 17403->17409 17405 1bfcac01be0 17404->17405 17406 1bfcac01bf1 17404->17406 17412 1bfcac01c40 17405->17412 17408 1bfcabfb714 _errno RtlFreeHeap 17406->17408 17410 1bfcac01bf6 17408->17410 17409->17365 17411 1bfcabfb6a4 __doserrno RtlFreeHeap 17410->17411 17411->17409 17413 1bfcac046c8 _chsize_nolock RtlFreeHeap 17412->17413 17414 1bfcac01c5e 17413->17414 17415 1bfcac01c74 17414->17415 17416 1bfcac01c64 17414->17416 17418 1bfcabfb6c4 _dosmaperr RtlFreeHeap 17415->17418 17419 1bfcac01c69 17415->17419 17417 1bfcabfb714 _errno RtlFreeHeap 17416->17417 17417->17419 17418->17419 17419->17409 17421 1bfcabfab56 17420->17421 17422 1bfcabff624 _fileno RtlFreeHeap 17421->17422 17423 1bfcabfab73 17422->17423 17424 1bfcac01cd8 _ftelli64_nolock RtlFreeHeap 17423->17424 17425 1bfcabfab8f 17424->17425 17426 1bfcabfabf7 17425->17426 17427 1bfcabfad12 17425->17427 17438 1bfcabfab97 __crtMessageBoxW 17425->17438 17429 1bfcabfac0c 17426->17429 17432 1bfcabface7 17426->17432 17428 1bfcabfad16 17427->17428 17427->17432 17430 1bfcabfb714 _errno RtlFreeHeap 17428->17430 17431 1bfcac01cd8 _ftelli64_nolock RtlFreeHeap 17429->17431 17429->17438 17430->17438 17435 1bfcabfac24 17431->17435 17433 1bfcac01cd8 _ftelli64_nolock RtlFreeHeap 17432->17433 17432->17438 17434 1bfcabfad61 17433->17434 17436 1bfcac01cd8 _ftelli64_nolock RtlFreeHeap 17434->17436 17434->17438 17437 1bfcac01cd8 _ftelli64_nolock RtlFreeHeap 17435->17437 17435->17438 17436->17438 17437->17438 17438->17353 17442 1bfcabd8470 17439->17442 17443 1bfcabf9468 malloc RtlFreeHeap 17442->17443 17444 1bfcabd8491 17443->17444 17444->16592 17446 1bfcabd8470 RtlFreeHeap 17445->17446 17447 1bfcabd85d3 17446->17447 17447->16596 17459 1bfcabf88c4 17448->17459 17450 1bfcabf8825 17451 1bfcabf8856 17450->17451 17452 1bfcabf8836 17450->17452 17455 1bfcabf8854 17450->17455 17454 1bfcabf9700 _snprintf RtlFreeHeap 17451->17454 17453 1bfcabf9700 _snprintf RtlFreeHeap 17452->17453 17453->17455 17454->17455 17455->16626 17457 1bfcabcf33c RtlFreeHeap 17456->17457 17458 1bfcabcf429 17457->17458 17458->16626 17461 1bfcabf88de 17459->17461 17460 1bfcabf896b 17460->17450 17461->17460 17462 1bfcabf9700 _snprintf RtlFreeHeap 17461->17462 17462->17460 17464 1bfcabdce98 17463->17464 17465 1bfcabf88c4 RtlFreeHeap 17464->17465 17466 1bfcabdce9c 17464->17466 17465->17466 17466->16669 17468 1bfcabd7f80 RtlFreeHeap 17467->17468 17469 1bfcabd25da 17468->17469 17473 1bfcabd27f2 17469->17473 17474 1bfcabcf280 17469->17474 17470 1bfcabd80f0 RtlFreeHeap 17472 1bfcabd2846 17470->17472 17472->16698 17473->17470 17479 1bfcabf990c 17474->17479 17477 1bfcabcf33c RtlFreeHeap 17478 1bfcabcf2e2 17477->17478 17478->17473 17482 1bfcabf989c 17479->17482 17481 1bfcabcf2c3 17481->17477 17483 1bfcabf98aa 17482->17483 17484 1bfcabf98f1 17482->17484 17483->17484 17486 1bfcabf98b4 17483->17486 17485 1bfcabfb714 _errno RtlFreeHeap 17484->17485 17489 1bfcabf98e9 _invalid_parameter_noinfo 17485->17489 17491 1bfcabf97b4 17486->17491 17488 1bfcabf98d8 17488->17489 17490 1bfcabfb714 _errno RtlFreeHeap 17488->17490 17489->17481 17490->17489 17492 1bfcabf97f0 memcpy_s 17491->17492 17493 1bfcabf97f5 17492->17493 17496 1bfcabf9814 17492->17496 17494 1bfcabfb714 _errno RtlFreeHeap 17493->17494 17495 1bfcabf97fa _invalid_parameter_noinfo 17494->17495 17495->17488 17496->17495 17497 1bfcabfbd98 write_char RtlFreeHeap 17496->17497 17497->17495 17499 1bfcabf9468 malloc RtlFreeHeap 17498->17499 17500 1bfcabd5fa9 17499->17500 17500->16707 17506 1bfcabf9924 17501->17506 17503 1bfcabcd369 17504 1bfcabcd395 17503->17504 17505 1bfcabf990c RtlFreeHeap 17503->17505 17504->16710 17505->17504 17507 1bfcabf993c memcpy_s 17506->17507 17508 1bfcabfb714 _errno RtlFreeHeap 17507->17508 17509 1bfcabf997a _invalid_parameter_noinfo 17507->17509 17508->17509 17509->17503 17512 1bfcabd6331 17510->17512 17511 1bfcabd5c0e 17511->16325 17512->17511 17513 1bfcabf9428 RtlFreeHeap free 17512->17513 17513->17512 17515 1bfcabf826c RtlFreeHeap 17514->17515 17516 1bfcabf860d 17515->17516 17517 1bfcabf8657 17516->17517 17518 1bfcabf8640 17516->17518 17519 1bfcabf8668 17517->17519 17520 1bfcabf867f 17517->17520 17521 1bfcabcf2ec RtlFreeHeap 17518->17521 17523 1bfcabcf2ec RtlFreeHeap 17519->17523 17522 1bfcabd7f80 RtlFreeHeap 17520->17522 17526 1bfcabf825a 17521->17526 17524 1bfcabf8689 17522->17524 17523->17526 17525 1bfcabf88c4 RtlFreeHeap 17524->17525 17525->17526 17526->16729 17531 1bfcabfa427 17527->17531 17528 1bfcabfa42c 17529 1bfcabfb714 _errno RtlFreeHeap 17528->17529 17530 1bfcabfa431 _invalid_parameter_noinfo 17528->17530 17529->17530 17530->16745 17531->17528 17532 1bfcabfa47a 17531->17532 17532->17530 17533 1bfcabfb714 _errno RtlFreeHeap 17532->17533 17533->17530 17535 1bfcabcf33c RtlFreeHeap 17534->17535 17536 1bfcabcf47f 17535->17536 17536->16755 17538 1bfcabf9468 malloc RtlFreeHeap 17537->17538 17539 1bfcabd844a 17538->17539 17539->16766 17541 1bfcabfaf1c 17540->17541 17542 1bfcabfaf12 17540->17542 17547 1bfcabd3323 17541->17547 17548 1bfcac022e0 17541->17548 17543 1bfcabf99d8 _sopen_nolock RtlFreeHeap 17542->17543 17543->17541 17546 1bfcabf9428 free RtlFreeHeap 17546->17547 17547->16769 17549 1bfcac022ec 17548->17549 17550 1bfcabfb6c4 _dosmaperr RtlFreeHeap 17549->17550 17551 1bfcabfaf32 17549->17551 17550->17551 17551->17546 17571 1bfcabdcf00 17552->17571 17555 1bfcabfaf48 17556 1bfcabfaf5a 17555->17556 17557 1bfcabfaf64 17555->17557 17558 1bfcabf99d8 _sopen_nolock RtlFreeHeap 17556->17558 17561 1bfcabfaf68 17557->17561 17592 1bfcac02314 17557->17592 17558->17557 17561->16788 17562 1bfcabf9428 free RtlFreeHeap 17562->17561 17564 1bfcabfae3a 17563->17564 17567 1bfcabfae44 17563->17567 17565 1bfcabf99d8 _sopen_nolock RtlFreeHeap 17564->17565 17565->17567 17569 1bfcabfae48 17567->17569 17596 1bfcac022b0 17567->17596 17569->16788 17570 1bfcabf9428 free RtlFreeHeap 17570->17569 17572 1bfcabf9468 malloc RtlFreeHeap 17571->17572 17573 1bfcabdcf1d 17572->17573 17574 1bfcabf9700 _snprintf RtlFreeHeap 17573->17574 17575 1bfcabdcf3d 17574->17575 17576 1bfcabf9428 free RtlFreeHeap 17575->17576 17581 1bfcabdcf5c 17576->17581 17577 1bfcabd2ee8 17577->17555 17578 1bfcabf9468 malloc RtlFreeHeap 17578->17581 17579 1bfcabf9700 _snprintf RtlFreeHeap 17579->17581 17581->17577 17581->17578 17581->17579 17582 1bfcabf9428 free RtlFreeHeap 17581->17582 17583 1bfcabdd08c 17581->17583 17582->17581 17584 1bfcabf9468 malloc RtlFreeHeap 17583->17584 17585 1bfcabdd0ae 17584->17585 17586 1bfcabf9700 _snprintf RtlFreeHeap 17585->17586 17587 1bfcabdd0d8 17586->17587 17588 1bfcabdcf00 RtlFreeHeap 17587->17588 17589 1bfcabdd0ec 17588->17589 17590 1bfcabf9428 free RtlFreeHeap 17589->17590 17591 1bfcabdd0f6 17590->17591 17591->17581 17593 1bfcac0231e 17592->17593 17594 1bfcabfaf7a 17593->17594 17595 1bfcabfb6c4 _dosmaperr RtlFreeHeap 17593->17595 17594->17562 17595->17594 17598 1bfcac022ba 17596->17598 17597 1bfcabfae5a 17597->17570 17598->17597 17599 1bfcabfb6c4 _dosmaperr RtlFreeHeap 17598->17599 17599->17597 17601 1bfcabf90fd 17600->17601 17602 1bfcabf8ff9 17601->17602 17606 1bfcabf92bc 17601->17606 17602->16325 17607 1bfcabf9468 malloc RtlFreeHeap 17606->17607 17608 1bfcabf92db 17607->17608 17609 1bfcabf9468 malloc RtlFreeHeap 17608->17609 17610 1bfcabf92fa 17609->17610 17611 1bfcabf9468 malloc RtlFreeHeap 17610->17611 17612 1bfcabf9331 17611->17612 17613 1bfcabf9700 _snprintf RtlFreeHeap 17612->17613 17614 1bfcabf935d 17613->17614 17615 1bfcabf9468 malloc RtlFreeHeap 17614->17615 17616 1bfcabf91b9 17615->17616 17617 1bfcabf7f5c 17616->17617 17618 1bfcabf7f82 17617->17618 17619 1bfcabf7f99 17618->17619 17621 1bfcabf7eb4 17618->17621 17619->17602 17622 1bfcabf7ee4 17621->17622 17625 1bfcabf8078 17622->17625 17626 1bfcabf8088 17625->17626 17627 1bfcabf7f19 17625->17627 17628 1bfcabd51dc RtlFreeHeap 17626->17628 17627->17619 17628->17627 17632 1bfcabd7291 17629->17632 17630 1bfcabd734c 17633 1bfcabd7377 17630->17633 17634 1bfcabd7375 17630->17634 17631 1bfcabd731e 17635 1bfcabd7329 17631->17635 17636 1bfcabd7335 17631->17636 17632->17630 17632->17631 17642 1bfcabd6c54 17633->17642 17640 1bfcabcf2ec RtlFreeHeap 17634->17640 17637 1bfcabcf410 RtlFreeHeap 17635->17637 17639 1bfcabcf2ec RtlFreeHeap 17636->17639 17641 1bfcabd6fd1 17637->17641 17639->17641 17640->17641 17641->16325 17643 1bfcabd6c99 17642->17643 17644 1bfcabd6e80 17643->17644 17646 1bfcabd6d14 17643->17646 17648 1bfcabd6c9d 17643->17648 17645 1bfcabcf410 RtlFreeHeap 17644->17645 17645->17648 17647 1bfcabf9468 malloc RtlFreeHeap 17646->17647 17646->17648 17647->17648 17648->17641 17650 1bfcabd3dbf 17649->17650 17651 1bfcabf72a0 RtlFreeHeap 17650->17651 17652 1bfcabd3e8c 17651->17652 17653 1bfcabd3e90 17652->17653 17654 1bfcabd4708 RtlFreeHeap 17652->17654 17653->16821 17655 1bfcabd3ef6 17654->17655 17657 1bfcabd60bc 17655->17657 17658 1bfcabf9468 malloc RtlFreeHeap 17657->17658 17659 1bfcabd60e0 17658->17659 17660 1bfcabf9700 _snprintf RtlFreeHeap 17659->17660 17661 1bfcabd6182 17660->17661 17661->17653 17663 1bfcabfd958 _lock RtlFreeHeap 17662->17663 17664 1bfcac08b5b 17663->17664 17667 1bfcac08b7c 17664->17667 17666 1bfcac08b66 __updatetmbcinfo 17666->16826 17668 1bfcac08bab 17667->17668 17672 1bfcac08ba3 _invalid_parameter_noinfo 17667->17672 17669 1bfcac08bb0 17668->17669 17671 1bfcac08bc7 17668->17671 17674 1bfcac08c26 _putenv_helper 17668->17674 17670 1bfcabfb714 _errno RtlFreeHeap 17669->17670 17670->17672 17700 1bfcac09728 17671->17700 17672->17666 17674->17669 17678 1bfcac08c51 17674->17678 17675 1bfcac08bf8 17677 1bfcabfe2f8 _calloc_crt RtlFreeHeap 17675->17677 17676 1bfcac08bd3 _putenv_helper 17676->17669 17676->17675 17683 1bfcac08c11 17677->17683 17679 1bfcabfe2f8 _calloc_crt RtlFreeHeap 17678->17679 17680 1bfcac08c65 17679->17680 17680->17672 17706 1bfcac04fbc 17680->17706 17682 1bfcac04fbc __crtsetenv RtlFreeHeap 17684 1bfcac08ca6 17682->17684 17683->17672 17683->17682 17713 1bfcac08fb8 17684->17713 17686 1bfcac08cb4 17687 1bfcac08cb8 17686->17687 17689 1bfcac08ccf 17686->17689 17687->17672 17688 1bfcabf9428 free RtlFreeHeap 17687->17688 17688->17672 17689->17672 17691 1bfcabfe2f8 _calloc_crt RtlFreeHeap 17689->17691 17696 1bfcac08d07 17689->17696 17690 1bfcabfb714 _errno RtlFreeHeap 17690->17672 17692 1bfcac08d50 _wsetenvp 17691->17692 17692->17672 17693 1bfcac08d77 17692->17693 17695 1bfcac08dc5 17692->17695 17694 1bfcabf9428 free RtlFreeHeap 17693->17694 17694->17696 17751 1bfcac09350 17695->17751 17696->17690 17699 1bfcabf9428 free RtlFreeHeap 17699->17672 17701 1bfcac09730 17700->17701 17702 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 17701->17702 17703 1bfcac09751 17702->17703 17704 1bfcabfb714 _errno RtlFreeHeap 17703->17704 17705 1bfcac0975d _invalid_parameter_noinfo strchr 17703->17705 17704->17705 17705->17676 17707 1bfcac04fd1 17706->17707 17708 1bfcac04fc7 17706->17708 17709 1bfcabfb714 _errno RtlFreeHeap 17707->17709 17708->17707 17710 1bfcac04fed 17708->17710 17711 1bfcac04fd9 _invalid_parameter_noinfo 17709->17711 17710->17711 17712 1bfcabfb714 _errno RtlFreeHeap 17710->17712 17711->17683 17712->17711 17714 1bfcac08fe1 17713->17714 17715 1bfcac08ff6 17713->17715 17716 1bfcabfb714 _errno RtlFreeHeap 17714->17716 17717 1bfcac090d8 17715->17717 17719 1bfcac09728 __crtsetenv RtlFreeHeap 17715->17719 17720 1bfcac08fe6 _invalid_parameter_noinfo 17716->17720 17718 1bfcabfb714 _errno RtlFreeHeap 17717->17718 17718->17720 17721 1bfcac0900f 17719->17721 17720->17686 17721->17717 17722 1bfcac0904f 17721->17722 17725 1bfcabfe2f8 _calloc_crt RtlFreeHeap 17721->17725 17723 1bfcac090fe 17722->17723 17724 1bfcac090cf 17722->17724 17731 1bfcac09133 17722->17731 17723->17720 17728 1bfcabfe378 _malloc_crt RtlFreeHeap 17723->17728 17788 1bfcac09c2c 17724->17788 17737 1bfcac0906e 17725->17737 17732 1bfcac09111 17728->17732 17729 1bfcac0923d 17734 1bfcac0932b 17729->17734 17740 1bfcac09234 17729->17740 17731->17720 17733 1bfcac09199 17731->17733 17796 1bfcac09d20 17731->17796 17732->17720 17732->17731 17738 1bfcabfe378 _malloc_crt RtlFreeHeap 17732->17738 17733->17729 17735 1bfcabf9428 free RtlFreeHeap 17733->17735 17733->17740 17736 1bfcabf9428 free RtlFreeHeap 17734->17736 17735->17733 17742 1bfcac09333 _invoke_watson 17736->17742 17737->17722 17782 1bfcac09bbc 17737->17782 17738->17731 17740->17720 17741 1bfcac09314 17740->17741 17744 1bfcabfe2f8 _calloc_crt RtlFreeHeap 17740->17744 17741->17720 17743 1bfcabf9428 free RtlFreeHeap 17741->17743 17743->17720 17745 1bfcac092b6 17744->17745 17745->17741 17746 1bfcac04fbc __crtsetenv RtlFreeHeap 17745->17746 17748 1bfcac092d5 17746->17748 17747 1bfcac09306 17749 1bfcabf9428 free RtlFreeHeap 17747->17749 17748->17742 17748->17747 17750 1bfcabfb714 _errno RtlFreeHeap 17748->17750 17749->17741 17750->17747 17754 1bfcac0938d wcschr 17751->17754 17752 1bfcac09483 17753 1bfcabfb714 _errno RtlFreeHeap 17752->17753 17774 1bfcac08dd0 17753->17774 17754->17752 17755 1bfcac094a9 17754->17755 17756 1bfcac09465 17754->17756 17767 1bfcac094e3 17754->17767 17757 1bfcac094be 17755->17757 17760 1bfcabfe378 _malloc_crt RtlFreeHeap 17755->17760 17755->17774 17839 1bfcac0a264 17756->17839 17762 1bfcabfe378 _malloc_crt RtlFreeHeap 17757->17762 17757->17767 17757->17774 17760->17757 17761 1bfcac0960d 17764 1bfcac09700 17761->17764 17772 1bfcac09601 _wsetenvp 17761->17772 17762->17767 17769 1bfcac09553 17767->17769 17767->17774 17854 1bfcac09ea0 17767->17854 17768 1bfcabf9428 free RtlFreeHeap 17768->17769 17769->17761 17769->17768 17769->17772 17772->17774 17774->17672 17774->17699 17783 1bfcac09bd3 17782->17783 17787 1bfcac09bfb _invoke_watson 17782->17787 17784 1bfcabf9468 malloc RtlFreeHeap 17783->17784 17785 1bfcac09be4 17784->17785 17786 1bfcac04fbc __crtsetenv RtlFreeHeap 17785->17786 17785->17787 17786->17787 17787->17737 17789 1bfcac090d4 17788->17789 17791 1bfcac09c54 17788->17791 17789->17717 17789->17731 17790 1bfcabfe2f8 _calloc_crt RtlFreeHeap 17790->17791 17791->17789 17791->17790 17792 1bfcac09d10 17791->17792 17794 1bfcac08fb8 __crtsetenv RtlFreeHeap 17791->17794 17795 1bfcabf9428 free RtlFreeHeap 17791->17795 17793 1bfcabf9428 free RtlFreeHeap 17792->17793 17793->17789 17794->17791 17795->17791 17797 1bfcac09d28 17796->17797 17798 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 17797->17798 17800 1bfcac09d59 17798->17800 17799 1bfcac09d6f 17802 1bfcabfb714 _errno RtlFreeHeap 17799->17802 17800->17799 17801 1bfcac09d86 17800->17801 17805 1bfcac09d5e _invalid_parameter_noinfo 17800->17805 17803 1bfcac09d90 17801->17803 17804 1bfcac09da2 17801->17804 17802->17805 17806 1bfcabfb714 _errno RtlFreeHeap 17803->17806 17807 1bfcac09dc2 17804->17807 17808 1bfcac09dad 17804->17808 17805->17731 17806->17805 17827 1bfcac0ad60 17807->17827 17811 1bfcac0a918 17808->17811 17828 1bfcabfbf24 _LocaleUpdate::_LocaleUpdate RtlFreeHeap 17827->17828 17841 1bfcac0a27e 17839->17841 17841->17841 17855 1bfcac09eb6 17854->17855 17858 1bfcac09f29 17854->17858 17859 1bfcac09f69 17858->17859 17861 1bfcac09f88 17858->17861 17868 1bfcac09f5d _invalid_parameter_noinfo 17858->17868 17868->17767 17872 1bfcabd17f6 17870->17872 17871 1bfcabd18e1 17871->16859 17872->17871 17873 1bfcabcd338 RtlFreeHeap 17872->17873 17873->17872 17875 1bfcabd11f1 17874->17875 17876 1bfcabda870 RtlFreeHeap 17875->17876 17877 1bfcabd1265 17876->17877 17878 1bfcabd1269 17877->17878 17880 1bfcabd648c 17877->17880 17878->16879 17881 1bfcabd60bc RtlFreeHeap 17880->17881 17882 1bfcabd64d3 17881->17882 17882->17878 17886 1bfcabcca6a 17883->17886 17884 1bfcabccaa8 17884->16895 17885 1bfcabf9468 malloc RtlFreeHeap 17885->17884 17886->17884 17886->17885 17888 1bfcabf7438 RtlFreeHeap 17887->17888 17889 1bfcabf735b 17888->17889 17890 1bfcabd25a8 RtlFreeHeap 17889->17890 17891 1bfcabf7392 17890->17891 17891->16933 17893 1bfcabf7438 RtlFreeHeap 17892->17893 17894 1bfcabf73c6 17893->17894 17895 1bfcabda618 RtlFreeHeap 17894->17895 17896 1bfcabd41fc 17895->17896 17896->16939 17896->16940 17899 1bfcabce053 17897->17899 17898 1bfcabce55a 17898->16943 17899->17898 17900 1bfcabcf310 RtlFreeHeap 17899->17900 17900->17898 17908 1bfcabcdc5e 17901->17908 17902 1bfcabcd691 17902->16944 17902->16947 17903 1bfcabcdd13 17904 1bfcabcf2ec RtlFreeHeap 17903->17904 17904->17902 17905 1bfcabcd9e4 RtlFreeHeap 17905->17908 17906 1bfcabcdf39 17907 1bfcabcf280 RtlFreeHeap 17906->17907 17907->17902 17908->17902 17908->17903 17908->17905 17908->17906 17909 1bfcabcdf7f 17908->17909 17910 1bfcabcf410 RtlFreeHeap 17909->17910 17910->17902 17916 1bfcabd9323 17911->17916 17912 1bfcabd9625 17912->15626 17913 1bfcabd6c54 RtlFreeHeap 17913->17916 17914 1bfcabd8470 RtlFreeHeap 17914->17916 17915 1bfcabcd2bc RtlFreeHeap 17915->17916 17916->17912 17916->17913 17916->17914 17916->17915 17917 1bfcabcd280 RtlFreeHeap 17916->17917 17917->17916 17919 1bfcabd9964 17918->17919 17921 1bfcabd996e 17918->17921 17920 1bfcabf9468 malloc RtlFreeHeap 17919->17920 17920->17921 17921->15626 17924 1bfcabd9bea 17922->17924 17923 1bfcabd92e1 17923->15530 17924->17923 17925 1bfcabf9428 RtlFreeHeap free 17924->17925 17925->17924

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: NameSocketUser_snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 1789932928-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: e36e629b820d9f907046e10724731c4382095022a6eed5a6b53155ed1a73a1a5
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: B671DD70618B488FE394EB18C894F9ABBE1FBC9345F50496DB499C32A5C774E885CB02
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: DCBA
                                      • API String ID: 544645111-2222620526
                                      • Opcode ID: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction ID: 117f1694ef31e4bcf5f49b13adc5e146e0016d42371b7ad50d7be881f8b10f5b
                                      • Opcode Fuzzy Hash: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction Fuzzy Hash: AF415932301B888EDB51CF69D8807DC3BA5F788BACF118225EA1C87B99DB34D995C340

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ($0
                                      • API String ID: 0-506339136
                                      • Opcode ID: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction ID: 00b4aa056d7b022e755cb012b382af4f1bbda1f7f15d20207c60102b2eb3d31a
                                      • Opcode Fuzzy Hash: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction Fuzzy Hash: 95416A305197498FE7ACDB28C454BAABBE1FB98305F50493DE0D9C31A5DB74D889CB02

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: IoctlSocketclosesocket
                                      • String ID:
                                      • API String ID: 3445158922-0
                                      • Opcode ID: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction ID: f960d7ac58c09de9911e414829b4a1f8d38c6e8b7536d5bb2ea48b3c5ac45230
                                      • Opcode Fuzzy Hash: 2b1563ebb8b5cee2362f50e6a9862c7e044125dd490747691ac161b43e72dde1
                                      • Instruction Fuzzy Hash: E1311D745187888FE358DF68C844B9AFBE4FB88344F50493DF49AC2294D7B8D4859B02
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_invalid_parameter_noinfo
                                      • String ID: U
                                      • API String ID: 3902385426-4171548499
                                      • Opcode ID: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction ID: 39f8438392468e8025deed0fbe3bc3d3fd897f484454e329d52360efc824d4b1
                                      • Opcode Fuzzy Hash: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction Fuzzy Hash: 0312083260468986EB228F24DC44BEE7FA9F7C9744F55813ADA4983794DB3DC4E6CB10
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                      • String ID: -$@
                                      • API String ID: 3246410048-1222683799
                                      • Opcode ID: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction ID: 42cd8bf538b8edf87bf3606aad7638bcd01ff2a3b0961fca41200dc7ac37aa1a
                                      • Opcode Fuzzy Hash: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction Fuzzy Hash: 78B1F93260468885FB66CB559C40BEE7FB9F7C5790F15903DEE49876D8CB34C5A28B40

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$ExitFreeHeapProcess__crt_errno
                                      • String ID:
                                      • API String ID: 150120455-0
                                      • Opcode ID: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction ID: 78e3e543ad713220664d2078124972144564ed5a8632a64cf365738b0c9bb32b
                                      • Opcode Fuzzy Hash: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction Fuzzy Hash: 70411E34218A0D8BFBA8EBA8DCD5FE936D1F758311F58443C9005C2696DB2CA88ACB50

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction ID: 01b4f52ffc162dd3225ff6e33965b198415e207cee27c3bbb65c4908d1049f6e
                                      • Opcode Fuzzy Hash: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction Fuzzy Hash: 3031E47421874C4EE715EF798C82BE97A90EB45320F16027DE412872EBD770F89B8751
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$ExitProcess__crt_errno
                                      • String ID:
                                      • API String ID: 1362684943-0
                                      • Opcode ID: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction ID: 7ca06d0dd11edbd9c4acc7a85d15a04dafd40e0c7050570545602b5afa6c7744
                                      • Opcode Fuzzy Hash: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction Fuzzy Hash: 2141EB35611A0C81FF579B11ED54BE83EA9EBC8B61F0AC57D9D1986291CF3888F78211
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction ID: 0cd3fea20f28e0a03e70681b659407c09785f96ce2f44d24aff0b74a23888bf6
                                      • Opcode Fuzzy Hash: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction Fuzzy Hash: AC31B33161028887E7075F659D81B9D3E99ABC4790F46C13CA916AB7D2C77CC4E2C710

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction ID: 2d9b326dfa71cb435d0c01abb3e130fc7eff1606dda093ba100b0c2915600412
                                      • Opcode Fuzzy Hash: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction Fuzzy Hash: FF2129346187084EF719FB6C9C42BF9BAD0EB45320F19026DE0168B1EBC764A8978762

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction ID: 0ee8150747c2acfaa3cb5e600dfb49b881f7b89fcb3bde2edfbb39db2ef1ceb6
                                      • Opcode Fuzzy Hash: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction Fuzzy Hash: 942127356082084EF319AB6CDC42BF9BA90DB42320F1A022CE157871EBD764F8D78362
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction ID: eab4706480842c32a18ae677e95b8bf0cb3826aa8d46de5a01709b91cb98ee0f
                                      • Opcode Fuzzy Hash: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction Fuzzy Hash: 6821D032A0418846F6076F559C41BED7E99A7C47A0F1A812CAA164B6D2CB7CC8E38321
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction ID: bee62677eb2442a88eb0e4fd2fd1395e663f4987f3f658d5a8dbe9a1b369c062
                                      • Opcode Fuzzy Hash: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction Fuzzy Hash: 6C219232A1024855FA075F559C01BED7E59A7C4BF0F19C22CAA358B7D2C77CC5E28611

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 919 1bfcac09ea0-1bfcac09eb4 920 1bfcac09eb6-1bfcac09eb9 919->920 921 1bfcac09f29-1bfcac09f5b 919->921 922 1bfcac09ed5-1bfcac09ed8 920->922 923 1bfcac09ebb-1bfcac09ed4 call 1bfcabfb714 call 1bfcabfbd3c 920->923 926 1bfcac09f64-1bfcac09f67 921->926 927 1bfcac09f5d-1bfcac09f5f 921->927 922->923 928 1bfcac09eda-1bfcac09ee1 922->928 931 1bfcac09f83-1bfcac09f86 926->931 932 1bfcac09f69-1bfcac09f7e call 1bfcabfb714 call 1bfcabfbd3c 926->932 930 1bfcac0a049-1bfcac0a063 927->930 928->923 933 1bfcac09ee3-1bfcac09ee4 928->933 931->932 937 1bfcac09f88-1bfcac09f90 931->937 932->930 936 1bfcac09ee6-1bfcac09ef2 933->936 940 1bfcac09ef4 936->940 941 1bfcac09ef8-1bfcac09f03 936->941 942 1bfcac09f92-1bfcac09fa2 call 1bfcabfb714 call 1bfcabfbd3c 937->942 943 1bfcac09fa7-1bfcac09fc3 call 1bfcabfbf24 937->943 940->941 946 1bfcac09f05 941->946 947 1bfcac09f09-1bfcac09f10 941->947 962 1bfcac0a047 942->962 956 1bfcac09fc5-1bfcac09fc6 943->956 957 1bfcac0a007-1bfcac0a022 call 1bfcac0adec 943->957 946->947 951 1bfcac09f12-1bfcac09f15 947->951 952 1bfcac09f1c-1bfcac09f28 947->952 951->952 954 1bfcac09f17-1bfcac09f1a 951->954 954->936 954->952 959 1bfcac09fc8-1bfcac09fd4 956->959 965 1bfcac0a031 957->965 966 1bfcac0a024-1bfcac0a02f call 1bfcabfb714 957->966 963 1bfcac09fd6 959->963 964 1bfcac09fda-1bfcac09fe4 959->964 962->930 963->964 967 1bfcac09fe6 964->967 968 1bfcac09fea-1bfcac09ff1 964->968 970 1bfcac0a034-1bfcac0a039 965->970 966->970 967->968 971 1bfcac09ff3-1bfcac09ff6 968->971 972 1bfcac09ffd-1bfcac0a005 968->972 970->962 974 1bfcac0a03b-1bfcac0a040 970->974 971->972 975 1bfcac09ff8-1bfcac09ffb 971->975 972->970 974->962 975->959 975->972
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction ID: 49c0c7625566fe1e9f980fd56f5d32d78b6c22a968d912b2f49aa5d7c1db5cac
                                      • Opcode Fuzzy Hash: 181d52bcb5af38a644f949309eae4e32f5a35df007ff24cdcce28bd57c8089db
                                      • Instruction Fuzzy Hash: C1512530118A1E4EEB64EB688C41BF57AD0EB54321F58027EE066C71EFD724E8DB8742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction ID: d0978e1fd277af022bbdbbb75e468e95f6b15d0b62c8c09aefdc9ec7c87710a1
                                      • Opcode Fuzzy Hash: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction Fuzzy Hash: 4C41F3B1A00398C1FB629B118D40BED3FE9E7D8B90FD5C139EA94876C5D72888E38600

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction ID: 51349db3e554797e88ba2c513ba218c63c7187bce2a2bdfe6b433d06a930ecd8
                                      • Opcode Fuzzy Hash: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction Fuzzy Hash: 332129306086080EFB14EB689C46BF97A90DB45320F1A026DE015C71EBD764B89786A9

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction ID: 1f012646ff6b946309cd3386185046cf1e62e9b87396808d9440003e274b80c8
                                      • Opcode Fuzzy Hash: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction Fuzzy Hash: E121E73A505A488EF715AF758C85BE87E90EF41320F1D057DE016872EBD774A88A8761
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction ID: ba7e63d4f5b844c49091fbc8105cd881781b89cfaf891d1b4aabe5e277d3cbb4
                                      • Opcode Fuzzy Hash: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction Fuzzy Hash: 5821953260018856FA076F159D41BED7D9AA7C07A1F1BC13DAA158B7D2CB7884F3C721
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction ID: 1d7b1bd236b2541180a3fcd76d5e9f83addc8e44cbf8c8c99913110a8c0df2b7
                                      • Opcode Fuzzy Hash: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction Fuzzy Hash: B611AF3264068845F6276F259D41BDC7E99A7C07A1F1BC63CE916877D2C77888E28314
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction ID: 5469b6a7c89c9fc59ab575378e539915d3f6ef82924ccb1d2d706371b92ad32a
                                      • Opcode Fuzzy Hash: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction Fuzzy Hash: 9A91C930318B4C4BD769AA6C9C55FF9BBD1E795704F54023ED48AC328BDF20E94B8682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction ID: efb82d9ad5be3c05b5c933612e35ac74ac209b99952d12d6235288ec0b8cbe95
                                      • Opcode Fuzzy Hash: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction Fuzzy Hash: C171C53630478D46EA169A269C40FEE7E99F7C5BC8F41C03D9D464BB95DB38C8A78700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _time64$strtok$malloc
                                      • String ID:
                                      • API String ID: 2141844861-0
                                      • Opcode ID: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction ID: 777b10252ad7db80c6b7d3f5f37d50cdb19da02c2ca522784be7823138edcad3
                                      • Opcode Fuzzy Hash: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction Fuzzy Hash: 5D910431205A4C8AE7628F05EE88B957FE9F3C5758F11823DD59A867A4DB3DD0E6CB00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-3916222277
                                      • Opcode ID: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction ID: d3dfe63c2ca799d9b075d81fb9b494c252e927e1c4443deb2ae62a1aabe1909a
                                      • Opcode Fuzzy Hash: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction Fuzzy Hash: 2541C472600B4C46EB5A9F24DC51BAD3EB8E7C4B94F158129EA66873C5DB34C8E2C740
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction ID: 793144328abcf2cea6f4f0a0be8757d0c54f23c677b872f67ec1d059715e7d74
                                      • Opcode Fuzzy Hash: 9aa24401b2afff689c0b0903031154c7b35a263849ab08805c315ffe4c7e00e0
                                      • Instruction Fuzzy Hash: 4D315C30608B0C4FD764DF589885BA97AD0EB58310F5502ADA459CB2ABDB70EC9A8785
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction ID: fddc46ebf3f6d12ec88aef98718f93ac25b1ff042ffb61f3096bb6d057d0a451
                                      • Opcode Fuzzy Hash: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction Fuzzy Hash: 7E31D634614A0D8FFB54AFB99C05BA97AD1FF88315F18417EE40AC32D6DB38D8868742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction ID: ff591d18d08e0e763bc3555ae5979bf044b71cf1b93b41c391864f52ae01e660
                                      • Opcode Fuzzy Hash: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction Fuzzy Hash: CF317E71700B4886FB22AF25DC047A97EE9ABC8B94F0585389E45877E5DF38C4E28704
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction ID: 4f9ea076040effa9bdee9a377f357b16bbe591ef7cbf7f2fe99ee6b3e4306e0d
                                      • Opcode Fuzzy Hash: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction Fuzzy Hash: 7E316472A0479885E7129F11D884BDD7EA8F7C8BE0F99C139EE5487B85CB74C9A2C710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction ID: 94dd82bf921cd4ce8179fd7b8913f87bdd15803f2b5582c18aef20b90a6db83c
                                      • Opcode Fuzzy Hash: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction Fuzzy Hash: 23619238218F0D4AE66C5A3C5C45AB57ED1E795760F18033ED456C32DADB60FC9B86C1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction ID: 8b59d886deee5517513ba5aed8a5f296db2552c5924caaf590c1719786688499
                                      • Opcode Fuzzy Hash: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction Fuzzy Hash: 9471183451878C8FD348EB18C855F9ABBE1FB98355F50453DB099C32A5CB34E98ACB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction ID: 6e9281e4794ee73e505a383999f820cfa2606c5ecdb83cefcc1de9295f45e6fa
                                      • Opcode Fuzzy Hash: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction Fuzzy Hash: 8651D53174424842FA668A665D00BE97ED9A3C4FF4F16C738AE2987BD4CB34C8F38644
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction ID: 17492a2eafde11a7f47a3d24ff8a94082c532c8b3fc699b4d5cb47a781ee409e
                                      • Opcode Fuzzy Hash: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction Fuzzy Hash: 13614632218A8882E761DB15E85079FBB65F7C5790F108139F68E47BAACF38C596CF40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction ID: 71a4c595a96e2ff1c72fa3cd3af3478b90d2be59cef4ebf51e5bcb7e475dba81
                                      • Opcode Fuzzy Hash: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction Fuzzy Hash: FB21D838618B4E4FFB94EB3C4C05BA97AD1EB49300F09057D9445C329AEF24EDC69351
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction ID: 90e3f228d78c475123a2f3fcdb4432a50bc276bb917b21c6ade95c51ff08f70a
                                      • Opcode Fuzzy Hash: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction Fuzzy Hash: 3031F434518A4C9FD64CEB28CC55F9A7BD1FB98305F50053DB099D32A9DB34A58AC742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction ID: e0f4a576dca989680e66bdd867c49017fb84d17f5fb3e91aee71de76cccf9bce
                                      • Opcode Fuzzy Hash: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction Fuzzy Hash: 4321A87131478945FB639B215C01B9EBE99A7C4BC0F16C478AD89D7785DB3CC4B28714
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction ID: c40eb04c6a66642ac89b96fc1c5d49b18c6aee04b308e2ac45dbf63f08da9018
                                      • Opcode Fuzzy Hash: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction Fuzzy Hash: B0212432518A4881DA21EB11E8517DE7F64F7C4794F108239BADE43AEADF3CC5E68B40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_set_error_mode$__crt_errno$ExitMessageProcess_lock_malloc_crtmalloc
                                      • String ID:
                                      • API String ID: 2751257304-0
                                      • Opcode ID: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction ID: 50efcc83a36c67d241c89f3c7c22b50f38370130a89368e80bfdb5a6eaca8e00
                                      • Opcode Fuzzy Hash: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction Fuzzy Hash: AB114C3221168C81F6669B60EC44BE93EA9E7C4781F46943CE546C66E2DF7888F29311
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction ID: 7ac7a25d58d83fb975e8b31d05800e39f330680ea4e5790ac3546a537e77c6b6
                                      • Opcode Fuzzy Hash: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction Fuzzy Hash: 8051C634728E0D4BE7599B689C56EF9BBD1FB59304F50013DD84AC728BEB10E98B86C1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction ID: 86dcf7ec5dceaa937fc33c428452af8cf6b677b8a17ce799b485c70f1e690252
                                      • Opcode Fuzzy Hash: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction Fuzzy Hash: C941B0313007599BEA5A9B269D94AE93F98F789BC0F408438DE464BB61DF34D8B7C700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc$_errno_snprintf$FreeHeap_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 1397185943-0
                                      • Opcode ID: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction ID: 0a6144576a578a43f45cacd504e69ee92b9388dc8b9d152c4d9ddb884f70c526
                                      • Opcode Fuzzy Hash: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction Fuzzy Hash: 78E121746146488BF358EB68CC55FEA7BE1FB85304F40453DB589C32DADB34A88ACB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 74200508-0
                                      • Opcode ID: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction ID: bb69a14d26e46ca2e3f7db1e63a62566e3ea6ee55e738c9baf5290d11b9b55ea
                                      • Opcode Fuzzy Hash: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction Fuzzy Hash: 98D143312186488AF752AB50EC51BDE7EA9F7C5344F10813DE689876E6CF39C4A6CF50
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _lock$_calloc_crt_mtinitlocknum
                                      • String ID:
                                      • API String ID: 3962633935-0
                                      • Opcode ID: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction ID: 2822211e83c0bc8569fb9642e7a8341035a5270a4611a393d9014b0b378e15f8
                                      • Opcode Fuzzy Hash: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction Fuzzy Hash: A8510670518A0D8BEB54DF58CC85BA6BBD0FB58310F15026DD84AC72BBD778EC978682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction ID: 29e1bfbb5eab4b82960d2abf313b734641a0150c479caf80ee87d747c474e9d3
                                      • Opcode Fuzzy Hash: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction Fuzzy Hash: F541E430258B0D4BE769AA688C45EFA7ED5EBA5315F54023DD487C3287EF20E84B87D1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-0
                                      • Opcode ID: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction ID: 5e94cc2d1beba7e92a1d2159566b7614eae48f29c4824be29fcf421788328dcd
                                      • Opcode Fuzzy Hash: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction Fuzzy Hash: 50519F78114A0C4FEB98DF388C81BA57AD0EB58310F18056DD856CB2DFD774E89ACB81
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_snprintffreemalloc$FreeHeap_callnewh_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 343393124-0
                                      • Opcode ID: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction ID: 076981fedf245a8099eb637d59088e7f9e7cf84e09137e9a70ae8c09c7ae75ff
                                      • Opcode Fuzzy Hash: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction Fuzzy Hash: 91416A30618A494FD758EB38CC54FAA7BF1FB99304F54053DE489C32A9DB25E986C741
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction ID: 236b793b0eed385b2afbf9118553263416e2e7deb1898e9ec83a188033ab6ca1
                                      • Opcode Fuzzy Hash: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction Fuzzy Hash: 9541C13221028D56EB169B269C48A997F9CF7D5FC4F4A8038DD168B761EF38C8A7C301
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction ID: 0e782d9341c5080ca383d426d43b1bc6b02d16d1ee75d2a740f473a329f3a1ff
                                      • Opcode Fuzzy Hash: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction Fuzzy Hash: 5901AD3412494C8EFA58EB28CE41FD53E90AF16326F58426CA405860FBC77CA4DAC622
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction ID: 4f48310ad446a17f9439f68297a010ac8caefba5c5b3c0d4c17d51fedb37ba40
                                      • Opcode Fuzzy Hash: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction Fuzzy Hash: 0301FF7452874C9FE388EB28CC55F99BBE1FFD4700F80052DB485C22A5DB74A589CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction ID: 53bb3d671bc0a424364e958f7d3e10f345aeda0a260b0ab82d8f30104bfb92d7
                                      • Opcode Fuzzy Hash: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction Fuzzy Hash: 35018171B1168C81FA075B14CD81BEC3EE99BD4BB1F56C32CE52A4A7D2C76C44E38222
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction ID: fef5f9557009b7021e7630b74b70d1c59b280baa959553d4e7f4d23ff41a41dc
                                      • Opcode Fuzzy Hash: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction Fuzzy Hash: EDF0F472528B8886D641EB51FC51B9EBB68F7C4780F405129FA8D93B59CF38C4A2CB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction ID: ef6fce37909579927d344ae09fdaa71981686ad037aed346a144dd2c6cb86a70
                                      • Opcode Fuzzy Hash: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction Fuzzy Hash: 099130341087898FE7A4EB78CC55BDEBBE1FB94300F54493DA489C3295DB75A88AC742
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction ID: 1e014cfcc561d6988e116e4a5650e5b9ee518cb702eddbb7d0080deafccab65e
                                      • Opcode Fuzzy Hash: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction Fuzzy Hash: 18815532604688C6E761DB14E840BDEBFA9F7C5740F508439E689C7A99DB7DC4D6CB10
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction ID: b513c8deed0744354f6f18a8348700b5801de1bdab5ac0d233fcc2cca5c73653
                                      • Opcode Fuzzy Hash: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction Fuzzy Hash: 4F31FC7451CB489FDB84EF28C444A5AB7E1FBAC315F14066DA48DD33A5CB34E982CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction ID: 10b9cf490ddab1fb3c48172cdd7d78adb02b8bc2f2438f884b18d2da395ecd54
                                      • Opcode Fuzzy Hash: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction Fuzzy Hash: 2121A936608B8886DA65DB16E45065EBBA4F3CCB94F114225EEDD53BA8CF3CC552CF40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction ID: 9859895ce777937b6fc6518a1b7814568d6f2c9c6442cb056bebb98d2f3dcece
                                      • Opcode Fuzzy Hash: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction Fuzzy Hash: BE51D734318F0D4BE66CAA7D5C45BB57AD1E759310F18023ED85AC31DAEB61EC9B4282
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction ID: 1229646aeb904b4b7df8ee0e402808c0f8c51fcec687b2dcab1bec9cdab54bf1
                                      • Opcode Fuzzy Hash: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction Fuzzy Hash: A141E53130024846EA769E225D44B9ABE99B7C4FE4F1AC2389E55CB7C5D73CD4F38608
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 9ac3ed3e1c51d573237c2c9bc79794e313d0c0f099c6aed1ff4f7321f4514034
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: A6210B3540C70C4EE764ADA8A882FB6BBC0D745350F25423DE99AD3157EB54EC8783C5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction ID: e93048bf98a5bc7b2b320efd2b2cc746c5c00d858f0d4231e780268641503b8d
                                      • Opcode Fuzzy Hash: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction Fuzzy Hash: 1721257651866C8EE7A4DEAC4894BBA3ED1E745311F04067DA096C71EBCB20D8DAC641
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction ID: 812192157d431240b680e1db648f12e81d9732db41e9476ec5b0ab513c2ac562
                                      • Opcode Fuzzy Hash: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction Fuzzy Hash: E821F6B2A042AC41EB6256159850BBD7EDCE3C8BD4F1CD1B9AE8646AC5CB6CC4E38710
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 675bc3ec00eb8b9c67879f7c9066e87facc7e8bafd92aea9c03590cd0e2c3f54
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: B5110A3250874CC5F7729EB6BC40AABBE98B7C8394F199039EE4543255EB78C8D3C600
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnofree$FreeHeap_calloc_implcalloc
                                      • String ID:
                                      • API String ID: 2553729582-0
                                      • Opcode ID: 78c2e68d2c1b3242693463214cb6a7d91bdf562fc33a57e2f937b62e4c2d32d4
                                      • Instruction ID: c7e1ba07d846a400eb62091e609f3061bb99218e99c40a67fdb73769b655a2a4
                                      • Opcode Fuzzy Hash: 78c2e68d2c1b3242693463214cb6a7d91bdf562fc33a57e2f937b62e4c2d32d4
                                      • Instruction Fuzzy Hash: 81E14C70618B488FD798DF5CD884BAABBE1FB98305F10452EE48DC3255DB70E985CB85
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 3587327836-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 1fe4ed74409d6625b6e29129e918b3ef65f71c27b64da4050af38ec099530da0
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: 1F61E032219B8885D751DB15E89479ABBA4F3C5B90F109129FACE47BA9CF7DC492CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction ID: 5c60d82e4b2ef78000324501c0ac56b7501a4f9fb84cc578fd517198858eab4d
                                      • Opcode Fuzzy Hash: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction Fuzzy Hash: 8AD12C746487898FD7B8DB18C444BAFBBE0FB9A314F90092DA5C9C7258CB30A885C747
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction ID: c514535b067c184f1e0663898cb6c5f087c3528db022bcd686bd61dfd79e95a3
                                      • Opcode Fuzzy Hash: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction Fuzzy Hash: 6E11C430218B0C4FD744EF6CD885BA5B7D1FB98324F1447AEA019C32A5CB34D985CB82
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CaptureContextPrevious__crt__raise_securityfailure
                                      • String ID: sv-FI
                                      • API String ID: 37250909-2947700294
                                      • Opcode ID: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction ID: 30c9680d3fc42d164e20494646a7080e59181120bd34c3c9b006cddfad6349d2
                                      • Opcode Fuzzy Hash: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction Fuzzy Hash: 5F211478615B0881FA0A9B18FD51BE57BA8F7C8344F90813ED98E867A1DF3CC5A6C310
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction ID: e24f09007ea0afcad60be329c7b062fea2ec9641a44cc3a374eb698e55ed1ac3
                                      • Opcode Fuzzy Hash: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction Fuzzy Hash: D811C27261064486EB118F52E840799BA65F7D8FD4F558324AF5847795CF38C191CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_calloc_implcalloc
                                      • String ID:
                                      • API String ID: 4000150058-0
                                      • Opcode ID: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction ID: 348033b2acd30b2b18c694c1097ae69c16b2376faf2b41a1fbd3f7900a86859f
                                      • Opcode Fuzzy Hash: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction Fuzzy Hash: F2C1EF36604B8586E765CF55E88479E7BF8F788784F108129EB8D87B68DF38C5A5CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction ID: e0085086d5121c5d9c7827195aa5434145bf29076a219f8069ec166ba68dba79
                                      • Opcode Fuzzy Hash: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction Fuzzy Hash: B8C1F876218AC5CAD771CA14E48079FBBA0F7CA794F50502AEBCA83B59CB39D491CF05
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: d84357b1d509afa2265f5ce35e536aab7e46c85bc8e57ef8058b93f6744e62d5
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: A1912374118B8C8FE764EF28C855F9BBBE1FB99301F40092DD48AC32A5DB74A585CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction ID: 4483145bca5bdade1695951f1ee0a79c774665c5505f9a7c3dd9abdcde91354d
                                      • Opcode Fuzzy Hash: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction Fuzzy Hash: 0451B83061CA094BDB58DF289C85EA977D1FB94304F14457DD85BC328AEF20FD878681
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: bd972e0ade444eac3dc1788b986b4d8af948173cba341529f68a8df69cd6c4cf
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: DB812E36208A8885E721DB55FC507DABB65F3C5794F40822ADA9D43BA9CF7DC0A6CB00
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction ID: cc0a22e73876d3d4ec068d4d4ecf96b0101818d490aba56e556f091175ca428f
                                      • Opcode Fuzzy Hash: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction Fuzzy Hash: 3341953260064887DB56DF269804AED7B98F7C4B84F44C439DE1A4BB55EF34DC9AC700
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 00564aca36f16f361905bde5f4b8bc15abb45bed7784437236aa5b11bc9bc3c4
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 77417F34518A489FE751EB28DC44BDA7BE0F798300F54057DA449C32E9DB34E9CACB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.2701316815.000001BFCABC1000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001BFCABC1000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_1bfcabc1000_rundll32.jbxd
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction ID: 69b3ac6c3c8f1a681b14463d04001fd7b40734f1e01f74b74af5ea6355a1790b
                                      • Opcode Fuzzy Hash: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction Fuzzy Hash: 5E316174518B4C9FE794EB28CC44FA97BE1FB99315F94062DA08AC32A5D734A8C6C701
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: 1e081825da501c0a616a6d1d3088f1de4234e841f6dba57f83f6dbe0e5fa52c2
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 0A311071214E8882E7229B05EC44BD97F69F3C4758F51823AEAAD437E5DB38C5A6C701
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000006.00000003.2696147687.000001BFC932D000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001BFC9310000, based on PE: true
                                      • Associated: 00000006.00000003.2696128658.000001BFC9310000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000006.00000003.2696147687.000001BFC936C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_3_1bfc9310000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction ID: 2bb42b024baa9cbfa4f8dd15f94cfa06aed0aa06ead6b66433caa0c4eeb65879
                                      • Opcode Fuzzy Hash: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction Fuzzy Hash: 4621DF31114B4885EA629B15FC8479A7F69F3C5BA4F415329ED9E837E5CF38C4A28B00
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: DCBA
                                      • API String ID: 544645111-2222620526
                                      • Opcode ID: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction ID: 1e4b1e08172eb35e3b59f6cfd70a0000e17b7ad9026aeb9c4b9285cc99cba4b8
                                      • Opcode Fuzzy Hash: 8f29a9ed39b750692e811b1f82c9dbcd5f6d1f936aceb2f7bdd09e353837e8a9
                                      • Instruction Fuzzy Hash: 31412672705B859EDB20CF69D8807DC37A5FB49BACF118212EA1D87B98DA34CA44E740

                                      Control-flow Graph

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ($0
                                      • API String ID: 0-506339136
                                      • Opcode ID: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction ID: 1dcdecb0afbe1713089f6b4a460d5e1dc65d1ba124603cd3d11b8432eec7d934
                                      • Opcode Fuzzy Hash: 10f7719d3d1d9079ceea84ceb22c18dc226f4ec162cd41ad22bc9bfc0006c88d
                                      • Instruction Fuzzy Hash: 13417F709187458FEBA5DB29C0947AEB7F0FB98355F50492EE09AC32A1DB74CA44CB03
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_invalid_parameter_noinfo
                                      • String ID: U
                                      • API String ID: 3902385426-4171548499
                                      • Opcode ID: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction ID: 43048541e243f958fc3e5dfb505f1fe08ebdcc3d57f9c81b334e757acaed3955
                                      • Opcode Fuzzy Hash: d340c754f10613e6dc0e06c90a2eafc547d7bf11865777075d14712fd4a8a73b
                                      • Instruction Fuzzy Hash: B7123A72A046818AFB208F24D0453EE77E1FB85B94F400117DB6A877A9DB3DF645DB12
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$Locale_invalid_parameter_noinfo$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexitwrite_multi_charwrite_string
                                      • String ID: -$@
                                      • API String ID: 3246410048-1222683799
                                      • Opcode ID: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction ID: 5348b7596a660b5c4fe17493c361beb8ab054e94bb234363978fcf4813a7d614
                                      • Opcode Fuzzy Hash: 4ec0c3fdefe748b4360ec292b4f3c1d7a4f271ecc1c53292c07100d3414dac0a
                                      • Instruction Fuzzy Hash: 33B12932A04A8485FB64CB6D94823ED6BA1FF41F94F144147DE6907AD9DB38F700E742

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction ID: 842ed3ef90596dbcd10452395429e1cbe88ebe7543dbe7adffaf6771a7ec2529
                                      • Opcode Fuzzy Hash: 8b77052a01e43cc8588673f458940c1df443eb567674aad5d151068f2fd19b3d
                                      • Instruction Fuzzy Hash: 583185F19197444EEF96AF68A8832EE3690FB85330F15435AE436873E3E7709E018653
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$ExitProcess__crt_errno
                                      • String ID:
                                      • API String ID: 1362684943-0
                                      • Opcode ID: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction ID: 3327c555d48b094da7745feafed5cecf3d3c371fd005de6daa04232727189783
                                      • Opcode Fuzzy Hash: 2cab59b5a68b187e6d78e7cea4af9017ef51927ae16ba3061b59f56144a0216f
                                      • Instruction Fuzzy Hash: 2F413B71E12A0186FE94AB15E9533E82361EF44FA4F484657A93A072D6CF38B654F343
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 388111225-0
                                      • Opcode ID: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction ID: 8ba397a49e64ac028e0e28835a737489eb4b79534022a9288c95f40ce2681e52
                                      • Opcode Fuzzy Hash: 9c62d4a9214b1d04db1b55005cc1b5354d5d9cc7472dc8ebe7b7b285c8c52e15
                                      • Instruction Fuzzy Hash: A3310931B102D48BE706AF65A9837DD3A51BF80BA0F454217A932077D7C67CFA41E722

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction ID: 5c9078d5b7aa11e41465fa6f0470f2d4087fd360526d69b731b107257724bd00
                                      • Opcode Fuzzy Hash: 999453a1ef7c5f2640f1125fecbe9f88979d53729486d554a8b4362df668ee0b
                                      • Instruction Fuzzy Hash: 2721F3B0A1AA040EFF9AAB58E8423ED72D0FB81330F15065EE036873D3D77059018663

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction ID: dc64d1834e062bae95c8677d0cc6733e46127d7f9278572767654781cc88daa2
                                      • Opcode Fuzzy Hash: 707e15bab0769dba6d0b9335517ebf2423601970b522f0f318b6a6f7e10e06ca
                                      • Instruction Fuzzy Hash: 1C21E2F1E096004EFB9A6B58E8863FD7290FB82330F15061EE166873D3E774594186A3
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 1078912150-0
                                      • Opcode ID: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction ID: ddc4151527209854f2a040ddfcc2d1c9c85688e835809abf867259812d621986
                                      • Opcode Fuzzy Hash: 052f49f1f3ac851965df9e4e0a5fdcbb5dcdf50cc75db62ce82ed435f4083efc
                                      • Instruction Fuzzy Hash: E521D432E001D046F711AF15A8433ED6A51AF80BA1F194116AA36073D3CB7CBA41E72A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2644381645-0
                                      • Opcode ID: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction ID: c974bef18cd9bbb5718b9551499a1acb2bf9b262e86592645269f0dcff4a3878
                                      • Opcode Fuzzy Hash: d5ad50827382f9f688de2ed4bc54a4a8806b0eb54b1b2836d37ae6c6a8c5fa9b
                                      • Instruction Fuzzy Hash: 3A21B332E0029445FB01AF25A8033ED6A61AF50BB0F198316AA36073D3C63CB681E726
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1812809483-0
                                      • Opcode ID: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction ID: a3cee79ecedf2f196b4073740fd76fdbaec25936218e59f6d488f6261a309333
                                      • Opcode Fuzzy Hash: 5b111bad4e3ad25f6770f39b0e3242b50fe6952f5642632ac1ddf2be5ba068f0
                                      • Instruction Fuzzy Hash: 47411A71E003A082FB60DB2B95423E936E1FF54BA4F904523DA7A436C9D728F641F712

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction ID: a2afaf2cc9a8117299b08153ff4f45beec2737443f238e2ff709649208027862
                                      • Opcode Fuzzy Hash: f1a07466abc0a1e4497666e3c48621111a436463e24d1ce96ef7aa2bb6ff0d0b
                                      • Instruction Fuzzy Hash: 462107F0A096000EFB9A6B58E8473EE7280FB85330F15431AE175873E3D774590186B7

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction ID: 7cecc2d825da0688d11125ff22f2089fb9ec968226c9520d33473761e9c72bbe
                                      • Opcode Fuzzy Hash: 9968854b850682f536c71446a658fcc7f3a984cbfa2ab25a029aaa246f596a45
                                      • Instruction Fuzzy Hash: 1221D8B2D06A044EFF96AB6898853ED7690FB46331F15055FE036873D3D7748A018763
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2464146582-0
                                      • Opcode ID: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction ID: f469c36681a40fd97c9d7be119a97513c5243bf3781aa6a0df4b111c9fceb132
                                      • Opcode Fuzzy Hash: a867b8d974dbd67bb56dd808c41ec57ac3effed6eda6b108ef7744f06fd674b8
                                      • Instruction Fuzzy Hash: 5E21D472F001845AF6017F25A8533ED6A91AF80FA0F594197BA350B3D3CB7CBA41E326
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
                                      • String ID:
                                      • API String ID: 2140805544-0
                                      • Opcode ID: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction ID: 7484d2844d051e0dd5706b939934a406ec1a5fb73322c1c1e54d0d42b4b5eb03
                                      • Opcode Fuzzy Hash: d9d9f5fa8865f3dd61bc216fc8b25a2ffe8c7a834c42e0986ae58d894a3e4964
                                      • Instruction Fuzzy Hash: D211E632F0068042F7056F65AC433DC6E51AF80FA1F1946A6A93A073D3C6B9F640E366

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1042 1d327a79b34-1d327a79b58 1044 1d327a79b5a-1d327a79b60 1042->1044 1045 1d327a79b74-1d327a79b8e call 1d327a79428 1042->1045 1047 1d327a79b62-1d327a79b6b call 1d327a79428 1044->1047 1048 1d327a79b6d-1d327a79b6e 1044->1048 1051 1d327a79baa-1d327a79be9 call 1d327a79428 * 3 1045->1051 1052 1d327a79b90-1d327a79b96 1045->1052 1047->1044 1047->1048 1048->1045 1064 1d327a79bfd-1d327a79c17 1051->1064 1065 1d327a79beb-1d327a79bf3 1051->1065 1054 1d327a79b98-1d327a79ba1 call 1d327a79428 1052->1054 1055 1d327a79ba3-1d327a79ba4 1052->1055 1054->1052 1054->1055 1055->1051 1069 1d327a79c19-1d327a79c1f call 1d327a79428 1064->1069 1070 1d327a79c26-1d327a79c30 1064->1070 1065->1064 1066 1d327a79bf5-1d327a79bf8 call 1d327a79428 1065->1066 1066->1064 1069->1070 1072 1d327a79c32-1d327a79c38 call 1d327a79428 1070->1072 1073 1d327a79c3f-1d327a79c4e 1070->1073 1072->1073 1076 1d327a79c50-1d327a79c61 1073->1076 1077 1d327a79c6f-1d327a79c79 1073->1077 1076->1077 1079 1d327a79c63-1d327a79c69 call 1d327a79428 1076->1079 1079->1077
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno
                                      • String ID:
                                      • API String ID: 2288870239-0
                                      • Opcode ID: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction ID: e7035fef2d1c7d7ff98ea6fb4287b875052132d76a69e399448586d66c761ae7
                                      • Opcode Fuzzy Hash: 93bfaf5764d7773b193cf5a5c99babc78185830d1e8edeb9aa307ccd339b6462
                                      • Instruction Fuzzy Hash: BA410E74658A0A8FFFE5EB58D8D6BED32D1F75C321F54402A9025C2391DB3C9945CB12

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1082 1d327a4460c-1d327a4463f call 1d327a4411c 1085 1d327a448c5-1d327a448d5 1082->1085 1086 1d327a44645-1d327a44653 call 1d327a4448c 1082->1086 1086->1085 1089 1d327a44659-1d327a4468f 1086->1089 1090 1d327a44695-1d327a446a1 1089->1090 1091 1d327a448c0 1089->1091 1090->1091 1092 1d327a446a7-1d327a446c9 call 1d327a79468 * 3 1090->1092 1091->1085 1099 1d327a4489f-1d327a448a2 1092->1099 1100 1d327a446cf-1d327a446d2 1092->1100 1101 1d327a448a4-1d327a448a7 call 1d327a79428 1099->1101 1102 1d327a448ac-1d327a448af 1099->1102 1103 1d327a44897-1d327a4489a call 1d327a79428 1100->1103 1104 1d327a446d8-1d327a446db 1100->1104 1101->1102 1107 1d327a448b9-1d327a448be 1102->1107 1108 1d327a448b1-1d327a448b4 call 1d327a79428 1102->1108 1103->1099 1104->1103 1109 1d327a446e1-1d327a446f3 1104->1109 1107->1085 1108->1107 1111 1d327a446f5-1d327a4470a 1109->1111 1112 1d327a4470c-1d327a44718 1109->1112 1113 1d327a4471c-1d327a44727 call 1d327a418bc 1111->1113 1112->1113 1116 1d327a4487b-1d327a44895 call 1d327a79428 * 3 1113->1116 1117 1d327a4472d-1d327a44795 call 1d327a7ca50 call 1d327a80020 1113->1117 1116->1085 1129 1d327a44797-1d327a4479c 1117->1129 1130 1d327a447a1-1d327a447c3 call 1d327a454f0 1117->1130 1129->1116 1130->1116 1133 1d327a447c9-1d327a447cc 1130->1133 1134 1d327a447e7-1d327a44800 call 1d327a454f0 1133->1134 1135 1d327a447ce-1d327a447d8 1133->1135 1134->1116 1139 1d327a44802-1d327a44808 1134->1139 1136 1d327a447da-1d327a447e5 1135->1136 1136->1134 1136->1136 1140 1d327a4480a-1d327a44814 1139->1140 1141 1d327a44823-1d327a4482d 1139->1141 1142 1d327a44816-1d327a44821 1140->1142 1143 1d327a44838-1d327a44879 call 1d327a80020 * 2 1141->1143 1144 1d327a4482f-1d327a44836 1141->1144 1142->1141 1142->1142 1143->1116 1144->1116
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction ID: f5ad6904484f3a820949f2ff198eb8fef0fd362c4973ca5eeeede061bfae0df6
                                      • Opcode Fuzzy Hash: c75b0a1d2e19df20c265fda1f1b61241464f7f19ba4f0f6e1f0497372b703070
                                      • Instruction Fuzzy Hash: 2491C8B0B18B484BEB9AAA6C94617FD73D1FB95711F50021FD49AC3383EF219D068687
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$malloc$_errno$_callnewh
                                      • String ID:
                                      • API String ID: 4160633307-0
                                      • Opcode ID: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction ID: 348e3d7e7be61105c7deae23dcef9f68f9848f9cfb8689c0b31bea84f946e7c7
                                      • Opcode Fuzzy Hash: 20bbb3d3feebccc814164c8c2da5a031c5bb9bc1d7db45e54f975c03fff4b992
                                      • Instruction Fuzzy Hash: A3712932B087A446EB189B2694407EE7B91FF86FC8F40C416DE5A07B86DB38D605FB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _time64$strtok$malloc
                                      • String ID:
                                      • API String ID: 2141844861-0
                                      • Opcode ID: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction ID: 2074f528d67c1a0ff212cc3ad1ef8294e30223f0602bad677558d11e12d2de68
                                      • Opcode Fuzzy Hash: 3ec86a168063cedbcd3a6d3fa6ff427ab04d0b3937c976a49be1e9dad73c97c2
                                      • Instruction Fuzzy Hash: F091F771906B848AE760CF19F88739977A0FB88754F10421BD5B9837A4CB3EF250EB42
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-3916222277
                                      • Opcode ID: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction ID: 421b463260ebf374ee4a1a56616b3eb3adbcb35e6bdd41a78dc6962848e8f345
                                      • Opcode Fuzzy Hash: dd06a51d82cda53a533cef69c96422d32d0124e5c0f38170d00e86b5a0f363e2
                                      • Instruction Fuzzy Hash: 9841F272A00B448AEB589F38D4533AC37A0EF44F94F144256DA7A473C6DA38FA51E782

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction ID: 62673a77f7879f63cbcc5b90c14194b3811791a6f779ffcfdbccec7b2240c140
                                      • Opcode Fuzzy Hash: 2de4b52953f98cf2f78611d97d2a60e8fea6ab52800e27ce238f3726801f7295
                                      • Instruction Fuzzy Hash: B731B3B0A15A094FFF95AB6998457ED72D1FB8C320F14416FA06AC33E2DB38C9418743

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1180 1d327a84818-1d327a8482f 1181 1d327a84841-1d327a84843 1180->1181 1182 1d327a84831-1d327a8483c call 1d327a7b714 1180->1182 1184 1d327a848ce-1d327a848d9 call 1d327a7b714 call 1d327a7bd3c 1181->1184 1185 1d327a84849-1d327a8484f 1181->1185 1190 1d327a848de 1182->1190 1184->1190 1185->1184 1187 1d327a84851-1d327a84875 1185->1187 1187->1184 1191 1d327a84877-1d327a84888 call 1d327a8438c 1187->1191 1193 1d327a848e1-1d327a848ee 1190->1193 1196 1d327a848b5-1d327a848c0 call 1d327a7b714 1191->1196 1197 1d327a8488a-1d327a8489c call 1d327a846c8 1191->1197 1202 1d327a848c3-1d327a848cc call 1d327a847ec 1196->1202 1205 1d327a8489e-1d327a848a6 1197->1205 1206 1d327a848a8 1197->1206 1202->1193 1208 1d327a848aa-1d327a848ac 1205->1208 1206->1208 1208->1202 1210 1d327a848ae-1d327a848b3 call 1d327a7b6a4 1208->1210 1210->1196
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
                                      • String ID:
                                      • API String ID: 4120058822-0
                                      • Opcode ID: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction ID: d1b8d3cfaf40c4ddb863d835d188d4828d04dcdef19ef92f34daac7a50c0343e
                                      • Opcode Fuzzy Hash: 606be4c0390d073f90be112aacc7631162c60430743b6131d582dd7324473647
                                      • Instruction Fuzzy Hash: A621F8B1E09B844FFF96AF68A8853EC7690FB85331F15025AE426873D3D7785A008663
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 2917016420-0
                                      • Opcode ID: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction ID: 12a38293fd8df85fcfec931bcd7ba6e32ac157b43a464bc0ac2d71a6d6a228ba
                                      • Opcode Fuzzy Hash: 4dc0a6a0ee47c2eadd5e88a02a6e6d0ec627a0b9d3dac7126e623028bf523029
                                      • Instruction Fuzzy Hash: 4F319131B01B4486FB50AB36E8063A966E1BF84F98F148566DA66477E5DF3CF700E306
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 3191669884-0
                                      • Opcode ID: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction ID: 2b97da988e532bd5e35d660dca64c0994a7a17a836ce8554a185f2fa35bcafa4
                                      • Opcode Fuzzy Hash: 3cca304a7dfbdf6935d1adbb7e774f1f6628624d9bfd8baf126a75af7f7d8f8d
                                      • Instruction Fuzzy Hash: C331D472A0479486E7109B1B94867DD76B8FB54FF0F144522EE6503BC9CB34FA81E701

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1213 1d327a7a6d0-1d327a7a700 1214 1d327a7a702-1d327a7a705 1213->1214 1215 1d327a7a71c 1213->1215 1214->1215 1217 1d327a7a707-1d327a7a70a 1214->1217 1216 1d327a7a71e-1d327a7a732 1215->1216 1218 1d327a7a733-1d327a7a73e 1217->1218 1219 1d327a7a70c-1d327a7a711 call 1d327a7b714 1217->1219 1221 1d327a7a740-1d327a7a74c 1218->1221 1222 1d327a7a74e-1d327a7a752 1218->1222 1229 1d327a7a717 call 1d327a7bd3c 1219->1229 1221->1222 1224 1d327a7a776-1d327a7a787 1221->1224 1225 1d327a7a754-1d327a7a75f call 1d327a7ca50 1222->1225 1226 1d327a7a763-1d327a7a766 1222->1226 1227 1d327a7a789-1d327a7a78c 1224->1227 1228 1d327a7a78e 1224->1228 1225->1226 1226->1219 1231 1d327a7a768-1d327a7a774 1226->1231 1232 1d327a7a793-1d327a7a79a 1227->1232 1228->1232 1229->1215 1231->1219 1231->1224 1235 1d327a7a8aa-1d327a7a8ad 1232->1235 1236 1d327a7a7a0-1d327a7a7ad 1232->1236 1235->1216 1237 1d327a7a807-1d327a7a80d 1236->1237 1238 1d327a7a7af-1d327a7a7b6 1236->1238 1241 1d327a7a872-1d327a7a87d call 1d327a80d20 1237->1241 1242 1d327a7a80f-1d327a7a811 1237->1242 1239 1d327a7a7b8 1238->1239 1240 1d327a7a802-1d327a7a803 1238->1240 1243 1d327a7a8d5 1239->1243 1244 1d327a7a7be-1d327a7a7cb 1239->1244 1240->1237 1251 1d327a7a8d9-1d327a7a8e4 1241->1251 1260 1d327a7a87f-1d327a7a882 1241->1260 1246 1d327a7a813-1d327a7a818 1242->1246 1247 1d327a7a832-1d327a7a839 1242->1247 1243->1251 1249 1d327a7a8b2-1d327a7a8b6 1244->1249 1250 1d327a7a7d1-1d327a7a7f1 call 1d327a80e64 1244->1250 1253 1d327a7a81a-1d327a7a822 1246->1253 1254 1d327a7a824-1d327a7a82b 1246->1254 1248 1d327a7a83c-1d327a7a842 1247->1248 1248->1249 1256 1d327a7a844-1d327a7a860 call 1d327a7f624 call 1d327a81008 1248->1256 1257 1d327a7a8b8-1d327a7a8c0 call 1d327a7ca50 1249->1257 1258 1d327a7a8c5-1d327a7a8d0 call 1d327a7b714 1249->1258 1269 1d327a7a7f3-1d327a7a7fd 1250->1269 1251->1216 1255 1d327a7a82d-1d327a7a830 1253->1255 1254->1255 1255->1248 1273 1d327a7a8e9-1d327a7a8ed 1256->1273 1274 1d327a7a866-1d327a7a869 1256->1274 1257->1258 1258->1229 1260->1249 1265 1d327a7a884-1d327a7a893 1260->1265 1266 1d327a7a897-1d327a7a89f 1265->1266 1266->1236 1270 1d327a7a8a5-1d327a7a8a6 1266->1270 1269->1266 1270->1235 1273->1251 1274->1243 1275 1d327a7a86b-1d327a7a870 1274->1275 1275->1269
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction ID: 3fcf4b640de4e8cc69e02607227682184aeccd5d0e3b9bec52199dd85901a424
                                      • Opcode Fuzzy Hash: c54c4921bb8379a399a2f22ab2fbfb724ef235ff3910e4ccc073ad148f491759
                                      • Instruction Fuzzy Hash: BD61AF70A18B095AEAAD5A2C58462FE72D1F794731F14032FE467C33D2EB709D5286CB

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction ID: 8077968d0721d5e66d18b94a22c4f445a837c8e2533ac7c39cbbb8fd080dbc0d
                                      • Opcode Fuzzy Hash: 2dbb8156d7e1450895b0831729246a29cec170c1605d5564cf2a09c383d44b35
                                      • Instruction Fuzzy Hash: 8E710EB09187488FE785EB18C455B9AB7F1FB98365F50492EB09AC33A1CB349A45CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
                                      • String ID:
                                      • API String ID: 2328795619-0
                                      • Opcode ID: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction ID: e46a5f4bcec0be777c1f35216ab720129f4747e076b636d901ff68864a16c2a0
                                      • Opcode Fuzzy Hash: ecd799a647894e1a7a20e5e3f128c4b9d353e91dff8985ebfeee713b4a510919
                                      • Instruction Fuzzy Hash: 1D513871F0525042FA248A2654027E976D1BF44FF0F148B62AE7943BDCCB34F691E242
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: fclosefseekmalloc$_errno_ftelli64_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 1929176045-0
                                      • Opcode ID: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction ID: 646611304342f190e370a7bc1d54a223aac0fb504ca40f96426ea8ac6d37e96f
                                      • Opcode Fuzzy Hash: dad127855c446f5c30b32346cc20f8ba9894d0a3e08f573577708a24a9af681f
                                      • Instruction Fuzzy Hash: 40614332A18A8482E760DB15F44139EB765FBC5790F108117FAAE43BA9DF38D644EF42

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction ID: 39f8326536becee1091dae2eefb6d154cec93cfb9dfa3a9f97b6ca90d38d89a7
                                      • Opcode Fuzzy Hash: 5822b292a46ad52fbba60e80c73f126c512aa3bbfad26addc6a572f3e42640c2
                                      • Instruction Fuzzy Hash: FC2183B1A19A495FFFD2AB2C48053EE62D1FB99320F04095BA456C7392EB34CA414757

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction ID: 9d2f8d764a8d81dd66805e9f4da96a2ed32cc7c982ae5e5cbeb4b4f963c13c86
                                      • Opcode Fuzzy Hash: be35bbba0d4894c2760315db9577ab2653c93394a1aa741eec404816c6ed7138
                                      • Instruction Fuzzy Hash: FA314FB0D18A449FEAC5EB28C4557EE77E1FB98364F500A1EB09AC33A1DB349A41C747
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
                                      • String ID:
                                      • API String ID: 1547050394-0
                                      • Opcode ID: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction ID: e0b984aadc083201bcd512919d35f3dfbf6469de283d8ee2cf959700bbd1625d
                                      • Opcode Fuzzy Hash: cc8f2cd6884705fde0d4f1a8c2f182f690a1ff23019d39bc98d417dc2c140732
                                      • Instruction Fuzzy Hash: 2821D871B1438245FBA19B21680239EA6956F44FC0F0448A3ADB99778AEB3CF701E716
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction ID: 743b21c29dbdf323a076314237f3032d085a4df0ba90b9852064bc8de17ba3bd
                                      • Opcode Fuzzy Hash: 0af8098b402a1582bc2cea660397b660c0a575d4e31ad9d078db98f20780a169
                                      • Instruction Fuzzy Hash: B6216572918A8081DA60EB11E4513DE6764FFD5B94F004213B6AE43AEACE3CD741EB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_set_error_mode$__crt_errno$ExitMessageProcess_lock_malloc_crtmalloc
                                      • String ID:
                                      • API String ID: 2751257304-0
                                      • Opcode ID: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction ID: 5fe81f82deae40866ba75a411c61f7a29d9bc82c1fcfc2b4e09aa50823df4464
                                      • Opcode Fuzzy Hash: 678e4a959376ceb353347c4c6683ca163f7139e42d5e898c0f83e718a8999621
                                      • Instruction Fuzzy Hash: 3E117031E11684C1F7609B61E4473E92A61EF80F80F045463E56A466D2DF7CB750F353
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction ID: 4db742f67cdb11aed1a2daa6d19a796d416a381e90250909888e5eb025abd55e
                                      • Opcode Fuzzy Hash: 695452f4ce591794a7dd27ab3daecb023a1ec355a28974067ff4d1f9e76553f2
                                      • Instruction Fuzzy Hash: D251B670A18F0A4BEB9AAB2894616F973D5FB49314F50012ED85AC3387EF60DD428686
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction ID: 8e9ad60d8cfcf03d41132590891c59b8fd4d502339ff1e7479156f42977077e6
                                      • Opcode Fuzzy Hash: 5e7a048ee2cb6ce51b5ff79f866e9b97e29af1da38353bc06982188158118a3e
                                      • Instruction Fuzzy Hash: 4241E232B0476197EA58AB3695513ED3BA0FF06B80F80C426DE6607745DF34E626F741
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc$_errno_snprintf$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 3710081536-0
                                      • Opcode ID: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction ID: 07d97ef18e427c871823c56fe34f8be53e28598586c7f6d16c40478f6a7d8d81
                                      • Opcode Fuzzy Hash: d21ad2a056178d292e578f576ebe5e2de7529cb5147e9b122ccfa2b8bfc6f6a7
                                      • Instruction Fuzzy Hash: 4AE13EB0A146408FFBD5EB28C4527EEB6E1FB84310F50452EA1AAC73D2DB359A45CB53
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc$_snprintf$_errno$_callnewhfreerealloc
                                      • String ID:
                                      • API String ID: 74200508-0
                                      • Opcode ID: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction ID: 743657f865515600994a0d6e4746d0786b620099ad6db535c102a685f18d1f13
                                      • Opcode Fuzzy Hash: a8f35467ff893584f98e16b323471e84d8a89d8ed4578621f824f5b2abd654e3
                                      • Instruction Fuzzy Hash: 0BD17171A1865086F750EB60E4523DE72A5EFC5740F108027B6AA877D6DF3DEA01FB82
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _lock$_calloc_crt_mtinitlocknum
                                      • String ID:
                                      • API String ID: 3962633935-0
                                      • Opcode ID: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction ID: b5f9b820ccbb57104ff1a34a622aea79d6d719d4f81fb8f5a0d7c77ec884c6e3
                                      • Opcode Fuzzy Hash: 0ae305d5a56d4f5fc965a78ca540d5d1c79cefd7c21b0e4f89b429e8ada4dcd0
                                      • Instruction Fuzzy Hash: 0351F5B0918B098BEB999F58D8813A9B7D0FB58320F15025EEC5AC73A2D734DD428783
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction ID: 4b28b1e19ab16f6e8dbaa4b23085c4073c8e4601bbc279c18120c82f03cb3c5e
                                      • Opcode Fuzzy Hash: bf64667b48beb023399457ef1e960719e952a42bf42d0b155e32a9186485f1aa
                                      • Instruction Fuzzy Hash: 8F410970618B1D4BEB9AAA2854112FAB2D5FB95320F14012FD497C3343EE21D9038793
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
                                      • String ID:
                                      • API String ID: 304646821-0
                                      • Opcode ID: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction ID: 365ca4eecbbb9548d02268bb2252b73d0a9b86b921991acbdfb309c94065f2ae
                                      • Opcode Fuzzy Hash: a379163105278670e5afc3e45665132b2485eaccacc1b866912359b1c472c8f6
                                      • Instruction Fuzzy Hash: 1251A1F0915A488FEFDADF28C4827E976D0FB55320F14069AE865CB3D6D734CA418B92
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$free$_callnewh_calloc_crt_invalid_parameter_noinfo_invoke_watsonmalloc
                                      • String ID:
                                      • API String ID: 1496976027-0
                                      • Opcode ID: a61f022d04707639bf355da8362fa33aa289f3e9c869973616d516e863df6b36
                                      • Instruction ID: e6b7ae2afd6ca2901c27212c6b33b9c669701076a55805265d4dc9198b595427
                                      • Opcode Fuzzy Hash: a61f022d04707639bf355da8362fa33aa289f3e9c869973616d516e863df6b36
                                      • Instruction Fuzzy Hash: 1841E6B0A28B494FEFC5EF69D4497EAB3D1FB98365F40452EA455C2291DB78C940CB03
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_snprintffreemalloc$_callnewh_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 761449704-0
                                      • Opcode ID: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction ID: 1a19ae421c25348598f1ba982524f8d31717b9f7a15096c9be31e9c106633465
                                      • Opcode Fuzzy Hash: 4b7488ccfcf92dff4a44f31d12171449a63be8ff974c4bbada150586fabccd75
                                      • Instruction Fuzzy Hash: B8419871618A058FEBC1EB28C495BAA77F1FB9D350F50052EE09AC33A1DB35DA45CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_callnewhmalloc
                                      • String ID:
                                      • API String ID: 2761444284-0
                                      • Opcode ID: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction ID: 1486b6fa774ceb279e546b0595c9af86b57211e6106aaa4de1bce35f54848155
                                      • Opcode Fuzzy Hash: a811918bd02154efe4651bb2500c9e1759e1a3ef0e0cb23a63cb8994a19cfb31
                                      • Instruction Fuzzy Hash: 23413432B1839142EA15AF2654002ED7795FF5AF98F498036DD254B741DE38EA06F346
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction ID: ceb177ad924e15fa039fc55b4e160c9ee9238190dea3c9cf61b9a165348b50a8
                                      • Opcode Fuzzy Hash: 025aeaa454097c1032dff6ea7fff23be1e1841866692d4dd75f2ef8b742b5775
                                      • Instruction Fuzzy Hash: 3901F4F09269484EFEDBAF28CC417D83290FF26335F94424AE1258B3E3E77805408A23
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction ID: 346a6557e2a1bc6028294109a4dc539096c54597e1685e09313049ee53a5b8e2
                                      • Opcode Fuzzy Hash: e10366be0be48da8ec2d1efe495d4130c24eed7f3ffc37a29e9978efec4970be
                                      • Instruction Fuzzy Hash: F2011AB08287449BE685EB18C845BDDB7E1FBD8311F80042EA485C2391CB349640C743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _getptd_noexit$__doserrno_errno
                                      • String ID:
                                      • API String ID: 2964073243-0
                                      • Opcode ID: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction ID: c2125c0de57f217d7828be10e89c034d0e0034b52f3c6daedd7b616a81800b66
                                      • Opcode Fuzzy Hash: 69af7df2a7883d456bcc134dc4df00a852c2ddf9a1d90879d0859074316e13fb
                                      • Instruction Fuzzy Hash: 5D0169B2E15A9481EA055F19D8933E82A919F90B71F558356DA3A073E2C72C7600E223
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$remove$_callnewh_invalid_parameter_noinfo_snprintffreemalloc
                                      • String ID:
                                      • API String ID: 929232287-0
                                      • Opcode ID: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction ID: 0f6f823627f51d11eb2f0e5384e2bde563698cd4540fc0ccb82ebc260adc7044
                                      • Opcode Fuzzy Hash: 760ecfd8c636994a04cd86e70f51933710fad854b9dafff484940356d921bfbf
                                      • Instruction Fuzzy Hash: E3F0FF72938B8086D680EB51F45239EB764FFC4B80F405117B69E53B99CF78E611EB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction ID: 197fbdebfabed3a958e430875052a38ad8f943a68cb6f257f963448cff458d44
                                      • Opcode Fuzzy Hash: e8cb766a1f708f6ad2c8040cda47f382cfa7383439f6add59f3ae7b1adecd00b
                                      • Instruction Fuzzy Hash: D59129B1A087448FEBA5EF28C4557DEB7E1FB89310F50092EA09AC3391DB759A45C743
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: freemalloc
                                      • String ID:
                                      • API String ID: 3061335427-0
                                      • Opcode ID: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction ID: 0598a2c53f4ee3e6d4fb01874039e87db4c90402f747babc5f1b70524e25ac6e
                                      • Opcode Fuzzy Hash: c51b43109db90fd33d1ada2d315fcc84a1e87e059fcc81b7406d59bf9917b86e
                                      • Instruction Fuzzy Hash: 5981DA32A186808BE760DF25E4423DEB7A1FB85740F504427E69983A99DF7DF644EF02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction ID: 78a328aa24d3c443a464a225371084ea104a905314fa0a492afae58b91b67f5b
                                      • Opcode Fuzzy Hash: 4a88a70e9d050a255cec614ea314018cd5afcce58f1384e82783e2fcc1a691ac
                                      • Instruction Fuzzy Hash: AF31DA7451CB489FDB84EF18C054A9AB7E1FB9C315F100A6EA49DD73A1DB34DA41CB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errnomalloc$_callnewh$_invalid_parameter_noinfo_snprintf
                                      • String ID:
                                      • API String ID: 2026495703-0
                                      • Opcode ID: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction ID: b17103b26d502f5c14c57d439bdaf38d68334a1de098d640ce9ca312b1ac74bb
                                      • Opcode Fuzzy Hash: a91d58c26d0a57bc794e59067ccea32def16148bb1a1b4aba4a4af629da6f414
                                      • Instruction Fuzzy Hash: E421C776608B8486DA60DB16E49125EB7A0F7CCB98F104216EEDD43BA8CF3CD651CF40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction ID: d112a32c4a7b41bea7171e6188dc2e8e098da6223034bc0c8570cd018d5c8b0b
                                      • Opcode Fuzzy Hash: 3724e7ae47d0555e82954cf94b1352b58e40b663c144e16cde101d0b22e5a577
                                      • Instruction Fuzzy Hash: DC51B4B0A18F095AEAEA5A6D58463F972C1F759320F14022F946BC33E2EB71DD4245CB
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
                                      • String ID:
                                      • API String ID: 634798775-0
                                      • Opcode ID: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction ID: e6f1994db12d98c352d357589f728813dcce9931e9f5080ba65431567be93ca7
                                      • Opcode Fuzzy Hash: c6c5643f4c80cb2c6c3217124f929d6583e36cafa3d7826c52d13d0a973425dc
                                      • Instruction Fuzzy Hash: B5415831B0438446FE288E2365423DEB691BF44FE0F084AA2DE7547BC9DA38F741E642
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 730bad3e03fb8b94ac7162989eb6797d39954b1c6ec2acc32451168edf365428
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: 7421C9B1C0C7084AEBE5ABACE4422A6B6D0F755360F15022FE9A693342EB519D4282D7
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction ID: 6d9360eae796fc236bf61df85fd1cf44be6a4904e8deee9daac9ccf988d2a11e
                                      • Opcode Fuzzy Hash: 078fbef60442204fefacc1113914627e5534cb2c2b17e97d4d3604c38646f191
                                      • Instruction Fuzzy Hash: EB210AF0D186654EEFE6AF2850883BA76D1F749335F04066BA0B6C73D1DB608A41CA53
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: CurrentImageNonwritable$FindSection_initp_misc_cfltcvt_tab_initterm_e
                                      • String ID:
                                      • API String ID: 1991439119-0
                                      • Opcode ID: 20d8fef81f8701dc950607fd9be9d74995b121df42281fa78a048c32d55c9c51
                                      • Instruction ID: 458f3054c6e0a277594d2aa1ea22296132d69aa01cf7cdcede471a7a18a70b37
                                      • Opcode Fuzzy Hash: 20d8fef81f8701dc950607fd9be9d74995b121df42281fa78a048c32d55c9c51
                                      • Instruction Fuzzy Hash: EF1194715159094BFF97AB24DCC97DE73A4FB5C321F40492B9412C61A2EF348A44C746
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: clock
                                      • String ID:
                                      • API String ID: 3195780754-0
                                      • Opcode ID: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction ID: 25e888e24eee3bb84ea3600e50d88932d910add92f4ee5051409c163d65b5abd
                                      • Opcode Fuzzy Hash: 52dbf759540b59de5f5951ee9cf1365415fde72d11341a4ad9c6f9647c7b1738
                                      • Instruction Fuzzy Hash: BC113A33D08BA441F3B09FB67840BAFB690FF45390F199027EE6643245E934D995E682
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
                                      • String ID:
                                      • API String ID: 4151157258-0
                                      • Opcode ID: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction ID: 5eba91c365babe1aad4d2074cec509da5d017af7c5c9134f08345f486b3d842e
                                      • Opcode Fuzzy Hash: 2fda11324eeaf47a8ee3b41ffe9ccb24b03a26f89d14d92f7fadfdcc20f1c38e
                                      • Instruction Fuzzy Hash: CB2127B2E082F445EBE0561590523FD6AD0EB40BD4F1CC12BEAB707AC5D92CF645E712
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintfmallocstrrchr
                                      • String ID: :
                                      • API String ID: 3587327836-336475711
                                      • Opcode ID: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction ID: 674a18d6b4646ac543898604e66f398a4e2d7759b0d8518accd16ee2222d64ec
                                      • Opcode Fuzzy Hash: 5042e97771ee50c8e95a1b01eede4ab7b041b3ed2cf5d813aa0aae0d836cddbb
                                      • Instruction Fuzzy Hash: DE612932619A8486E750DF25F88139EB7A0F7C6B90F108116FADE47BA9CF78D940DB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction ID: 70d78b6f69a7438085d1596e7d94fa0443131a1409c62123ed6b28113be35ae2
                                      • Opcode Fuzzy Hash: 02173545e05a84c9264574fa8afe8a9a8e664c3501bd964f3948135e520a17a9
                                      • Instruction Fuzzy Hash: 46D11AB0A597859FDBA5DB18C0447EBB7E0FB9A365F90192EA5C9C3350DB319880CB07
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction ID: bb269a42dcda1bfbd69ecde5331f9e5e1c6755512615d8e137ef66a358387754
                                      • Opcode Fuzzy Hash: dfff7db8d8a75928eb3056cb64617ae28a34f3a6f2aa6637d9c29ae3215ba4d9
                                      • Instruction Fuzzy Hash: E711B270618B084FEB84EF5C94857E9B2D5FB98335F10476EA029C32A1DB34C940CB82
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CaptureContextPrevious__crt__raise_securityfailure
                                      • String ID: sv-FI
                                      • API String ID: 37250909-2947700294
                                      • Opcode ID: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction ID: 6df72a15d60365cd6948bbb1a6bbc35e6b71bd15902463ea6a2d22ea492c1ffa
                                      • Opcode Fuzzy Hash: 9f53ab00d13e9a342103fd536e2d944939a79712ef2d4f4aeda1767cd607b540
                                      • Instruction Fuzzy Hash: C8210034A04B0482EB009B18E8533D567A5FB84348FA00127EAAE877A1DF3CF614E302
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
                                      • String ID: B
                                      • API String ID: 1812809483-1255198513
                                      • Opcode ID: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction ID: 2402d22f51adbd1f9e02240c6095ee344d39d6ea098a897d410ba247b597e1c6
                                      • Opcode Fuzzy Hash: bd58f0530e0c488c71797034e25c9bf653429e439c692c434a90aaed543f7fa3
                                      • Instruction Fuzzy Hash: 9111C872A1474486EB10DF56E4413D9B661FB98FE4F548352AF68077D6CF38E241CB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free$_errno$_calloc_implcalloc
                                      • String ID:
                                      • API String ID: 4000150058-0
                                      • Opcode ID: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction ID: 35b07b71d3c8a9130c03ce33c771d35dc946d7c0368ddbdb138ffae06a00cc1a
                                      • Opcode Fuzzy Hash: 8ca7377d6160abed60e61000ef39786ff8db9ad75b6d968bcb858b8998d5a5ab
                                      • Instruction Fuzzy Hash: 4FC14F32608B948AE764CF65E88039E77F4F789B84F10812AEB8D83B58DF38D555DB40
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _errno$_callnewhfreemalloc
                                      • String ID:
                                      • API String ID: 3099215566-0
                                      • Opcode ID: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction ID: 77a85c69be794e9aecd6fa694004e86fe59c2dfcb46a94fdd64637904a111b8d
                                      • Opcode Fuzzy Hash: 9f3e12b26db61c15565dc3452f0e8a98f6bb8c253c0c8c62c771028bca80e689
                                      • Instruction Fuzzy Hash: 92C1E8B665C6C0CAD7B0CB15E48039FB7A0FB8A794F50511AEB8A43B58DB39C540EF06
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction ID: f663172f7446c7feb77f43c37d44a2cd7c64a336b95c488b42dadfb351c73e29
                                      • Opcode Fuzzy Hash: 0fca5248a8da2211dc422f8e372dab47ed3a9ffe4740c211d34fb45fef0fccd2
                                      • Instruction Fuzzy Hash: F851A8B0A1CA054BEF999F2894952A973D1FB98320F10455EE86BC3386EF31ED428646
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction ID: 25396497b68483b4ca226d1c591aedbfe0b9fc9cd82c19766e096e311198c269
                                      • Opcode Fuzzy Hash: 964770dd05ef821e2aacc901c70c6f38254c4cd412dbff5c462cae5e6ebdf0b1
                                      • Instruction Fuzzy Hash: AA813A32608AC486EB209B50F4413DAB761FBC5794F504217DAAE43BA9DF38E645EB41
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: malloc
                                      • String ID:
                                      • API String ID: 2803490479-0
                                      • Opcode ID: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction ID: 1269e91f9666d7b51ccf81f5b2db8dff66854ac158f0e8193e48a2309f8ca5f9
                                      • Opcode Fuzzy Hash: 1a305bbe9122f1aaabfb9c066298554f52a7825b389ea4342c2348e755cda45b
                                      • Instruction Fuzzy Hash: 0541C132A0879087EB58DB26A5106AD3BA1FB45B84F408426DE6A87785DF34EA05F741
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: c83ad5d08b82b77088db20421ebfa40476c0ffae07ff14779cb37314aafa096a
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 22415170518A498FEB92EB1CD844BDA77E0F798320F50452BA49AC33E4DB34DA45CB43
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction ID: 0067c181de398a0b0bfff6fa19c04472ce5c14678afbe8e6b8e5bd5bb7528f7a
                                      • Opcode Fuzzy Hash: cc5c2709471a9d062e74d135495815655ac884716402f97f549632d6e6adb14d
                                      • Instruction Fuzzy Hash: 6D31E170918B4D9FEBD5FB18C484BA977E1FB99325F50061EA49AC33A1D734D941CB02
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: _snprintf
                                      • String ID:
                                      • API String ID: 3512837008-0
                                      • Opcode ID: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction ID: be636fcbb385b7a15b0f341fd1ffbe7e7e5bd3b95e29963819f52c4d9db4653d
                                      • Opcode Fuzzy Hash: e2b5329c93648b9f23ade1c9bb210d2789aefad62375947c65960709d8e77631
                                      • Instruction Fuzzy Hash: 44314D35A14A8482E6208B11F4423DA7770FB88BA4F604217EABD43BF4CF3DE641DB42
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000003.2709168077.000001D3260FD000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001D3260E0000, based on PE: true
                                      • Associated: 00000008.00000003.2709024126.000001D3260E0000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      • Associated: 00000008.00000003.2709168077.000001D32613C000.00000020.00000001.00020000.00000000.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_3_1d3260e0000_rundll32.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok$freemalloc
                                      • String ID:
                                      • API String ID: 3145456250-0
                                      • Opcode ID: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction ID: 0a01f6fa8f89c9721730c5badd849f4a0234059dfd34b4ba6205d39da7b66f22
                                      • Opcode Fuzzy Hash: 80ab93629553fc5d6cc24c753a0247cda557e51b81ee1ac9acc78e4d89c7d1cf
                                      • Instruction Fuzzy Hash: 5921ED32914B4485EA609B15F85239A6771FB85BA4F501357EABE437E5CF3CF240DB01
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.2712251805.000001D327A41000.00000020.00001000.00020000.00000000.sdmp, Offset: 000001D327A41000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1d327a41000_rundll32.jbxd
                                      Similarity
                                      • API ID: free$_errno
                                      • String ID:
                                      • API String ID: 2288870239-0
                                      • Opcode ID: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction ID: e54fad829a49b766f1c930fb7f92b4c115a2b35a8b7dfebc9720e5201c0fb6bb
                                      • Opcode Fuzzy Hash: 1c646a249a85c78f16f0867a465f9e1b54ef229f6325fa69fa7df30955489616
                                      • Instruction Fuzzy Hash: 46F02874528948AFDAC9FB18C496EDD77E1FB9C310F80145AB059C73A2DA34E940CB16