Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7zba89tklZ.exe

Overview

General Information

Sample name:7zba89tklZ.exe
renamed because original name is a hash value
Original sample name:2b5e1dfe4e4db4e886b079f054182055.exe
Analysis ID:1579669
MD5:2b5e1dfe4e4db4e886b079f054182055
SHA1:d90e2828ea0082917583975f4a054f7c85d45053
SHA256:92382cc3402b6fb7cbd68fe7fa49a00ae204682a90fe0b4e69a6ef2c6d324793
Tags:exeuser-abuse_ch
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for dropped file
Machine Learning detection for sample
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 7zba89tklZ.exe (PID: 5700 cmdline: "C:\Users\user\Desktop\7zba89tklZ.exe" MD5: 2B5E1DFE4E4DB4E886B079F054182055)
  • 7zba89tklZ.exe (PID: 4836 cmdline: "C:\Users\user\Desktop\7zba89tklZ.exe" MD5: 2B5E1DFE4E4DB4E886B079F054182055)
  • svcapp.exe (PID: 5416 cmdline: "C:\Users\user\AppData\Local\Microsoft\svcapp.exe" MD5: 2B5E1DFE4E4DB4E886B079F054182055)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Desktop\7zba89tklZ.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\7zba89tklZ.exe, ProcessId: 5700, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemHandler
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeReversingLabs: Detection: 60%
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeVirustotal: Detection: 62%Perma Link
Source: 7zba89tklZ.exeVirustotal: Detection: 62%Perma Link
Source: 7zba89tklZ.exeReversingLabs: Detection: 60%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeJoe Sandbox ML: detected
Source: 7zba89tklZ.exeJoe Sandbox ML: detected
Source: 7zba89tklZ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 7zba89tklZ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F184C __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z,__EH_prolog3,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_004F184C
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F184C __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z,__EH_prolog3,GlobalAlloc,GlobalLock,_memmove,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_004F184C
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F17EC OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004F17EC
Source: C:\Users\user\Desktop\7zba89tklZ.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F75290_2_004F7529
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F19DF0_2_004F19DF
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004FB4640_2_004FB464
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004FBC1E0_2_004FBC1E
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004FB8360_2_004FB836
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004FAC310_2_004FAC31
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004FB0C60_2_004FB0C6
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_0037B8363_2_0037B836
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_0037AC313_2_0037AC31
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_0037BC1E3_2_0037BC1E
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_0037B4643_2_0037B464
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_0037B0C63_2_0037B0C6
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_003775293_2_00377529
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_003719DF3_2_003719DF
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: String function: 00371000 appears 40 times
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: String function: 004F1000 appears 40 times
Source: 7zba89tklZ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal76.evad.winEXE@3/2@0/0
Source: C:\Users\user\Desktop\7zba89tklZ.exeFile created: C:\Users\user\AppData\Local\Microsoft\svcapp.exeJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeMutant created: \Sessions\1\BaseNamedObjects\DiamoTrix
Source: C:\Users\user\Desktop\7zba89tklZ.exeCommand line argument: DiamoTrix0_2_004F2235
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCommand line argument: DiamoTrix3_2_00372235
Source: 7zba89tklZ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\7zba89tklZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 7zba89tklZ.exeVirustotal: Detection: 62%
Source: 7zba89tklZ.exeReversingLabs: Detection: 60%
Source: C:\Users\user\Desktop\7zba89tklZ.exeFile read: C:\Users\user\Desktop\7zba89tklZ.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\7zba89tklZ.exe "C:\Users\user\Desktop\7zba89tklZ.exe"
Source: unknownProcess created: C:\Users\user\Desktop\7zba89tklZ.exe "C:\Users\user\Desktop\7zba89tklZ.exe"
Source: unknownProcess created: C:\Users\user\AppData\Local\Microsoft\svcapp.exe "C:\Users\user\AppData\Local\Microsoft\svcapp.exe"
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeSection loaded: netutils.dllJump to behavior
Source: 7zba89tklZ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 7zba89tklZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 7zba89tklZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 7zba89tklZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 7zba89tklZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 7zba89tklZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F1000 LoadLibraryA,GetProcAddress,0_2_004F1000
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F982B push ecx; ret 0_2_004F983E
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004FDB85 push ecx; ret 0_2_004FDB98
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_0037982B push ecx; ret 3_2_0037983E
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_0037DB85 push ecx; ret 3_2_0037DB98
Source: C:\Users\user\Desktop\7zba89tklZ.exeFile created: C:\Users\user\AppData\Local\Microsoft\svcapp.exeJump to dropped file
Source: C:\Users\user\Desktop\7zba89tklZ.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SystemHandlerJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SystemHandlerJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SystemHandlerJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SystemHandlerJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_3-11755
Source: C:\Users\user\Desktop\7zba89tklZ.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-11367
Source: C:\Users\user\Desktop\7zba89tklZ.exeWindow / User API: threadDelayed 596Jump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeWindow / User API: threadDelayed 5050Jump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeWindow / User API: threadDelayed 3903Jump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-10465
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-10457
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeAPI coverage: 9.9 %
Source: C:\Users\user\Desktop\7zba89tklZ.exe TID: 1996Thread sleep count: 596 > 30Jump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exe TID: 1996Thread sleep time: -29800000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exe TID: 5568Thread sleep count: 5050 > 30Jump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exe TID: 5568Thread sleep time: -4646000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exe TID: 5568Thread sleep count: 3903 > 30Jump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exe TID: 5568Thread sleep time: -3590760s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\7zba89tklZ.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\7zba89tklZ.exeThread delayed: delay time: 50000Jump to behavior
Source: C:\Users\user\Desktop\7zba89tklZ.exeAPI call chain: ExitProcess graph end nodegraph_0-10466
Source: C:\Users\user\Desktop\7zba89tklZ.exeAPI call chain: ExitProcess graph end nodegraph_0-10558
Source: C:\Users\user\Desktop\7zba89tklZ.exeAPI call chain: ExitProcess graph end nodegraph_0-11246
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeAPI call chain: ExitProcess graph end nodegraph_3-10458
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeAPI call chain: ExitProcess graph end nodegraph_3-10551

Anti Debugging

barindex
Source: C:\Users\user\Desktop\7zba89tklZ.exeDebugger detection routine: IsDebuggerPresent or CheckRemoteDebuggerPresent, DecisionNodes, ExitProcess or Sleepgraph_0-11242
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F2235 CreateMutexA,GetLastError,CloseHandle,ExitProcess,IsDebuggerPresent,CreateThread,Sleep,0_2_004F2235
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F1000 LoadLibraryA,GetProcAddress,0_2_004F1000
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004FCA46 SetUnhandledExceptionFilter,0_2_004FCA46
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004F8A8F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004F8A8F
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_005002B8 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005002B8
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_0037CA46 SetUnhandledExceptionFilter,3_2_0037CA46
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_003802B8 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_003802B8
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: 3_2_00378A8F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00378A8F
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_00501453
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,0_2_00502CBB
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_00502D95
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0050125C
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,0_2_00502A77
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_00501624
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_005016E4
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_00501351
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_0050174B
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,0_2_00501BCC
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,0_2_005013F8
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,0_2_00501787
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: GetLocaleInfoA,0_2_00502BAC
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,3_2_00381453
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,3_2_00382CBB
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,3_2_00382D95
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,3_2_00381624
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,3_2_00382A77
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_0038125C
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_003816E4
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,3_2_00381351
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,3_2_0038174B
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: GetLocaleInfoA,3_2_00382BAC
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,3_2_00381787
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,3_2_003813F8
Source: C:\Users\user\AppData\Local\Microsoft\svcapp.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,3_2_00381BCC
Source: C:\Users\user\Desktop\7zba89tklZ.exeCode function: 0_2_004FDD2F GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004FDD2F
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Native API
1
DLL Side-Loading
1
Registry Run Keys / Startup Folder
111
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop Protocol3
Clipboard Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager111
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
7zba89tklZ.exe62%VirustotalBrowse
7zba89tklZ.exe61%ReversingLabsWin32.Trojan.Doina
7zba89tklZ.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Microsoft\svcapp.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Microsoft\svcapp.exe61%ReversingLabsWin32.Trojan.Doina
C:\Users\user\AppData\Local\Microsoft\svcapp.exe62%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1579669
Start date and time:2024-12-23 07:19:39 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 1s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Sample name:7zba89tklZ.exe
renamed because original name is a hash value
Original Sample Name:2b5e1dfe4e4db4e886b079f054182055.exe
Detection:MAL
Classification:mal76.evad.winEXE@3/2@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 97%
  • Number of executed functions: 17
  • Number of non-executed functions: 77
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
TimeTypeDescription
01:20:29API Interceptor13922588x Sleep call for process: 7zba89tklZ.exe modified
07:20:28AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SystemHandler C:\Users\user\Desktop\7zba89tklZ.exe
07:20:36AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SystemHandler C:\Users\user\AppData\Local\Microsoft\svcapp.exe
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\7zba89tklZ.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):112640
Entropy (8bit):6.3674970206945
Encrypted:false
SSDEEP:1536:XkhBm8BvFsJMAjrUTXqKgcs5Btdyhy3NZRgYDnRQKlw2LWeSMD+/G:0rjBvKrUbqKgRTHvRgYVQKlw2SeSJO
MD5:2B5E1DFE4E4DB4E886B079F054182055
SHA1:D90E2828EA0082917583975F4A054F7C85D45053
SHA-256:92382CC3402B6FB7CBD68FE7FA49A00AE204682A90FE0B4E69A6EF2C6D324793
SHA-512:954F56680E32E5AFB7F70596C10AC74416CC2DDA93F1835BFE330660792B8CE9591C56B43A40A3A36B6434AEB59FD0D5C6E189547161DB3F9A7F81605F83C087
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: ReversingLabs, Detection: 61%
  • Antivirus: Virustotal, Detection: 62%, Browse
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......0F..t'..t'..t'..}_[.w'..t'..='...QV.e'...Qc.W'...Qb.='...Qg.w'...QU.u'..Richt'..........PE..L....jdg.....................................@....@.......................................@.....................................(....................................................................w..@............@...............................text...\-.......................... ..`.rdata...U...@...V...2..............@..@.data.... ..........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................
Process:C:\Users\user\Desktop\7zba89tklZ.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:ggPYV:rPYV
MD5:187F488E27DB4AF347237FE461A079AD
SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
Malicious:true
Reputation:high, very likely benign file
Preview:[ZoneTransfer]....ZoneId=0
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.3674970206945
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:7zba89tklZ.exe
File size:112'640 bytes
MD5:2b5e1dfe4e4db4e886b079f054182055
SHA1:d90e2828ea0082917583975f4a054f7c85d45053
SHA256:92382cc3402b6fb7cbd68fe7fa49a00ae204682a90fe0b4e69a6ef2c6d324793
SHA512:954f56680e32e5afb7f70596c10ac74416cc2dda93f1835bfe330660792b8ce9591c56b43a40a3a36b6434aeb59fd0d5c6e189547161db3f9a7f81605f83c087
SSDEEP:1536:XkhBm8BvFsJMAjrUTXqKgcs5Btdyhy3NZRgYDnRQKlw2LWeSMD+/G:0rjBvKrUbqKgRTHvRgYVQKlw2SeSJO
TLSH:8CB39E21B2C5C4F3D11211308DA69BE28EBFFCB15EB125AF6BD9066D0F696C1CA58353
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......0F..t'..t'..t'..}_[.w'..t'..='...QV.e'...Qc.W'...Qb.='...Qg.w'...QU.u'..Richt'..........PE..L....jdg...........................
Icon Hash:00928e8e8686b000
Entrypoint:0x408a85
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x67646AD3 [Thu Dec 19 18:49:55 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:ebb56531f9710b9a467b3b47d8223424
Instruction
call 00007FE1F8E177AAh
jmp 00007FE1F8E1238Eh
cmp ecx, dword ptr [0041A2F0h]
jne 00007FE1F8E12504h
rep ret
jmp 00007FE1F8E17831h
mov edi, edi
push ebp
mov ebp, esp
mov eax, ecx
mov ecx, dword ptr [ebp+08h]
mov dword ptr [eax], 00414210h
mov ecx, dword ptr [ecx]
mov dword ptr [eax+04h], ecx
mov byte ptr [eax+08h], 00000000h
pop ebp
retn 0008h
mov eax, dword ptr [ecx+04h]
test eax, eax
jne 00007FE1F8E12507h
mov eax, 00414218h
ret
mov edi, edi
push ebp
mov ebp, esp
cmp dword ptr [ebp+08h], 00000000h
push edi
mov edi, ecx
je 00007FE1F8E1252Fh
push esi
push dword ptr [ebp+08h]
call 00007FE1F8E17956h
lea esi, dword ptr [eax+01h]
push esi
call 00007FE1F8E1420Eh
pop ecx
pop ecx
mov dword ptr [edi+04h], eax
test eax, eax
je 00007FE1F8E12513h
push dword ptr [ebp+08h]
push esi
push eax
call 00007FE1F8E178DAh
add esp, 0Ch
mov byte ptr [edi+08h], 00000001h
pop esi
pop edi
pop ebp
retn 0004h
mov edi, edi
push esi
mov esi, ecx
cmp byte ptr [esi+08h], 00000000h
je 00007FE1F8E1250Bh
push dword ptr [esi+04h]
call 00007FE1F8E1296Bh
pop ecx
and dword ptr [esi+04h], 00000000h
mov byte ptr [esi+08h], 00000000h
pop esi
ret
mov edi, edi
push ebp
mov ebp, esp
mov eax, dword ptr [ebp+08h]
push esi
mov esi, ecx
and dword ptr [esi+04h], 00000000h
mov dword ptr [esi], 00414210h
mov byte ptr [esi+08h], 00000000h
push dword ptr [eax]
call 00007FE1F8E12487h
mov eax, esi
pop esi
pop ebp
retn 0004h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
  • [ASM] VS2010 build 30319
  • [C++] VS2010 build 30319
  • [ C ] VS2010 build 30319
  • [LNK] VS2010 build 30319
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x18fa40x28.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x2b8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e0000x1210.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x177100x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x140000x110.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x12d5c0x12e000c92ac62242b124a32252ddc926ef20cFalse0.5768832781456954data6.610430575360831IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x140000x55c40x5600bb84a75048842581960fa9790cb583fdFalse0.35846656976744184data4.822094045067747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x1a0000x20c00x10007bfb1ee1a98f05a772f0fc0aea792a8fFalse0.258056640625data3.4184107185858905IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x1d0000x2b80x4007cc9e164c83cbadc629bacfeff29fda1False0.3203125data5.171342193183488IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1e0000x1ba40x1c003e08707dc6e8c85e5f4b7ee4e18ad05cFalse0.5330636160714286data5.052251546929224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x1d0580x25fASCII text, with very long lines (607), with no line terminatorsEnglishUnited States0.43492586490939045
DLLImport
KERNEL32.dllGetProcAddress, LoadLibraryA, ExitProcess, GlobalLock, GlobalAlloc, Sleep, GlobalUnlock, GetLastError, IsDebuggerPresent, CreateThread, InterlockedIncrement, InterlockedDecrement, EncodePointer, DecodePointer, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, GetCommandLineW, HeapSetInformation, GetStartupInfoW, HeapFree, HeapReAlloc, RaiseException, RtlUnwind, HeapAlloc, CompareStringW, MultiByteToWideChar, GetCPInfo, WideCharToMultiByte, LCMapStringW, SetUnhandledExceptionFilter, GetModuleHandleW, WriteFile, GetStdHandle, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, HeapCreate, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, IsProcessorFeaturePresent, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetUserDefaultLCID, GetLocaleInfoW, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, GetStringTypeW, LoadLibraryW
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:01:20:28
Start date:23/12/2024
Path:C:\Users\user\Desktop\7zba89tklZ.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\7zba89tklZ.exe"
Imagebase:0x4f0000
File size:112'640 bytes
MD5 hash:2B5E1DFE4E4DB4E886B079F054182055
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:2
Start time:01:20:36
Start date:23/12/2024
Path:C:\Users\user\Desktop\7zba89tklZ.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\7zba89tklZ.exe"
Imagebase:0x4f0000
File size:112'640 bytes
MD5 hash:2B5E1DFE4E4DB4E886B079F054182055
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:01:20:44
Start date:23/12/2024
Path:C:\Users\user\AppData\Local\Microsoft\svcapp.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\AppData\Local\Microsoft\svcapp.exe"
Imagebase:0x370000
File size:112'640 bytes
MD5 hash:2B5E1DFE4E4DB4E886B079F054182055
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Antivirus matches:
  • Detection: 100%, Joe Sandbox ML
  • Detection: 61%, ReversingLabs
  • Detection: 62%, Virustotal, Browse
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:7.9%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:4.7%
    Total number of Nodes:1683
    Total number of Limit Nodes:25
    execution_graph 12175 503a56 12178 4f23ef 12175->12178 12177 503a5e 12179 4f23fb __EH_prolog3 12178->12179 12180 4f14cb 2 API calls 12179->12180 12181 4f2422 std::locale::_Locimp::~_Locimp 12180->12181 12181->12177 12325 4f946b 12326 4f8a8f CatchGuardHandler 5 API calls 12325->12326 12327 4f947f 12326->12327 12330 4fee2f 12327->12330 12331 4fd856 __getptd 66 API calls 12330->12331 12332 4fee3c 12331->12332 12333 4fee80 12332->12333 12334 4f9498 12332->12334 12335 4feea3 12332->12335 12333->12334 12338 4fe318 12333->12338 12335->12334 12348 4fea9d 12335->12348 12339 4fe324 ___BuildCatchObject 12338->12339 12340 4fd856 __getptd 66 API calls 12339->12340 12345 4fe344 __CallSettingFrame@12 12340->12345 12341 4fe3b5 12393 4fe3da 12341->12393 12345->12341 12387 4fef61 12345->12387 12346 4fe3cb ___BuildCatchObject 12346->12334 12347 4fef61 ___BuildCatchObjectHelper 68 API calls 12347->12346 12349 4feabc 12348->12349 12350 4fef61 ___BuildCatchObjectHelper 68 API calls 12349->12350 12352 4fead6 12349->12352 12350->12352 12351 4fedf7 12354 4fd856 __getptd 66 API calls 12351->12354 12357 4fd856 __getptd 66 API calls 12352->12357 12384 4febb5 FindHandler type_info::operator== ___TypeMatch 12352->12384 12353 4fedde 12436 4fe996 12353->12436 12359 4fedff 12354->12359 12356 4fef15 CallUnexpected 67 API calls 12356->12384 12360 4feb1d 12357->12360 12358 4fee0d 12358->12334 12359->12358 12361 4fef61 ___BuildCatchObjectHelper 68 API calls 12359->12361 12360->12358 12363 4fd856 __getptd 66 API calls 12360->12363 12361->12358 12365 4feb2f 12363->12365 12364 4f8b26 std::exception::exception 66 API calls 12364->12384 12366 4fd856 __getptd 66 API calls 12365->12366 12369 4feb3d ___BuildCatchObjectHelper 12366->12369 12367 4f935c __CxxThrowException@8 RaiseException 12367->12384 12368 4fe4b7 IsInExceptionSpec 68 API calls 12368->12384 12371 4fef61 ___BuildCatchObjectHelper 68 API calls 12369->12371 12374 4feb59 12369->12374 12370 4feb83 12373 4fd856 __getptd 66 API calls 12370->12373 12371->12374 12372 4fd856 66 API calls __getptd 12372->12384 12375 4feb88 12373->12375 12374->12370 12377 4fef61 ___BuildCatchObjectHelper 68 API calls 12374->12377 12378 4fd856 __getptd 66 API calls 12375->12378 12375->12384 12377->12370 12379 4feb9a 12378->12379 12380 4fd856 __getptd 66 API calls 12379->12380 12381 4feba5 12380->12381 12399 4fe4b7 12381->12399 12384->12351 12384->12353 12384->12356 12384->12364 12384->12367 12384->12368 12384->12372 12385 4fe318 ___FrameUnwindToState 68 API calls 12384->12385 12405 4f9614 12384->12405 12411 4fe928 12384->12411 12421 4f93e1 RtlUnwind 12384->12421 12422 4fe532 12384->12422 12385->12384 12398 4fdb40 12387->12398 12389 4fef6d DecodePointer 12390 4fef7d 12389->12390 12391 4fef15 CallUnexpected 67 API calls 12390->12391 12392 4fef98 12391->12392 12394 4fd856 __getptd 66 API calls 12393->12394 12395 4fe3df 12394->12395 12396 4fe3c1 12395->12396 12397 4fd856 __getptd 66 API calls 12395->12397 12396->12346 12396->12347 12397->12396 12398->12389 12400 4fe4c3 12399->12400 12404 4fe4cd ___TypeMatch 12399->12404 12401 4fef61 ___BuildCatchObjectHelper 68 API calls 12400->12401 12402 4fe4c8 12401->12402 12403 4fef15 CallUnexpected 67 API calls 12402->12403 12403->12404 12404->12384 12406 4f962d 12405->12406 12407 4f9661 12406->12407 12410 4fef61 ___BuildCatchObjectHelper 68 API calls 12406->12410 12408 4f967a 12407->12408 12409 4fef61 ___BuildCatchObjectHelper 68 API calls 12407->12409 12408->12384 12409->12408 12410->12406 12412 4fe940 12411->12412 12413 4fe933 12411->12413 12456 4f93e1 RtlUnwind 12412->12456 12452 4fe896 12413->12452 12416 4fe957 12417 4fe318 ___FrameUnwindToState 68 API calls 12416->12417 12418 4fe965 12417->12418 12457 4fe57b 12418->12457 12420 4fe986 FindHandler 12420->12384 12421->12384 12423 4fe53e __EH_prolog3_catch 12422->12423 12424 4fd856 __getptd 66 API calls 12423->12424 12425 4fe543 12424->12425 12426 4fe551 12425->12426 12427 4fef61 ___BuildCatchObjectHelper 68 API calls 12425->12427 12500 4fef4e 12426->12500 12427->12426 12437 4fe9ae 12436->12437 12446 4fea98 12436->12446 12438 4fd856 __getptd 66 API calls 12437->12438 12439 4fe9b4 12438->12439 12441 4fd856 __getptd 66 API calls 12439->12441 12450 4fe9f9 12439->12450 12440 4fea12 12443 4f9614 _GetRangeOfTrysToCheck 68 API calls 12440->12443 12444 4fe9c2 12441->12444 12442 4fef61 ___BuildCatchObjectHelper 68 API calls 12442->12440 12447 4fea27 12443->12447 12503 4fd6a6 EncodePointer 12444->12503 12446->12351 12447->12446 12451 4fe928 FindHandler 69 API calls 12447->12451 12448 4fe9cd 12448->12450 12504 4f949e 12448->12504 12450->12440 12450->12442 12450->12446 12451->12447 12453 4fe8a2 ___BuildCatchObject 12452->12453 12471 4fe717 12453->12471 12455 4fe8d1 ___BuildCatchObject 12455->12412 12456->12416 12458 4fe587 ___BuildCatchObject 12457->12458 12475 4f9687 12458->12475 12461 4fd856 __getptd 66 API calls 12462 4fe5b2 12461->12462 12463 4fd856 __getptd 66 API calls 12462->12463 12464 4fe5c0 12463->12464 12465 4fd856 __getptd 66 API calls 12464->12465 12466 4fe5ce 12465->12466 12467 4fd856 __getptd 66 API calls 12466->12467 12468 4fe5d9 _CallCatchBlock2 12467->12468 12480 4fe6a1 12468->12480 12470 4fe68d ___BuildCatchObject 12470->12420 12473 4fe723 ___BuildCatchObject ___BuildCatchObjectHelper 12471->12473 12472 4fe790 ___BuildCatchObject _memmove 12472->12455 12473->12472 12474 4fef61 ___BuildCatchObjectHelper 68 API calls 12473->12474 12474->12472 12476 4fd856 __getptd 66 API calls 12475->12476 12477 4f969a 12476->12477 12478 4fd856 __getptd 66 API calls 12477->12478 12479 4f96a8 12478->12479 12479->12461 12489 4f96da 12480->12489 12483 4fd856 __getptd 66 API calls 12484 4fe6b5 12483->12484 12485 4fd856 __getptd 66 API calls 12484->12485 12487 4fe6c3 12485->12487 12486 4fe706 FindHandler 12486->12470 12487->12486 12497 4f96b3 12487->12497 12490 4fd856 __getptd 66 API calls 12489->12490 12491 4f96e5 12490->12491 12492 4f9701 12491->12492 12493 4f96f0 12491->12493 12495 4fd856 __getptd 66 API calls 12492->12495 12494 4fd856 __getptd 66 API calls 12493->12494 12496 4f96f5 12494->12496 12495->12496 12496->12483 12498 4fd856 __getptd 66 API calls 12497->12498 12499 4f96bd 12498->12499 12499->12486 12501 4fd856 __getptd 66 API calls 12500->12501 12502 4fef53 12501->12502 12503->12448 12505 4f94c2 12504->12505 12507 4f94b0 12504->12507 12506 4fd856 __getptd 66 API calls 12505->12506 12506->12507 12507->12450 11640 503b7a 11641 4f234f 116 API calls 11640->11641 11642 503b8a 11641->11642 11643 4f91b1 __cinit 76 API calls 11642->11643 11644 503b94 11643->11644 11645 500c6c 11655 500bf0 11645->11655 11648 500c97 setSBCS 11649 4f8a8f CatchGuardHandler 5 API calls 11648->11649 11650 500e53 11649->11650 11651 500cdb IsValidCodePage 11651->11648 11652 500ced GetCPInfo 11651->11652 11652->11648 11654 500d00 _memset __setmbcp_nolock 11652->11654 11662 5009bc GetCPInfo 11654->11662 11672 4fa8fa 11655->11672 11658 500c2d 11660 500c32 GetACP 11658->11660 11661 500c1f 11658->11661 11659 500c0f GetOEMCP 11659->11661 11660->11661 11661->11648 11661->11651 11661->11654 11663 5009f0 _memset 11662->11663 11671 500aa4 11662->11671 11985 501a5f 11663->11985 11667 4f8a8f CatchGuardHandler 5 API calls 11669 500b4a 11667->11669 11669->11654 11670 4fc785 ___crtLCMapStringA 82 API calls 11670->11671 11671->11667 11673 4fa90d 11672->11673 11679 4fa95a 11672->11679 11674 4fd856 __getptd 66 API calls 11673->11674 11675 4fa912 11674->11675 11676 4fa93a 11675->11676 11680 500703 11675->11680 11676->11679 11695 500b4c 11676->11695 11679->11658 11679->11659 11681 50070f ___BuildCatchObject 11680->11681 11682 4fd856 __getptd 66 API calls 11681->11682 11683 500714 11682->11683 11684 500742 11683->11684 11686 500726 11683->11686 11685 5008f6 __lock 66 API calls 11684->11685 11687 500749 11685->11687 11688 4fd856 __getptd 66 API calls 11686->11688 11711 5006b6 11687->11711 11690 50072b 11688->11690 11693 500739 ___BuildCatchObject 11690->11693 11694 4fcd21 __amsg_exit 66 API calls 11690->11694 11693->11676 11694->11693 11696 500b58 ___BuildCatchObject 11695->11696 11697 4fd856 __getptd 66 API calls 11696->11697 11698 500b5d 11697->11698 11699 500b6f 11698->11699 11700 5008f6 __lock 66 API calls 11698->11700 11702 500b7d ___BuildCatchObject 11699->11702 11704 4fcd21 __amsg_exit 66 API calls 11699->11704 11701 500b8d 11700->11701 11703 500bd6 11701->11703 11706 500ba4 InterlockedDecrement 11701->11706 11707 500bbe InterlockedIncrement 11701->11707 11702->11679 11981 500be7 11703->11981 11704->11702 11706->11707 11708 500baf 11706->11708 11707->11703 11708->11707 11709 4f8f81 _free 66 API calls 11708->11709 11710 500bbd 11709->11710 11710->11707 11712 5006c3 11711->11712 11713 5006f8 11711->11713 11712->11713 11714 500443 ___addlocaleref 8 API calls 11712->11714 11719 500770 11713->11719 11715 5006d9 11714->11715 11715->11713 11722 5004d2 11715->11722 11980 50081d LeaveCriticalSection 11719->11980 11721 500777 11721->11690 11723 5004e3 InterlockedDecrement 11722->11723 11724 500566 11722->11724 11725 5004f8 InterlockedDecrement 11723->11725 11726 5004fb 11723->11726 11724->11713 11736 50056b 11724->11736 11725->11726 11727 500505 InterlockedDecrement 11726->11727 11728 500508 11726->11728 11727->11728 11729 500512 InterlockedDecrement 11728->11729 11730 500515 11728->11730 11729->11730 11731 50051f InterlockedDecrement 11730->11731 11733 500522 11730->11733 11731->11733 11732 50053b InterlockedDecrement 11732->11733 11733->11732 11734 50054b InterlockedDecrement 11733->11734 11735 500556 InterlockedDecrement 11733->11735 11734->11733 11735->11724 11737 5005ef 11736->11737 11740 500582 11736->11740 11738 4f8f81 _free 66 API calls 11737->11738 11739 50063c 11737->11739 11742 500610 11738->11742 11750 500665 11739->11750 11806 4ff7fb 11739->11806 11740->11737 11746 4f8f81 _free 66 API calls 11740->11746 11762 5005b6 11740->11762 11744 4f8f81 _free 66 API calls 11742->11744 11748 500623 11744->11748 11745 4f8f81 _free 66 API calls 11745->11750 11751 5005ab 11746->11751 11747 5006aa 11752 4f8f81 _free 66 API calls 11747->11752 11754 4f8f81 _free 66 API calls 11748->11754 11749 4f8f81 _free 66 API calls 11756 5005e4 11749->11756 11750->11747 11755 4f8f81 66 API calls _free 11750->11755 11766 4ffe48 11751->11766 11759 5006b0 11752->11759 11753 4f8f81 _free 66 API calls 11760 5005cc 11753->11760 11761 500631 11754->11761 11755->11750 11757 4f8f81 _free 66 API calls 11756->11757 11757->11737 11759->11713 11794 4ffbef 11760->11794 11764 4f8f81 _free 66 API calls 11761->11764 11762->11753 11765 5005d7 11762->11765 11764->11739 11765->11749 11767 4ffe59 11766->11767 11793 4fff42 11766->11793 11768 4ffe6a 11767->11768 11769 4f8f81 _free 66 API calls 11767->11769 11770 4ffe7c 11768->11770 11771 4f8f81 _free 66 API calls 11768->11771 11769->11768 11772 4ffe8e 11770->11772 11774 4f8f81 _free 66 API calls 11770->11774 11771->11770 11773 4ffea0 11772->11773 11775 4f8f81 _free 66 API calls 11772->11775 11776 4ffeb2 11773->11776 11777 4f8f81 _free 66 API calls 11773->11777 11774->11772 11775->11773 11778 4ffec4 11776->11778 11779 4f8f81 _free 66 API calls 11776->11779 11777->11776 11780 4f8f81 _free 66 API calls 11778->11780 11784 4ffed6 11778->11784 11779->11778 11780->11784 11781 4f8f81 _free 66 API calls 11783 4ffee8 11781->11783 11782 4ffefa 11786 4fff0c 11782->11786 11787 4f8f81 _free 66 API calls 11782->11787 11783->11782 11785 4f8f81 _free 66 API calls 11783->11785 11784->11781 11784->11783 11785->11782 11788 4fff1e 11786->11788 11790 4f8f81 _free 66 API calls 11786->11790 11787->11786 11789 4fff30 11788->11789 11791 4f8f81 _free 66 API calls 11788->11791 11792 4f8f81 _free 66 API calls 11789->11792 11789->11793 11790->11788 11791->11789 11792->11793 11793->11762 11795 4ffbfc 11794->11795 11805 4ffc54 11794->11805 11796 4ffc0c 11795->11796 11797 4f8f81 _free 66 API calls 11795->11797 11798 4ffc1e 11796->11798 11799 4f8f81 _free 66 API calls 11796->11799 11797->11796 11800 4ffc30 11798->11800 11801 4f8f81 _free 66 API calls 11798->11801 11799->11798 11802 4f8f81 _free 66 API calls 11800->11802 11803 4ffc42 11800->11803 11801->11800 11802->11803 11804 4f8f81 _free 66 API calls 11803->11804 11803->11805 11804->11805 11805->11765 11807 4ffb6c 11806->11807 11808 4ff80c 11806->11808 11807->11745 11809 4f8f81 _free 66 API calls 11808->11809 11810 4ff814 11809->11810 11811 4f8f81 _free 66 API calls 11810->11811 11812 4ff81c 11811->11812 11813 4f8f81 _free 66 API calls 11812->11813 11814 4ff824 11813->11814 11815 4f8f81 _free 66 API calls 11814->11815 11816 4ff82c 11815->11816 11817 4f8f81 _free 66 API calls 11816->11817 11818 4ff834 11817->11818 11819 4f8f81 _free 66 API calls 11818->11819 11820 4ff83c 11819->11820 11821 4f8f81 _free 66 API calls 11820->11821 11822 4ff843 11821->11822 11823 4f8f81 _free 66 API calls 11822->11823 11824 4ff84b 11823->11824 11825 4f8f81 _free 66 API calls 11824->11825 11826 4ff853 11825->11826 11827 4f8f81 _free 66 API calls 11826->11827 11828 4ff85b 11827->11828 11829 4f8f81 _free 66 API calls 11828->11829 11830 4ff863 11829->11830 11831 4f8f81 _free 66 API calls 11830->11831 11832 4ff86b 11831->11832 11833 4f8f81 _free 66 API calls 11832->11833 11834 4ff873 11833->11834 11835 4f8f81 _free 66 API calls 11834->11835 11836 4ff87b 11835->11836 11837 4f8f81 _free 66 API calls 11836->11837 11838 4ff883 11837->11838 11839 4f8f81 _free 66 API calls 11838->11839 11840 4ff88b 11839->11840 11841 4f8f81 _free 66 API calls 11840->11841 11842 4ff896 11841->11842 11843 4f8f81 _free 66 API calls 11842->11843 11844 4ff89e 11843->11844 11845 4f8f81 _free 66 API calls 11844->11845 11846 4ff8a6 11845->11846 11847 4f8f81 _free 66 API calls 11846->11847 11848 4ff8ae 11847->11848 11849 4f8f81 _free 66 API calls 11848->11849 11850 4ff8b6 11849->11850 11851 4f8f81 _free 66 API calls 11850->11851 11852 4ff8be 11851->11852 11853 4f8f81 _free 66 API calls 11852->11853 11854 4ff8c6 11853->11854 11855 4f8f81 _free 66 API calls 11854->11855 11856 4ff8ce 11855->11856 11857 4f8f81 _free 66 API calls 11856->11857 11858 4ff8d6 11857->11858 11859 4f8f81 _free 66 API calls 11858->11859 11860 4ff8de 11859->11860 11861 4f8f81 _free 66 API calls 11860->11861 11862 4ff8e6 11861->11862 11863 4f8f81 _free 66 API calls 11862->11863 11864 4ff8ee 11863->11864 11865 4f8f81 _free 66 API calls 11864->11865 11866 4ff8f6 11865->11866 11867 4f8f81 _free 66 API calls 11866->11867 11868 4ff8fe 11867->11868 11869 4f8f81 _free 66 API calls 11868->11869 11870 4ff906 11869->11870 11871 4f8f81 _free 66 API calls 11870->11871 11872 4ff90e 11871->11872 11873 4f8f81 _free 66 API calls 11872->11873 11874 4ff91c 11873->11874 11875 4f8f81 _free 66 API calls 11874->11875 11876 4ff927 11875->11876 11877 4f8f81 _free 66 API calls 11876->11877 11878 4ff932 11877->11878 11879 4f8f81 _free 66 API calls 11878->11879 11880 4ff93d 11879->11880 11881 4f8f81 _free 66 API calls 11880->11881 11882 4ff948 11881->11882 11883 4f8f81 _free 66 API calls 11882->11883 11884 4ff953 11883->11884 11885 4f8f81 _free 66 API calls 11884->11885 11886 4ff95e 11885->11886 11887 4f8f81 _free 66 API calls 11886->11887 11888 4ff969 11887->11888 11889 4f8f81 _free 66 API calls 11888->11889 11890 4ff974 11889->11890 11891 4f8f81 _free 66 API calls 11890->11891 11892 4ff97f 11891->11892 11893 4f8f81 _free 66 API calls 11892->11893 11894 4ff98a 11893->11894 11895 4f8f81 _free 66 API calls 11894->11895 11896 4ff995 11895->11896 11897 4f8f81 _free 66 API calls 11896->11897 11898 4ff9a0 11897->11898 11899 4f8f81 _free 66 API calls 11898->11899 11900 4ff9ab 11899->11900 11901 4f8f81 _free 66 API calls 11900->11901 11902 4ff9b6 11901->11902 11903 4f8f81 _free 66 API calls 11902->11903 11904 4ff9c1 11903->11904 11905 4f8f81 _free 66 API calls 11904->11905 11906 4ff9cf 11905->11906 11907 4f8f81 _free 66 API calls 11906->11907 11908 4ff9da 11907->11908 11909 4f8f81 _free 66 API calls 11908->11909 11910 4ff9e5 11909->11910 11911 4f8f81 _free 66 API calls 11910->11911 11912 4ff9f0 11911->11912 11913 4f8f81 _free 66 API calls 11912->11913 11914 4ff9fb 11913->11914 11915 4f8f81 _free 66 API calls 11914->11915 11916 4ffa06 11915->11916 11917 4f8f81 _free 66 API calls 11916->11917 11918 4ffa11 11917->11918 11919 4f8f81 _free 66 API calls 11918->11919 11920 4ffa1c 11919->11920 11921 4f8f81 _free 66 API calls 11920->11921 11922 4ffa27 11921->11922 11923 4f8f81 _free 66 API calls 11922->11923 11924 4ffa32 11923->11924 11925 4f8f81 _free 66 API calls 11924->11925 11926 4ffa3d 11925->11926 11927 4f8f81 _free 66 API calls 11926->11927 11928 4ffa48 11927->11928 11929 4f8f81 _free 66 API calls 11928->11929 11930 4ffa53 11929->11930 11931 4f8f81 _free 66 API calls 11930->11931 11932 4ffa5e 11931->11932 11933 4f8f81 _free 66 API calls 11932->11933 11934 4ffa69 11933->11934 11935 4f8f81 _free 66 API calls 11934->11935 11936 4ffa74 11935->11936 11937 4f8f81 _free 66 API calls 11936->11937 11938 4ffa82 11937->11938 11939 4f8f81 _free 66 API calls 11938->11939 11940 4ffa8d 11939->11940 11941 4f8f81 _free 66 API calls 11940->11941 11942 4ffa98 11941->11942 11943 4f8f81 _free 66 API calls 11942->11943 11944 4ffaa3 11943->11944 11945 4f8f81 _free 66 API calls 11944->11945 11946 4ffaae 11945->11946 11947 4f8f81 _free 66 API calls 11946->11947 11948 4ffab9 11947->11948 11949 4f8f81 _free 66 API calls 11948->11949 11950 4ffac4 11949->11950 11951 4f8f81 _free 66 API calls 11950->11951 11952 4ffacf 11951->11952 11953 4f8f81 _free 66 API calls 11952->11953 11954 4ffada 11953->11954 11955 4f8f81 _free 66 API calls 11954->11955 11956 4ffae5 11955->11956 11957 4f8f81 _free 66 API calls 11956->11957 11958 4ffaf0 11957->11958 11959 4f8f81 _free 66 API calls 11958->11959 11960 4ffafb 11959->11960 11961 4f8f81 _free 66 API calls 11960->11961 11962 4ffb06 11961->11962 11963 4f8f81 _free 66 API calls 11962->11963 11964 4ffb11 11963->11964 11965 4f8f81 _free 66 API calls 11964->11965 11966 4ffb1c 11965->11966 11967 4f8f81 _free 66 API calls 11966->11967 11968 4ffb27 11967->11968 11969 4f8f81 _free 66 API calls 11968->11969 11970 4ffb35 11969->11970 11971 4f8f81 _free 66 API calls 11970->11971 11972 4ffb40 11971->11972 11973 4f8f81 _free 66 API calls 11972->11973 11974 4ffb4b 11973->11974 11975 4f8f81 _free 66 API calls 11974->11975 11976 4ffb56 11975->11976 11977 4f8f81 _free 66 API calls 11976->11977 11978 4ffb61 11977->11978 11979 4f8f81 _free 66 API calls 11978->11979 11979->11807 11980->11721 11984 50081d LeaveCriticalSection 11981->11984 11983 500bee 11983->11699 11984->11983 11986 4fa8fa _LocaleUpdate::_LocaleUpdate 76 API calls 11985->11986 11987 501a72 11986->11987 11995 501978 11987->11995 11990 4fc785 11991 4fa8fa _LocaleUpdate::_LocaleUpdate 76 API calls 11990->11991 11992 4fc798 11991->11992 12012 4fc59e 11992->12012 11996 5019a1 MultiByteToWideChar 11995->11996 11997 501996 11995->11997 12000 5019ce 11996->12000 12007 5019ca 11996->12007 11997->11996 11998 4f8a8f CatchGuardHandler 5 API calls 11999 500a5f 11998->11999 11999->11990 12001 5019e3 _memset __alloca_probe_16 12000->12001 12002 4fa7f1 _malloc 66 API calls 12000->12002 12003 501a1c MultiByteToWideChar 12001->12003 12001->12007 12002->12001 12004 501a32 GetStringTypeW 12003->12004 12005 501a43 12003->12005 12004->12005 12008 4fa8da 12005->12008 12007->11998 12009 4fa8f7 12008->12009 12010 4fa8e6 12008->12010 12009->12007 12010->12009 12011 4f8f81 _free 66 API calls 12010->12011 12011->12009 12014 4fc5bc MultiByteToWideChar 12012->12014 12015 4fc61a 12014->12015 12020 4fc621 12014->12020 12017 4f8a8f CatchGuardHandler 5 API calls 12015->12017 12016 4fc63a __alloca_probe_16 12016->12015 12018 4fc66e MultiByteToWideChar 12016->12018 12019 4fc783 12017->12019 12021 4fc687 LCMapStringW 12018->12021 12034 4fc766 12018->12034 12019->11670 12020->12016 12022 4fa7f1 _malloc 66 API calls 12020->12022 12024 4fc6a6 12021->12024 12021->12034 12022->12016 12023 4fa8da __freea 66 API calls 12023->12015 12025 4fc6b0 12024->12025 12026 4fc6d9 12024->12026 12027 4fc6c4 LCMapStringW 12025->12027 12025->12034 12029 4fa7f1 _malloc 66 API calls 12026->12029 12033 4fc6f4 __alloca_probe_16 12026->12033 12027->12034 12028 4fc728 LCMapStringW 12030 4fc73e WideCharToMultiByte 12028->12030 12031 4fc760 12028->12031 12029->12033 12030->12031 12032 4fa8da __freea 66 API calls 12031->12032 12032->12034 12033->12028 12033->12034 12034->12023 11128 4f8918 11166 4fdb40 11128->11166 11130 4f8924 GetStartupInfoW 11131 4f8938 HeapSetInformation 11130->11131 11132 4f8943 11130->11132 11131->11132 11167 4fdb1a HeapCreate 11132->11167 11134 4f899c 11168 4fd99f GetModuleHandleW 11134->11168 11135 4f8991 11135->11134 11250 4f88ef 11135->11250 11138 4f89a2 11139 4f89ad __RTC_Initialize 11138->11139 11140 4f88ef _fast_error_exit 66 API calls 11138->11140 11193 4fd415 GetStartupInfoW 11139->11193 11140->11139 11143 4f89c7 GetCommandLineW 11206 4fd3bd GetEnvironmentStringsW 11143->11206 11144 4fcd21 __amsg_exit 66 API calls 11146 4f89c6 11144->11146 11146->11143 11147 4f89d7 11213 4fd30f GetModuleFileNameW 11147->11213 11150 4f89ec 11219 4fd0dd 11150->11219 11151 4fcd21 __amsg_exit 66 API calls 11151->11150 11153 4f89f2 11154 4f89fd 11153->11154 11156 4fcd21 __amsg_exit 66 API calls 11153->11156 11233 4fcb00 11154->11233 11156->11154 11157 4f8a05 11158 4fcd21 __amsg_exit 66 API calls 11157->11158 11159 4f8a10 __wwincmdln 11157->11159 11158->11159 11239 4f2235 11159->11239 11166->11130 11167->11135 11169 4fd9bc GetProcAddress GetProcAddress GetProcAddress GetProcAddress 11168->11169 11170 4fd9b3 11168->11170 11171 4fda06 TlsAlloc 11169->11171 11258 4fd6ec 11170->11258 11175 4fdb15 11171->11175 11176 4fda54 TlsSetValue 11171->11176 11175->11138 11176->11175 11177 4fda65 11176->11177 11268 4fcaa9 11177->11268 11182 4fdaad DecodePointer 11185 4fdac2 11182->11185 11183 4fdb10 11184 4fd6ec __mtterm 70 API calls 11183->11184 11184->11175 11185->11183 11186 4fc937 __calloc_crt 66 API calls 11185->11186 11187 4fdad8 11186->11187 11187->11183 11188 4fdae0 DecodePointer 11187->11188 11189 4fdaf1 11188->11189 11189->11183 11190 4fdaf5 11189->11190 11191 4fd729 __getptd_noexit 66 API calls 11190->11191 11192 4fdafd GetCurrentThreadId 11191->11192 11192->11175 11194 4fc937 __calloc_crt 66 API calls 11193->11194 11203 4fd433 11194->11203 11195 4f89bb 11195->11143 11195->11144 11196 4fd5de GetStdHandle 11197 4fd5a8 11196->11197 11197->11196 11199 4fd642 SetHandleCount 11197->11199 11200 4fd5f0 GetFileType 11197->11200 11204 4fd616 InitializeCriticalSectionAndSpinCount 11197->11204 11198 4fc937 __calloc_crt 66 API calls 11198->11203 11199->11195 11200->11197 11201 4fd55f InitializeCriticalSectionAndSpinCount 11201->11195 11205 4fd528 11201->11205 11202 4fd554 GetFileType 11202->11201 11202->11205 11203->11195 11203->11197 11203->11198 11203->11205 11204->11195 11204->11197 11205->11197 11205->11201 11205->11202 11207 4fd3ce 11206->11207 11208 4fd3d2 11206->11208 11207->11147 11279 4fc8f2 11208->11279 11211 4fd3f4 _memmove 11212 4fd3fb FreeEnvironmentStringsW 11211->11212 11212->11147 11214 4fd344 _wparse_cmdline 11213->11214 11215 4f89e1 11214->11215 11216 4fd381 11214->11216 11215->11150 11215->11151 11217 4fc8f2 __malloc_crt 66 API calls 11216->11217 11218 4fd387 _wparse_cmdline 11217->11218 11218->11215 11220 4fd0f5 _wcslen 11219->11220 11224 4fd0ed 11219->11224 11221 4fc937 __calloc_crt 66 API calls 11220->11221 11227 4fd119 _wcslen 11221->11227 11222 4fd16f 11223 4f8f81 _free 66 API calls 11222->11223 11223->11224 11224->11153 11225 4fc937 __calloc_crt 66 API calls 11225->11227 11226 4fd195 11228 4f8f81 _free 66 API calls 11226->11228 11227->11222 11227->11224 11227->11225 11227->11226 11229 502515 __NMSG_WRITE 66 API calls 11227->11229 11230 4fd1ac 11227->11230 11228->11224 11229->11227 11231 5003e1 __invoke_watson 10 API calls 11230->11231 11232 4fd1b8 11231->11232 11232->11153 11235 4fcb0e __IsNonwritableInCurrentImage 11233->11235 11284 5020d5 11235->11284 11236 4fcb2c __initterm_e 11237 4f91b1 __cinit 76 API calls 11236->11237 11238 4fcb4d __IsNonwritableInCurrentImage 11236->11238 11237->11238 11238->11157 11287 4f1020 11239->11287 11242 4f226d IsDebuggerPresent 11245 4f2277 11242->11245 11246 4f2266 ExitProcess 11242->11246 11243 4f2252 GetLastError 11243->11242 11244 4f225f CloseHandle 11243->11244 11244->11246 11368 4f7529 11245->11368 11249 4f2290 Sleep 11249->11249 11251 4f88fd 11250->11251 11252 4f8902 11250->11252 11253 4fcf14 __FF_MSGBANNER 66 API calls 11251->11253 11254 4fcd65 __NMSG_WRITE 66 API calls 11252->11254 11253->11252 11255 4f890a 11254->11255 11256 4fca7f _malloc 3 API calls 11255->11256 11257 4f8914 11256->11257 11257->11134 11259 4fd705 11258->11259 11260 4fd6f6 DecodePointer 11258->11260 11261 4fd716 TlsFree 11259->11261 11262 4fd724 11259->11262 11260->11259 11261->11262 11263 5007e2 DeleteCriticalSection 11262->11263 11264 5007fa 11262->11264 11265 4f8f81 _free 66 API calls 11263->11265 11266 4fd9b8 11264->11266 11267 50080c DeleteCriticalSection 11264->11267 11265->11262 11266->11138 11267->11264 11277 4fd6a6 EncodePointer 11268->11277 11270 4fcab1 __init_pointers __initp_misc_winsig 11278 4fef99 EncodePointer 11270->11278 11272 4fcad7 EncodePointer EncodePointer EncodePointer EncodePointer 11273 50077c 11272->11273 11274 500787 11273->11274 11275 500791 InitializeCriticalSectionAndSpinCount 11274->11275 11276 4fdaa9 11274->11276 11275->11274 11275->11276 11276->11182 11276->11183 11277->11270 11278->11272 11283 4fc8fb 11279->11283 11280 4fa7f1 _malloc 65 API calls 11280->11283 11281 4fc931 11281->11211 11282 4fc912 Sleep 11282->11283 11283->11280 11283->11281 11283->11282 11285 5020db EncodePointer 11284->11285 11285->11285 11286 5020f5 11285->11286 11286->11236 11410 4f1000 LoadLibraryA 11287->11410 11289 4f1033 11290 4f1000 2 API calls 11289->11290 11291 4f1043 11290->11291 11292 4f1000 2 API calls 11291->11292 11293 4f1058 11292->11293 11294 4f1000 2 API calls 11293->11294 11295 4f1068 11294->11295 11296 4f1000 2 API calls 11295->11296 11297 4f1078 11296->11297 11298 4f1000 2 API calls 11297->11298 11299 4f1088 11298->11299 11300 4f1000 2 API calls 11299->11300 11301 4f1098 11300->11301 11302 4f1000 2 API calls 11301->11302 11303 4f10a8 11302->11303 11304 4f1000 2 API calls 11303->11304 11305 4f10bb 11304->11305 11306 4f1000 2 API calls 11305->11306 11307 4f10d0 11306->11307 11308 4f1000 2 API calls 11307->11308 11309 4f10e0 11308->11309 11310 4f1000 2 API calls 11309->11310 11311 4f10f0 11310->11311 11312 4f1000 2 API calls 11311->11312 11313 4f1100 11312->11313 11314 4f1000 2 API calls 11313->11314 11315 4f1110 11314->11315 11316 4f1000 2 API calls 11315->11316 11317 4f1120 11316->11317 11318 4f1000 2 API calls 11317->11318 11319 4f1130 11318->11319 11320 4f1000 2 API calls 11319->11320 11321 4f1143 11320->11321 11322 4f1000 2 API calls 11321->11322 11323 4f1153 11322->11323 11324 4f1000 2 API calls 11323->11324 11325 4f1163 11324->11325 11326 4f1000 2 API calls 11325->11326 11327 4f1173 11326->11327 11328 4f1000 2 API calls 11327->11328 11329 4f1183 11328->11329 11330 4f1000 2 API calls 11329->11330 11331 4f1193 11330->11331 11332 4f1000 2 API calls 11331->11332 11333 4f11a3 11332->11333 11334 4f1000 2 API calls 11333->11334 11335 4f11b3 11334->11335 11336 4f1000 2 API calls 11335->11336 11337 4f11c6 11336->11337 11338 4f1000 2 API calls 11337->11338 11339 4f11d6 11338->11339 11340 4f1000 2 API calls 11339->11340 11341 4f11ea 11340->11341 11342 4f1000 2 API calls 11341->11342 11343 4f11fe 11342->11343 11344 4f1000 2 API calls 11343->11344 11345 4f120e 11344->11345 11346 4f1000 2 API calls 11345->11346 11347 4f121e 11346->11347 11348 4f1000 2 API calls 11347->11348 11349 4f122e 11348->11349 11350 4f1000 2 API calls 11349->11350 11351 4f123e 11350->11351 11352 4f1000 2 API calls 11351->11352 11353 4f1251 11352->11353 11354 4f1000 2 API calls 11353->11354 11355 4f1266 11354->11355 11356 4f1000 2 API calls 11355->11356 11357 4f1276 11356->11357 11358 4f1000 2 API calls 11357->11358 11359 4f1286 11358->11359 11360 4f1000 2 API calls 11359->11360 11361 4f1296 11360->11361 11362 4f1000 2 API calls 11361->11362 11363 4f12a6 11362->11363 11364 4f1000 2 API calls 11363->11364 11365 4f12b6 11364->11365 11366 4f1000 2 API calls 11365->11366 11367 4f12c6 CreateMutexA 11366->11367 11367->11242 11367->11243 11413 4f97f5 11368->11413 11370 4f7538 GetModuleFileNameW 11414 4f7838 11370->11414 11374 4f756e 11375 4f7584 SHGetFolderPathW 11374->11375 11376 4f76d3 11375->11376 11377 4f75a0 11375->11377 11456 4f983f 11376->11456 11434 4f22c3 11377->11434 11381 4f227c CreateThread 11381->11249 11602 4f19df 11381->11602 11382 4f22c3 77 API calls 11383 4f75c3 11382->11383 11438 4f73c3 11383->11438 11385 4f75dc 11446 4f7e83 11385->11446 11387 4f7650 11388 4f7838 77 API calls 11387->11388 11389 4f7666 11388->11389 11453 4f7c18 11389->11453 11391 4f76a8 CopyFileW 11393 4f76bc Sleep 11391->11393 11394 4f7701 11391->11394 11392 4f767f 11392->11391 11396 4f744f 80 API calls 11393->11396 11395 4f22c3 77 API calls 11394->11395 11397 4f7711 11395->11397 11396->11376 11398 4f22c3 77 API calls 11397->11398 11399 4f7725 11398->11399 11400 4f73c3 77 API calls 11399->11400 11401 4f773e 11400->11401 11402 4f7e83 77 API calls 11401->11402 11403 4f77af 11402->11403 11459 4f7c3e 11403->11459 11405 4f77cc 11406 4f77e7 MoveFileW 11405->11406 11407 4f77e1 11405->11407 11408 4f744f 80 API calls 11406->11408 11407->11406 11409 4f7801 11408->11409 11409->11376 11411 4f101c 11410->11411 11412 4f1010 GetProcAddress 11410->11412 11411->11289 11412->11289 11413->11370 11415 4f7854 11414->11415 11415->11415 11467 4f7958 11415->11467 11417 4f755e 11418 4f744f 11417->11418 11419 4f745b __EH_prolog3_GS 11418->11419 11420 4f22c3 77 API calls 11419->11420 11421 4f746e 11420->11421 11422 4f22c3 77 API calls 11421->11422 11423 4f747f 11422->11423 11424 4f73c3 77 API calls 11423->11424 11425 4f7492 11424->11425 11426 4f74b6 RegOpenKeyExA 11425->11426 11427 4f74e3 RegSetValueExW 11426->11427 11431 4f74cf 11426->11431 11429 4f750c RegCloseKey 11427->11429 11430 4f7525 11427->11430 11429->11431 11430->11429 11432 4f983f 5 API calls 11431->11432 11433 4f74e2 11432->11433 11433->11374 11435 4f22da 11434->11435 11435->11435 11521 4f255b 11435->11521 11437 4f22ed 11437->11382 11439 4f73cf __EH_prolog3_GS 11438->11439 11561 4f7399 11439->11561 11443 4f73ef 11444 4f983f 5 API calls 11443->11444 11445 4f744e 11444->11445 11445->11385 11447 4f7e8f __EH_prolog3_catch 11446->11447 11581 4f7d19 11447->11581 11449 4f7f19 std::locale::_Locimp::~_Locimp 11449->11387 11450 4f8329 std::_Xinvalid_argument 67 API calls 11452 4f7e9f 11450->11452 11451 4f7a44 77 API calls 11451->11452 11452->11449 11452->11450 11452->11451 11585 4f7d4e 11453->11585 11455 4f7c2e 11455->11392 11457 4f8a8f CatchGuardHandler 5 API calls 11456->11457 11458 4f9849 11457->11458 11458->11458 11460 4f7c4a __EH_prolog3 11459->11460 11461 4f7d19 77 API calls 11460->11461 11462 4f7c8a 11461->11462 11593 4f7deb 11462->11593 11464 4f7cab 11465 4f7d4e 77 API calls 11464->11465 11466 4f7cb6 std::locale::_Locimp::~_Locimp 11465->11466 11466->11405 11468 4f796a 11467->11468 11469 4f796e 11468->11469 11470 4f798b 11468->11470 11474 4f787e 11469->11474 11485 4f7a44 11470->11485 11473 4f7989 _memmove 11473->11417 11475 4f789c 11474->11475 11476 4f7892 11474->11476 11478 4f78aa 11475->11478 11479 4f78c1 11475->11479 11491 4f8376 11476->11491 11498 4f79d3 11478->11498 11481 4f7a44 77 API calls 11479->11481 11484 4f78bf _memmove 11481->11484 11482 4f78b5 11483 4f79d3 67 API calls 11482->11483 11483->11484 11484->11473 11486 4f7a52 11485->11486 11488 4f7a5c 11485->11488 11502 4f8329 11486->11502 11490 4f7a6d 11488->11490 11509 4f7ab0 11488->11509 11490->11473 11492 4f8b26 std::exception::exception 66 API calls 11491->11492 11493 4f8390 11492->11493 11494 4f935c __CxxThrowException@8 RaiseException 11493->11494 11495 4f83a5 11494->11495 11496 4f8bd2 std::exception::exception 66 API calls 11495->11496 11497 4f83b6 11496->11497 11497->11475 11499 4f79dd 11498->11499 11501 4f79e7 _memmove 11498->11501 11500 4f8376 std::_Xinvalid_argument 67 API calls 11499->11500 11500->11501 11501->11482 11503 4f8b26 std::exception::exception 66 API calls 11502->11503 11504 4f8343 11503->11504 11505 4f935c __CxxThrowException@8 RaiseException 11504->11505 11506 4f8358 11505->11506 11507 4f8bd2 std::exception::exception 66 API calls 11506->11507 11508 4f8369 11507->11508 11508->11488 11510 4f7abc __EH_prolog3_catch 11509->11510 11513 4f7bcf 11510->11513 11512 4f7b08 std::locale::_Locimp::~_Locimp _memmove 11512->11490 11514 4f7bdb 11513->11514 11515 4f7c16 11513->11515 11516 4f92dc std::locale::_Init 77 API calls 11514->11516 11518 4f7bec 11514->11518 11515->11512 11516->11518 11517 4f8b26 std::exception::exception 66 API calls 11519 4f7c01 11517->11519 11518->11515 11518->11517 11520 4f935c __CxxThrowException@8 RaiseException 11519->11520 11520->11515 11522 4f25a6 11521->11522 11525 4f2568 11521->11525 11539 4f26d9 11522->11539 11524 4f25a4 _memmove 11524->11437 11525->11522 11526 4f258e 11525->11526 11528 4f2495 11526->11528 11529 4f24a6 11528->11529 11530 4f24b0 11528->11530 11531 4f8376 std::_Xinvalid_argument 67 API calls 11529->11531 11532 4f24d8 11530->11532 11533 4f24c0 11530->11533 11531->11530 11535 4f26d9 77 API calls 11532->11535 11545 4f266f 11533->11545 11538 4f24d6 _memmove 11535->11538 11536 4f24cc 11537 4f266f 67 API calls 11536->11537 11537->11538 11538->11524 11540 4f26de 11539->11540 11542 4f26e8 11539->11542 11541 4f8329 std::_Xinvalid_argument 67 API calls 11540->11541 11541->11542 11543 4f26f9 11542->11543 11549 4f2749 11542->11549 11543->11524 11546 4f2679 11545->11546 11548 4f2683 _memmove 11545->11548 11547 4f8376 std::_Xinvalid_argument 67 API calls 11546->11547 11547->11548 11548->11536 11550 4f2755 __EH_prolog3_catch 11549->11550 11553 4f2823 11550->11553 11552 4f279c std::locale::_Locimp::~_Locimp _memmove 11552->11543 11554 4f2868 11553->11554 11555 4f2830 11553->11555 11554->11552 11556 4f283e 11555->11556 11558 4f92dc std::locale::_Init 77 API calls 11555->11558 11556->11554 11557 4f8b26 std::exception::exception 66 API calls 11556->11557 11559 4f2853 11557->11559 11558->11556 11560 4f935c __CxxThrowException@8 RaiseException 11559->11560 11560->11554 11562 4f73ad 11561->11562 11571 4f7219 11562->11571 11564 4f73bc 11565 4f41b6 11564->11565 11566 4f41cf 11565->11566 11567 4f41d9 11565->11567 11568 4f8329 std::_Xinvalid_argument 67 API calls 11566->11568 11569 4f26d9 77 API calls 11567->11569 11568->11567 11570 4f41e0 11569->11570 11570->11443 11572 4f7225 __EH_prolog3_GS 11571->11572 11573 4f7238 11572->11573 11576 4f7249 11572->11576 11574 4f22c3 77 API calls 11573->11574 11579 4f7242 11574->11579 11575 4f7391 11575->11564 11576->11575 11577 4f41b6 77 API calls 11576->11577 11577->11579 11578 4f983f 5 API calls 11580 4f7377 11578->11580 11579->11578 11580->11564 11582 4f7d27 11581->11582 11584 4f7d35 11581->11584 11583 4f7a44 77 API calls 11582->11583 11582->11584 11583->11584 11584->11452 11586 4f7d5f 11585->11586 11587 4f7d69 11585->11587 11588 4f8376 std::_Xinvalid_argument 67 API calls 11586->11588 11589 4f7d88 11587->11589 11590 4f8329 std::_Xinvalid_argument 67 API calls 11587->11590 11588->11587 11591 4f7a44 77 API calls 11589->11591 11592 4f7d99 _memmove 11589->11592 11590->11589 11591->11592 11592->11455 11594 4f7dfb 11593->11594 11595 4f7dff 11594->11595 11596 4f7e1a 11594->11596 11599 4f7d4e 77 API calls 11595->11599 11597 4f8329 std::_Xinvalid_argument 67 API calls 11596->11597 11598 4f7e30 11596->11598 11597->11598 11600 4f7a44 77 API calls 11598->11600 11601 4f7e18 _memmove 11598->11601 11599->11601 11600->11601 11601->11464 11624 4f17ca LoadLibraryA 11602->11624 11604 4f1a20 11605 4f17ca 2 API calls 11604->11605 11606 4f1a31 11605->11606 11607 4f17ca 2 API calls 11606->11607 11608 4f1a42 11607->11608 11609 4f17ca 2 API calls 11608->11609 11610 4f1a53 11609->11610 11611 4f17ca 2 API calls 11610->11611 11620 4f1a64 11611->11620 11613 4f229d 77 API calls 11623 4f1ac3 11613->11623 11614 4f23a4 81 API calls 11614->11620 11615 4f184c 7 API calls 11615->11623 11616 4f229d 77 API calls 11616->11620 11617 4f22c3 77 API calls 11617->11623 11618 4f23a4 81 API calls 11618->11623 11619 4f197a 116 API calls 11619->11623 11620->11614 11620->11616 11621 4f18bf 116 API calls 11620->11621 11622 4f2210 Sleep 11620->11622 11620->11623 11627 4f17ec OpenClipboard 11620->11627 11621->11620 11622->11620 11623->11613 11623->11615 11623->11617 11623->11618 11623->11619 11623->11620 11623->11622 11625 4f17dc GetProcAddress 11624->11625 11626 4f17e8 11624->11626 11625->11604 11626->11604 11628 4f183a 11627->11628 11629 4f1804 GetClipboardData 11627->11629 11637 4f229d 11628->11637 11631 4f1827 CloseClipboard 11629->11631 11632 4f1813 GlobalLock 11629->11632 11631->11628 11634 4f1832 11631->11634 11632->11631 11633 4f181e GlobalUnlock 11632->11633 11633->11631 11635 4f22c3 77 API calls 11634->11635 11636 4f1838 11635->11636 11636->11620 11638 4f2495 77 API calls 11637->11638 11639 4f22bc 11638->11639 11639->11636 10248 503b23 10253 4f234f 10248->10253 10250 503b33 10261 4f91b1 10250->10261 10254 4f235b __EH_prolog3 10253->10254 10264 4f242a 10254->10264 10258 4f2371 10269 4f296f 10258->10269 10260 4f239a std::locale::_Locimp::~_Locimp 10260->10250 11087 4f9175 10261->11087 10263 4f91be 10281 4f829a 10264->10281 10266 4f2436 10297 4f1461 10266->10297 10667 4f2ac1 10269->10667 10271 4f2989 10670 4f2b41 10271->10670 10273 4f2993 10273->10260 10274 4f7f85 11084 4f7f21 10274->11084 10277 4f935c __CxxThrowException@8 RaiseException 10278 4f7fa6 10277->10278 10279 4f8bd2 std::exception::exception 66 API calls 10278->10279 10280 4f7fb9 10279->10280 10280->10258 10282 4f82a6 __EH_prolog3 10281->10282 10283 4f8321 std::locale::_Locimp::~_Locimp 10282->10283 10302 4f843e 10282->10302 10283->10266 10286 4f830b 10331 4f8466 10286->10331 10290 4f82de 10321 4f805f 10290->10321 10295 4f82fe 10296 4f1461 std::locale::facet::_Incref 2 API calls 10295->10296 10296->10286 10298 4f843e std::_Lockit::_Lockit EnterCriticalSection 10297->10298 10299 4f1472 10298->10299 10300 4f8466 _Fac_tidy LeaveCriticalSection 10299->10300 10301 4f1486 10300->10301 10301->10258 10301->10274 10303 4f82bc 10302->10303 10304 4f8450 10302->10304 10303->10286 10306 4f92dc 10303->10306 10335 4f88cf EnterCriticalSection 10304->10335 10308 4f92e6 10306->10308 10309 4f82d1 10308->10309 10314 4f9302 std::exception::exception 10308->10314 10336 4fa7f1 10308->10336 10353 4fe110 DecodePointer 10308->10353 10309->10290 10318 4f81f7 10309->10318 10311 4f9340 10355 4f8bd2 10311->10355 10314->10311 10316 4f91b1 __cinit 76 API calls 10314->10316 10316->10311 10317 4f935b 10319 4f8152 _Yarn 66 API calls 10318->10319 10320 4f822f 10319->10320 10320->10290 10322 4f807e 10321->10322 10323 4f806d 10321->10323 10325 4f8152 10322->10325 10604 4f8852 10323->10604 10326 4f8164 10325->10326 10330 4f818f _memmove 10325->10330 10327 4f816e 10326->10327 10328 4f8f81 _free 66 API calls 10326->10328 10329 4fa7f1 _malloc 66 API calls 10327->10329 10327->10330 10328->10327 10329->10330 10330->10295 10332 4f846d 10331->10332 10333 4f847b 10331->10333 10666 4f88df LeaveCriticalSection 10332->10666 10333->10283 10335->10303 10337 4fa86e 10336->10337 10350 4fa7ff 10336->10350 10338 4fe110 _malloc DecodePointer 10337->10338 10339 4fa874 10338->10339 10341 4fa8c7 __strnicmp_l 65 API calls 10339->10341 10340 4fa80a 10340->10350 10361 4fcf14 10340->10361 10370 4fcd65 10340->10370 10394 4fca7f 10340->10394 10344 4fa866 10341->10344 10343 4fa82d RtlAllocateHeap 10343->10344 10343->10350 10344->10308 10346 4fa85a 10397 4fa8c7 10346->10397 10348 4fe110 _malloc DecodePointer 10348->10350 10350->10340 10350->10343 10350->10346 10350->10348 10351 4fa858 10350->10351 10352 4fa8c7 __strnicmp_l 65 API calls 10351->10352 10352->10344 10354 4fe125 10353->10354 10354->10308 10579 4f8b4d 10355->10579 10358 4f935c 10359 4f9385 10358->10359 10360 4f9391 RaiseException 10358->10360 10359->10360 10360->10317 10400 502578 10361->10400 10363 4fcf1b 10364 502578 __NMSG_WRITE 66 API calls 10363->10364 10366 4fcf28 10363->10366 10364->10366 10365 4fcd65 __NMSG_WRITE 66 API calls 10367 4fcf40 10365->10367 10366->10365 10368 4fcf4a 10366->10368 10369 4fcd65 __NMSG_WRITE 66 API calls 10367->10369 10368->10340 10369->10368 10371 4fcd86 __NMSG_WRITE 10370->10371 10373 502578 __NMSG_WRITE 63 API calls 10371->10373 10393 4fcea2 10371->10393 10375 4fcda0 10373->10375 10374 4fcf12 10374->10340 10376 4fceb1 GetStdHandle 10375->10376 10377 502578 __NMSG_WRITE 63 API calls 10375->10377 10380 4fcebf _strlen 10376->10380 10376->10393 10378 4fcdb1 10377->10378 10378->10376 10379 4fcdc3 10378->10379 10379->10393 10419 502515 10379->10419 10382 4fcef5 WriteFile 10380->10382 10380->10393 10382->10393 10384 4fcdef GetModuleFileNameW 10385 4fce10 10384->10385 10389 4fce1c _wcslen 10384->10389 10386 502515 __NMSG_WRITE 63 API calls 10385->10386 10386->10389 10387 5003e1 __invoke_watson 10 API calls 10387->10389 10388 5023b8 63 API calls __NMSG_WRITE 10388->10389 10389->10387 10389->10388 10391 4fce92 10389->10391 10428 50242d 10389->10428 10437 50224c 10391->10437 10455 4f8a8f 10393->10455 10465 4fca54 GetModuleHandleW 10394->10465 10468 4fd7dd GetLastError 10397->10468 10399 4fa8cc 10399->10351 10401 502584 10400->10401 10402 50258e 10401->10402 10403 4fa8c7 __strnicmp_l 66 API calls 10401->10403 10402->10363 10404 5025a7 10403->10404 10407 500433 10404->10407 10410 500406 DecodePointer 10407->10410 10411 50041b 10410->10411 10416 5003e1 10411->10416 10413 500432 10414 500406 __strnicmp_l 10 API calls 10413->10414 10415 50043f 10414->10415 10415->10363 10417 5002b8 __call_reportfault 8 API calls 10416->10417 10418 5003f3 GetCurrentProcess TerminateProcess 10417->10418 10418->10413 10420 502523 10419->10420 10422 50252a 10419->10422 10420->10422 10425 50254b 10420->10425 10421 4fa8c7 __strnicmp_l 66 API calls 10423 50252f 10421->10423 10422->10421 10424 500433 __strnicmp_l 11 API calls 10423->10424 10426 4fcde4 10424->10426 10425->10426 10427 4fa8c7 __strnicmp_l 66 API calls 10425->10427 10426->10384 10426->10389 10427->10423 10432 50243f 10428->10432 10429 502443 10430 4fa8c7 __strnicmp_l 66 API calls 10429->10430 10431 502448 10429->10431 10436 50245f 10430->10436 10431->10389 10432->10429 10432->10431 10434 502486 10432->10434 10433 500433 __strnicmp_l 11 API calls 10433->10431 10434->10431 10435 4fa8c7 __strnicmp_l 66 API calls 10434->10435 10435->10436 10436->10433 10463 4fd6a6 EncodePointer 10437->10463 10439 502272 10440 502282 LoadLibraryW 10439->10440 10441 5022ff 10439->10441 10442 502297 GetProcAddress 10440->10442 10450 502397 10440->10450 10446 502319 DecodePointer DecodePointer 10441->10446 10453 50232c 10441->10453 10445 5022ad 7 API calls 10442->10445 10442->10450 10443 502362 DecodePointer 10444 50238b DecodePointer 10443->10444 10448 502369 10443->10448 10444->10450 10445->10441 10449 5022ef GetProcAddress EncodePointer 10445->10449 10446->10453 10447 4f8a8f CatchGuardHandler 5 API calls 10451 5023b6 10447->10451 10448->10444 10452 50237c DecodePointer 10448->10452 10449->10441 10450->10447 10451->10393 10452->10444 10454 50234f 10452->10454 10453->10443 10453->10444 10453->10454 10454->10444 10456 4f8a99 IsDebuggerPresent 10455->10456 10457 4f8a97 10455->10457 10464 502712 10456->10464 10457->10374 10460 4fde97 SetUnhandledExceptionFilter UnhandledExceptionFilter 10461 4fdebc GetCurrentProcess TerminateProcess 10460->10461 10462 4fdeb4 __call_reportfault 10460->10462 10461->10374 10462->10461 10463->10439 10464->10460 10466 4fca78 ExitProcess 10465->10466 10467 4fca68 GetProcAddress 10465->10467 10467->10466 10482 4fd6b8 TlsGetValue 10468->10482 10471 4fd84a SetLastError 10471->10399 10474 4fd810 DecodePointer 10475 4fd825 10474->10475 10476 4fd829 10475->10476 10477 4fd841 10475->10477 10491 4fd729 10476->10491 10504 4f8f81 10477->10504 10480 4fd831 GetCurrentThreadId 10480->10471 10481 4fd847 10481->10471 10483 4fd6cd DecodePointer TlsSetValue 10482->10483 10484 4fd6e8 10482->10484 10483->10484 10484->10471 10485 4fc937 10484->10485 10488 4fc940 10485->10488 10487 4fc97d 10487->10471 10487->10474 10488->10487 10489 4fc95e Sleep 10488->10489 10510 501e3f 10488->10510 10490 4fc973 10489->10490 10490->10487 10490->10488 10519 4fdb40 10491->10519 10493 4fd735 GetModuleHandleW 10520 5008f6 10493->10520 10495 4fd773 InterlockedIncrement 10527 4fd7cb 10495->10527 10498 5008f6 __lock 64 API calls 10499 4fd794 10498->10499 10530 500443 InterlockedIncrement 10499->10530 10501 4fd7b2 10542 4fd7d4 10501->10542 10503 4fd7bf ___BuildCatchObject 10503->10480 10505 4f8f8c HeapFree 10504->10505 10506 4f8fb5 _free 10504->10506 10505->10506 10507 4f8fa1 10505->10507 10506->10481 10508 4fa8c7 __strnicmp_l 64 API calls 10507->10508 10509 4f8fa7 GetLastError 10508->10509 10509->10506 10511 501e4b 10510->10511 10517 501e66 10510->10517 10512 501e57 10511->10512 10511->10517 10513 4fa8c7 __strnicmp_l 65 API calls 10512->10513 10515 501e5c 10513->10515 10514 501e79 HeapAlloc 10516 501ea0 10514->10516 10514->10517 10515->10488 10516->10488 10517->10514 10517->10516 10518 4fe110 _malloc DecodePointer 10517->10518 10518->10517 10519->10493 10521 50090b 10520->10521 10522 50091e EnterCriticalSection 10520->10522 10545 500834 10521->10545 10522->10495 10524 500911 10524->10522 10570 4fcd21 10524->10570 10577 50081d LeaveCriticalSection 10527->10577 10529 4fd78d 10529->10498 10531 500461 InterlockedIncrement 10530->10531 10532 500464 10530->10532 10531->10532 10533 500471 10532->10533 10534 50046e InterlockedIncrement 10532->10534 10535 50047b InterlockedIncrement 10533->10535 10536 50047e 10533->10536 10534->10533 10535->10536 10537 500488 InterlockedIncrement 10536->10537 10539 50048b 10536->10539 10537->10539 10538 5004a4 InterlockedIncrement 10538->10539 10539->10538 10540 5004b4 InterlockedIncrement 10539->10540 10541 5004bf InterlockedIncrement 10539->10541 10540->10539 10541->10501 10578 50081d LeaveCriticalSection 10542->10578 10544 4fd7db 10544->10503 10546 500840 ___BuildCatchObject 10545->10546 10547 4fcf14 __FF_MSGBANNER 65 API calls 10546->10547 10548 500866 10546->10548 10549 500855 10547->10549 10550 4fc8f2 __malloc_crt 65 API calls 10548->10550 10553 500876 ___BuildCatchObject 10548->10553 10551 4fcd65 __NMSG_WRITE 65 API calls 10549->10551 10552 500881 10550->10552 10554 50085c 10551->10554 10555 500897 10552->10555 10556 500888 10552->10556 10553->10524 10558 4fca7f _malloc GetModuleHandleW GetProcAddress ExitProcess 10554->10558 10557 5008f6 __lock 65 API calls 10555->10557 10559 4fa8c7 __strnicmp_l 65 API calls 10556->10559 10560 50089e 10557->10560 10558->10548 10559->10553 10561 5008d1 10560->10561 10562 5008a6 InitializeCriticalSectionAndSpinCount 10560->10562 10565 4f8f81 _free 65 API calls 10561->10565 10563 5008b6 10562->10563 10564 5008c2 10562->10564 10566 4f8f81 _free 65 API calls 10563->10566 10568 5008ed __mtinitlocknum LeaveCriticalSection 10564->10568 10565->10564 10567 5008bc 10566->10567 10569 4fa8c7 __strnicmp_l 65 API calls 10567->10569 10568->10553 10569->10564 10571 4fcf14 __FF_MSGBANNER 66 API calls 10570->10571 10572 4fcd2b 10571->10572 10573 4fcd65 __NMSG_WRITE 66 API calls 10572->10573 10574 4fcd33 10573->10574 10575 4fcced _raise 66 API calls 10574->10575 10576 4fcd3e 10575->10576 10577->10529 10578->10544 10580 4f8b5d 10579->10580 10583 4f8b72 10579->10583 10585 4f8b08 10580->10585 10583->10358 10586 4f8b1b 10585->10586 10587 4f8b13 10585->10587 10586->10583 10589 4f8ac8 10586->10589 10588 4f8f81 _free 66 API calls 10587->10588 10588->10586 10590 4f8ad6 _strlen 10589->10590 10593 4f8afb 10589->10593 10591 4fa7f1 _malloc 66 API calls 10590->10591 10592 4f8ae8 10591->10592 10592->10593 10595 4fded0 10592->10595 10593->10583 10596 4fdede 10595->10596 10597 4fdee5 10595->10597 10596->10597 10599 4fdf03 10596->10599 10598 4fa8c7 __strnicmp_l 66 API calls 10597->10598 10603 4fdeea 10598->10603 10601 4fdef4 10599->10601 10602 4fa8c7 __strnicmp_l 66 API calls 10599->10602 10600 500433 __strnicmp_l 11 API calls 10600->10601 10601->10593 10602->10603 10603->10600 10605 4f8866 EncodePointer 10604->10605 10606 4f8860 10604->10606 10605->10322 10613 501f16 DecodePointer 10606->10613 10608 4fc9d6 10614 4fcced 10608->10614 10610 4fca40 10610->10322 10613->10608 10623 4fcb97 10614->10623 10616 4fca03 10616->10610 10617 4fef15 10616->10617 10618 4fef21 ___BuildCatchObject 10617->10618 10653 4fd856 10618->10653 10622 4fef48 ___BuildCatchObject 10622->10610 10624 4fcba3 ___BuildCatchObject 10623->10624 10625 5008f6 __lock 61 API calls 10624->10625 10626 4fcbaa 10625->10626 10628 4fcbd5 DecodePointer 10626->10628 10632 4fcc54 10626->10632 10630 4fcbec DecodePointer 10628->10630 10628->10632 10637 4fcbff 10630->10637 10631 4fccd1 ___BuildCatchObject 10631->10616 10646 4fccc2 10632->10646 10635 4fccb9 10636 4fca7f _malloc 3 API calls 10635->10636 10638 4fccc2 10635->10638 10636->10638 10637->10632 10640 4fcc16 DecodePointer 10637->10640 10643 4fcc25 DecodePointer DecodePointer 10637->10643 10644 4fd6a6 EncodePointer 10637->10644 10639 4fcccf 10638->10639 10651 50081d LeaveCriticalSection 10638->10651 10639->10616 10645 4fd6a6 EncodePointer 10640->10645 10643->10637 10644->10637 10645->10637 10647 4fccc8 10646->10647 10648 4fcca2 10646->10648 10652 50081d LeaveCriticalSection 10647->10652 10648->10631 10650 50081d LeaveCriticalSection 10648->10650 10650->10635 10651->10639 10652->10648 10654 4fd7dd __getptd_noexit 66 API calls 10653->10654 10655 4fd85e 10654->10655 10656 4fd86b 10655->10656 10657 4fcd21 __amsg_exit 66 API calls 10655->10657 10658 4fc9d1 10656->10658 10657->10656 10665 501f16 DecodePointer 10658->10665 10660 4fc9d6 10661 4fcced _raise 66 API calls 10660->10661 10663 4fca03 10661->10663 10662 4fca40 10662->10622 10663->10662 10664 4fef15 CallUnexpected 67 API calls 10663->10664 10664->10662 10665->10660 10666->10333 10668 4f92dc std::locale::_Init 77 API calls 10667->10668 10669 4f2ae5 10668->10669 10669->10271 10671 4f2b4d __EH_prolog3_catch 10670->10671 10682 4f33b8 10671->10682 10673 4f2b5f 10685 4f3270 10673->10685 10676 4f2b76 10699 4f335e 10676->10699 10677 4f7f85 67 API calls 10677->10676 10679 4f2b7d 10703 4f40cc 10679->10703 10681 4f2b85 std::locale::_Locimp::~_Locimp 10681->10273 10683 4f92dc std::locale::_Init 77 API calls 10682->10683 10684 4f33c2 10683->10684 10684->10673 10706 4f3e53 10685->10706 10688 4f32ad 10716 4f4021 10688->10716 10689 4f2b68 10689->10676 10689->10677 10691 4f40cc 77 API calls 10692 4f32a5 10691->10692 10693 4f335e 77 API calls 10692->10693 10693->10688 10694 4f3e53 114 API calls 10696 4f32ba 10694->10696 10695 4f40cc 77 API calls 10695->10696 10696->10689 10696->10694 10696->10695 10697 4f335e 77 API calls 10696->10697 10698 4f92dc std::locale::_Init 77 API calls 10696->10698 10697->10696 10698->10696 10700 4f336a 10699->10700 10701 4f92dc std::locale::_Init 77 API calls 10700->10701 10702 4f338b 10701->10702 10702->10679 10704 4f92dc std::locale::_Init 77 API calls 10703->10704 10705 4f40d6 10704->10705 10705->10681 10707 4f328c 10706->10707 10714 4f3e68 10706->10714 10707->10688 10707->10689 10707->10691 10708 4f40cc 77 API calls 10708->10714 10709 4f7f85 67 API calls 10709->10714 10714->10707 10714->10708 10714->10709 10721 4f4fc3 10714->10721 10732 4f4d37 10714->10732 10748 4f4cee 10714->10748 10755 4f4e09 10714->10755 10782 4f4ed7 10714->10782 10717 4f92dc std::locale::_Init 77 API calls 10716->10717 10718 4f402d 10717->10718 10719 4f92dc std::locale::_Init 77 API calls 10718->10719 10720 4f4061 10719->10720 10720->10696 10722 4f4fd5 10721->10722 10723 4f92dc std::locale::_Init 77 API calls 10722->10723 10724 4f4fe2 10722->10724 10723->10724 10725 4f502d 10724->10725 10726 4f5019 10724->10726 10730 4f5021 10725->10730 10806 4f33f5 10725->10806 10798 4f354d 10726->10798 10792 4f5076 10730->10792 10733 4f4d48 10732->10733 10734 4f4dd0 10732->10734 10733->10734 10737 4f4d5a 10733->10737 10967 4f5720 10734->10967 10736 4f4dd7 10738 4f4d70 10736->10738 10739 4f4dea 10736->10739 10740 4f4d63 10737->10740 10743 4f4d72 10737->10743 10741 4f4fc3 114 API calls 10738->10741 10745 4f4d9d 10739->10745 10982 4f55c4 10739->10982 10740->10738 10740->10745 10744 4f4de8 10741->10744 10743->10745 10747 4f92dc std::locale::_Init 77 API calls 10743->10747 10744->10714 10745->10744 10746 4f7f85 67 API calls 10745->10746 10746->10744 10747->10745 10749 4f5864 77 API calls 10748->10749 10752 4f4cfc 10749->10752 10750 4f4d27 11020 4f563b 10750->11020 10752->10750 11013 4f58b0 10752->11013 10756 4f4e18 10755->10756 10757 4f4e77 10756->10757 10758 4f4e1e 10756->10758 10768 4f4e2c 10756->10768 10759 4f4e9c 10757->10759 10760 4f4e80 10757->10760 10761 4f7f85 67 API calls 10758->10761 10763 4f4eac 10759->10763 10766 4f7f85 67 API calls 10759->10766 10762 4f40cc 77 API calls 10760->10762 10772 4f4e50 10761->10772 10765 4f4e8b 10762->10765 10764 4f33b8 77 API calls 10763->10764 10767 4f4eb9 10764->10767 10769 4f3270 114 API calls 10765->10769 10766->10763 10770 4f3270 114 API calls 10767->10770 10768->10760 10774 4f4e42 10768->10774 10771 4f4e94 10769->10771 10773 4f4ec2 10770->10773 10775 4f335e 77 API calls 10771->10775 10772->10714 10776 4f335e 77 API calls 10773->10776 10777 4f4e58 10774->10777 10778 4f4e47 10774->10778 10775->10772 10776->10772 10777->10758 10780 4f4e5d 10777->10780 11063 4f5837 10778->11063 10781 4f5837 114 API calls 10780->10781 10781->10772 10784 4f4ef6 10782->10784 10786 4f4ef1 10782->10786 10783 4f4fbf 10783->10714 11076 4f58e2 10784->11076 10786->10783 10786->10784 10787 4f4f34 10786->10787 10788 4f7f85 67 API calls 10786->10788 10790 4f4f3f 10787->10790 10791 4f7f85 67 API calls 10787->10791 10788->10787 10789 4f7f85 67 API calls 10789->10784 10790->10784 10790->10789 10791->10790 10793 4f5050 10792->10793 10794 4f5080 10792->10794 10793->10714 10811 4f91de 10794->10811 10796 4f508e 10796->10793 10832 4f7f52 10796->10832 10799 4f3559 __EH_prolog3 10798->10799 10800 4f357e std::locale::_Locimp::~_Locimp 10799->10800 10836 4f3726 10799->10836 10800->10730 10804 4f3573 10857 4f14cb 10804->10857 10927 4f3516 10806->10927 10808 4f341b 10809 4f8a8f CatchGuardHandler 5 API calls 10808->10809 10810 4f3456 10809->10810 10810->10730 10812 4f91e9 10811->10812 10813 4f91f4 10811->10813 10814 4fa7f1 _malloc 66 API calls 10812->10814 10815 4f91fc 10813->10815 10824 4f9209 10813->10824 10816 4f91f1 10814->10816 10817 4f8f81 _free 66 API calls 10815->10817 10816->10796 10831 4f9204 _free 10817->10831 10818 4f9241 10819 4fe110 _malloc DecodePointer 10818->10819 10821 4f9247 10819->10821 10820 4f9211 HeapReAlloc 10820->10824 10820->10831 10822 4fa8c7 __strnicmp_l 66 API calls 10821->10822 10822->10831 10823 4f9271 10826 4fa8c7 __strnicmp_l 66 API calls 10823->10826 10824->10818 10824->10820 10824->10823 10825 4fe110 _malloc DecodePointer 10824->10825 10828 4f9259 10824->10828 10825->10824 10827 4f9276 GetLastError 10826->10827 10827->10831 10829 4fa8c7 __strnicmp_l 66 API calls 10828->10829 10830 4f925e GetLastError 10829->10830 10830->10831 10831->10796 10833 4f7f6f std::exception::exception 10832->10833 10834 4f935c __CxxThrowException@8 RaiseException 10833->10834 10835 4f7f84 10834->10835 10837 4f1461 std::locale::facet::_Incref 2 API calls 10836->10837 10838 4f3569 10837->10838 10839 4f286c 10838->10839 10840 4f2878 __EH_prolog3 10839->10840 10841 4f843e std::_Lockit::_Lockit EnterCriticalSection 10840->10841 10842 4f2882 10841->10842 10861 4f1430 10842->10861 10844 4f2899 10856 4f28ad 10844->10856 10867 4f1533 10844->10867 10845 4f8466 _Fac_tidy LeaveCriticalSection 10846 4f2902 std::locale::_Locimp::~_Locimp 10845->10846 10846->10804 10848 4f28bd 10849 4f28df 10848->10849 10877 4f8b8d 10848->10877 10851 4f1461 std::locale::facet::_Incref 2 API calls 10849->10851 10853 4f28ef 10851->10853 10880 4f7fe2 10853->10880 10854 4f935c __CxxThrowException@8 RaiseException 10854->10849 10856->10845 10858 4f14d6 10857->10858 10859 4f14d1 10857->10859 10858->10800 10922 4f1489 10859->10922 10862 4f145d 10861->10862 10863 4f1439 10861->10863 10862->10844 10864 4f843e std::_Lockit::_Lockit EnterCriticalSection 10863->10864 10865 4f1443 10864->10865 10866 4f8466 _Fac_tidy LeaveCriticalSection 10865->10866 10866->10862 10868 4f153f __EH_prolog3 10867->10868 10869 4f15bb std::locale::_Locimp::~_Locimp 10868->10869 10870 4f92dc std::locale::_Init 77 API calls 10868->10870 10869->10848 10871 4f1556 10870->10871 10872 4f1595 10871->10872 10883 4f1323 10871->10883 10872->10869 10905 4f139d 10872->10905 10874 4f157c 10893 4f8634 10874->10893 10919 4f8b26 10877->10919 10881 4f92dc std::locale::_Init 77 API calls 10880->10881 10882 4f7fee 10881->10882 10882->10856 10884 4f132f __EH_prolog3 10883->10884 10885 4f843e std::_Lockit::_Lockit EnterCriticalSection 10884->10885 10886 4f133c 10885->10886 10887 4f1388 10886->10887 10888 4f8b26 std::exception::exception 66 API calls 10886->10888 10889 4f81aa std::_Locinfo::_Locinfo_ctor 101 API calls 10887->10889 10890 4f1373 10888->10890 10892 4f1391 std::locale::_Locimp::~_Locimp 10889->10892 10891 4f935c __CxxThrowException@8 RaiseException 10890->10891 10891->10887 10892->10874 10894 4fc578 ____lc_handle_func 74 API calls 10893->10894 10895 4f863f 10894->10895 10896 4fc52c ____lc_codepage_func 74 API calls 10895->10896 10897 4f864c 10896->10897 10898 4fc937 __calloc_crt 66 API calls 10897->10898 10899 4f865b 10898->10899 10900 4f8664 10899->10900 10901 4f8683 10899->10901 10902 4fc7cb ___pctype_func 74 API calls 10900->10902 10903 4fc7cb ___pctype_func 74 API calls 10901->10903 10904 4f866e _memmove 10902->10904 10903->10904 10904->10872 10906 4f13a9 __EH_prolog3 10905->10906 10907 4f8137 std::_Locinfo::_Locinfo_dtor 101 API calls 10906->10907 10908 4f13b9 10907->10908 10909 4f13c7 10908->10909 10910 4f8f81 _free 66 API calls 10908->10910 10911 4f13d9 10909->10911 10913 4f8f81 _free 66 API calls 10909->10913 10910->10909 10912 4f13eb 10911->10912 10914 4f8f81 _free 66 API calls 10911->10914 10915 4f8f81 _free 66 API calls 10912->10915 10917 4f13fd 10912->10917 10913->10911 10914->10912 10915->10917 10916 4f8466 _Fac_tidy LeaveCriticalSection 10918 4f140d std::locale::_Locimp::~_Locimp 10916->10918 10917->10916 10918->10869 10920 4f8ac8 std::exception::_Copy_str 66 API calls 10919->10920 10921 4f28d1 10920->10921 10921->10854 10923 4f843e std::_Lockit::_Lockit EnterCriticalSection 10922->10923 10924 4f149b 10923->10924 10925 4f8466 _Fac_tidy LeaveCriticalSection 10924->10925 10926 4f14be 10925->10926 10926->10858 10928 4f3522 __EH_prolog3 10927->10928 10929 4f3545 std::locale::_Locimp::~_Locimp 10928->10929 10930 4f3726 2 API calls 10928->10930 10929->10808 10931 4f3531 10930->10931 10935 4f4102 10931->10935 10933 4f353c 10934 4f14cb 2 API calls 10933->10934 10934->10929 10936 4f410e __EH_prolog3 10935->10936 10937 4f843e std::_Lockit::_Lockit EnterCriticalSection 10936->10937 10938 4f411a 10937->10938 10939 4f1430 2 API calls 10938->10939 10941 4f4131 10939->10941 10940 4f4144 10942 4f8466 _Fac_tidy LeaveCriticalSection 10940->10942 10941->10940 10953 4f420b 10941->10953 10943 4f4193 std::locale::_Locimp::~_Locimp 10942->10943 10943->10933 10946 4f4170 10948 4f1461 std::locale::facet::_Incref 2 API calls 10946->10948 10947 4f8b8d std::bad_exception::bad_exception 66 API calls 10949 4f4162 10947->10949 10950 4f4180 10948->10950 10951 4f935c __CxxThrowException@8 RaiseException 10949->10951 10952 4f7fe2 std::locale::facet::_Facet_Register 77 API calls 10950->10952 10951->10946 10952->10940 10954 4f4217 __EH_prolog3_GS 10953->10954 10956 4f92dc std::locale::_Init 77 API calls 10954->10956 10961 4f42a4 10954->10961 10955 4f983f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10957 4f4150 10955->10957 10958 4f4235 10956->10958 10957->10946 10957->10947 10959 4f4280 10958->10959 10960 4f14e3 77 API calls 10958->10960 10959->10961 10963 4f139d 102 API calls 10959->10963 10962 4f424d 10960->10962 10961->10955 10964 4f1323 103 API calls 10962->10964 10963->10961 10965 4f426a 10964->10965 10966 4f8511 74 API calls 10965->10966 10966->10959 10968 4f572c 10967->10968 10969 4f5766 10968->10969 10970 4f57b9 10968->10970 10981 4f574a 10968->10981 10973 4f354d 114 API calls 10969->10973 10971 4f5830 10970->10971 10977 4f57c5 10970->10977 10991 4f6260 10971->10991 10975 4f577a 10973->10975 10974 4f5835 10974->10736 10979 4f7f85 67 API calls 10975->10979 10975->10981 10976 4f582b 10976->10736 10980 4f7f85 67 API calls 10977->10980 10977->10981 10978 4f7f85 67 API calls 10978->10976 10979->10981 10980->10981 10981->10976 10981->10978 10995 4f633e 10982->10995 10985 4f55f0 10985->10745 10986 4f5603 11002 4f6510 10986->11002 10990 4f354d 114 API calls 10990->10985 10992 4f6269 10991->10992 10994 4f6276 10991->10994 10993 4f354d 114 API calls 10992->10993 10993->10994 10994->10974 10996 4f55e8 10995->10996 10998 4f6354 10995->10998 10996->10985 10996->10986 10999 4f5864 10996->10999 10997 4f354d 114 API calls 10997->10998 10998->10996 10998->10997 11000 4f92dc std::locale::_Init 77 API calls 10999->11000 11001 4f586e 11000->11001 11001->10986 11004 4f6525 11002->11004 11005 4f560d 11004->11005 11006 4f92dc std::locale::_Init 77 API calls 11004->11006 11007 4f345a 11004->11007 11005->10990 11006->11004 11008 4f3466 11007->11008 11011 4f347e 11007->11011 11009 4f354d 114 API calls 11008->11009 11010 4f346b 11009->11010 11010->11004 11011->11010 11012 4f354d 114 API calls 11011->11012 11012->11010 11014 4f58bf 11013->11014 11015 4f58d3 11013->11015 11014->11015 11016 4f58c6 11014->11016 11038 4f668f 11015->11038 11032 4f6629 11016->11032 11019 4f58d1 11019->10750 11031 4f5645 11020->11031 11021 4f4d33 11021->10714 11022 4f58b0 114 API calls 11022->11031 11023 4f7f85 67 API calls 11023->11031 11024 4f6184 114 API calls 11024->11031 11025 4f5707 11026 4f58b0 114 API calls 11025->11026 11027 4f5715 11026->11027 11029 4f58b0 114 API calls 11027->11029 11028 4f33f5 114 API calls 11028->11031 11029->11021 11031->11021 11031->11022 11031->11023 11031->11024 11031->11025 11031->11028 11046 4f63f9 11031->11046 11033 4f6639 11032->11033 11036 4f6641 11032->11036 11034 4f354d 114 API calls 11033->11034 11034->11036 11035 4f665e 11035->11019 11036->11035 11037 4f92dc std::locale::_Init 77 API calls 11036->11037 11037->11035 11039 4f669f 11038->11039 11040 4f66a7 11038->11040 11041 4f354d 114 API calls 11039->11041 11043 4f92dc std::locale::_Init 77 API calls 11040->11043 11045 4f66c5 11040->11045 11041->11040 11042 4f5076 70 API calls 11044 4f66e4 11042->11044 11043->11045 11044->11019 11045->11042 11047 4f640b 11046->11047 11062 4f6428 11046->11062 11048 4f354d 114 API calls 11047->11048 11050 4f6413 11048->11050 11049 4f649f 11051 4f64d1 11049->11051 11052 4f64b0 11049->11052 11058 4f354d 114 API calls 11050->11058 11054 4f92dc std::locale::_Init 77 API calls 11051->11054 11057 4f64df 11051->11057 11053 4f64cf 11052->11053 11056 4f668f 114 API calls 11052->11056 11053->11031 11054->11057 11055 4f5076 70 API calls 11059 4f64fe 11055->11059 11056->11052 11057->11055 11058->11062 11061 4f5076 70 API calls 11059->11061 11060 4f92dc std::locale::_Init 77 API calls 11060->11062 11061->11053 11062->11049 11062->11060 11070 4f6582 11063->11070 11065 4f584b 11066 4f3270 114 API calls 11065->11066 11067 4f5854 11066->11067 11068 4f335e 77 API calls 11067->11068 11069 4f585a 11068->11069 11069->10772 11071 4f658e __EH_prolog3_catch 11070->11071 11072 4f92dc std::locale::_Init 77 API calls 11071->11072 11073 4f6595 11072->11073 11074 4f92dc std::locale::_Init 77 API calls 11073->11074 11075 4f65d2 std::locale::_Locimp::~_Locimp 11074->11075 11075->11065 11077 4f58ef 11076->11077 11078 4f590b 11076->11078 11077->11078 11080 4f4fc3 114 API calls 11077->11080 11079 4f92dc std::locale::_Init 77 API calls 11078->11079 11081 4f5917 11079->11081 11080->11078 11082 4f92dc std::locale::_Init 77 API calls 11081->11082 11083 4f594d 11082->11083 11083->10783 11085 4f8b26 std::exception::exception 66 API calls 11084->11085 11086 4f7f3a 11085->11086 11086->10277 11088 4f9181 ___BuildCatchObject 11087->11088 11095 4fca97 11088->11095 11094 4f91a2 ___BuildCatchObject 11094->10263 11096 5008f6 __lock 66 API calls 11095->11096 11097 4f9186 11096->11097 11098 4f908e DecodePointer DecodePointer 11097->11098 11099 4f913d 11098->11099 11100 4f90bc 11098->11100 11109 4f91ab 11099->11109 11100->11099 11112 4fe0ce 11100->11112 11102 4f9120 EncodePointer EncodePointer 11102->11099 11103 4f90ce 11103->11102 11105 4f90f2 11103->11105 11119 4fc983 11103->11119 11105->11099 11106 4fc983 __realloc_crt 70 API calls 11105->11106 11107 4f910e EncodePointer 11105->11107 11108 4f9108 11106->11108 11107->11102 11108->11099 11108->11107 11124 4fcaa0 11109->11124 11113 4fe0ee HeapSize 11112->11113 11114 4fe0d9 11112->11114 11113->11103 11115 4fa8c7 __strnicmp_l 66 API calls 11114->11115 11116 4fe0de 11115->11116 11117 500433 __strnicmp_l 11 API calls 11116->11117 11118 4fe0e9 11117->11118 11118->11103 11121 4fc98c 11119->11121 11120 4f91de __realloc_crt 69 API calls 11120->11121 11121->11120 11122 4fc9cb 11121->11122 11123 4fc9ac Sleep 11121->11123 11122->11105 11123->11121 11127 50081d LeaveCriticalSection 11124->11127 11126 4f91b0 11126->11094 11127->11126

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 81 4f19df-4f1a6a call 4f17ca * 5 92 4f1a6c-4f1abd call 4f17ec call 4f23a4 call 4f229d call 4f18bf 81->92 101 4f1b54-4f1b95 call 4f23a4 call 4f229d call 4f18bf 92->101 102 4f1ac3-4f1b4f call 4f23a4 call 4f22c3 call 4f229d call 4f197a call 4f229d call 4f184c call 4f2520 92->102 115 4f1c2c-4f1c6d call 4f23a4 call 4f229d call 4f18bf 101->115 116 4f1b9b-4f1c27 call 4f23a4 call 4f22c3 call 4f229d call 4f197a call 4f229d call 4f184c call 4f2520 101->116 102->101 136 4f1d04-4f1d45 call 4f23a4 call 4f229d call 4f18bf 115->136 137 4f1c73-4f1cff call 4f23a4 call 4f22c3 call 4f229d call 4f197a call 4f229d call 4f184c call 4f2520 115->137 116->115 157 4f1ddc-4f1e1d call 4f23a4 call 4f229d call 4f18bf 136->157 158 4f1d4b-4f1dd7 call 4f23a4 call 4f22c3 call 4f229d call 4f197a call 4f229d call 4f184c call 4f2520 136->158 137->136 178 4f1eb4-4f1ef5 call 4f23a4 call 4f229d call 4f18bf 157->178 179 4f1e23-4f1eaf call 4f23a4 call 4f22c3 call 4f229d call 4f197a call 4f229d call 4f184c call 4f2520 157->179 158->157 199 4f1f8c-4f1fcd call 4f23a4 call 4f229d call 4f18bf 178->199 200 4f1efb-4f1f87 call 4f23a4 call 4f22c3 call 4f229d call 4f197a call 4f229d call 4f184c call 4f2520 178->200 179->178 220 4f2064-4f20a5 call 4f23a4 call 4f229d call 4f18bf 199->220 221 4f1fd3-4f205f call 4f23a4 call 4f22c3 call 4f229d call 4f197a call 4f229d call 4f184c call 4f2520 199->221 200->199 241 4f213c-4f217d call 4f23a4 call 4f229d call 4f18bf 220->241 242 4f20ab-4f2137 call 4f23a4 call 4f22c3 call 4f229d call 4f197a call 4f229d call 4f184c call 4f2520 220->242 221->220 262 4f2183-4f220b call 4f23a4 call 4f22c3 call 4f229d call 4f197a call 4f229d call 4f184c call 4f2520 241->262 263 4f2210-4f222b Sleep call 4f2520 241->263 242->241 262->263 268 4f2230 263->268 268->92
    APIs
      • Part of subcall function 004F17CA: LoadLibraryA.KERNEL32(User32.dll,?,004F1A20,SetClipboardData,402896FC), ref: 004F17D2
      • Part of subcall function 004F17CA: GetProcAddress.KERNEL32(00000000,?), ref: 004F17E0
      • Part of subcall function 004F17EC: OpenClipboard.USER32(00000000), ref: 004F17FA
      • Part of subcall function 004F17EC: GetClipboardData.USER32(00000001), ref: 004F1807
      • Part of subcall function 004F17EC: GlobalLock.KERNEL32(00000000), ref: 004F1814
      • Part of subcall function 004F17EC: GlobalUnlock.KERNEL32(00000000), ref: 004F1821
      • Part of subcall function 004F17EC: CloseClipboard.USER32 ref: 004F1827
      • Part of subcall function 004F23A4: __EH_prolog3.LIBCMT ref: 004F23AB
      • Part of subcall function 004F18BF: __EH_prolog3.LIBCMT ref: 004F18C6
      • Part of subcall function 004F197A: __EH_prolog3.LIBCMT ref: 004F1981
      • Part of subcall function 004F184C: __EH_prolog3.LIBCMT ref: 004F1853
      • Part of subcall function 004F184C: GlobalAlloc.KERNEL32(00000002,?,00000000,004F1B3D,?), ref: 004F1863
      • Part of subcall function 004F184C: GlobalLock.KERNEL32(00000000), ref: 004F187A
      • Part of subcall function 004F184C: _memmove.LIBCMT ref: 004F1881
      • Part of subcall function 004F184C: GlobalUnlock.KERNEL32(00000000), ref: 004F188A
      • Part of subcall function 004F184C: OpenClipboard.USER32(00000000), ref: 004F1892
      • Part of subcall function 004F184C: EmptyClipboard.USER32 ref: 004F1898
      • Part of subcall function 004F184C: SetClipboardData.USER32(00000001,00000000), ref: 004F18A1
      • Part of subcall function 004F184C: CloseClipboard.USER32 ref: 004F18A7
      • Part of subcall function 004F2520: _memmove.LIBCMT ref: 004F2539
    • Sleep.KERNELBASE(00000398), ref: 004F2215
    Strings
    • $, xrefs: 004F21E3
    • 1B4GDAxGV7Vqa9Lav4EfypTxgrAhCFMQrs, xrefs: 004F1AE4
    • addr18kvGyaCauRTSejv3qoSvmsXBGn77NhdfFjj3s9l2ccgr2fqzs9p7cl8rr2ckq4c7emm9uaa0s7ynk32ysaxmr5xaazqj4gex0, xrefs: 004F1F1C
    • TMjbm61ctPtZqDVxeZHgXRw4Tq8gzZo9Jq, xrefs: 004F1C94
    • 0xe082eae973143a32d82db061b6c8885ceba72b87, xrefs: 004F1BBC
    • XuLskqV3efHE8eaJDu8oeeLoUn6hHpUAyH, xrefs: 004F21A4
    • #, xrefs: 004F21B1
    • GetClipboardData, xrefs: 004F1A47
    • rNcd1L9tTLohuJh45vUtcisKcgGJTCtnTv, xrefs: 004F1FF4
    • OpenClipboard, xrefs: 004F1A36
    • CloseClipboard, xrefs: 004F1A58
    • DU8bbCYGxj3be3XDMiipMJdFFGHgwDzLB5, xrefs: 004F20CC
    • SetClipboardData, xrefs: 004F1A16
    • ", xrefs: 004F2196
    • EmptyClipboard, xrefs: 004F1A25
    • LRjCGBFrHsFFehN2kCNc6ds8icUCgLZ6KP, xrefs: 004F1D6C
    • bitcoincash:qr7r9w340hvnxqjm2cjpj3kd0s7kfz02ks5su6hrze, xrefs: 004F1E44
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Clipboard$Global$H_prolog3$CloseDataLockOpenUnlock_memmove$AddressAllocEmptyLibraryLoadProcSleep
    • String ID: "$#$$$0xe082eae973143a32d82db061b6c8885ceba72b87$1B4GDAxGV7Vqa9Lav4EfypTxgrAhCFMQrs$CloseClipboard$DU8bbCYGxj3be3XDMiipMJdFFGHgwDzLB5$EmptyClipboard$GetClipboardData$LRjCGBFrHsFFehN2kCNc6ds8icUCgLZ6KP$OpenClipboard$SetClipboardData$TMjbm61ctPtZqDVxeZHgXRw4Tq8gzZo9Jq$XuLskqV3efHE8eaJDu8oeeLoUn6hHpUAyH$addr18kvGyaCauRTSejv3qoSvmsXBGn77NhdfFjj3s9l2ccgr2fqzs9p7cl8rr2ckq4c7emm9uaa0s7ynk32ysaxmr5xaazqj4gex0$bitcoincash:qr7r9w340hvnxqjm2cjpj3kd0s7kfz02ks5su6hrze$rNcd1L9tTLohuJh45vUtcisKcgGJTCtnTv
    • API String ID: 1247621152-3269600870
    • Opcode ID: 1c5e210374b824fc73e49898a562c7a74b85d1e38bc0068773f5f2d3adc2b476
    • Instruction ID: c75b175faf10bd6c568dd84017b4160ca604bd98d59e4da9ad3986ef8eb9c789
    • Opcode Fuzzy Hash: 1c5e210374b824fc73e49898a562c7a74b85d1e38bc0068773f5f2d3adc2b476
    • Instruction Fuzzy Hash: 78227375918384ABD320BB3E8907B9F7FD4AF56314F450A4EF9C843242DB7995088BA7

    Control-flow Graph

    APIs
    • __EH_prolog3_GS.LIBCMT ref: 004F7533
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,000004F8,004F227C), ref: 004F7546
      • Part of subcall function 004F744F: __EH_prolog3_GS.LIBCMT ref: 004F7456
      • Part of subcall function 004F744F: RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00000002,?,00000001,00000001,FyYnOTg1ICwkGCQIDh0bAQYeMDU9OgYaFgYPNzU9LhoGAAwWMD8EHxwdHQckGDsUAw==,Diamotrix,00000060,004F756E,?), ref: 004F74C5
      • Part of subcall function 004F7918: _memmove.LIBCMT ref: 004F7934
    • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,00000001), ref: 004F7592
      • Part of subcall function 004F73C3: __EH_prolog3_GS.LIBCMT ref: 004F73CA
      • Part of subcall function 004F2520: _memmove.LIBCMT ref: 004F2539
    • CopyFileW.KERNELBASE(?,?,00000000,00000001), ref: 004F76B2
    • Sleep.KERNELBASE(000001F4), ref: 004F76C1
    • MoveFileW.KERNEL32(?,?), ref: 004F77EF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: FileH_prolog3_$_memmove$CopyFolderModuleMoveNameOpenPathSleep
    • String ID: Diamotrix$GBoXDg4EAkcdPAw=$GCQIDh0bAQYeMDUSGwwVAhlWIREE
    • API String ID: 3945932230-3474619492
    • Opcode ID: 380581bcfd1c49fff2a534a2b9bc249304f93be8cbb499b08f1b3429cbcec060
    • Instruction ID: 552a3a9ac062d41c59a139b95348efec5e0895f2b18c64ce4736b3d1f871165e
    • Opcode Fuzzy Hash: 380581bcfd1c49fff2a534a2b9bc249304f93be8cbb499b08f1b3429cbcec060
    • Instruction Fuzzy Hash: F28141B290412C9EDB60DB65CD85FEEB7B8AB14314F4000DAA709B3141DB786F89CF69

    Control-flow Graph

    APIs
    • CreateMutexA.KERNELBASE(00000000,00000001,DiamoTrix), ref: 004F2246
    • GetLastError.KERNEL32 ref: 004F2252
    • CloseHandle.KERNEL32(00000000), ref: 004F2260
    • ExitProcess.KERNEL32 ref: 004F2267
    • IsDebuggerPresent.KERNEL32 ref: 004F226D
    • CreateThread.KERNELBASE(00000000,00000000,Function_000019DF,00507314,00000000,00000000), ref: 004F228A
    • Sleep.KERNELBASE(0000C350), ref: 004F2295
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Create$CloseDebuggerErrorExitHandleLastMutexPresentProcessSleepThread
    • String ID: DiamoTrix
    • API String ID: 2699360975-3521203031
    • Opcode ID: 554d1864169b1af3b86912d41b8b1d3602ff93f9deebe997ddec8e0ea3b2efe5
    • Instruction ID: f41f815d1cba37649138cc3aa841793f8687d986cf602a6504a1728712aa553d
    • Opcode Fuzzy Hash: 554d1864169b1af3b86912d41b8b1d3602ff93f9deebe997ddec8e0ea3b2efe5
    • Instruction Fuzzy Hash: 3EF0A731505228B7D22127619D4DEBF3E18EF1AB51B114001F305A41A0CF9C5646FAEA

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 456 4f1000-4f100e LoadLibraryA 457 4f101c-4f101f 456->457 458 4f1010-4f101b GetProcAddress 456->458
    APIs
    • LoadLibraryA.KERNELBASE(?), ref: 004F1006
    • GetProcAddress.KERNEL32(00000000,?), ref: 004F1014
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID:
    • API String ID: 2574300362-0
    • Opcode ID: 147d7d23de5b48658afefcf4c500257473637c2aa556bcff573b0bb91ffc8c49
    • Instruction ID: 7aba46e64d3c47912547b0726fd7c69f2cd55a7b19fc19f3137a4cbbd707c8f8
    • Opcode Fuzzy Hash: 147d7d23de5b48658afefcf4c500257473637c2aa556bcff573b0bb91ffc8c49
    • Instruction Fuzzy Hash: 70C0127520020CFBCF102FA1FC0CA6A3F6CEB14260B044021FB0CE8421EB3AC820AA54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 373 4f744f-4f74b2 call 4f97f5 call 4f22c3 * 2 call 4f73c3 call 4f2520 * 2 386 4f74b6-4f74cd RegOpenKeyExA 373->386 387 4f74b4 373->387 388 4f74cf-4f74db call 4f2520 386->388 389 4f74e3-4f74ed 386->389 387->386 396 4f74dd-4f74e2 call 4f983f 388->396 390 4f74ef 389->390 391 4f74f1-4f750a RegSetValueExW 389->391 390->391 394 4f750c-4f751c RegCloseKey call 4f2520 391->394 395 4f7525-4f7527 391->395 399 4f7521-4f7523 394->399 395->394 399->396
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 004F7456
      • Part of subcall function 004F73C3: __EH_prolog3_GS.LIBCMT ref: 004F73CA
      • Part of subcall function 004F2520: _memmove.LIBCMT ref: 004F2539
    • RegOpenKeyExA.KERNELBASE(80000001,?,00000000,00000002,?,00000001,00000001,FyYnOTg1ICwkGCQIDh0bAQYeMDU9OgYaFgYPNzU9LhoGAAwWMD8EHxwdHQckGDsUAw==,Diamotrix,00000060,004F756E,?), ref: 004F74C5
    • RegSetValueExW.KERNELBASE(?,SystemHandler,00000000,00000001,?,?), ref: 004F7502
    • RegCloseKey.KERNELBASE(?), ref: 004F750F
    Strings
    • FyYnOTg1ICwkGCQIDh0bAQYeMDU9OgYaFgYPNzU9LhoGAAwWMD8EHxwdHQckGDsUAw==, xrefs: 004F7472
    • SystemHandler, xrefs: 004F74FA
    • Diamotrix, xrefs: 004F745E
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: H_prolog3_$CloseOpenValue_memmove
    • String ID: Diamotrix$FyYnOTg1ICwkGCQIDh0bAQYeMDU9OgYaFgYPNzU9LhoGAAwWMD8EHxwdHQckGDsUAw==$SystemHandler
    • API String ID: 1044828830-2798639340
    • Opcode ID: 5c161c8563c58b2b0cb39250f2f5ddf664a607ebbee98b8b22c6b03dcb0c12f2
    • Instruction ID: 3e0efd1626ad9d057bae547a50c5de0250fc93a889915d4fd7fb950d7a99b08d
    • Opcode Fuzzy Hash: 5c161c8563c58b2b0cb39250f2f5ddf664a607ebbee98b8b22c6b03dcb0c12f2
    • Instruction Fuzzy Hash: 9A214C71A4420CAEEB00DBA5CD46FEE7BB4EB04304F10405AF7056B281DAA9AD49DB65

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 401 4f91de-4f91e7 402 4f91e9-4f91ec call 4fa7f1 401->402 403 4f91f4-4f91fa 401->403 407 4f91f1-4f91f3 402->407 405 4f91fc-4f9207 call 4f8f81 403->405 406 4f9209-4f920a 403->406 414 4f9256-4f9258 405->414 409 4f923c-4f923f 406->409 410 4f920c-4f920e 409->410 411 4f9241-4f924d call 4fe110 call 4fa8c7 409->411 415 4f9211-4f9227 HeapReAlloc 410->415 416 4f9210 410->416 427 4f9253 411->427 418 4f9229-4f922f 415->418 419 4f9287-4f9289 415->419 416->415 422 4f9271-4f9285 call 4fa8c7 GetLastError call 4fa885 418->422 423 4f9231-4f923a call 4fe110 418->423 421 4f9255 419->421 421->414 422->419 423->409 431 4f9259-4f926f call 4fa8c7 GetLastError call 4fa885 423->431 427->421 431->427
    APIs
    • _malloc.LIBCMT ref: 004F91EC
      • Part of subcall function 004FA7F1: __FF_MSGBANNER.LIBCMT ref: 004FA80A
      • Part of subcall function 004FA7F1: __NMSG_WRITE.LIBCMT ref: 004FA811
      • Part of subcall function 004FA7F1: RtlAllocateHeap.NTDLL(00000000,00000001,?,00000001,?,?,004F8AE8,00000001,00000000,?,00000003,?,004F8B46,S(O,?), ref: 004FA836
    • _free.LIBCMT ref: 004F91FF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: AllocateHeap_free_malloc
    • String ID: H=P
    • API String ID: 1020059152-2152406048
    • Opcode ID: 891600771f8cd8def6ae5f1a7704627dbe4d654d490aa51312bb29c9ae21f766
    • Instruction ID: 178bff2c1f8ee889acdfd2238e4280d0403c5af6bae49dec68974f57d2c4e365
    • Opcode Fuzzy Hash: 891600771f8cd8def6ae5f1a7704627dbe4d654d490aa51312bb29c9ae21f766
    • Instruction Fuzzy Hash: 4F112E7280010DBACF213B759C04B3E37589F803A4B214D6BFB089A151DF3CCC56965D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 437 4f92dc-4f92e4 438 4f92f3-4f92fe call 4fa7f1 437->438 441 4f92e6-4f92f1 call 4fe110 438->441 442 4f9300-4f9301 438->442 441->438 445 4f9302-4f9313 441->445 446 4f9315-4f9340 call 4f8a9e call 4f91b1 445->446 447 4f9341-4f935b call 4f8bd2 call 4f935c 445->447 446->447
    APIs
    • _malloc.LIBCMT ref: 004F92F6
      • Part of subcall function 004FA7F1: __FF_MSGBANNER.LIBCMT ref: 004FA80A
      • Part of subcall function 004FA7F1: __NMSG_WRITE.LIBCMT ref: 004FA811
      • Part of subcall function 004FA7F1: RtlAllocateHeap.NTDLL(00000000,00000001,?,00000001,?,?,004F8AE8,00000001,00000000,?,00000003,?,004F8B46,S(O,?), ref: 004FA836
    • std::exception::exception.LIBCMT ref: 004F932B
    • std::exception::exception.LIBCMT ref: 004F9345
    • __CxxThrowException@8.LIBCMT ref: 004F9356
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
    • String ID:
    • API String ID: 615853336-0
    • Opcode ID: 37a9533a45f24ec5b5433943664cc37aeff8c51f3fd54b1a80f61809a41c5c83
    • Instruction ID: aaa802467e00722f1f8d0c47c809aad8e35f1e841fbdf56a491206bdcd9a00b9
    • Opcode Fuzzy Hash: 37a9533a45f24ec5b5433943664cc37aeff8c51f3fd54b1a80f61809a41c5c83
    • Instruction Fuzzy Hash: F2F0F47190020EB6EB10EB96CC96A7F3BA9BB00718F14041FFF149A1D1DF799E458759

    Control-flow Graph

    APIs
    • __EH_prolog3_catch.LIBCMT ref: 004F2B48
      • Part of subcall function 004F7F85: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCMT ref: 004F7F93
      • Part of subcall function 004F7F85: __CxxThrowException@8.LIBCMT ref: 004F7FA1
      • Part of subcall function 004F7F85: std::exception::exception.LIBCMT ref: 004F7FB4
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8H_prolog3_catchThrowstd::exception::exception
    • String ID:
    • API String ID: 1558761032-0
    • Opcode ID: 2f74549861232e83aea7c95a1caa336d65a21dcf6d65ffd0eba5852b6b759564
    • Instruction ID: e8a7a9f6770e58ee14113b6ea32eb5d038edf340a4b6b2bf55a98eef50b1658e
    • Opcode Fuzzy Hash: 2f74549861232e83aea7c95a1caa336d65a21dcf6d65ffd0eba5852b6b759564
    • Instruction Fuzzy Hash: 7BF09071100308ABC714FF26C982E2A77E5AF84344B40484EF7469B352CE38E941C758

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 476 4f234f-4f236f call 4f978c call 4f242a 481 4f2381-4f2389 call 4f7f85 476->481 482 4f2371-4f2373 476->482 487 4f238b-4f2395 call 4f296f 481->487 484 4f2376-4f237b 482->484 484->484 486 4f237d-4f237f 484->486 486->487 489 4f239a-4f23a1 call 4f982b 487->489
    APIs
    • __EH_prolog3.LIBCMT ref: 004F2356
      • Part of subcall function 004F242A: std::locale::_Init.LIBCPMT ref: 004F2431
      • Part of subcall function 004F242A: std::locale::facet::_Incref.LIBCPMT ref: 004F2440
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: H_prolog3IncrefInitstd::locale::_std::locale::facet::_
    • String ID:
    • API String ID: 2441394073-0
    • Opcode ID: 6bb86fdc5e68b37f88ee75b101e7f8ac7227b65a9601e302b651767fb542864f
    • Instruction ID: 61e7610b9e6ccfe7db1e5598605188d16a0f143642a0b8966d453df0f9f4b1e1
    • Opcode Fuzzy Hash: 6bb86fdc5e68b37f88ee75b101e7f8ac7227b65a9601e302b651767fb542864f
    • Instruction Fuzzy Hash: A2F0207230420A9BEB02AF29C9567B97691AF50308F14813ABF049F245DBBCCE098299

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 492 4f5076-4f507e 493 4f50a2-4f50b2 492->493 494 4f5080-4f5089 call 4f91de 492->494 496 4f508e-4f5094 494->496 497 4f509b-4f50a1 496->497 498 4f5096 call 4f7f52 496->498 497->493 498->497
    APIs
      • Part of subcall function 004F91DE: _malloc.LIBCMT ref: 004F91EC
    • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 004F5096
      • Part of subcall function 004F7F52: std::exception::exception.LIBCMT ref: 004F7F6A
      • Part of subcall function 004F7F52: __CxxThrowException@8.LIBCMT ref: 004F7F7F
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Exception@8Internal_throw_exceptionThrow_mallocstd::exception::exception
    • String ID:
    • API String ID: 4204326809-0
    • Opcode ID: 883a0bd67c2d40cd78a423c91a8c0d624f6316e23ecca44dc0849041ac370a47
    • Instruction ID: b3b500541178690acc5d4f222dd28ac3291887b8bb0346b99af362f3adf8b24f
    • Opcode Fuzzy Hash: 883a0bd67c2d40cd78a423c91a8c0d624f6316e23ecca44dc0849041ac370a47
    • Instruction Fuzzy Hash: 20F0307510874A8FD3309F5AD580827F7E9EF55714310882EEAD987712DA70B841CB54
    APIs
    • ___crtGetLocaleInfoA.LIBCMT ref: 00501C16
      • Part of subcall function 00502D95: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00502DA3
      • Part of subcall function 00502D95: __crtGetLocaleInfoA_stat.LIBCMT ref: 00502DB8
    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00501C24
    • ___crtGetLocaleInfoA.LIBCMT ref: 00501C3D
    • ___crtGetLocaleInfoA.LIBCMT ref: 00501C78
    • __calloc_crt.LIBCMT ref: 00501C52
      • Part of subcall function 004FC937: Sleep.KERNEL32(00000000), ref: 004FC95F
    • __calloc_crt.LIBCMT ref: 00501C89
    • _free.LIBCMT ref: 00501CA1
    • _free.LIBCMT ref: 00501CD5
    • __invoke_watson.LIBCMT ref: 00501CE4
    • GetLocaleInfoW.KERNEL32(?,00001004,00000000,00000000,?,?,00000000), ref: 00501D01
    • __calloc_crt.LIBCMT ref: 00501D0C
    • GetLocaleInfoW.KERNEL32(?,00001004,00000000,00000000,?,?,00000000), ref: 00501D21
    • _free.LIBCMT ref: 00501D29
    • GetLocaleInfoW.KERNEL32(?,00001004,00000000,00000002,?,?,00000000), ref: 00501D5D
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Locale$Info$___crt__calloc_crt_free$A_statErrorLastSleepUpdateUpdate::___crt__invoke_watson
    • String ID:
    • API String ID: 2728192355-0
    • Opcode ID: 9d3a820547be2341c63943f81d04c880c16982a54ddd5c7a963f4b87db7fc97d
    • Instruction ID: 4c6891022a8e14d3d4f922097a02391e509e21f728b4e6672a6a450b0c425da0
    • Opcode Fuzzy Hash: 9d3a820547be2341c63943f81d04c880c16982a54ddd5c7a963f4b87db7fc97d
    • Instruction Fuzzy Hash: 9941DE7290061AAFEF219F22CC45BAE3FA9FF14364F504469F904A6191EB36CC50DF69
    APIs
    • __EH_prolog3.LIBCMT ref: 004F1853
    • GlobalAlloc.KERNEL32(00000002,?,00000000,004F1B3D,?), ref: 004F1863
    • GlobalLock.KERNEL32(00000000), ref: 004F187A
    • _memmove.LIBCMT ref: 004F1881
    • GlobalUnlock.KERNEL32(00000000), ref: 004F188A
    • OpenClipboard.USER32(00000000), ref: 004F1892
    • EmptyClipboard.USER32 ref: 004F1898
    • SetClipboardData.USER32(00000001,00000000), ref: 004F18A1
    • CloseClipboard.USER32 ref: 004F18A7
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Clipboard$Global$AllocCloseDataEmptyH_prolog3LockOpenUnlock_memmove
    • String ID:
    • API String ID: 2493768046-0
    • Opcode ID: 69ec527a6eee4af1c08ea559ce96c274ce9df4c6ea6e8637b55224d567f9db88
    • Instruction ID: 458b6952b7616f6cd90bf5c148581c3fb17af33d20630d8cc5a2f37eb7f74d35
    • Opcode Fuzzy Hash: 69ec527a6eee4af1c08ea559ce96c274ce9df4c6ea6e8637b55224d567f9db88
    • Instruction Fuzzy Hash: 71F04FB2400108EBEB10BFA1DC4DBEF3E78EF55741F044018F70A9A0A1CBB55949EBA1
    APIs
    • OpenClipboard.USER32(00000000), ref: 004F17FA
    • GetClipboardData.USER32(00000001), ref: 004F1807
    • GlobalLock.KERNEL32(00000000), ref: 004F1814
    • GlobalUnlock.KERNEL32(00000000), ref: 004F1821
    • CloseClipboard.USER32 ref: 004F1827
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Clipboard$Global$CloseDataLockOpenUnlock
    • String ID: SetClipboardData
    • API String ID: 1006321803-803054430
    • Opcode ID: 25d952ab0baaa7abef0b5fc48bc57f66575620c6b57afe22d5499ecd05a02180
    • Instruction ID: e8e4c0441ba958bcc6648e13904a35684b669902b8360823f9891238046b2b79
    • Opcode Fuzzy Hash: 25d952ab0baaa7abef0b5fc48bc57f66575620c6b57afe22d5499ecd05a02180
    • Instruction Fuzzy Hash: A8F05B71700208ABE7113BB69DC9D7F766CEB65BD5B14003AB701D1361DBB8CC055664
    APIs
    • GetLocaleInfoW.KERNEL32(?,2000000B,00501899,00000002,?,?,00501899), ref: 0050129B
    • GetLocaleInfoW.KERNEL32(?,20001004,00501899,00000002,?,?,00501899), ref: 005012C4
    • GetACP.KERNEL32(?,?), ref: 005012D8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID: ACP$OCP
    • API String ID: 2299586839-711371036
    • Opcode ID: a462691a907fae3f1d2a48739443a8b804e044c1204534f4c3b98dbc02ea40fe
    • Instruction ID: 333128d6e73f208c88257f3771cc865158a79cb71d3ada1208b8eebbb57b67f3
    • Opcode Fuzzy Hash: a462691a907fae3f1d2a48739443a8b804e044c1204534f4c3b98dbc02ea40fe
    • Instruction Fuzzy Hash: 0601D434600A0BBBEB218B63ED0AB5E3EA8BF00359F200419FB01E10C1EB60CA41965A
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 004FDE85
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004FDE9A
    • UnhandledExceptionFilter.KERNEL32(0050568C), ref: 004FDEA5
    • GetCurrentProcess.KERNEL32(C0000409), ref: 004FDEC1
    • TerminateProcess.KERNEL32(00000000), ref: 004FDEC8
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 2579439406-0
    • Opcode ID: 8ac856fb09ed220b548b9ebddbb79ebbdf0da1dd561a1b67d41ab084ac35f0da
    • Instruction ID: d13f1a00dbd4292e11271dac325429e9d18d1740abdc8936bc456e691333622c
    • Opcode Fuzzy Hash: 8ac856fb09ed220b548b9ebddbb79ebbdf0da1dd561a1b67d41ab084ac35f0da
    • Instruction Fuzzy Hash: C321E5B480230ADFE700DF55F9CA65C3BB4FB28310F00491AE71897361E7B15888AF45
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(004FCA04), ref: 004FCA4B
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: e2317df8d1208993c660b68f78dfd88c8657948d1fb3d3873181eb7624103978
    • Instruction ID: 8e0267c90b3135f43a3173d7ff6e12225979466d77a184111ccf68186767dc73
    • Opcode Fuzzy Hash: e2317df8d1208993c660b68f78dfd88c8657948d1fb3d3873181eb7624103978
    • Instruction Fuzzy Hash: C59002A0A9514D8AD6005BB06F5D61A66906B5C64275144516311D8054DB6450046926
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
    • Instruction ID: a29845cb8e418bfa069a223df42f4f215de5462b419b53102929b4ac38a04e8a
    • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
    • Instruction Fuzzy Hash: 4BC19073D0A5B6098736452D841823FEE62EE82B4031FC396DED03F38AC72BAD4196D4
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
    • Instruction ID: 83e4d279a28273d64441eeb617d616628069a6a0210f6101ff5405e81a4bbcdd
    • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
    • Instruction Fuzzy Hash: 45C19173D0E5B6098736462D841823FEE62AE82B4031FC396DED03F38AC72B6D4196D4
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
    • Instruction ID: eee57ed2afef8eaa9f5925b7ae31a1a46eb730875f0224759a6801b608f99a5e
    • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
    • Instruction Fuzzy Hash: 90C18473D0A5B6498B36452D851823FEEA2AE83B4131FC392DDD03F38AC72B6D4596D4
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
    • Instruction ID: 62fc18d00c322207b2220bb7069a521eeee0eab4fb487979f9c775918c828736
    • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
    • Instruction Fuzzy Hash: 4DB19173D0A5B6098736452D855823FEE62AE83B8031FC396CDD03F38AC72BAD4596D4
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004F89A2), ref: 004FD9A7
    • __mtterm.LIBCMT ref: 004FD9B3
      • Part of subcall function 004FD6EC: DecodePointer.KERNEL32(00000001,004FDB15,?,004F89A2), ref: 004FD6FD
      • Part of subcall function 004FD6EC: TlsFree.KERNEL32(00000001,004FDB15,?,004F89A2), ref: 004FD717
      • Part of subcall function 004FD6EC: DeleteCriticalSection.KERNEL32(00000000,00000000,76EE5810,?,004FDB15,?,004F89A2), ref: 005007E3
      • Part of subcall function 004FD6EC: _free.LIBCMT ref: 005007E6
      • Part of subcall function 004FD6EC: DeleteCriticalSection.KERNEL32(00000001,76EE5810,?,004FDB15,?,004F89A2), ref: 0050080D
    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 004FD9C9
    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 004FD9D6
    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 004FD9E3
    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 004FD9F0
    • TlsAlloc.KERNEL32(?,004F89A2), ref: 004FDA40
    • TlsSetValue.KERNEL32(00000000,?,004F89A2), ref: 004FDA5B
    • __init_pointers.LIBCMT ref: 004FDA65
    • EncodePointer.KERNEL32(?,004F89A2), ref: 004FDA76
    • EncodePointer.KERNEL32(?,004F89A2), ref: 004FDA83
    • EncodePointer.KERNEL32(?,004F89A2), ref: 004FDA90
    • EncodePointer.KERNEL32(?,004F89A2), ref: 004FDA9D
    • DecodePointer.KERNEL32(004FD870,?,004F89A2), ref: 004FDABE
    • __calloc_crt.LIBCMT ref: 004FDAD3
    • DecodePointer.KERNEL32(00000000,?,004F89A2), ref: 004FDAED
    • GetCurrentThreadId.KERNEL32 ref: 004FDAFF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
    • API String ID: 3698121176-3819984048
    • Opcode ID: 873a78d4027d9d05ce75d79b37d8a8d3a7fce59eedd4e398274e2a3730cc39f7
    • Instruction ID: f2dffd0b26720d22c6f5338f12766ac000605aea52c01cfd3ff1a9028d25a7fa
    • Opcode Fuzzy Hash: 873a78d4027d9d05ce75d79b37d8a8d3a7fce59eedd4e398274e2a3730cc39f7
    • Instruction Fuzzy Hash: 9131B170D007499AE711AF75BC48A2E3FE9FF24360B05852BE604D72B0DB799408EF98
    APIs
    • __malloc_crt.LIBCMT ref: 004FC1E6
    • __calloc_crt.LIBCMT ref: 004FC1F6
    • __calloc_crt.LIBCMT ref: 004FC201
    • __calloc_crt.LIBCMT ref: 004FC20C
    • __calloc_crt.LIBCMT ref: 004FC21B
    • GetCPInfo.KERNEL32(?,?), ref: 004FC26E
    • ___crtGetStringTypeA.LIBCMT ref: 004FC2DC
    • ___crtLCMapStringA.LIBCMT ref: 004FC30F
      • Part of subcall function 00501BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00501C16
      • Part of subcall function 00501BCC: GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00501C24
      • Part of subcall function 00501BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00501C3D
      • Part of subcall function 00501BCC: __calloc_crt.LIBCMT ref: 00501C52
      • Part of subcall function 00501BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00501C78
      • Part of subcall function 00501BCC: __calloc_crt.LIBCMT ref: 00501C89
      • Part of subcall function 00501BCC: _free.LIBCMT ref: 00501CA1
    • ___crtLCMapStringA.LIBCMT ref: 004FC33C
      • Part of subcall function 004FC785: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004FC793
      • Part of subcall function 004FC785: __crtLCMapStringA_stat.LIBCMT ref: 004FC7B4
    • _memmove.LIBCMT ref: 004FC3E7
    • _memmove.LIBCMT ref: 004FC3F6
    • _memmove.LIBCMT ref: 004FC408
    • InterlockedDecrement.KERNEL32(?), ref: 004FC41B
    • _free.LIBCMT ref: 004FC431
    • _free.LIBCMT ref: 004FC444
    • _free.LIBCMT ref: 004FC452
    • _free.LIBCMT ref: 004FC45D
    • _free.LIBCMT ref: 004FC4A4
    • _free.LIBCMT ref: 004FC4B1
    • _free.LIBCMT ref: 004FC4B9
    • _free.LIBCMT ref: 004FC4C1
    • _free.LIBCMT ref: 004FC4C9
    • InterlockedDecrement.KERNEL32(?), ref: 004FC4E1
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: _free$___crt__calloc_crt$Locale$InfoString$_memmove$DecrementInterlocked$A_statErrorLastTypeUpdateUpdate::___crt__malloc_crt
    • String ID:
    • API String ID: 2149289317-0
    • Opcode ID: a30b79fbd6548ee0cbcbb7c38b578d6f961ab5cb0163775a0ab912b717d35593
    • Instruction ID: 41318256b57fc5e8eede1dc7f335ef72bcc04acdbe79f97ab9f79da2ab0b6e9a
    • Opcode Fuzzy Hash: a30b79fbd6548ee0cbcbb7c38b578d6f961ab5cb0163775a0ab912b717d35593
    • Instruction Fuzzy Hash: 0DB177B1D0020D9FDB20DFA5C991BFEBBB9BF08304F04412EE655A7241DB79A845CB28
    APIs
    • __malloc_crt.LIBCMT ref: 004FC1E6
    • __calloc_crt.LIBCMT ref: 004FC1F6
    • __calloc_crt.LIBCMT ref: 004FC201
    • __calloc_crt.LIBCMT ref: 004FC20C
    • __calloc_crt.LIBCMT ref: 004FC21B
    • GetCPInfo.KERNEL32(?,?), ref: 004FC26E
    • ___crtGetStringTypeA.LIBCMT ref: 004FC2DC
    • ___crtLCMapStringA.LIBCMT ref: 004FC30F
      • Part of subcall function 00501BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00501C16
      • Part of subcall function 00501BCC: GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00501C24
      • Part of subcall function 00501BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00501C3D
      • Part of subcall function 00501BCC: __calloc_crt.LIBCMT ref: 00501C52
      • Part of subcall function 00501BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00501C78
      • Part of subcall function 00501BCC: __calloc_crt.LIBCMT ref: 00501C89
      • Part of subcall function 00501BCC: _free.LIBCMT ref: 00501CA1
    • _free.LIBCMT ref: 004FC4A4
    • _free.LIBCMT ref: 004FC4B1
    • _free.LIBCMT ref: 004FC4B9
    • _free.LIBCMT ref: 004FC4C1
    • _free.LIBCMT ref: 004FC4C9
    • InterlockedDecrement.KERNEL32(?), ref: 004FC4E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: __calloc_crt_free$___crt$Info$Locale$String$DecrementErrorInterlockedLastType__malloc_crt
    • String ID: O
    • API String ID: 1207360155-878818188
    • Opcode ID: c80db5eb9d08cde8b48b95e95ed751b8ae03dbeafc600324a1716e3d410ad14f
    • Instruction ID: fda6a0235d92bf1ab40e93cead1e6b12b50e913029fa328b51f2869b9cea16f8
    • Opcode Fuzzy Hash: c80db5eb9d08cde8b48b95e95ed751b8ae03dbeafc600324a1716e3d410ad14f
    • Instruction Fuzzy Hash: F4B1BCB1E0424D9FDB20DFA4C9A1AFEBBB4FF58304F04406EE685AB241D7389845CB25
    APIs
    • __EH_prolog3.LIBCMT ref: 004F2873
    • std::_Lockit::_Lockit.LIBCPMT ref: 004F287D
      • Part of subcall function 004F1430: std::_Lockit::_Lockit.LIBCPMT ref: 004F143E
    • std::bad_exception::bad_exception.LIBCMT ref: 004F28CC
    • __CxxThrowException@8.LIBCMT ref: 004F28DA
    • std::locale::facet::_Incref.LIBCPMT ref: 004F28EA
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 004F28F0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prolog3IncrefRegisterThrowstd::bad_exception::bad_exception
    • String ID: bad cast
    • API String ID: 158301680-3145022300
    • Opcode ID: 8bc9a3c7b798276e34410fbfe5c00e027c36236c4d456d53d1554f9c0923aea3
    • Instruction ID: e1a1618d1bc02681de1110113488bd350de00b1e5f57cfa27de60cc4eaa9c7ca
    • Opcode Fuzzy Hash: 8bc9a3c7b798276e34410fbfe5c00e027c36236c4d456d53d1554f9c0923aea3
    • Instruction Fuzzy Hash: 0601823181062E9BCF00FB64C9429BE77647F44768F54021EE6207B2E1DF7C9E059B98
    APIs
    • __EH_prolog3.LIBCMT ref: 004F4109
    • std::_Lockit::_Lockit.LIBCPMT ref: 004F4115
      • Part of subcall function 004F1430: std::_Lockit::_Lockit.LIBCPMT ref: 004F143E
    • std::bad_exception::bad_exception.LIBCMT ref: 004F415D
    • __CxxThrowException@8.LIBCMT ref: 004F416B
    • std::locale::facet::_Incref.LIBCPMT ref: 004F417B
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 004F4181
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prolog3IncrefRegisterThrowstd::bad_exception::bad_exception
    • String ID: bad cast
    • API String ID: 158301680-3145022300
    • Opcode ID: f9cb6150894d302d984bc91e458451cafa95c17d47aeb4f566f66f10bfefa25e
    • Instruction ID: 0137f96e0f3f61ff36bc1a5ef8f7a28cda9b7d6f903357cc2701dc9a1ddfd9b3
    • Opcode Fuzzy Hash: f9cb6150894d302d984bc91e458451cafa95c17d47aeb4f566f66f10bfefa25e
    • Instruction Fuzzy Hash: 1C01D23191062E87CF10FB658D42ABE7260BF94368F54021EF621772E1DF3C5E058B98
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 004F7171
      • Part of subcall function 004F8329: std::exception::exception.LIBCMT ref: 004F833E
      • Part of subcall function 004F8329: __CxxThrowException@8.LIBCMT ref: 004F8353
      • Part of subcall function 004F8329: std::exception::exception.LIBCMT ref: 004F8364
    • _memmove.LIBCMT ref: 004F71A6
    • _memmove.LIBCMT ref: 004F71B2
    • _memmove.LIBCMT ref: 004F71C4
    • _memmove.LIBCMT ref: 004F71FA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
    • String ID: vector<T> too long
    • API String ID: 4034224661-3788999226
    • Opcode ID: 6c789f1500a478209974c5f5b48b25548c9d174683b8fb45ddb9110af4c62b4c
    • Instruction ID: b82075dc14e1faca616a5cb4b995c51e4cdbbf76a809cb3bfdf92e6d7cff561c
    • Opcode Fuzzy Hash: 6c789f1500a478209974c5f5b48b25548c9d174683b8fb45ddb9110af4c62b4c
    • Instruction Fuzzy Hash: 37219271A00209AFCB14EF79DD8597EBBE9EF48344701882EF646D7341DA38E904CB68
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,005081B8,00000008,004FD831,00000000,00000000,?,004F8AE8,00000001,00000000,?,00000003,?,004F8B46,S(O,?), ref: 004FD73A
    • __lock.LIBCMT ref: 004FD76E
      • Part of subcall function 005008F6: __mtinitlocknum.LIBCMT ref: 0050090C
      • Part of subcall function 005008F6: __amsg_exit.LIBCMT ref: 00500918
      • Part of subcall function 005008F6: EnterCriticalSection.KERNEL32(00000000,00000000,?,004FD773,0000000D), ref: 00500920
    • InterlockedIncrement.KERNEL32(?), ref: 004FD77B
    • __lock.LIBCMT ref: 004FD78F
    • ___addlocaleref.LIBCMT ref: 004FD7AD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
    • String ID: KERNEL32.DLL
    • API String ID: 637971194-2576044830
    • Opcode ID: 8d8582a4dc632c28ce8ac011de320e0f366743b02124eaaaa8821146ea510273
    • Instruction ID: f5279fe150274c398f1353c7158c75c61d9210abf1b8a71518be04e6fa1f2d5a
    • Opcode Fuzzy Hash: 8d8582a4dc632c28ce8ac011de320e0f366743b02124eaaaa8821146ea510273
    • Instruction Fuzzy Hash: 5501A171840B00DFD720AF66C80A75EBBE0BF50325F10890EE6969A3E1DBB4A644CF15
    APIs
    • __EH_prolog3.LIBCMT ref: 004F132A
    • std::_Lockit::_Lockit.LIBCPMT ref: 004F1337
    • std::exception::exception.LIBCMT ref: 004F136E
      • Part of subcall function 004F8B26: std::exception::_Copy_str.LIBCMT ref: 004F8B41
    • __CxxThrowException@8.LIBCMT ref: 004F1383
      • Part of subcall function 004F935C: RaiseException.KERNEL32(?,?,h(O,?,?,?,?,?,004F2868,?,00508518,00000000), ref: 004F939E
    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 004F138C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: std::_$Copy_strExceptionException@8H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
    • String ID: bad locale name
    • API String ID: 637683493-1405518554
    • Opcode ID: ee3eb71497dc970fcc3bbe6fbff9a11a4b494d004e0c8ee070de2f43a1f7b7ca
    • Instruction ID: 3c7b9aeba95b412f6960976cab7557f63a7092ea51bcd3810d13ef7f92e1d09a
    • Opcode Fuzzy Hash: ee3eb71497dc970fcc3bbe6fbff9a11a4b494d004e0c8ee070de2f43a1f7b7ca
    • Instruction Fuzzy Hash: 6201A7B2401749DECB21EF5AC48159EBFF4BF28314B90C55FE28957641CB34A609CFA9
    APIs
    • __getptd.LIBCMT ref: 004FE2EA
      • Part of subcall function 004FD856: __getptd_noexit.LIBCMT ref: 004FD859
      • Part of subcall function 004FD856: __amsg_exit.LIBCMT ref: 004FD866
    • __getptd.LIBCMT ref: 004FE2FB
    • __getptd.LIBCMT ref: 004FE309
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: MOC$RCC$csm
    • API String ID: 803148776-2671469338
    • Opcode ID: 66fe2ae8f2f944d596b07c7afcf23f70c7f6a3015fa94fec549782034b546478
    • Instruction ID: 6e484af4bae81bd75eb6257f867d298327cd418f385feffecfb5aa492fdeb9b7
    • Opcode Fuzzy Hash: 66fe2ae8f2f944d596b07c7afcf23f70c7f6a3015fa94fec549782034b546478
    • Instruction Fuzzy Hash: 9CE0123151010CCECB10AB66C04A7793295BB44359F1600FBEA1CCF332D73DD850859B
    APIs
    • __CreateFrameInfo.LIBCMT ref: 004FE5A3
      • Part of subcall function 004F9687: __getptd.LIBCMT ref: 004F9695
      • Part of subcall function 004F9687: __getptd.LIBCMT ref: 004F96A3
    • __getptd.LIBCMT ref: 004FE5AD
      • Part of subcall function 004FD856: __getptd_noexit.LIBCMT ref: 004FD859
      • Part of subcall function 004FD856: __amsg_exit.LIBCMT ref: 004FD866
    • __getptd.LIBCMT ref: 004FE5BB
    • __getptd.LIBCMT ref: 004FE5C9
    • __getptd.LIBCMT ref: 004FE5D4
    • _CallCatchBlock2.LIBCMT ref: 004FE5FA
      • Part of subcall function 004F972C: __CallSettingFrame@12.LIBCMT ref: 004F9778
      • Part of subcall function 004FE6A1: __getptd.LIBCMT ref: 004FE6B0
      • Part of subcall function 004FE6A1: __getptd.LIBCMT ref: 004FE6BE
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
    • String ID:
    • API String ID: 1602911419-0
    • Opcode ID: 5d1f77e4179b7f5ec5b1565cf10787d6934920cb5fb2b830c4828216910461c5
    • Instruction ID: e6db9ecf770f832b5deb3de0753d98d21003c8706b87c4d312388b28d347a043
    • Opcode Fuzzy Hash: 5d1f77e4179b7f5ec5b1565cf10787d6934920cb5fb2b830c4828216910461c5
    • Instruction Fuzzy Hash: E411B4B1C102099FDB00EFA5C546BADBBB1FF08315F11816EF924A7251DB389A159B58
    APIs
    • __getptd.LIBCMT ref: 00500B58
      • Part of subcall function 004FD856: __getptd_noexit.LIBCMT ref: 004FD859
      • Part of subcall function 004FD856: __amsg_exit.LIBCMT ref: 004FD866
    • __amsg_exit.LIBCMT ref: 00500B78
    • __lock.LIBCMT ref: 00500B88
    • InterlockedDecrement.KERNEL32(?), ref: 00500BA5
    • _free.LIBCMT ref: 00500BB8
    • InterlockedIncrement.KERNEL32(00DF2D00), ref: 00500BD0
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
    • String ID:
    • API String ID: 3470314060-0
    • Opcode ID: cd68e488735c28dc5f1bff0f5f7956eb666c2582e67153b0eced9cddbca5ef26
    • Instruction ID: bec9a4bfc21d8aec08291c80739008042e3417f0f6da5c282474455dd53a292a
    • Opcode Fuzzy Hash: cd68e488735c28dc5f1bff0f5f7956eb666c2582e67153b0eced9cddbca5ef26
    • Instruction Fuzzy Hash: EA01F932D01715DBCB21BF659946B6E7BA1FF04728F01511AE914A72D0CB38AC41DFD6
    APIs
    • __EH_prolog3.LIBCMT ref: 004F13A4
    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 004F13B4
      • Part of subcall function 004F8137: _setlocale.LIBCMT ref: 004F8149
    • _free.LIBCMT ref: 004F13C2
      • Part of subcall function 004F8F81: HeapFree.KERNEL32(00000000,00000000,?,004FD847,00000000,?,004F8AE8,00000001,00000000,?,00000003,?,004F8B46,S(O,?), ref: 004F8F97
      • Part of subcall function 004F8F81: GetLastError.KERNEL32(00000000,?,004FD847,00000000,?,004F8AE8,00000001,00000000,?,00000003,?,004F8B46,S(O,?), ref: 004F8FA9
    • _free.LIBCMT ref: 004F13D4
    • _free.LIBCMT ref: 004F13E6
    • _free.LIBCMT ref: 004F13F8
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: _free$ErrorFreeH_prolog3HeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
    • String ID:
    • API String ID: 2259855018-0
    • Opcode ID: 5e16a3d4a2d370e945789577502df6e721163cb96fb20476701d4c620e64200c
    • Instruction ID: cb37c8fbc8f6c3b5ab95548c1debe3ccee37b3f2dcb8435cbcfbf3f0abc0b372
    • Opcode Fuzzy Hash: 5e16a3d4a2d370e945789577502df6e721163cb96fb20476701d4c620e64200c
    • Instruction Fuzzy Hash: C3016231B007099BEB24AE66C54676B73E8AF0072AF14460EE641DB9C1CF3CE945CB68
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID:
    • String ID: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789_$xuP$AP
    • API String ID: 0-2420211075
    • Opcode ID: 606cfba21e9f2a607b77a247581045512d8f8538a187477e2cd48e5759e937d7
    • Instruction ID: 1d215ad8371fa61e0099a4457b709ccace572947d84da6390dee831ace2eaa10
    • Opcode Fuzzy Hash: 606cfba21e9f2a607b77a247581045512d8f8538a187477e2cd48e5759e937d7
    • Instruction Fuzzy Hash: A9B1E331604248AFCB11DF15C4C4BB67BE0AF45315F4844AAEE898F346C378EA45CB6A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID:
    • String ID: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789_$xuP$AP
    • API String ID: 0-2420211075
    • Opcode ID: 7dde469b7a9fa7fd7ee67540c22a5245b4fd293bb1b214d48606271d71115d62
    • Instruction ID: b07d948968b991b87cc1050d15e1ec5720a61742a6bcd4fb497e4f81b85517df
    • Opcode Fuzzy Hash: 7dde469b7a9fa7fd7ee67540c22a5245b4fd293bb1b214d48606271d71115d62
    • Instruction Fuzzy Hash: ACB1D071204B499FD724CF28D484BBBBBE1EF45300F54484EE7DA87281C738A985DB6A
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 004F6D07
    • std::_Xinvalid_argument.LIBCPMT ref: 004F6D2D
      • Part of subcall function 004F8329: std::exception::exception.LIBCMT ref: 004F833E
      • Part of subcall function 004F8329: __CxxThrowException@8.LIBCMT ref: 004F8353
      • Part of subcall function 004F8329: std::exception::exception.LIBCMT ref: 004F8364
    • _memmove.LIBCMT ref: 004F6D69
    • _memmove.LIBCMT ref: 004F6D8C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: _memmovestd::exception::exception$Exception@8H_prolog3_catchThrowXinvalid_argumentstd::_
    • String ID: vector<T> too long
    • API String ID: 3478911975-3788999226
    • Opcode ID: 9d723c49ecab346a2f322a08e8cf035f527e376b9cc17a9fa840f04baaf13583
    • Instruction ID: e6c77c436beb778c98b9ab63383f530084b24cc48af8ca643ea68d9c6b3da75d
    • Opcode Fuzzy Hash: 9d723c49ecab346a2f322a08e8cf035f527e376b9cc17a9fa840f04baaf13583
    • Instruction Fuzzy Hash: 5321A271A00209AFCF04EF79CD4597E7BA2EF84304B11842EFA4597355DF39A910CB98
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 004F7D64
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F838B
      • Part of subcall function 004F8376: __CxxThrowException@8.LIBCMT ref: 004F83A0
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F83B1
    • std::_Xinvalid_argument.LIBCPMT ref: 004F7D83
    • _memmove.LIBCMT ref: 004F7DC6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
    • String ID: invalid string position$string too long
    • API String ID: 3404309857-4289949731
    • Opcode ID: 96d72a7cf4c7051ee6592279a88eedab71786ec2eb4578d6d5023395ed1fc7d6
    • Instruction ID: cdd46f9976adfa235369f17aa28963c3633117dcb640758e78eb8753b6fae0ac
    • Opcode Fuzzy Hash: 96d72a7cf4c7051ee6592279a88eedab71786ec2eb4578d6d5023395ed1fc7d6
    • Instruction Fuzzy Hash: 2411B13020860D9BCB24DE18D88187A73F5FF857187A0451EF956CB261EB38E915C799
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 004F25F0
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F838B
      • Part of subcall function 004F8376: __CxxThrowException@8.LIBCMT ref: 004F83A0
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F83B1
    • std::_Xinvalid_argument.LIBCPMT ref: 004F2604
    • _memmove.LIBCMT ref: 004F263F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
    • String ID: invalid string position$string too long
    • API String ID: 3404309857-4289949731
    • Opcode ID: 6ae654f638285417a888961748c74f6b6e8c9c208dfc84b5c2f6fdaa9cce49ab
    • Instruction ID: 2123cb5e33aa2d40ed48082eb50561648e9e59b1768a149e98feb315d7360433
    • Opcode Fuzzy Hash: 6ae654f638285417a888961748c74f6b6e8c9c208dfc84b5c2f6fdaa9cce49ab
    • Instruction Fuzzy Hash: F80104307002095BEB08AF2C9A9097DB766FB81714B54061EF602CB2D2CBA9EC548399
    APIs
    • ___BuildCatchObject.LIBCMT ref: 004FE93B
      • Part of subcall function 004FE896: ___BuildCatchObjectHelper.LIBCMT ref: 004FE8CC
    • _UnwindNestedFrames.LIBCMT ref: 004FE952
    • ___FrameUnwindToState.LIBCMT ref: 004FE960
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
    • String ID: csm$csm
    • API String ID: 2163707966-3733052814
    • Opcode ID: 25b235255ab6597edc552ed3ef3507b70867476e850620615844bf3548dffac4
    • Instruction ID: b77bf87e265692c95b4ca31b05a6f66ef11d260042055902f8074eedc51c6fa7
    • Opcode Fuzzy Hash: 25b235255ab6597edc552ed3ef3507b70867476e850620615844bf3548dffac4
    • Instruction Fuzzy Hash: C801127140020EBBDF126E52CC45EAF3E6AEF08359F04801ABE0815170D77A99A1EBA9
    APIs
    • __getptd.LIBCMT ref: 0050070F
      • Part of subcall function 004FD856: __getptd_noexit.LIBCMT ref: 004FD859
      • Part of subcall function 004FD856: __amsg_exit.LIBCMT ref: 004FD866
    • __getptd.LIBCMT ref: 00500726
    • __amsg_exit.LIBCMT ref: 00500734
    • __lock.LIBCMT ref: 00500744
    • __updatetlocinfoEx_nolock.LIBCMT ref: 00500758
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
    • String ID:
    • API String ID: 938513278-0
    • Opcode ID: 989b6c55bcc827bf44c87ed26d4c6fff54ad843feeb133bfba2493063856a4ae
    • Instruction ID: a5fcf8620b624838aae9988f0fceb4b130d251ad54ce81e5a4715c00e3d12358
    • Opcode Fuzzy Hash: 989b6c55bcc827bf44c87ed26d4c6fff54ad843feeb133bfba2493063856a4ae
    • Instruction Fuzzy Hash: 72F09032D403049BDA21BB799907B6E3BA1FF40764F11525EF618AA2C3CB2C6841DA5A
    APIs
    • __EH_prolog3.LIBCMT ref: 004F35EE
    • __Strxfrm.LIBCPMT ref: 004F36A3
    • std::_Xinvalid_argument.LIBCPMT ref: 004F36D2
      • Part of subcall function 004F266F: std::_Xinvalid_argument.LIBCPMT ref: 004F267E
      • Part of subcall function 004F266F: _memmove.LIBCMT ref: 004F26B4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_$H_prolog3Strxfrm_memmove
    • String ID: string too long
    • API String ID: 1992344758-2556327735
    • Opcode ID: e7ce6d4da7307c8ea1ed3deaf18bf9442433787e7d36edfdb5ddf2c8dc2cd09f
    • Instruction ID: a75f385b74b34e3ac838dcac841936b252bdf7c401b7cea2c2b1fc4ea3af845d
    • Opcode Fuzzy Hash: e7ce6d4da7307c8ea1ed3deaf18bf9442433787e7d36edfdb5ddf2c8dc2cd09f
    • Instruction Fuzzy Hash: 2731B83070020AABEF28EF38C59063EB7B2BF40315B54461EE612D7391DB78AE51C799
    APIs
    • GetEnvironmentStringsW.KERNEL32(00000000,004F89D7), ref: 004FD3C0
    • __malloc_crt.LIBCMT ref: 004FD3EF
    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004FD3FC
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: EnvironmentStrings$Free__malloc_crt
    • String ID:
    • API String ID: 237123855-0
    • Opcode ID: a6535584b024f1952fb776bf35587570ff2947c4bb8902fa99d33e22e97790d5
    • Instruction ID: cae0141c236fd89c6e707aa39bea335c20defa649b247b6539e059f7b78d87c1
    • Opcode Fuzzy Hash: a6535584b024f1952fb776bf35587570ff2947c4bb8902fa99d33e22e97790d5
    • Instruction Fuzzy Hash: A9F0E2B7D0411C5ACA21B734BC498BB233ADAE136930A401BFB46C3240F6689D4686A6
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 004F7897
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F838B
      • Part of subcall function 004F8376: __CxxThrowException@8.LIBCMT ref: 004F83A0
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F83B1
      • Part of subcall function 004F7A44: std::_Xinvalid_argument.LIBCPMT ref: 004F7A57
    • _memmove.LIBCMT ref: 004F78F2
    Strings
    • invalid string position, xrefs: 004F7892
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
    • String ID: invalid string position
    • API String ID: 3404309857-1799206989
    • Opcode ID: 76b81eb39d6435decddabd82dd83bf6e92b0c3ac7d7bfaa8dd90ff7686d0eb6b
    • Instruction ID: b057f9adae289e0f4efdc1a3c585cd7ac367a795c885064771de51214baa4309
    • Opcode Fuzzy Hash: 76b81eb39d6435decddabd82dd83bf6e92b0c3ac7d7bfaa8dd90ff7686d0eb6b
    • Instruction Fuzzy Hash: F411D07071820C9BCB20EE68D884C7AB3A5FB457A4710462FE6458B241E7BCE950C7A9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Xinvalid_argument_memmovestd::_
    • String ID: string too long
    • API String ID: 256744135-2556327735
    • Opcode ID: e6eac8d46658d0ee396d6514ae0a5fbc002877691f2905c65d2eff7c4eeaa7fb
    • Instruction ID: 6966830b93c35298a592386edb8a37e630b113b2a41009322d43d173376aad40
    • Opcode Fuzzy Hash: e6eac8d46658d0ee396d6514ae0a5fbc002877691f2905c65d2eff7c4eeaa7fb
    • Instruction Fuzzy Hash: B011917030860C9BCA30DF6CD88587BB3A9EF057487500A5FFA56CB651D73CAD158799
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 004F24AB
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F838B
      • Part of subcall function 004F8376: __CxxThrowException@8.LIBCMT ref: 004F83A0
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F83B1
      • Part of subcall function 004F26D9: std::_Xinvalid_argument.LIBCPMT ref: 004F26E3
    • _memmove.LIBCMT ref: 004F24FD
    Strings
    • invalid string position, xrefs: 004F24A6
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
    • String ID: invalid string position
    • API String ID: 3404309857-1799206989
    • Opcode ID: a050055a2cf1a51971dbd99c204cd401fd832a35caccb34a47dde4e40cbe6f97
    • Instruction ID: 573d51ba048e22f61ae0b68f59a747df4c805d8057d1e40944b290f5b850b39a
    • Opcode Fuzzy Hash: a050055a2cf1a51971dbd99c204cd401fd832a35caccb34a47dde4e40cbe6f97
    • Instruction Fuzzy Hash: 3E11E17130021CABDB14DE1CDA809797765AF45328B44051BFA16DF242C7F8ED90C7EA
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 004F5ADE
    • std::_Xinvalid_argument.LIBCPMT ref: 004F5AF4
      • Part of subcall function 004F8329: std::exception::exception.LIBCMT ref: 004F833E
      • Part of subcall function 004F8329: __CxxThrowException@8.LIBCMT ref: 004F8353
      • Part of subcall function 004F8329: std::exception::exception.LIBCMT ref: 004F8364
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: std::exception::exception$Exception@8H_prolog3_catchThrowXinvalid_argumentstd::_
    • String ID: vector<T> too long
    • API String ID: 1877048013-3788999226
    • Opcode ID: f1d6004d39f2308cd53786256895df2786a02e55da5ffd6cae9e46ba3dc207fc
    • Instruction ID: f8feeb3cee7ea505a7eeb01813ea37b442a9dc46b3c1f9573469ead2a8382ead
    • Opcode Fuzzy Hash: f1d6004d39f2308cd53786256895df2786a02e55da5ffd6cae9e46ba3dc207fc
    • Instruction Fuzzy Hash: B9117076A006098BC718EFA9D982A3EF7E1EF54710B21082FE395D7280DA75A9008B18
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 004F79E2
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F838B
      • Part of subcall function 004F8376: __CxxThrowException@8.LIBCMT ref: 004F83A0
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F83B1
    • _memmove.LIBCMT ref: 004F7A1D
    Strings
    • invalid string position, xrefs: 004F79DD
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
    • String ID: invalid string position
    • API String ID: 1785806476-1799206989
    • Opcode ID: bb67a3563640b1f1bcc3fd7c380593832a456f6cc75bc75889718fc28be7344f
    • Instruction ID: 71f9446b2a273de93263785248289284212236768d4bc3bf37d5ea56938dab62
    • Opcode Fuzzy Hash: bb67a3563640b1f1bcc3fd7c380593832a456f6cc75bc75889718fc28be7344f
    • Instruction Fuzzy Hash: 7F0171717086198BC721CE28D98083FB3A6AFC5744321492ED282CB659EB39D95687A8
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 004F267E
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F838B
      • Part of subcall function 004F8376: __CxxThrowException@8.LIBCMT ref: 004F83A0
      • Part of subcall function 004F8376: std::exception::exception.LIBCMT ref: 004F83B1
    • _memmove.LIBCMT ref: 004F26B4
    Strings
    • invalid string position, xrefs: 004F2679
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
    • String ID: invalid string position
    • API String ID: 1785806476-1799206989
    • Opcode ID: 2ded5381c2337a59aa7c46eac287cceda6ac647c0bae52eea87701d652758558
    • Instruction ID: 7ae9638e9a7487a90585d7d01063578f73fdc440ee85283d82209e548b2b186d
    • Opcode Fuzzy Hash: 2ded5381c2337a59aa7c46eac287cceda6ac647c0bae52eea87701d652758558
    • Instruction Fuzzy Hash: 2401D6313002198BE7248E689BC443BB3A2DB857053300D3ED682CB645DBF8E8468799
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 004F7E8A
    • std::_Xinvalid_argument.LIBCPMT ref: 004F7EC4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: H_prolog3_catchXinvalid_argumentstd::_
    • String ID: string too long
    • API String ID: 4202626062-2556327735
    • Opcode ID: da6eb0fb2c7455791b6e00f9f0d80226e0d8019b7561e47b6723beb101907654
    • Instruction ID: d3796218d8a53f965387d86c69d8242f7512d5d5a8e238014f22b4e48e635a93
    • Opcode Fuzzy Hash: da6eb0fb2c7455791b6e00f9f0d80226e0d8019b7561e47b6723beb101907654
    • Instruction Fuzzy Hash: 51118B30218248DBCB20EF28C441A7E73B0FF05705B11098FFA929B691CB79EE04CB59
    APIs
      • Part of subcall function 004F96DA: __getptd.LIBCMT ref: 004F96E0
      • Part of subcall function 004F96DA: __getptd.LIBCMT ref: 004F96F0
    • __getptd.LIBCMT ref: 004FE6B0
      • Part of subcall function 004FD856: __getptd_noexit.LIBCMT ref: 004FD859
      • Part of subcall function 004FD856: __amsg_exit.LIBCMT ref: 004FD866
    • __getptd.LIBCMT ref: 004FE6BE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: csm
    • API String ID: 803148776-1018135373
    • Opcode ID: 6a44a58e31c99b426e54366fb5621d297f0f0e60a01b212659432dc75c0bdb3e
    • Instruction ID: 95ac7424f914e56daa457cec59eef65ed8a13a798e4507eb5559610e0619482e
    • Opcode Fuzzy Hash: 6a44a58e31c99b426e54366fb5621d297f0f0e60a01b212659432dc75c0bdb3e
    • Instruction Fuzzy Hash: C801243480030C8BDF34AFA2C540ABEB3F5AF10316F68442FE654966A1DB3E9980CE59
    APIs
    • LoadLibraryA.KERNEL32(User32.dll,?,004F1A20,SetClipboardData,402896FC), ref: 004F17D2
    • GetProcAddress.KERNEL32(00000000,?), ref: 004F17E0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4483173502.00000000004F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004F0000, based on PE: true
    • Associated: 00000000.00000002.4483153851.00000000004F0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483194123.0000000000504000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483213044.000000000050A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4483229881.000000000050D000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_4f0000_7zba89tklZ.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: User32.dll
    • API String ID: 2574300362-1293261179
    • Opcode ID: 9646d3d4acc1f37128dfbe4e2643dc35e77105b17a9aa86fd05f83018c5f4b02
    • Instruction ID: 55330552234c164fc6db5baf01e88bc7470a66335f1a1b3cee9af546ec3f44cc
    • Opcode Fuzzy Hash: 9646d3d4acc1f37128dfbe4e2643dc35e77105b17a9aa86fd05f83018c5f4b02
    • Instruction Fuzzy Hash: C3C08C7168420CEBDF002FF2BC0CABE7FDCEB14691B040412FB0CD4060EA36D410AA64

    Execution Graph

    Execution Coverage:4.6%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:1635
    Total number of Limit Nodes:22
    execution_graph 11988 379435 11991 37ee2f 11988->11991 11992 37d856 __getptd 66 API calls 11991->11992 11993 37ee3c 11992->11993 11994 37ee80 11993->11994 11995 37945b 11993->11995 11996 37eea3 11993->11996 11994->11995 11999 37e318 11994->11999 11996->11995 12009 37ea9d 11996->12009 12000 37e324 _setlocale 11999->12000 12001 37d856 __getptd 66 API calls 12000->12001 12006 37e344 __CallSettingFrame@12 12001->12006 12002 37e3b5 12054 37e3da 12002->12054 12006->12002 12048 37ef61 12006->12048 12007 37e3cb _setlocale 12007->11995 12008 37ef61 ___BuildCatchObjectHelper 68 API calls 12008->12007 12010 37eabc 12009->12010 12011 37ef61 ___BuildCatchObjectHelper 68 API calls 12010->12011 12014 37ead6 12010->12014 12011->12014 12012 37edf7 12013 37d856 __getptd 66 API calls 12012->12013 12016 37edff 12013->12016 12020 37d856 __getptd 66 API calls 12014->12020 12046 37ebb5 FindHandler type_info::operator== ___TypeMatch 12014->12046 12015 37edde 12097 37e996 12015->12097 12019 37ee0d 12016->12019 12021 37ef61 ___BuildCatchObjectHelper 68 API calls 12016->12021 12018 37ef15 _abort 67 API calls 12018->12046 12019->11995 12022 37eb1d 12020->12022 12021->12019 12022->12019 12025 37d856 __getptd 66 API calls 12022->12025 12024 378b26 std::exception::exception 66 API calls 12024->12046 12026 37eb2f 12025->12026 12028 37d856 __getptd 66 API calls 12026->12028 12027 37935c __CxxThrowException@8 RaiseException 12027->12046 12030 37eb3d ___BuildCatchObjectHelper 12028->12030 12029 37e4b7 IsInExceptionSpec 68 API calls 12029->12046 12031 37ef61 ___BuildCatchObjectHelper 68 API calls 12030->12031 12035 37eb59 12030->12035 12031->12035 12032 37eb83 12034 37d856 __getptd 66 API calls 12032->12034 12033 37d856 66 API calls __getptd 12033->12046 12036 37eb88 12034->12036 12035->12032 12039 37ef61 ___BuildCatchObjectHelper 68 API calls 12035->12039 12038 37d856 __getptd 66 API calls 12036->12038 12036->12046 12040 37eb9a 12038->12040 12039->12032 12041 37d856 __getptd 66 API calls 12040->12041 12042 37eba5 12041->12042 12060 37e4b7 12042->12060 12045 37e318 ___FrameUnwindToState 68 API calls 12045->12046 12046->12012 12046->12015 12046->12018 12046->12024 12046->12027 12046->12029 12046->12033 12046->12045 12066 379614 12046->12066 12072 37e928 12046->12072 12082 3793e1 RtlUnwind 12046->12082 12083 37e532 12046->12083 12059 37db40 12048->12059 12050 37ef6d DecodePointer 12051 37ef7d 12050->12051 12052 37ef15 _abort 67 API calls 12051->12052 12053 37ef98 12052->12053 12055 37d856 __getptd 66 API calls 12054->12055 12056 37e3df 12055->12056 12057 37e3c1 12056->12057 12058 37d856 __getptd 66 API calls 12056->12058 12057->12007 12057->12008 12058->12057 12059->12050 12061 37e4c3 12060->12061 12063 37e4cd ___TypeMatch 12060->12063 12062 37ef61 ___BuildCatchObjectHelper 68 API calls 12061->12062 12064 37e4c8 12062->12064 12063->12046 12065 37ef15 _abort 67 API calls 12064->12065 12065->12063 12067 37962d 12066->12067 12068 379661 12067->12068 12071 37ef61 ___BuildCatchObjectHelper 68 API calls 12067->12071 12069 37967a 12068->12069 12070 37ef61 ___BuildCatchObjectHelper 68 API calls 12068->12070 12069->12046 12070->12069 12071->12067 12073 37e933 12072->12073 12075 37e940 12072->12075 12113 37e896 12073->12113 12117 3793e1 RtlUnwind 12075->12117 12077 37e957 12078 37e318 ___FrameUnwindToState 68 API calls 12077->12078 12079 37e965 12078->12079 12118 37e57b 12079->12118 12081 37e986 FindHandlerForForeignException 12081->12046 12082->12046 12084 37e53e __EH_prolog3_catch 12083->12084 12085 37d856 __getptd 66 API calls 12084->12085 12086 37e543 12085->12086 12087 37e551 12086->12087 12088 37ef61 ___BuildCatchObjectHelper 68 API calls 12086->12088 12161 37ef4e 12087->12161 12088->12087 12098 37e9ae 12097->12098 12107 37ea98 12097->12107 12099 37d856 __getptd 66 API calls 12098->12099 12100 37e9b4 12099->12100 12102 37d856 __getptd 66 API calls 12100->12102 12111 37e9f9 12100->12111 12101 37ea12 12104 379614 _GetRangeOfTrysToCheck 68 API calls 12101->12104 12105 37e9c2 12102->12105 12103 37ef61 ___BuildCatchObjectHelper 68 API calls 12103->12101 12108 37ea27 12104->12108 12164 37d6a6 EncodePointer 12105->12164 12107->12012 12108->12107 12112 37e928 FindHandlerForForeignException 69 API calls 12108->12112 12109 37e9cd 12109->12111 12165 37949e 12109->12165 12111->12101 12111->12103 12111->12107 12112->12108 12114 37e8a2 _setlocale 12113->12114 12132 37e717 12114->12132 12116 37e8d1 ___BuildCatchObject _setlocale ___BuildCatchObjectHelper 12116->12075 12117->12077 12119 37e587 _setlocale 12118->12119 12136 379687 12119->12136 12122 37d856 __getptd 66 API calls 12123 37e5b2 12122->12123 12124 37d856 __getptd 66 API calls 12123->12124 12125 37e5c0 12124->12125 12126 37d856 __getptd 66 API calls 12125->12126 12127 37e5ce 12126->12127 12128 37d856 __getptd 66 API calls 12127->12128 12129 37e5d9 _CallCatchBlock2 12128->12129 12141 37e6a1 12129->12141 12131 37e68d _setlocale 12131->12081 12134 37e723 _setlocale ___BuildCatchObjectHelper 12132->12134 12133 37ef61 ___BuildCatchObjectHelper 68 API calls 12135 37e790 _memmove _setlocale ___BuildCatchObjectHelper 12133->12135 12134->12133 12134->12135 12135->12116 12137 37d856 __getptd 66 API calls 12136->12137 12138 37969a 12137->12138 12139 37d856 __getptd 66 API calls 12138->12139 12140 3796a8 12139->12140 12140->12122 12150 3796da 12141->12150 12144 37d856 __getptd 66 API calls 12145 37e6b5 12144->12145 12146 37d856 __getptd 66 API calls 12145->12146 12147 37e6c3 12146->12147 12149 37e706 FindHandler 12147->12149 12158 3796b3 12147->12158 12149->12131 12151 37d856 __getptd 66 API calls 12150->12151 12152 3796e5 12151->12152 12153 379701 12152->12153 12154 3796f0 12152->12154 12155 37d856 __getptd 66 API calls 12153->12155 12156 37d856 __getptd 66 API calls 12154->12156 12157 3796f5 12155->12157 12156->12157 12157->12144 12159 37d856 __getptd 66 API calls 12158->12159 12160 3796bd 12159->12160 12160->12149 12162 37d856 __getptd 66 API calls 12161->12162 12163 37ef53 12162->12163 12164->12109 12166 3794c2 12165->12166 12167 3794b0 12165->12167 12168 37d856 __getptd 66 API calls 12166->12168 12167->12111 12168->12167 11511 383b23 11512 37234f 116 API calls 11511->11512 11513 383b33 11512->11513 11514 3791b1 __cinit 76 API calls 11513->11514 11515 383b3d 11514->11515 11516 378918 11554 37db40 11516->11554 11518 378924 GetStartupInfoW 11519 378938 HeapSetInformation 11518->11519 11521 378943 11518->11521 11519->11521 11555 37db1a HeapCreate 11521->11555 11522 378991 11523 37899c 11522->11523 11638 3788ef 11522->11638 11556 37d99f GetModuleHandleW 11523->11556 11526 3789a2 11527 3789ad __RTC_Initialize 11526->11527 11528 3788ef _fast_error_exit 66 API calls 11526->11528 11581 37d415 GetStartupInfoW 11527->11581 11528->11527 11531 3789c7 GetCommandLineW 11594 37d3bd GetEnvironmentStringsW 11531->11594 11532 37cd21 __amsg_exit 66 API calls 11535 3789c6 11532->11535 11534 3789d7 11601 37d30f GetModuleFileNameW 11534->11601 11535->11531 11538 3789ec 11607 37d0dd 11538->11607 11539 37cd21 __amsg_exit 66 API calls 11539->11538 11541 3789f2 11542 3789fd 11541->11542 11543 37cd21 __amsg_exit 66 API calls 11541->11543 11621 37cb00 11542->11621 11543->11542 11545 378a05 11546 37cd21 __amsg_exit 66 API calls 11545->11546 11547 378a10 __wwincmdln 11545->11547 11546->11547 11627 372235 11547->11627 11554->11518 11555->11522 11557 37d9b3 11556->11557 11558 37d9bc GetProcAddress GetProcAddress GetProcAddress GetProcAddress 11556->11558 11646 37d6ec 11557->11646 11560 37da06 TlsAlloc 11558->11560 11563 37db15 11560->11563 11564 37da54 TlsSetValue 11560->11564 11563->11526 11564->11563 11565 37da65 11564->11565 11656 37caa9 11565->11656 11570 37db10 11572 37d6ec __mtterm 70 API calls 11570->11572 11571 37daad DecodePointer 11573 37dac2 11571->11573 11572->11563 11573->11570 11574 37c937 __calloc_crt 66 API calls 11573->11574 11575 37dad8 11574->11575 11575->11570 11576 37dae0 DecodePointer 11575->11576 11577 37daf1 11576->11577 11577->11570 11578 37daf5 11577->11578 11579 37d729 __getptd_noexit 66 API calls 11578->11579 11580 37dafd GetCurrentThreadId 11579->11580 11580->11563 11582 37c937 __calloc_crt 66 API calls 11581->11582 11583 37d433 11582->11583 11583->11583 11584 37d5a8 11583->11584 11586 37c937 __calloc_crt 66 API calls 11583->11586 11589 3789bb 11583->11589 11590 37d528 11583->11590 11585 37d5de GetStdHandle 11584->11585 11587 37d642 SetHandleCount 11584->11587 11588 37d5f0 GetFileType 11584->11588 11593 37d616 InitializeCriticalSectionAndSpinCount 11584->11593 11585->11584 11586->11583 11587->11589 11588->11584 11589->11531 11589->11532 11590->11584 11591 37d554 GetFileType 11590->11591 11592 37d55f InitializeCriticalSectionAndSpinCount 11590->11592 11591->11590 11591->11592 11592->11589 11592->11590 11593->11584 11593->11589 11595 37d3d2 11594->11595 11596 37d3ce 11594->11596 11667 37c8f2 11595->11667 11596->11534 11599 37d3f4 _memmove 11600 37d3fb FreeEnvironmentStringsW 11599->11600 11600->11534 11602 37d344 _wparse_cmdline 11601->11602 11603 3789e1 11602->11603 11604 37d381 11602->11604 11603->11538 11603->11539 11605 37c8f2 __malloc_crt 66 API calls 11604->11605 11606 37d387 _wparse_cmdline 11605->11606 11606->11603 11608 37d0f5 _wcslen 11607->11608 11610 37d0ed 11607->11610 11609 37c937 __calloc_crt 66 API calls 11608->11609 11611 37d119 _wcslen 11609->11611 11610->11541 11611->11610 11612 37d16f 11611->11612 11614 37c937 __calloc_crt 66 API calls 11611->11614 11615 37d195 11611->11615 11616 382515 __wsetenvp 66 API calls 11611->11616 11618 37d1ac 11611->11618 11613 378f81 _free 66 API calls 11612->11613 11613->11610 11614->11611 11617 378f81 _free 66 API calls 11615->11617 11616->11611 11617->11610 11619 3803e1 __invoke_watson 10 API calls 11618->11619 11620 37d1b8 11619->11620 11620->11541 11622 37cb0e __IsNonwritableInCurrentImage 11621->11622 11672 3820d5 11622->11672 11624 37cb2c __initterm_e 11625 3791b1 __cinit 76 API calls 11624->11625 11626 37cb4d __IsNonwritableInCurrentImage 11624->11626 11625->11626 11626->11545 11675 371020 11627->11675 11630 372252 GetLastError 11631 37225f CloseHandle 11630->11631 11633 37226d 11630->11633 11632 372266 ExitProcess 11631->11632 11633->11632 11634 372277 11633->11634 11756 377529 11634->11756 11639 378902 11638->11639 11640 3788fd 11638->11640 11642 37cd65 __NMSG_WRITE 66 API calls 11639->11642 11641 37cf14 __FF_MSGBANNER 66 API calls 11640->11641 11641->11639 11643 37890a 11642->11643 11644 37ca7f _doexit 3 API calls 11643->11644 11645 378914 11644->11645 11645->11523 11647 37d6f6 DecodePointer 11646->11647 11648 37d705 11646->11648 11647->11648 11649 37d716 TlsFree 11648->11649 11650 37d724 11648->11650 11649->11650 11651 3807e2 DeleteCriticalSection 11650->11651 11652 3807fa 11650->11652 11653 378f81 _free 66 API calls 11651->11653 11654 38080c DeleteCriticalSection 11652->11654 11655 37d9b8 11652->11655 11653->11650 11654->11652 11655->11526 11665 37d6a6 EncodePointer 11656->11665 11658 37cab1 __init_pointers __initp_misc_winsig 11666 37ef99 EncodePointer 11658->11666 11660 37cad7 EncodePointer EncodePointer EncodePointer EncodePointer 11661 38077c 11660->11661 11662 380787 11661->11662 11663 380791 InitializeCriticalSectionAndSpinCount 11662->11663 11664 37daa9 11662->11664 11663->11662 11663->11664 11664->11570 11664->11571 11665->11658 11666->11660 11670 37c8fb 11667->11670 11668 37a7f1 _malloc 65 API calls 11668->11670 11669 37c931 11669->11599 11670->11668 11670->11669 11671 37c912 Sleep 11670->11671 11671->11670 11673 3820db EncodePointer 11672->11673 11673->11673 11674 3820f5 11673->11674 11674->11624 11796 371000 LoadLibraryA 11675->11796 11677 371033 11678 371000 2 API calls 11677->11678 11679 371043 11678->11679 11680 371000 2 API calls 11679->11680 11681 371058 11680->11681 11682 371000 2 API calls 11681->11682 11683 371068 11682->11683 11684 371000 2 API calls 11683->11684 11685 371078 11684->11685 11686 371000 2 API calls 11685->11686 11687 371088 11686->11687 11688 371000 2 API calls 11687->11688 11689 371098 11688->11689 11690 371000 2 API calls 11689->11690 11691 3710a8 11690->11691 11692 371000 2 API calls 11691->11692 11693 3710bb 11692->11693 11694 371000 2 API calls 11693->11694 11695 3710d0 11694->11695 11696 371000 2 API calls 11695->11696 11697 3710e0 11696->11697 11698 371000 2 API calls 11697->11698 11699 3710f0 11698->11699 11700 371000 2 API calls 11699->11700 11701 371100 11700->11701 11702 371000 2 API calls 11701->11702 11703 371110 11702->11703 11704 371000 2 API calls 11703->11704 11705 371120 11704->11705 11706 371000 2 API calls 11705->11706 11707 371130 11706->11707 11708 371000 2 API calls 11707->11708 11709 371143 11708->11709 11710 371000 2 API calls 11709->11710 11711 371153 11710->11711 11712 371000 2 API calls 11711->11712 11713 371163 11712->11713 11714 371000 2 API calls 11713->11714 11715 371173 11714->11715 11716 371000 2 API calls 11715->11716 11717 371183 11716->11717 11718 371000 2 API calls 11717->11718 11719 371193 11718->11719 11720 371000 2 API calls 11719->11720 11721 3711a3 11720->11721 11722 371000 2 API calls 11721->11722 11723 3711b3 11722->11723 11724 371000 2 API calls 11723->11724 11725 3711c6 11724->11725 11726 371000 2 API calls 11725->11726 11727 3711d6 11726->11727 11728 371000 2 API calls 11727->11728 11729 3711ea 11728->11729 11730 371000 2 API calls 11729->11730 11731 3711fe 11730->11731 11732 371000 2 API calls 11731->11732 11733 37120e 11732->11733 11734 371000 2 API calls 11733->11734 11735 37121e 11734->11735 11736 371000 2 API calls 11735->11736 11737 37122e 11736->11737 11738 371000 2 API calls 11737->11738 11739 37123e 11738->11739 11740 371000 2 API calls 11739->11740 11741 371251 11740->11741 11742 371000 2 API calls 11741->11742 11743 371266 11742->11743 11744 371000 2 API calls 11743->11744 11745 371276 11744->11745 11746 371000 2 API calls 11745->11746 11747 371286 11746->11747 11748 371000 2 API calls 11747->11748 11749 371296 11748->11749 11750 371000 2 API calls 11749->11750 11751 3712a6 11750->11751 11752 371000 2 API calls 11751->11752 11753 3712b6 11752->11753 11754 371000 2 API calls 11753->11754 11755 3712c6 CreateMutexA 11754->11755 11755->11630 11755->11633 11799 3797f5 11756->11799 11758 377538 GetModuleFileNameW 11800 377838 11758->11800 11762 37756e 11763 377584 SHGetFolderPathW 11762->11763 11764 3775a0 11763->11764 11795 3776d3 11763->11795 11820 3722c3 11764->11820 11769 3722c3 77 API calls 11770 3775c3 11769->11770 11824 3773c3 11770->11824 11772 3775dc 11832 377e83 11772->11832 11774 377650 11775 377838 77 API calls 11774->11775 11776 377666 11775->11776 11839 377c18 11776->11839 11778 37767f 11779 3776a8 CopyFileW 11778->11779 11780 377701 11779->11780 11781 3776bc Sleep 11779->11781 11782 3722c3 77 API calls 11780->11782 11783 37744f 80 API calls 11781->11783 11784 377711 11782->11784 11783->11795 11785 3722c3 77 API calls 11784->11785 11786 377725 11785->11786 11787 3773c3 77 API calls 11786->11787 11788 37773e 11787->11788 11789 377e83 77 API calls 11788->11789 11790 3777af 11789->11790 11842 377c3e 11790->11842 11792 3777cc MoveFileW 11794 37744f 80 API calls 11792->11794 11794->11795 11850 37983f 11795->11850 11797 371010 GetProcAddress 11796->11797 11798 37101c 11796->11798 11797->11677 11798->11677 11799->11758 11801 377854 11800->11801 11801->11801 11853 377958 11801->11853 11803 37755e 11804 37744f 11803->11804 11805 37745b __EH_prolog3_GS 11804->11805 11806 3722c3 77 API calls 11805->11806 11807 37746e 11806->11807 11808 3722c3 77 API calls 11807->11808 11809 37747f 11808->11809 11810 3773c3 77 API calls 11809->11810 11811 377492 11810->11811 11812 3774b6 RegOpenKeyExA 11811->11812 11813 3774e3 RegSetValueExW 11812->11813 11814 3774cf 11812->11814 11816 377525 11813->11816 11817 37750c RegCloseKey 11813->11817 11818 37983f 5 API calls 11814->11818 11816->11817 11817->11814 11819 3774e2 11818->11819 11819->11762 11821 3722da 11820->11821 11821->11821 11907 37255b 11821->11907 11823 3722ed 11823->11769 11825 3773cf __EH_prolog3_GS 11824->11825 11947 377399 11825->11947 11829 3773ef 11830 37983f 5 API calls 11829->11830 11831 37744e 11830->11831 11831->11772 11833 377e8f __EH_prolog3_catch 11832->11833 11967 377d19 11833->11967 11835 377e9f 11836 377a44 77 API calls 11835->11836 11837 377f19 std::locale::_Locimp::~_Locimp 11835->11837 11838 378329 std::_Xinvalid_argument 67 API calls 11835->11838 11836->11835 11837->11774 11838->11835 11971 377d4e 11839->11971 11841 377c2e 11841->11778 11843 377c4a __EH_prolog3 11842->11843 11843->11843 11844 377d19 77 API calls 11843->11844 11845 377c8a 11844->11845 11979 377deb 11845->11979 11847 377cab 11848 377d4e 77 API calls 11847->11848 11849 377cb6 std::locale::_Locimp::~_Locimp 11848->11849 11849->11792 11851 378a8f __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 11850->11851 11852 379849 11851->11852 11852->11852 11854 37796a 11853->11854 11855 37798b 11854->11855 11857 37796e 11854->11857 11871 377a44 11855->11871 11860 37787e 11857->11860 11859 377989 _memmove 11859->11803 11861 377892 11860->11861 11862 37789c 11860->11862 11877 378376 11861->11877 11864 3778c1 11862->11864 11865 3778aa 11862->11865 11866 377a44 77 API calls 11864->11866 11884 3779d3 11865->11884 11870 3778bf _memmove 11866->11870 11868 3778b5 11869 3779d3 67 API calls 11868->11869 11869->11870 11870->11859 11872 377a52 11871->11872 11873 377a5c 11871->11873 11888 378329 11872->11888 11876 377a6d 11873->11876 11895 377ab0 11873->11895 11876->11859 11878 378b26 std::exception::exception 66 API calls 11877->11878 11879 378390 11878->11879 11880 37935c __CxxThrowException@8 RaiseException 11879->11880 11881 3783a5 11880->11881 11882 378bd2 std::exception::exception 66 API calls 11881->11882 11883 3783b6 11882->11883 11883->11862 11885 3779dd 11884->11885 11887 3779e7 _memmove 11884->11887 11886 378376 std::_Xinvalid_argument 67 API calls 11885->11886 11886->11887 11887->11868 11889 378b26 std::exception::exception 66 API calls 11888->11889 11890 378343 11889->11890 11891 37935c __CxxThrowException@8 RaiseException 11890->11891 11892 378358 11891->11892 11893 378bd2 std::exception::exception 66 API calls 11892->11893 11894 378369 11893->11894 11894->11873 11896 377abc __EH_prolog3_catch 11895->11896 11899 377bcf 11896->11899 11898 377b08 std::locale::_Locimp::~_Locimp _memmove 11898->11876 11900 377c16 11899->11900 11901 377bdb 11899->11901 11900->11898 11902 377bec 11901->11902 11903 3792dc std::locale::_Init 77 API calls 11901->11903 11902->11900 11904 378b26 std::exception::exception 66 API calls 11902->11904 11903->11902 11905 377c01 11904->11905 11906 37935c __CxxThrowException@8 RaiseException 11905->11906 11906->11900 11908 3725a6 11907->11908 11910 372568 11907->11910 11925 3726d9 11908->11925 11910->11908 11912 37258e 11910->11912 11911 3725a4 _memmove 11911->11823 11914 372495 11912->11914 11915 3724a6 11914->11915 11916 3724b0 11914->11916 11917 378376 std::_Xinvalid_argument 67 API calls 11915->11917 11918 3724c0 11916->11918 11919 3724d8 11916->11919 11917->11916 11931 37266f 11918->11931 11921 3726d9 77 API calls 11919->11921 11924 3724d6 _memmove 11921->11924 11922 3724cc 11923 37266f 67 API calls 11922->11923 11923->11924 11924->11911 11926 3726de 11925->11926 11927 3726e8 11925->11927 11929 378329 std::_Xinvalid_argument 67 API calls 11926->11929 11928 3726f9 11927->11928 11935 372749 11927->11935 11928->11911 11929->11927 11932 372679 11931->11932 11934 372683 _memmove 11931->11934 11933 378376 std::_Xinvalid_argument 67 API calls 11932->11933 11933->11934 11934->11922 11936 372755 __EH_prolog3_catch 11935->11936 11939 372823 11936->11939 11938 37279c std::locale::_Locimp::~_Locimp _memmove 11938->11928 11940 372830 11939->11940 11941 372868 11939->11941 11942 37283e 11940->11942 11943 3792dc std::locale::_Init 77 API calls 11940->11943 11941->11938 11942->11941 11944 378b26 std::exception::exception 66 API calls 11942->11944 11943->11942 11945 372853 11944->11945 11946 37935c __CxxThrowException@8 RaiseException 11945->11946 11946->11941 11948 3773ad 11947->11948 11957 377219 11948->11957 11950 3773bc 11951 3741b6 11950->11951 11952 3741cf 11951->11952 11953 3741d9 11951->11953 11954 378329 std::_Xinvalid_argument 67 API calls 11952->11954 11955 3726d9 77 API calls 11953->11955 11954->11953 11956 3741e0 11955->11956 11956->11829 11958 377225 __EH_prolog3_GS 11957->11958 11959 377238 11958->11959 11962 377249 11958->11962 11960 3722c3 77 API calls 11959->11960 11966 377242 11960->11966 11961 377391 11961->11950 11962->11961 11963 3741b6 77 API calls 11962->11963 11963->11966 11964 37983f 5 API calls 11965 377377 11964->11965 11965->11950 11966->11964 11968 377d27 11967->11968 11970 377d35 11967->11970 11969 377a44 77 API calls 11968->11969 11968->11970 11969->11970 11970->11835 11972 377d5f 11971->11972 11973 377d69 11971->11973 11974 378376 std::_Xinvalid_argument 67 API calls 11972->11974 11975 377d88 11973->11975 11976 378329 std::_Xinvalid_argument 67 API calls 11973->11976 11974->11973 11977 377a44 77 API calls 11975->11977 11978 377d99 _memmove 11975->11978 11976->11975 11977->11978 11978->11841 11980 377dfb 11979->11980 11981 377dff 11980->11981 11982 377e1a 11980->11982 11986 377d4e 77 API calls 11981->11986 11983 377e30 11982->11983 11984 378329 std::_Xinvalid_argument 67 API calls 11982->11984 11985 377a44 77 API calls 11983->11985 11987 377e18 _memmove 11983->11987 11984->11983 11985->11987 11986->11987 11987->11847 10240 383b7a 10245 37234f 10240->10245 10242 383b8a 10253 3791b1 10242->10253 10246 37235b __EH_prolog3 10245->10246 10256 37242a 10246->10256 10250 372371 10261 37296f 10250->10261 10252 37239a std::locale::_Locimp::~_Locimp 10252->10242 11079 379175 10253->11079 10255 3791be 10273 37829a 10256->10273 10258 372436 10289 371461 10258->10289 10659 372ac1 10261->10659 10263 372989 10662 372b41 10263->10662 10265 372993 10265->10252 10266 377f85 11076 377f21 10266->11076 10269 37935c __CxxThrowException@8 RaiseException 10270 377fa6 10269->10270 10271 378bd2 std::exception::exception 66 API calls 10270->10271 10272 377fb9 10271->10272 10272->10250 10274 3782a6 __EH_prolog3 10273->10274 10275 378321 std::locale::_Locimp::~_Locimp 10274->10275 10294 37843e 10274->10294 10275->10258 10283 3782de 10313 37805f 10283->10313 10286 3782fe 10287 371461 std::locale::facet::_Incref 2 API calls 10286->10287 10288 37830b 10287->10288 10323 378466 10288->10323 10290 37843e std::_Lockit::_Lockit EnterCriticalSection 10289->10290 10291 371472 10290->10291 10292 378466 _tidy_global LeaveCriticalSection 10291->10292 10293 371486 10292->10293 10293->10250 10293->10266 10295 378450 10294->10295 10296 3782bc 10294->10296 10327 3788cf EnterCriticalSection 10295->10327 10296->10288 10298 3792dc 10296->10298 10300 3792e6 10298->10300 10301 3782d1 10300->10301 10306 379302 std::exception::exception 10300->10306 10328 37a7f1 10300->10328 10345 37e110 DecodePointer 10300->10345 10301->10283 10310 3781f7 10301->10310 10303 379340 10347 378bd2 10303->10347 10306->10303 10308 3791b1 __cinit 76 API calls 10306->10308 10308->10303 10309 37935b 10311 378152 _Yarn 66 API calls 10310->10311 10312 37822f 10311->10312 10312->10283 10314 37807e 10313->10314 10315 37806d 10313->10315 10317 378152 10314->10317 10596 378852 10315->10596 10318 378164 10317->10318 10322 37818f _memmove 10317->10322 10319 37816e 10318->10319 10320 378f81 _free 66 API calls 10318->10320 10321 37a7f1 _malloc 66 API calls 10319->10321 10319->10322 10320->10319 10321->10322 10322->10286 10324 37846d 10323->10324 10325 37847b 10323->10325 10658 3788df LeaveCriticalSection 10324->10658 10325->10275 10327->10296 10329 37a86e 10328->10329 10333 37a7ff 10328->10333 10330 37e110 _malloc DecodePointer 10329->10330 10331 37a874 10330->10331 10334 37a8c7 __stricmp_l 65 API calls 10331->10334 10332 37a80a 10332->10333 10353 37cf14 10332->10353 10362 37cd65 10332->10362 10386 37ca7f 10332->10386 10333->10332 10336 37a82d RtlAllocateHeap 10333->10336 10339 37a85a 10333->10339 10340 37e110 _malloc DecodePointer 10333->10340 10343 37a858 10333->10343 10337 37a866 10334->10337 10336->10333 10336->10337 10337->10300 10389 37a8c7 10339->10389 10340->10333 10344 37a8c7 __stricmp_l 65 API calls 10343->10344 10344->10337 10346 37e125 10345->10346 10346->10300 10571 378b4d 10347->10571 10350 37935c 10351 379385 10350->10351 10352 379391 RaiseException 10350->10352 10351->10352 10352->10309 10392 382578 10353->10392 10355 37cf1b 10356 37cf28 10355->10356 10357 382578 __NMSG_WRITE 66 API calls 10355->10357 10358 37cd65 __NMSG_WRITE 66 API calls 10356->10358 10360 37cf4a 10356->10360 10357->10356 10359 37cf40 10358->10359 10361 37cd65 __NMSG_WRITE 66 API calls 10359->10361 10360->10332 10361->10360 10363 37cd86 __NMSG_WRITE 10362->10363 10365 382578 __NMSG_WRITE 63 API calls 10363->10365 10385 37cea2 10363->10385 10367 37cda0 10365->10367 10366 37cf12 10366->10332 10368 37ceb1 GetStdHandle 10367->10368 10369 382578 __NMSG_WRITE 63 API calls 10367->10369 10372 37cebf _strlen 10368->10372 10368->10385 10370 37cdb1 10369->10370 10370->10368 10371 37cdc3 10370->10371 10371->10385 10411 382515 10371->10411 10375 37cef5 WriteFile 10372->10375 10372->10385 10375->10385 10376 37cdef GetModuleFileNameW 10377 37ce10 10376->10377 10381 37ce1c _wcslen 10376->10381 10378 382515 __wsetenvp 63 API calls 10377->10378 10378->10381 10379 3803e1 __invoke_watson 10 API calls 10379->10381 10380 3823b8 63 API calls __NMSG_WRITE 10380->10381 10381->10379 10381->10380 10383 37ce92 10381->10383 10420 38242d 10381->10420 10429 38224c 10383->10429 10447 378a8f 10385->10447 10457 37ca54 GetModuleHandleW 10386->10457 10460 37d7dd GetLastError 10389->10460 10391 37a8cc 10391->10343 10393 382584 10392->10393 10394 37a8c7 __stricmp_l 66 API calls 10393->10394 10395 38258e 10393->10395 10396 3825a7 10394->10396 10395->10355 10399 380433 10396->10399 10402 380406 DecodePointer 10399->10402 10403 38041b 10402->10403 10408 3803e1 10403->10408 10405 380432 10406 380406 __stricmp_l 10 API calls 10405->10406 10407 38043f 10406->10407 10407->10355 10409 3802b8 __call_reportfault 8 API calls 10408->10409 10410 3803f3 GetCurrentProcess TerminateProcess 10409->10410 10410->10405 10412 38252a 10411->10412 10413 382523 10411->10413 10414 37a8c7 __stricmp_l 66 API calls 10412->10414 10413->10412 10415 38254b 10413->10415 10419 38252f 10414->10419 10417 37cde4 10415->10417 10418 37a8c7 __stricmp_l 66 API calls 10415->10418 10416 380433 __stricmp_l 11 API calls 10416->10417 10417->10376 10417->10381 10418->10419 10419->10416 10425 38243f 10420->10425 10421 382443 10422 37a8c7 __stricmp_l 66 API calls 10421->10422 10423 382448 10421->10423 10424 38245f 10422->10424 10423->10381 10426 380433 __stricmp_l 11 API calls 10424->10426 10425->10421 10425->10423 10427 382486 10425->10427 10426->10423 10427->10423 10428 37a8c7 __stricmp_l 66 API calls 10427->10428 10428->10424 10455 37d6a6 EncodePointer 10429->10455 10431 382272 10432 3822ff 10431->10432 10433 382282 LoadLibraryW 10431->10433 10439 382319 DecodePointer DecodePointer 10432->10439 10444 38232c 10432->10444 10434 382397 10433->10434 10435 382297 GetProcAddress 10433->10435 10440 378a8f __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 10434->10440 10435->10434 10438 3822ad 7 API calls 10435->10438 10436 38238b DecodePointer 10436->10434 10437 382362 DecodePointer 10437->10436 10441 382369 10437->10441 10438->10432 10442 3822ef GetProcAddress EncodePointer 10438->10442 10439->10444 10443 3823b6 10440->10443 10441->10436 10445 38237c DecodePointer 10441->10445 10442->10432 10443->10385 10444->10436 10444->10437 10446 38234f 10444->10446 10445->10436 10445->10446 10446->10436 10448 378a97 10447->10448 10449 378a99 IsDebuggerPresent 10447->10449 10448->10366 10456 382712 10449->10456 10452 37de97 SetUnhandledExceptionFilter UnhandledExceptionFilter 10453 37deb4 __call_reportfault 10452->10453 10454 37debc GetCurrentProcess TerminateProcess 10452->10454 10453->10454 10454->10366 10455->10431 10456->10452 10458 37ca78 ExitProcess 10457->10458 10459 37ca68 GetProcAddress 10457->10459 10459->10458 10474 37d6b8 TlsGetValue 10460->10474 10463 37d84a SetLastError 10463->10391 10466 37d810 DecodePointer 10467 37d825 10466->10467 10468 37d841 10467->10468 10469 37d829 10467->10469 10496 378f81 10468->10496 10483 37d729 10469->10483 10472 37d831 GetCurrentThreadId 10472->10463 10473 37d847 10473->10463 10475 37d6cd DecodePointer TlsSetValue 10474->10475 10476 37d6e8 10474->10476 10475->10476 10476->10463 10477 37c937 10476->10477 10479 37c940 10477->10479 10480 37c97d 10479->10480 10481 37c95e Sleep 10479->10481 10502 381e3f 10479->10502 10480->10463 10480->10466 10482 37c973 10481->10482 10482->10479 10482->10480 10511 37db40 10483->10511 10485 37d735 GetModuleHandleW 10512 3808f6 10485->10512 10487 37d773 InterlockedIncrement 10519 37d7cb 10487->10519 10490 3808f6 __lock 64 API calls 10491 37d794 10490->10491 10522 380443 InterlockedIncrement 10491->10522 10493 37d7b2 10534 37d7d4 10493->10534 10495 37d7bf _setlocale 10495->10472 10497 378f8c HeapFree 10496->10497 10498 378fb5 _free 10496->10498 10497->10498 10499 378fa1 10497->10499 10498->10473 10500 37a8c7 __stricmp_l 64 API calls 10499->10500 10501 378fa7 GetLastError 10500->10501 10501->10498 10503 381e4b 10502->10503 10507 381e66 10502->10507 10504 381e57 10503->10504 10503->10507 10505 37a8c7 __stricmp_l 65 API calls 10504->10505 10508 381e5c 10505->10508 10506 381e79 HeapAlloc 10506->10507 10510 381ea0 10506->10510 10507->10506 10509 37e110 _malloc DecodePointer 10507->10509 10507->10510 10508->10479 10509->10507 10510->10479 10511->10485 10513 38090b 10512->10513 10514 38091e EnterCriticalSection 10512->10514 10537 380834 10513->10537 10514->10487 10516 380911 10516->10514 10562 37cd21 10516->10562 10569 38081d LeaveCriticalSection 10519->10569 10521 37d78d 10521->10490 10523 380461 InterlockedIncrement 10522->10523 10524 380464 10522->10524 10523->10524 10525 38046e InterlockedIncrement 10524->10525 10526 380471 10524->10526 10525->10526 10527 38047b InterlockedIncrement 10526->10527 10528 38047e 10526->10528 10527->10528 10529 380488 InterlockedIncrement 10528->10529 10531 38048b 10528->10531 10529->10531 10530 3804a4 InterlockedIncrement 10530->10531 10531->10530 10532 3804b4 InterlockedIncrement 10531->10532 10533 3804bf InterlockedIncrement 10531->10533 10532->10531 10533->10493 10570 38081d LeaveCriticalSection 10534->10570 10536 37d7db 10536->10495 10538 380840 _setlocale 10537->10538 10539 380866 10538->10539 10540 37cf14 __FF_MSGBANNER 65 API calls 10538->10540 10541 37c8f2 __malloc_crt 65 API calls 10539->10541 10547 380876 _setlocale 10539->10547 10542 380855 10540->10542 10543 380881 10541->10543 10544 37cd65 __NMSG_WRITE 65 API calls 10542->10544 10545 380888 10543->10545 10546 380897 10543->10546 10548 38085c 10544->10548 10549 37a8c7 __stricmp_l 65 API calls 10545->10549 10550 3808f6 __lock 65 API calls 10546->10550 10547->10516 10551 37ca7f _doexit GetModuleHandleW GetProcAddress ExitProcess 10548->10551 10549->10547 10552 38089e 10550->10552 10551->10539 10553 3808d1 10552->10553 10554 3808a6 InitializeCriticalSectionAndSpinCount 10552->10554 10555 378f81 _free 65 API calls 10553->10555 10556 3808c2 10554->10556 10557 3808b6 10554->10557 10555->10556 10559 3808ed __mtinitlocknum LeaveCriticalSection 10556->10559 10558 378f81 _free 65 API calls 10557->10558 10560 3808bc 10558->10560 10559->10547 10561 37a8c7 __stricmp_l 65 API calls 10560->10561 10561->10556 10563 37cf14 __FF_MSGBANNER 66 API calls 10562->10563 10564 37cd2b 10563->10564 10565 37cd65 __NMSG_WRITE 66 API calls 10564->10565 10566 37cd33 10565->10566 10567 37cced __amsg_exit 66 API calls 10566->10567 10568 37cd3e 10567->10568 10569->10521 10570->10536 10572 378b5d 10571->10572 10576 378b72 10571->10576 10577 378b08 10572->10577 10576->10350 10578 378b13 10577->10578 10579 378b1b 10577->10579 10580 378f81 _free 66 API calls 10578->10580 10579->10576 10581 378ac8 10579->10581 10580->10579 10582 378ad6 _strlen 10581->10582 10583 378afb 10581->10583 10584 37a7f1 _malloc 66 API calls 10582->10584 10583->10576 10585 378ae8 10584->10585 10585->10583 10587 37ded0 10585->10587 10588 37dee5 10587->10588 10589 37dede 10587->10589 10590 37a8c7 __stricmp_l 66 API calls 10588->10590 10589->10588 10594 37df03 10589->10594 10591 37deea 10590->10591 10592 380433 __stricmp_l 11 API calls 10591->10592 10593 37def4 10592->10593 10593->10583 10594->10593 10595 37a8c7 __stricmp_l 66 API calls 10594->10595 10595->10591 10597 378866 EncodePointer 10596->10597 10598 378860 10596->10598 10597->10314 10605 381f16 DecodePointer 10598->10605 10600 37c9d6 10606 37cced 10600->10606 10602 37ca40 10602->10314 10605->10600 10615 37cb97 10606->10615 10608 37ca03 10608->10602 10609 37ef15 10608->10609 10610 37ef21 _setlocale 10609->10610 10645 37d856 10610->10645 10613 37ef48 _setlocale 10613->10602 10616 37cba3 _setlocale 10615->10616 10617 3808f6 __lock 61 API calls 10616->10617 10618 37cbaa 10617->10618 10620 37cbd5 DecodePointer 10618->10620 10624 37cc54 10618->10624 10622 37cbec DecodePointer 10620->10622 10620->10624 10634 37cbff 10622->10634 10623 37ccd1 _setlocale 10623->10608 10638 37ccc2 10624->10638 10626 37ccb9 10628 37ccc2 10626->10628 10629 37ca7f _doexit 3 API calls 10626->10629 10630 37cccf 10628->10630 10643 38081d LeaveCriticalSection 10628->10643 10629->10628 10630->10608 10631 37cc16 DecodePointer 10637 37d6a6 EncodePointer 10631->10637 10634->10624 10634->10631 10635 37cc25 DecodePointer DecodePointer 10634->10635 10636 37d6a6 EncodePointer 10634->10636 10635->10634 10636->10634 10637->10634 10639 37ccc8 10638->10639 10641 37cca2 10638->10641 10644 38081d LeaveCriticalSection 10639->10644 10641->10623 10642 38081d LeaveCriticalSection 10641->10642 10642->10626 10643->10630 10644->10641 10646 37d7dd __getptd_noexit 66 API calls 10645->10646 10647 37d85e 10646->10647 10648 37d86b 10647->10648 10649 37cd21 __amsg_exit 66 API calls 10647->10649 10650 37c9d1 10648->10650 10649->10648 10657 381f16 DecodePointer 10650->10657 10652 37c9d6 10653 37cced __amsg_exit 66 API calls 10652->10653 10655 37ca03 10653->10655 10654 37ca40 10654->10613 10655->10654 10656 37ef15 _abort 67 API calls 10655->10656 10656->10654 10657->10652 10658->10325 10660 3792dc std::locale::_Init 77 API calls 10659->10660 10661 372ae5 10660->10661 10661->10263 10663 372b4d __EH_prolog3_catch 10662->10663 10674 3733b8 10663->10674 10665 372b5f 10677 373270 10665->10677 10668 372b76 10691 37335e 10668->10691 10669 377f85 67 API calls 10669->10668 10671 372b7d 10695 3740cc 10671->10695 10673 372b85 std::locale::_Locimp::~_Locimp 10673->10265 10675 3792dc std::locale::_Init 77 API calls 10674->10675 10676 3733c2 10675->10676 10676->10665 10698 373e53 10677->10698 10680 3732ad 10708 374021 10680->10708 10681 372b68 10681->10668 10681->10669 10683 3740cc 77 API calls 10684 3732a5 10683->10684 10685 37335e 77 API calls 10684->10685 10685->10680 10686 373e53 114 API calls 10690 3732ba 10686->10690 10687 3740cc 77 API calls 10687->10690 10688 37335e 77 API calls 10688->10690 10689 3792dc std::locale::_Init 77 API calls 10689->10690 10690->10681 10690->10686 10690->10687 10690->10688 10690->10689 10692 37336a 10691->10692 10693 3792dc std::locale::_Init 77 API calls 10692->10693 10694 37338b 10693->10694 10694->10671 10696 3792dc std::locale::_Init 77 API calls 10695->10696 10697 3740d6 10696->10697 10697->10673 10699 37328c 10698->10699 10701 373e68 10698->10701 10699->10680 10699->10681 10699->10683 10701->10699 10705 377f85 67 API calls 10701->10705 10706 3740cc 77 API calls 10701->10706 10713 374fc3 10701->10713 10724 374d37 10701->10724 10740 374cee 10701->10740 10747 374e09 10701->10747 10774 374ed7 10701->10774 10705->10701 10706->10701 10709 3792dc std::locale::_Init 77 API calls 10708->10709 10710 37402d 10709->10710 10711 3792dc std::locale::_Init 77 API calls 10710->10711 10712 374061 10711->10712 10712->10690 10714 374fd5 10713->10714 10715 374fe2 10714->10715 10716 3792dc std::locale::_Init 77 API calls 10714->10716 10717 375019 10715->10717 10719 37502d 10715->10719 10716->10715 10790 37354d 10717->10790 10721 375021 10719->10721 10798 3733f5 10719->10798 10784 375076 10721->10784 10725 374dd0 10724->10725 10726 374d48 10724->10726 10959 375720 10725->10959 10726->10725 10729 374d5a 10726->10729 10728 374dd7 10730 374d70 10728->10730 10731 374dea 10728->10731 10732 374d63 10729->10732 10737 374d72 10729->10737 10733 374fc3 114 API calls 10730->10733 10739 374d9d 10731->10739 10974 3755c4 10731->10974 10732->10730 10732->10739 10734 374de8 10733->10734 10734->10701 10736 377f85 67 API calls 10736->10734 10738 3792dc std::locale::_Init 77 API calls 10737->10738 10737->10739 10738->10739 10739->10734 10739->10736 10741 375864 77 API calls 10740->10741 10744 374cfc 10741->10744 10742 374d27 11012 37563b 10742->11012 10744->10742 11005 3758b0 10744->11005 10748 374e18 10747->10748 10749 374e77 10748->10749 10752 374e2c 10748->10752 10771 374e1e 10748->10771 10750 374e80 10749->10750 10751 374e9c 10749->10751 10753 3740cc 77 API calls 10750->10753 10754 374eac 10751->10754 10757 377f85 67 API calls 10751->10757 10752->10750 10764 374e42 10752->10764 10756 374e8b 10753->10756 10758 3733b8 77 API calls 10754->10758 10755 377f85 67 API calls 10761 374e50 10755->10761 10759 373270 114 API calls 10756->10759 10757->10754 10760 374eb9 10758->10760 10762 374e94 10759->10762 10763 373270 114 API calls 10760->10763 10761->10701 10765 37335e 77 API calls 10762->10765 10766 374ec2 10763->10766 10768 374e47 10764->10768 10769 374e58 10764->10769 10765->10761 10767 37335e 77 API calls 10766->10767 10767->10761 11055 375837 10768->11055 10769->10771 10772 374e5d 10769->10772 10771->10755 10773 375837 114 API calls 10772->10773 10773->10761 10775 374ef1 10774->10775 10776 374ef6 10774->10776 10775->10776 10777 374fbf 10775->10777 10779 377f85 67 API calls 10775->10779 10782 374f34 10775->10782 11068 3758e2 10776->11068 10777->10701 10779->10782 10780 374f3f 10780->10776 10781 377f85 67 API calls 10780->10781 10781->10776 10782->10780 10783 377f85 67 API calls 10782->10783 10783->10780 10785 375080 10784->10785 10788 375050 10784->10788 10803 3791de 10785->10803 10787 37508e 10787->10788 10824 377f52 10787->10824 10788->10701 10791 373559 __EH_prolog3 10790->10791 10794 37357e std::locale::_Locimp::~_Locimp 10791->10794 10828 373726 10791->10828 10794->10721 10796 373573 10849 3714cb 10796->10849 10919 373516 10798->10919 10800 37341b 10801 378a8f __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 10800->10801 10802 373456 10801->10802 10802->10721 10804 3791f4 10803->10804 10805 3791e9 10803->10805 10807 3791fc 10804->10807 10816 379209 10804->10816 10806 37a7f1 _malloc 66 API calls 10805->10806 10808 3791f1 10806->10808 10809 378f81 _free 66 API calls 10807->10809 10808->10787 10823 379204 _free 10809->10823 10810 379241 10811 37e110 _malloc DecodePointer 10810->10811 10813 379247 10811->10813 10812 379211 HeapReAlloc 10812->10816 10812->10823 10814 37a8c7 __stricmp_l 66 API calls 10813->10814 10814->10823 10815 379271 10818 37a8c7 __stricmp_l 66 API calls 10815->10818 10816->10810 10816->10812 10816->10815 10817 37e110 _malloc DecodePointer 10816->10817 10820 379259 10816->10820 10817->10816 10819 379276 GetLastError 10818->10819 10819->10823 10821 37a8c7 __stricmp_l 66 API calls 10820->10821 10822 37925e GetLastError 10821->10822 10822->10823 10823->10787 10825 377f6f std::exception::exception 10824->10825 10826 37935c __CxxThrowException@8 RaiseException 10825->10826 10827 377f84 10826->10827 10829 371461 std::locale::facet::_Incref 2 API calls 10828->10829 10830 373569 10829->10830 10831 37286c 10830->10831 10832 372878 __EH_prolog3 10831->10832 10833 37843e std::_Lockit::_Lockit EnterCriticalSection 10832->10833 10834 372882 10833->10834 10853 371430 10834->10853 10836 372899 10848 3728ad 10836->10848 10859 371533 10836->10859 10837 378466 _tidy_global LeaveCriticalSection 10838 372902 std::locale::_Locimp::~_Locimp 10837->10838 10838->10796 10840 3728bd 10841 3728df 10840->10841 10869 378b8d 10840->10869 10843 371461 std::locale::facet::_Incref 2 API calls 10841->10843 10845 3728ef 10843->10845 10872 377fe2 10845->10872 10847 37935c __CxxThrowException@8 RaiseException 10847->10841 10848->10837 10850 3714d6 10849->10850 10851 3714d1 10849->10851 10850->10794 10914 371489 10851->10914 10854 37145d 10853->10854 10855 371439 10853->10855 10854->10836 10856 37843e std::_Lockit::_Lockit EnterCriticalSection 10855->10856 10857 371443 10856->10857 10858 378466 _tidy_global LeaveCriticalSection 10857->10858 10858->10854 10861 37153f __EH_prolog3 10859->10861 10860 3715bb std::locale::_Locimp::~_Locimp 10860->10840 10861->10860 10862 3792dc std::locale::_Init 77 API calls 10861->10862 10863 371556 10862->10863 10864 371595 10863->10864 10875 371323 10863->10875 10864->10860 10897 37139d 10864->10897 10866 37157c 10885 378634 10866->10885 10911 378b26 10869->10911 10873 3792dc std::locale::_Init 77 API calls 10872->10873 10874 377fee 10873->10874 10874->10848 10876 37132f __EH_prolog3 10875->10876 10877 37843e std::_Lockit::_Lockit EnterCriticalSection 10876->10877 10878 37133c 10877->10878 10879 371388 10878->10879 10880 378b26 std::exception::exception 66 API calls 10878->10880 10881 3781aa std::_Locinfo::_Locinfo_ctor 101 API calls 10879->10881 10883 371373 10880->10883 10882 371391 std::locale::_Locimp::~_Locimp 10881->10882 10882->10866 10884 37935c __CxxThrowException@8 RaiseException 10883->10884 10884->10879 10886 37c578 ____lc_handle_func 74 API calls 10885->10886 10887 37863f 10886->10887 10888 37c52c ____lc_codepage_func 74 API calls 10887->10888 10889 37864c 10888->10889 10890 37c937 __calloc_crt 66 API calls 10889->10890 10891 37865b 10890->10891 10892 378664 10891->10892 10893 378683 10891->10893 10894 37c7cb ___pctype_func 74 API calls 10892->10894 10895 37c7cb ___pctype_func 74 API calls 10893->10895 10896 37866e _memmove 10894->10896 10895->10896 10896->10864 10898 3713a9 __EH_prolog3 10897->10898 10899 378137 std::_Locinfo::_Locinfo_dtor 101 API calls 10898->10899 10900 3713b9 10899->10900 10901 378f81 _free 66 API calls 10900->10901 10904 3713c7 10900->10904 10901->10904 10902 3713d9 10903 3713eb 10902->10903 10906 378f81 _free 66 API calls 10902->10906 10907 3713fd 10903->10907 10908 378f81 _free 66 API calls 10903->10908 10904->10902 10905 378f81 _free 66 API calls 10904->10905 10905->10902 10906->10903 10909 378466 _tidy_global LeaveCriticalSection 10907->10909 10908->10907 10910 37140d std::locale::_Locimp::~_Locimp 10909->10910 10910->10860 10912 378ac8 std::exception::_Copy_str 66 API calls 10911->10912 10913 3728d1 10912->10913 10913->10847 10915 37843e std::_Lockit::_Lockit EnterCriticalSection 10914->10915 10916 37149b 10915->10916 10917 378466 _tidy_global LeaveCriticalSection 10916->10917 10918 3714be 10917->10918 10918->10850 10920 373522 __EH_prolog3 10919->10920 10921 373726 2 API calls 10920->10921 10922 373545 std::locale::_Locimp::~_Locimp 10920->10922 10923 373531 10921->10923 10922->10800 10927 374102 10923->10927 10925 37353c 10926 3714cb 2 API calls 10925->10926 10926->10922 10928 37410e __EH_prolog3 10927->10928 10929 37843e std::_Lockit::_Lockit EnterCriticalSection 10928->10929 10930 37411a 10929->10930 10931 371430 2 API calls 10930->10931 10933 374131 10931->10933 10932 374144 10934 378466 _tidy_global LeaveCriticalSection 10932->10934 10933->10932 10945 37420b 10933->10945 10936 374193 std::locale::_Locimp::~_Locimp 10934->10936 10936->10925 10938 374170 10940 371461 std::locale::facet::_Incref 2 API calls 10938->10940 10939 378b8d 66 API calls 10941 374162 10939->10941 10942 374180 10940->10942 10943 37935c __CxxThrowException@8 RaiseException 10941->10943 10944 377fe2 std::locale::facet::_Facet_Register 77 API calls 10942->10944 10943->10938 10944->10932 10947 374217 __EH_prolog3_GS 10945->10947 10946 37983f IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10948 374150 10946->10948 10949 3792dc std::locale::_Init 77 API calls 10947->10949 10954 3742a4 10947->10954 10948->10938 10948->10939 10950 374235 10949->10950 10951 3714e3 77 API calls 10950->10951 10958 374280 10950->10958 10952 37424d 10951->10952 10955 371323 103 API calls 10952->10955 10953 37139d 102 API calls 10953->10954 10954->10946 10956 37426a 10955->10956 10957 378511 74 API calls 10956->10957 10957->10958 10958->10953 10958->10954 10960 37572c 10959->10960 10961 375766 10960->10961 10963 3757b9 10960->10963 10973 37574a 10960->10973 10964 37354d 114 API calls 10961->10964 10962 375830 10983 376260 10962->10983 10963->10962 10969 3757c5 10963->10969 10967 37577a 10964->10967 10966 375835 10966->10728 10971 377f85 67 API calls 10967->10971 10967->10973 10968 37582b 10968->10728 10972 377f85 67 API calls 10969->10972 10969->10973 10970 377f85 67 API calls 10970->10968 10971->10973 10972->10973 10973->10968 10973->10970 10987 37633e 10974->10987 10977 375603 10994 376510 10977->10994 10981 37354d 114 API calls 10982 3755f0 10981->10982 10982->10739 10984 376269 10983->10984 10986 376276 10983->10986 10985 37354d 114 API calls 10984->10985 10985->10986 10986->10966 10988 3755e8 10987->10988 10990 376354 10987->10990 10988->10977 10988->10982 10991 375864 10988->10991 10989 37354d 114 API calls 10989->10990 10990->10988 10990->10989 10992 3792dc std::locale::_Init 77 API calls 10991->10992 10993 37586e 10992->10993 10993->10977 10996 376525 10994->10996 10997 37560d 10996->10997 10998 3792dc std::locale::_Init 77 API calls 10996->10998 10999 37345a 10996->10999 10997->10981 10998->10996 11000 373466 10999->11000 11002 37347e 10999->11002 11001 37354d 114 API calls 11000->11001 11003 37346b 11001->11003 11002->11003 11004 37354d 114 API calls 11002->11004 11003->10996 11004->11003 11006 3758d3 11005->11006 11007 3758bf 11005->11007 11030 37668f 11006->11030 11007->11006 11008 3758c6 11007->11008 11024 376629 11008->11024 11011 3758d1 11011->10742 11021 375645 11012->11021 11013 374d33 11013->10701 11014 3758b0 114 API calls 11014->11021 11015 376184 114 API calls 11015->11021 11016 375707 11017 3758b0 114 API calls 11016->11017 11018 375715 11017->11018 11019 3758b0 114 API calls 11018->11019 11019->11013 11021->11013 11021->11014 11021->11015 11021->11016 11022 377f85 67 API calls 11021->11022 11023 3733f5 114 API calls 11021->11023 11038 3763f9 11021->11038 11022->11021 11023->11021 11025 376641 11024->11025 11026 376639 11024->11026 11028 37665e 11025->11028 11029 3792dc std::locale::_Init 77 API calls 11025->11029 11027 37354d 114 API calls 11026->11027 11027->11025 11028->11011 11029->11028 11031 37669f 11030->11031 11033 3766a7 11030->11033 11032 37354d 114 API calls 11031->11032 11032->11033 11034 3792dc std::locale::_Init 77 API calls 11033->11034 11037 3766c5 11033->11037 11034->11037 11035 375076 70 API calls 11036 3766e4 11035->11036 11036->11011 11037->11035 11039 37640b 11038->11039 11054 376428 11038->11054 11040 37354d 114 API calls 11039->11040 11042 376413 11040->11042 11041 37649f 11043 3764d1 11041->11043 11044 3764b0 11041->11044 11049 37354d 114 API calls 11042->11049 11048 3792dc std::locale::_Init 77 API calls 11043->11048 11051 3764df 11043->11051 11045 3764cf 11044->11045 11047 37668f 114 API calls 11044->11047 11045->11021 11046 375076 70 API calls 11050 3764fe 11046->11050 11047->11044 11048->11051 11049->11054 11052 375076 70 API calls 11050->11052 11051->11046 11052->11045 11053 3792dc std::locale::_Init 77 API calls 11053->11054 11054->11041 11054->11053 11062 376582 11055->11062 11057 37584b 11058 373270 114 API calls 11057->11058 11059 375854 11058->11059 11060 37335e 77 API calls 11059->11060 11061 37585a 11060->11061 11061->10761 11063 37658e __EH_prolog3_catch 11062->11063 11064 3792dc std::locale::_Init 77 API calls 11063->11064 11065 376595 11064->11065 11066 3792dc std::locale::_Init 77 API calls 11065->11066 11067 3765d2 std::locale::_Locimp::~_Locimp 11066->11067 11067->11057 11069 3758ef 11068->11069 11070 37590b 11068->11070 11069->11070 11072 374fc3 114 API calls 11069->11072 11071 3792dc std::locale::_Init 77 API calls 11070->11071 11073 375917 11071->11073 11072->11070 11074 3792dc std::locale::_Init 77 API calls 11073->11074 11075 37594d 11074->11075 11075->10777 11077 378b26 std::exception::exception 66 API calls 11076->11077 11078 377f3a 11077->11078 11078->10269 11080 379181 _setlocale 11079->11080 11087 37ca97 11080->11087 11086 3791a2 _setlocale 11086->10255 11088 3808f6 __lock 66 API calls 11087->11088 11089 379186 11088->11089 11090 37908e DecodePointer DecodePointer 11089->11090 11091 37913d 11090->11091 11092 3790bc 11090->11092 11101 3791ab 11091->11101 11092->11091 11104 37e0ce 11092->11104 11094 379120 EncodePointer EncodePointer 11094->11091 11095 3790ce 11095->11094 11096 3790f2 11095->11096 11111 37c983 11095->11111 11096->11091 11098 37c983 __realloc_crt 70 API calls 11096->11098 11099 37910e EncodePointer 11096->11099 11100 379108 11098->11100 11099->11094 11100->11091 11100->11099 11116 37caa0 11101->11116 11105 37e0ee HeapSize 11104->11105 11106 37e0d9 11104->11106 11105->11095 11107 37a8c7 __stricmp_l 66 API calls 11106->11107 11108 37e0de 11107->11108 11109 380433 __stricmp_l 11 API calls 11108->11109 11110 37e0e9 11109->11110 11110->11095 11113 37c98c 11111->11113 11112 3791de __realloc_crt 69 API calls 11112->11113 11113->11112 11114 37c9cb 11113->11114 11115 37c9ac Sleep 11113->11115 11114->11096 11115->11113 11119 38081d LeaveCriticalSection 11116->11119 11118 3791b0 11118->11086 11119->11118 11120 380c6c 11130 380bf0 11120->11130 11123 380c97 setSBCS 11124 378a8f __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 11123->11124 11126 380e53 11124->11126 11125 380cdb IsValidCodePage 11125->11123 11127 380ced GetCPInfo 11125->11127 11127->11123 11128 380d00 _memset __setmbcp_nolock 11127->11128 11137 3809bc GetCPInfo 11128->11137 11147 37a8fa 11130->11147 11133 380c2d 11135 380c32 GetACP 11133->11135 11136 380c1f 11133->11136 11134 380c0f GetOEMCP 11134->11136 11135->11136 11136->11123 11136->11125 11136->11128 11138 380aa4 11137->11138 11140 3809f0 _memset 11137->11140 11142 378a8f __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 11138->11142 11460 381a5f 11140->11460 11144 380b4a 11142->11144 11144->11128 11146 37c785 ___crtLCMapStringA 82 API calls 11146->11138 11148 37a90d 11147->11148 11152 37a95a 11147->11152 11149 37d856 __getptd 66 API calls 11148->11149 11150 37a912 11149->11150 11153 37a93a 11150->11153 11155 380703 11150->11155 11152->11133 11152->11134 11153->11152 11170 380b4c 11153->11170 11156 38070f _setlocale 11155->11156 11157 37d856 __getptd 66 API calls 11156->11157 11158 380714 11157->11158 11159 380742 11158->11159 11160 380726 11158->11160 11161 3808f6 __lock 66 API calls 11159->11161 11163 37d856 __getptd 66 API calls 11160->11163 11162 380749 11161->11162 11186 3806b6 11162->11186 11165 38072b 11163->11165 11168 380739 _setlocale 11165->11168 11169 37cd21 __amsg_exit 66 API calls 11165->11169 11168->11153 11169->11168 11171 380b58 _setlocale 11170->11171 11172 37d856 __getptd 66 API calls 11171->11172 11173 380b5d 11172->11173 11174 3808f6 __lock 66 API calls 11173->11174 11175 380b6f 11173->11175 11176 380b8d 11174->11176 11177 380b7d _setlocale 11175->11177 11179 37cd21 __amsg_exit 66 API calls 11175->11179 11178 380bd6 11176->11178 11181 380bbe InterlockedIncrement 11176->11181 11182 380ba4 InterlockedDecrement 11176->11182 11177->11152 11456 380be7 11178->11456 11179->11177 11181->11178 11182->11181 11183 380baf 11182->11183 11183->11181 11184 378f81 _free 66 API calls 11183->11184 11185 380bbd 11184->11185 11185->11181 11187 3806f8 11186->11187 11188 3806c3 11186->11188 11194 380770 11187->11194 11188->11187 11189 380443 ___addlocaleref 8 API calls 11188->11189 11190 3806d9 11189->11190 11190->11187 11197 3804d2 11190->11197 11455 38081d LeaveCriticalSection 11194->11455 11196 380777 11196->11165 11198 3804e3 InterlockedDecrement 11197->11198 11199 380566 11197->11199 11200 3804f8 InterlockedDecrement 11198->11200 11201 3804fb 11198->11201 11199->11187 11211 38056b 11199->11211 11200->11201 11202 380508 11201->11202 11203 380505 InterlockedDecrement 11201->11203 11204 380512 InterlockedDecrement 11202->11204 11205 380515 11202->11205 11203->11202 11204->11205 11206 38051f InterlockedDecrement 11205->11206 11208 380522 11205->11208 11206->11208 11207 38053b InterlockedDecrement 11207->11208 11208->11207 11209 38054b InterlockedDecrement 11208->11209 11210 380556 InterlockedDecrement 11208->11210 11209->11208 11210->11199 11212 3805ef 11211->11212 11215 380582 11211->11215 11213 378f81 _free 66 API calls 11212->11213 11214 38063c 11212->11214 11217 380610 11213->11217 11226 380665 11214->11226 11281 37f7fb 11214->11281 11215->11212 11221 378f81 _free 66 API calls 11215->11221 11223 3805b6 11215->11223 11219 378f81 _free 66 API calls 11217->11219 11224 380623 11219->11224 11220 378f81 _free 66 API calls 11220->11226 11227 3805ab 11221->11227 11222 3806aa 11228 378f81 _free 66 API calls 11222->11228 11229 378f81 _free 66 API calls 11223->11229 11240 3805d7 11223->11240 11230 378f81 _free 66 API calls 11224->11230 11225 378f81 _free 66 API calls 11231 3805e4 11225->11231 11226->11222 11237 378f81 66 API calls _free 11226->11237 11241 37fe48 11227->11241 11234 3806b0 11228->11234 11235 3805cc 11229->11235 11236 380631 11230->11236 11232 378f81 _free 66 API calls 11231->11232 11232->11212 11234->11187 11269 37fbef 11235->11269 11239 378f81 _free 66 API calls 11236->11239 11237->11226 11239->11214 11240->11225 11242 37fe59 11241->11242 11268 37ff42 11241->11268 11243 37fe6a 11242->11243 11244 378f81 _free 66 API calls 11242->11244 11245 37fe7c 11243->11245 11247 378f81 _free 66 API calls 11243->11247 11244->11243 11246 37fe8e 11245->11246 11248 378f81 _free 66 API calls 11245->11248 11249 378f81 _free 66 API calls 11246->11249 11250 37fea0 11246->11250 11247->11245 11248->11246 11249->11250 11251 378f81 _free 66 API calls 11250->11251 11253 37feb2 11250->11253 11251->11253 11252 37fec4 11254 37fed6 11252->11254 11256 378f81 _free 66 API calls 11252->11256 11253->11252 11255 378f81 _free 66 API calls 11253->11255 11257 37fee8 11254->11257 11258 378f81 _free 66 API calls 11254->11258 11255->11252 11256->11254 11259 37fefa 11257->11259 11260 378f81 _free 66 API calls 11257->11260 11258->11257 11261 37ff0c 11259->11261 11263 378f81 _free 66 API calls 11259->11263 11260->11259 11262 37ff1e 11261->11262 11264 378f81 _free 66 API calls 11261->11264 11265 37ff30 11262->11265 11266 378f81 _free 66 API calls 11262->11266 11263->11261 11264->11262 11267 378f81 _free 66 API calls 11265->11267 11265->11268 11266->11265 11267->11268 11268->11223 11270 37fbfc 11269->11270 11280 37fc54 11269->11280 11271 37fc0c 11270->11271 11272 378f81 _free 66 API calls 11270->11272 11273 37fc1e 11271->11273 11274 378f81 _free 66 API calls 11271->11274 11272->11271 11275 378f81 _free 66 API calls 11273->11275 11277 37fc30 11273->11277 11274->11273 11275->11277 11276 37fc42 11279 378f81 _free 66 API calls 11276->11279 11276->11280 11277->11276 11278 378f81 _free 66 API calls 11277->11278 11278->11276 11279->11280 11280->11240 11282 37fb6c 11281->11282 11283 37f80c 11281->11283 11282->11220 11284 378f81 _free 66 API calls 11283->11284 11285 37f814 11284->11285 11286 378f81 _free 66 API calls 11285->11286 11287 37f81c 11286->11287 11288 378f81 _free 66 API calls 11287->11288 11289 37f824 11288->11289 11290 378f81 _free 66 API calls 11289->11290 11291 37f82c 11290->11291 11292 378f81 _free 66 API calls 11291->11292 11293 37f834 11292->11293 11294 378f81 _free 66 API calls 11293->11294 11295 37f83c 11294->11295 11296 378f81 _free 66 API calls 11295->11296 11297 37f843 11296->11297 11298 378f81 _free 66 API calls 11297->11298 11299 37f84b 11298->11299 11300 378f81 _free 66 API calls 11299->11300 11301 37f853 11300->11301 11302 378f81 _free 66 API calls 11301->11302 11303 37f85b 11302->11303 11304 378f81 _free 66 API calls 11303->11304 11305 37f863 11304->11305 11306 378f81 _free 66 API calls 11305->11306 11307 37f86b 11306->11307 11308 378f81 _free 66 API calls 11307->11308 11309 37f873 11308->11309 11310 378f81 _free 66 API calls 11309->11310 11311 37f87b 11310->11311 11312 378f81 _free 66 API calls 11311->11312 11313 37f883 11312->11313 11314 378f81 _free 66 API calls 11313->11314 11315 37f88b 11314->11315 11316 378f81 _free 66 API calls 11315->11316 11317 37f896 11316->11317 11318 378f81 _free 66 API calls 11317->11318 11319 37f89e 11318->11319 11320 378f81 _free 66 API calls 11319->11320 11321 37f8a6 11320->11321 11322 378f81 _free 66 API calls 11321->11322 11323 37f8ae 11322->11323 11324 378f81 _free 66 API calls 11323->11324 11325 37f8b6 11324->11325 11326 378f81 _free 66 API calls 11325->11326 11327 37f8be 11326->11327 11328 378f81 _free 66 API calls 11327->11328 11329 37f8c6 11328->11329 11330 378f81 _free 66 API calls 11329->11330 11331 37f8ce 11330->11331 11332 378f81 _free 66 API calls 11331->11332 11333 37f8d6 11332->11333 11334 378f81 _free 66 API calls 11333->11334 11335 37f8de 11334->11335 11336 378f81 _free 66 API calls 11335->11336 11337 37f8e6 11336->11337 11338 378f81 _free 66 API calls 11337->11338 11339 37f8ee 11338->11339 11340 378f81 _free 66 API calls 11339->11340 11341 37f8f6 11340->11341 11342 378f81 _free 66 API calls 11341->11342 11343 37f8fe 11342->11343 11344 378f81 _free 66 API calls 11343->11344 11345 37f906 11344->11345 11346 378f81 _free 66 API calls 11345->11346 11347 37f90e 11346->11347 11348 378f81 _free 66 API calls 11347->11348 11349 37f91c 11348->11349 11350 378f81 _free 66 API calls 11349->11350 11351 37f927 11350->11351 11352 378f81 _free 66 API calls 11351->11352 11353 37f932 11352->11353 11354 378f81 _free 66 API calls 11353->11354 11355 37f93d 11354->11355 11356 378f81 _free 66 API calls 11355->11356 11357 37f948 11356->11357 11358 378f81 _free 66 API calls 11357->11358 11359 37f953 11358->11359 11360 378f81 _free 66 API calls 11359->11360 11361 37f95e 11360->11361 11362 378f81 _free 66 API calls 11361->11362 11363 37f969 11362->11363 11364 378f81 _free 66 API calls 11363->11364 11365 37f974 11364->11365 11366 378f81 _free 66 API calls 11365->11366 11367 37f97f 11366->11367 11368 378f81 _free 66 API calls 11367->11368 11369 37f98a 11368->11369 11370 378f81 _free 66 API calls 11369->11370 11371 37f995 11370->11371 11372 378f81 _free 66 API calls 11371->11372 11373 37f9a0 11372->11373 11374 378f81 _free 66 API calls 11373->11374 11375 37f9ab 11374->11375 11376 378f81 _free 66 API calls 11375->11376 11377 37f9b6 11376->11377 11378 378f81 _free 66 API calls 11377->11378 11379 37f9c1 11378->11379 11380 378f81 _free 66 API calls 11379->11380 11381 37f9cf 11380->11381 11382 378f81 _free 66 API calls 11381->11382 11383 37f9da 11382->11383 11384 378f81 _free 66 API calls 11383->11384 11385 37f9e5 11384->11385 11386 378f81 _free 66 API calls 11385->11386 11387 37f9f0 11386->11387 11388 378f81 _free 66 API calls 11387->11388 11389 37f9fb 11388->11389 11390 378f81 _free 66 API calls 11389->11390 11391 37fa06 11390->11391 11392 378f81 _free 66 API calls 11391->11392 11393 37fa11 11392->11393 11394 378f81 _free 66 API calls 11393->11394 11395 37fa1c 11394->11395 11396 378f81 _free 66 API calls 11395->11396 11397 37fa27 11396->11397 11398 378f81 _free 66 API calls 11397->11398 11399 37fa32 11398->11399 11400 378f81 _free 66 API calls 11399->11400 11401 37fa3d 11400->11401 11402 378f81 _free 66 API calls 11401->11402 11403 37fa48 11402->11403 11404 378f81 _free 66 API calls 11403->11404 11405 37fa53 11404->11405 11406 378f81 _free 66 API calls 11405->11406 11407 37fa5e 11406->11407 11408 378f81 _free 66 API calls 11407->11408 11409 37fa69 11408->11409 11410 378f81 _free 66 API calls 11409->11410 11411 37fa74 11410->11411 11412 378f81 _free 66 API calls 11411->11412 11413 37fa82 11412->11413 11414 378f81 _free 66 API calls 11413->11414 11415 37fa8d 11414->11415 11416 378f81 _free 66 API calls 11415->11416 11417 37fa98 11416->11417 11418 378f81 _free 66 API calls 11417->11418 11419 37faa3 11418->11419 11420 378f81 _free 66 API calls 11419->11420 11421 37faae 11420->11421 11422 378f81 _free 66 API calls 11421->11422 11423 37fab9 11422->11423 11424 378f81 _free 66 API calls 11423->11424 11425 37fac4 11424->11425 11426 378f81 _free 66 API calls 11425->11426 11427 37facf 11426->11427 11428 378f81 _free 66 API calls 11427->11428 11429 37fada 11428->11429 11430 378f81 _free 66 API calls 11429->11430 11431 37fae5 11430->11431 11432 378f81 _free 66 API calls 11431->11432 11433 37faf0 11432->11433 11434 378f81 _free 66 API calls 11433->11434 11435 37fafb 11434->11435 11436 378f81 _free 66 API calls 11435->11436 11437 37fb06 11436->11437 11438 378f81 _free 66 API calls 11437->11438 11439 37fb11 11438->11439 11440 378f81 _free 66 API calls 11439->11440 11441 37fb1c 11440->11441 11442 378f81 _free 66 API calls 11441->11442 11443 37fb27 11442->11443 11444 378f81 _free 66 API calls 11443->11444 11445 37fb35 11444->11445 11446 378f81 _free 66 API calls 11445->11446 11447 37fb40 11446->11447 11448 378f81 _free 66 API calls 11447->11448 11449 37fb4b 11448->11449 11450 378f81 _free 66 API calls 11449->11450 11451 37fb56 11450->11451 11452 378f81 _free 66 API calls 11451->11452 11453 37fb61 11452->11453 11454 378f81 _free 66 API calls 11453->11454 11454->11282 11455->11196 11459 38081d LeaveCriticalSection 11456->11459 11458 380bee 11458->11175 11459->11458 11461 37a8fa _LocaleUpdate::_LocaleUpdate 76 API calls 11460->11461 11462 381a72 11461->11462 11470 381978 11462->11470 11465 37c785 11466 37a8fa _LocaleUpdate::_LocaleUpdate 76 API calls 11465->11466 11467 37c798 11466->11467 11487 37c59e 11467->11487 11471 3819a1 MultiByteToWideChar 11470->11471 11472 381996 11470->11472 11473 3819ca 11471->11473 11474 3819ce 11471->11474 11472->11471 11475 378a8f __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 11473->11475 11478 37a7f1 _malloc 66 API calls 11474->11478 11482 3819e3 _memset __alloca_probe_16 11474->11482 11476 380a5f 11475->11476 11476->11465 11477 381a1c MultiByteToWideChar 11479 381a32 GetStringTypeW 11477->11479 11480 381a43 11477->11480 11478->11482 11479->11480 11483 37a8da 11480->11483 11482->11473 11482->11477 11484 37a8e6 11483->11484 11485 37a8f7 11483->11485 11484->11485 11486 378f81 _free 66 API calls 11484->11486 11485->11473 11486->11485 11488 37c5bc MultiByteToWideChar 11487->11488 11490 37c61a 11488->11490 11494 37c621 11488->11494 11491 378a8f __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 11490->11491 11493 37c783 11491->11493 11492 37c66e MultiByteToWideChar 11495 37c766 11492->11495 11496 37c687 LCMapStringW 11492->11496 11493->11146 11497 37a7f1 _malloc 66 API calls 11494->11497 11501 37c63a __alloca_probe_16 11494->11501 11499 37a8da __freea 66 API calls 11495->11499 11496->11495 11498 37c6a6 11496->11498 11497->11501 11500 37c6b0 11498->11500 11504 37c6d9 11498->11504 11499->11490 11500->11495 11502 37c6c4 LCMapStringW 11500->11502 11501->11490 11501->11492 11502->11495 11503 37c728 LCMapStringW 11505 37c760 11503->11505 11506 37c73e WideCharToMultiByte 11503->11506 11507 37c6f4 __alloca_probe_16 11504->11507 11508 37a7f1 _malloc 66 API calls 11504->11508 11509 37a8da __freea 66 API calls 11505->11509 11506->11505 11507->11495 11507->11503 11508->11507 11509->11495

    Control-flow Graph

    APIs
    • CreateMutexA.KERNELBASE(00000000,00000001,DiamoTrix), ref: 00372246
    • GetLastError.KERNEL32 ref: 00372252
    • CloseHandle.KERNEL32(00000000), ref: 00372260
    • ExitProcess.KERNEL32 ref: 00372267
    • CreateThread.KERNEL32(00000000,00000000,Function_000019DF,00387314,00000000,00000000), ref: 0037228A
    • Sleep.KERNEL32(0000C350), ref: 00372295
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Create$CloseErrorExitHandleLastMutexProcessSleepThread
    • String ID: DiamoTrix
    • API String ID: 3762534975-3521203031
    • Opcode ID: 2cef0c19eb311f498654bc1d0636007c02a02aee299f22897e6db93c607bfafc
    • Instruction ID: fd5586f64bd8efe40ebc895a679f3b8f9324e6c9d470b8dad1ac3cbe1e6363d5
    • Opcode Fuzzy Hash: 2cef0c19eb311f498654bc1d0636007c02a02aee299f22897e6db93c607bfafc
    • Instruction Fuzzy Hash: 0DF01232505321ABC2332771AC0DE9F7D2DEF46B51F118480F20DA5491CB58954297F6

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 93 3791de-3791e7 94 3791f4-3791fa 93->94 95 3791e9-3791ec call 37a7f1 93->95 97 3791fc-379207 call 378f81 94->97 98 379209-37920a 94->98 99 3791f1-3791f3 95->99 106 379256-379258 97->106 101 37923c-37923f 98->101 102 379241-37924d call 37e110 call 37a8c7 101->102 103 37920c-37920e 101->103 119 379253 102->119 107 379211-379227 HeapReAlloc 103->107 108 379210 103->108 110 379287-379289 107->110 111 379229-37922f 107->111 108->107 113 379255 110->113 114 379271-379285 call 37a8c7 GetLastError call 37a885 111->114 115 379231-37923a call 37e110 111->115 113->106 114->110 115->101 123 379259-37926f call 37a8c7 GetLastError call 37a885 115->123 119->113 123->119
    APIs
    • _malloc.LIBCMT ref: 003791EC
      • Part of subcall function 0037A7F1: __FF_MSGBANNER.LIBCMT ref: 0037A80A
      • Part of subcall function 0037A7F1: __NMSG_WRITE.LIBCMT ref: 0037A811
      • Part of subcall function 0037A7F1: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,0037C903,00000000,00000001,00000000,?,00380881,00000018,003883C8,0000000C,00380911), ref: 0037A836
    • _free.LIBCMT ref: 003791FF
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: AllocateHeap_free_malloc
    • String ID: H=8
    • API String ID: 1020059152-3273848138
    • Opcode ID: 555671ac5ba66b92c94c12146b7c7c5a36f04d376598bf34fd8a3fede4b2a564
    • Instruction ID: 2a0eb36a110b9f62c912f01ef51c5e85dfa169a76fa0a4474d5e70ac0de46443
    • Opcode Fuzzy Hash: 555671ac5ba66b92c94c12146b7c7c5a36f04d376598bf34fd8a3fede4b2a564
    • Instruction Fuzzy Hash: 6311C832804619BACF333B74AC05B5E3B989FC43A0F22CE66F91C9A552DE3C88429755

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 129 3792dc-3792e4 130 3792f3-3792fe call 37a7f1 129->130 133 3792e6-3792f1 call 37e110 130->133 134 379300-379301 130->134 133->130 137 379302-379313 133->137 138 379315-379340 call 378a9e call 3791b1 137->138 139 379341-37935b call 378bd2 call 37935c 137->139 138->139
    APIs
    • _malloc.LIBCMT ref: 003792F6
      • Part of subcall function 0037A7F1: __FF_MSGBANNER.LIBCMT ref: 0037A80A
      • Part of subcall function 0037A7F1: __NMSG_WRITE.LIBCMT ref: 0037A811
      • Part of subcall function 0037A7F1: RtlAllocateHeap.NTDLL(00000000,00000001,00000001,00000000,00000000,?,0037C903,00000000,00000001,00000000,?,00380881,00000018,003883C8,0000000C,00380911), ref: 0037A836
    • std::exception::exception.LIBCMT ref: 0037932B
    • std::exception::exception.LIBCMT ref: 00379345
    • __CxxThrowException@8.LIBCMT ref: 00379356
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
    • String ID:
    • API String ID: 615853336-0
    • Opcode ID: 3f5cb086c5b24fd47b4f921399280e632c9b024d43b209016a92ef5809b85ab1
    • Instruction ID: a46ae1f01d500e5a0585f0304942d97512e3ca0753d183af23d58df16a561f3e
    • Opcode Fuzzy Hash: 3f5cb086c5b24fd47b4f921399280e632c9b024d43b209016a92ef5809b85ab1
    • Instruction Fuzzy Hash: 3EF0787490030BBACB33FB54CC46AAE77AD6B00718F608496F81CAA0D2CF788B458751

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 148 371000-37100e LoadLibraryA 149 371010-37101b GetProcAddress 148->149 150 37101c-37101f 148->150
    APIs
    • LoadLibraryA.KERNELBASE(?), ref: 00371006
    • GetProcAddress.KERNEL32(00000000,?), ref: 00371014
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID:
    • API String ID: 2574300362-0
    • Opcode ID: 4a7616f3960a8df98072c01a3c4fc76226a10f86ed4a88b00e1d95637b02e275
    • Instruction ID: e3df4b6023f834ac4bbfe7c83daf22ee14034d27efcf7629ab4245b923cde6d2
    • Opcode Fuzzy Hash: 4a7616f3960a8df98072c01a3c4fc76226a10f86ed4a88b00e1d95637b02e275
    • Instruction Fuzzy Hash: E1C01276200209ABCF222FA1FC0895B7F6CEB04360B0480A0FA0CC4821EB3AC820AB50

    Control-flow Graph

    APIs
    • __EH_prolog3_catch.LIBCMT ref: 00372B48
      • Part of subcall function 00377F85: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_error.LIBCMT ref: 00377F93
      • Part of subcall function 00377F85: __CxxThrowException@8.LIBCMT ref: 00377FA1
      • Part of subcall function 00377F85: std::exception::exception.LIBCMT ref: 00377FB4
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Concurrency::scheduler_resource_allocation_error::scheduler_resource_allocation_errorException@8H_prolog3_catchThrowstd::exception::exception
    • String ID:
    • API String ID: 1558761032-0
    • Opcode ID: 525eec10023e59a2b693230524bb071f62611b779456d182800fe5d65e4ce9c2
    • Instruction ID: 775d101bfe5f8ca92b873e2fc0b90518ab83c2cad1f603369446e006377ee40b
    • Opcode Fuzzy Hash: 525eec10023e59a2b693230524bb071f62611b779456d182800fe5d65e4ce9c2
    • Instruction Fuzzy Hash: 21F0BEB5200700ABD73AFF34C882E5A73E5AF88300B40880DF24A9F352CA38F941DB90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 168 37234f-37236f call 37978c call 37242a 173 372381-372389 call 377f85 168->173 174 372371-372373 168->174 179 37238b-372395 call 37296f 173->179 175 372376-37237b 174->175 175->175 177 37237d-37237f 175->177 177->179 181 37239a-3723a1 call 37982b 179->181
    APIs
    • __EH_prolog3.LIBCMT ref: 00372356
      • Part of subcall function 0037242A: std::locale::_Init.LIBCPMT ref: 00372431
      • Part of subcall function 0037242A: std::locale::facet::_Incref.LIBCPMT ref: 00372440
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: H_prolog3IncrefInitstd::locale::_std::locale::facet::_
    • String ID:
    • API String ID: 2441394073-0
    • Opcode ID: a5a5f805fdfc633a106b0cd574ecb6786a2478a0d41542d772c3f10858c833ba
    • Instruction ID: a303f3d06e790e231be8d2d72d61a2de79baa2cfd4ef365e47faecfd0ff2daeb
    • Opcode Fuzzy Hash: a5a5f805fdfc633a106b0cd574ecb6786a2478a0d41542d772c3f10858c833ba
    • Instruction Fuzzy Hash: C6F0A0366042029BEB23AF68C8567BA7691AF50300F18C274BD4C9F245DB6CCE199791

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 184 375076-37507e 185 3750a2-3750b2 184->185 186 375080-375089 call 3791de 184->186 188 37508e-375094 186->188 189 375096 call 377f52 188->189 190 37509b-3750a1 188->190 189->190 190->185
    APIs
      • Part of subcall function 003791DE: _malloc.LIBCMT ref: 003791EC
    • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 00375096
      • Part of subcall function 00377F52: std::exception::exception.LIBCMT ref: 00377F6A
      • Part of subcall function 00377F52: __CxxThrowException@8.LIBCMT ref: 00377F7F
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Exception@8Internal_throw_exceptionThrow_mallocstd::exception::exception
    • String ID:
    • API String ID: 4204326809-0
    • Opcode ID: 883a0bd67c2d40cd78a423c91a8c0d624f6316e23ecca44dc0849041ac370a47
    • Instruction ID: ab5136f801da2e66180133f7ab7e71524711763622e5eaadaab5a6d70c8ab6b2
    • Opcode Fuzzy Hash: 883a0bd67c2d40cd78a423c91a8c0d624f6316e23ecca44dc0849041ac370a47
    • Instruction Fuzzy Hash: 4AF0A0751087028F93359F5AD480812F7E9EF54710300C82EE8DD47611C7B0B840CB50
    APIs
    • ___crtGetLocaleInfoA.LIBCMT ref: 00381C16
      • Part of subcall function 00382D95: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00382DA3
      • Part of subcall function 00382D95: __crtGetLocaleInfoA_stat.LIBCMT ref: 00382DB8
    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00381C24
    • ___crtGetLocaleInfoA.LIBCMT ref: 00381C3D
    • ___crtGetLocaleInfoA.LIBCMT ref: 00381C78
    • __calloc_crt.LIBCMT ref: 00381C52
      • Part of subcall function 0037C937: Sleep.KERNEL32(00000000), ref: 0037C95F
    • __calloc_crt.LIBCMT ref: 00381C89
    • _free.LIBCMT ref: 00381CA1
    • _free.LIBCMT ref: 00381CD5
    • __invoke_watson.LIBCMT ref: 00381CE4
    • GetLocaleInfoW.KERNEL32(?,00001004,00000000,00000000,?,?,00000000), ref: 00381D01
    • __calloc_crt.LIBCMT ref: 00381D0C
    • GetLocaleInfoW.KERNEL32(?,00001004,00000000,00000000,?,?,00000000), ref: 00381D21
    • _free.LIBCMT ref: 00381D29
    • GetLocaleInfoW.KERNEL32(?,00001004,00000000,00000002,?,?,00000000), ref: 00381D5D
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Locale$Info$___crt__calloc_crt_free$A_statErrorLastSleepUpdateUpdate::___crt__invoke_watson
    • String ID:
    • API String ID: 2728192355-0
    • Opcode ID: 82654cf269cd7fdc2f8432a9bd98c763cfa76f82c1b9c3a14335a80751fcc80c
    • Instruction ID: 922950f829b8a9d462e0a3ee216d15ffc92da00d40ffd7ceae9b04300ef08e22
    • Opcode Fuzzy Hash: 82654cf269cd7fdc2f8432a9bd98c763cfa76f82c1b9c3a14335a80751fcc80c
    • Instruction Fuzzy Hash: 26419EB190031AAFEF23AF619C45BAB7BBDFF05350F2044A5F908EA141EB358C559B60
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00377533
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104,000004F8,0037227C), ref: 00377546
      • Part of subcall function 0037744F: __EH_prolog3_GS.LIBCMT ref: 00377456
      • Part of subcall function 0037744F: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00000002,?,00000001,00000001,FyYnOTg1ICwkGCQIDh0bAQYeMDU9OgYaFgYPNzU9LhoGAAwWMD8EHxwdHQckGDsUAw==,Diamotrix,00000060,0037756E,?), ref: 003774C5
      • Part of subcall function 00377918: _memmove.LIBCMT ref: 00377934
    • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,00000001), ref: 00377592
      • Part of subcall function 003773C3: __EH_prolog3_GS.LIBCMT ref: 003773CA
      • Part of subcall function 00372520: _memmove.LIBCMT ref: 00372539
    • CopyFileW.KERNEL32(?,?,00000000,00000001), ref: 003776B2
    • Sleep.KERNEL32(000001F4), ref: 003776C1
    • MoveFileW.KERNEL32(?,?), ref: 003777EF
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: FileH_prolog3_$_memmove$CopyFolderModuleMoveNameOpenPathSleep
    • String ID: Diamotrix$GBoXDg4EAkcdPAw=$GCQIDh0bAQYeMDUSGwwVAhlWIREE
    • API String ID: 3945932230-3474619492
    • Opcode ID: 63660a427b93e9fcb9e1654a077134c358d3673c5bb46f1b89e5f81718dfd544
    • Instruction ID: f56578e09cc9a3ff3b4f10374f3f3ac527f0e81b281effb130b43a7407c97a10
    • Opcode Fuzzy Hash: 63660a427b93e9fcb9e1654a077134c358d3673c5bb46f1b89e5f81718dfd544
    • Instruction Fuzzy Hash: 488152B29052689EDB32DB64CC85BDEB7B8AB04310F4040D9E60DB7142DB746F89CF65
    APIs
    • GetLocaleInfoW.KERNEL32(?,2000000B,00381899,00000002,?,?,00381899), ref: 0038129B
    • GetLocaleInfoW.KERNEL32(?,20001004,00381899,00000002,?,?,00381899), ref: 003812C4
    • GetACP.KERNEL32(?,?), ref: 003812D8
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID: ACP$OCP
    • API String ID: 2299586839-711371036
    • Opcode ID: dabff32f00f58bee5f473d5e448a657cbf18d961431f5d551358293f097629c6
    • Instruction ID: 4bb1a9781f3c95d744feea00c6f13479a4ee91fa5467c068986210aaf9e3f2c4
    • Opcode Fuzzy Hash: dabff32f00f58bee5f473d5e448a657cbf18d961431f5d551358293f097629c6
    • Instruction Fuzzy Hash: 6A01D430600307BAEB23AB60EC06F9B77AC9F00358F2008D5FA02E40C1EB60CA428754
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 0037DE85
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0037DE9A
    • UnhandledExceptionFilter.KERNEL32(0038568C), ref: 0037DEA5
    • GetCurrentProcess.KERNEL32(C0000409), ref: 0037DEC1
    • TerminateProcess.KERNEL32(00000000), ref: 0037DEC8
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 2579439406-0
    • Opcode ID: 105df1a31cd25583e0fb1b9207a81643112ea164b97b08c27fb66edafcc6d64c
    • Instruction ID: 938defbac9b1f7ac9795386e4aef88818a700ef116fd6d8821e59639872e632e
    • Opcode Fuzzy Hash: 105df1a31cd25583e0fb1b9207a81643112ea164b97b08c27fb66edafcc6d64c
    • Instruction Fuzzy Hash: 6921CBB480230B9FDB53DF6AE985A54BBBCBB48310F1151DAE60887771E7B458848F42
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,003789A2), ref: 0037D9A7
    • __mtterm.LIBCMT ref: 0037D9B3
      • Part of subcall function 0037D6EC: DecodePointer.KERNEL32(00000001,0037DB15,?,003789A2), ref: 0037D6FD
      • Part of subcall function 0037D6EC: TlsFree.KERNEL32(00000001,0037DB15,?,003789A2), ref: 0037D717
      • Part of subcall function 0037D6EC: DeleteCriticalSection.KERNEL32(00000000,00000000,76EE5810,?,0037DB15,?,003789A2), ref: 003807E3
      • Part of subcall function 0037D6EC: _free.LIBCMT ref: 003807E6
      • Part of subcall function 0037D6EC: DeleteCriticalSection.KERNEL32(00000001,76EE5810,?,0037DB15,?,003789A2), ref: 0038080D
    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0037D9C9
    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0037D9D6
    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0037D9E3
    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0037D9F0
    • TlsAlloc.KERNEL32(?,003789A2), ref: 0037DA40
    • TlsSetValue.KERNEL32(00000000,?,003789A2), ref: 0037DA5B
    • __init_pointers.LIBCMT ref: 0037DA65
    • EncodePointer.KERNEL32(?,003789A2), ref: 0037DA76
    • EncodePointer.KERNEL32(?,003789A2), ref: 0037DA83
    • EncodePointer.KERNEL32(?,003789A2), ref: 0037DA90
    • EncodePointer.KERNEL32(?,003789A2), ref: 0037DA9D
    • DecodePointer.KERNEL32(0037D870,?,003789A2), ref: 0037DABE
    • __calloc_crt.LIBCMT ref: 0037DAD3
    • DecodePointer.KERNEL32(00000000,?,003789A2), ref: 0037DAED
    • GetCurrentThreadId.KERNEL32 ref: 0037DAFF
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
    • API String ID: 3698121176-3819984048
    • Opcode ID: 97c01f64745aa157689b780ddf2f4fd9cc77ed9329e5e36eb7cc4c93143f235f
    • Instruction ID: 1b61d9b7f556b9416ade08441733acca930871936e44ab38c47311c1aead9dc3
    • Opcode Fuzzy Hash: 97c01f64745aa157689b780ddf2f4fd9cc77ed9329e5e36eb7cc4c93143f235f
    • Instruction Fuzzy Hash: 4E3130729003939AC763AF74AC19A16BBFCFF443A0F1A45ABE508971B1E7799440CF50
    APIs
    • __malloc_crt.LIBCMT ref: 0037C1E6
    • __calloc_crt.LIBCMT ref: 0037C1F6
    • __calloc_crt.LIBCMT ref: 0037C201
    • __calloc_crt.LIBCMT ref: 0037C20C
    • __calloc_crt.LIBCMT ref: 0037C21B
    • GetCPInfo.KERNEL32(?,?), ref: 0037C26E
    • ___crtGetStringTypeA.LIBCMT ref: 0037C2DC
    • ___crtLCMapStringA.LIBCMT ref: 0037C30F
      • Part of subcall function 00381BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00381C16
      • Part of subcall function 00381BCC: GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00381C24
      • Part of subcall function 00381BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00381C3D
      • Part of subcall function 00381BCC: __calloc_crt.LIBCMT ref: 00381C52
      • Part of subcall function 00381BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00381C78
      • Part of subcall function 00381BCC: __calloc_crt.LIBCMT ref: 00381C89
      • Part of subcall function 00381BCC: _free.LIBCMT ref: 00381CA1
    • ___crtLCMapStringA.LIBCMT ref: 0037C33C
      • Part of subcall function 0037C785: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0037C793
      • Part of subcall function 0037C785: __crtLCMapStringA_stat.LIBCMT ref: 0037C7B4
    • _memmove.LIBCMT ref: 0037C3E7
    • _memmove.LIBCMT ref: 0037C3F6
    • _memmove.LIBCMT ref: 0037C408
    • InterlockedDecrement.KERNEL32(?), ref: 0037C41B
    • _free.LIBCMT ref: 0037C431
    • _free.LIBCMT ref: 0037C444
    • _free.LIBCMT ref: 0037C452
    • _free.LIBCMT ref: 0037C45D
    • _free.LIBCMT ref: 0037C4A4
    • _free.LIBCMT ref: 0037C4B1
    • _free.LIBCMT ref: 0037C4B9
    • _free.LIBCMT ref: 0037C4C1
    • _free.LIBCMT ref: 0037C4C9
    • InterlockedDecrement.KERNEL32(?), ref: 0037C4E1
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: _free$___crt__calloc_crt$Locale$InfoString$_memmove$DecrementInterlocked$A_statErrorLastTypeUpdateUpdate::___crt__malloc_crt
    • String ID:
    • API String ID: 2149289317-0
    • Opcode ID: 522ca97f879ca1712cb5cd934076aea788e5429224d25d818ca0354508fc827e
    • Instruction ID: 3c7bed37ea910e424cc6923666e50cc9e2c8aada0b6fddca770cc1b39f8d7efa
    • Opcode Fuzzy Hash: 522ca97f879ca1712cb5cd934076aea788e5429224d25d818ca0354508fc827e
    • Instruction Fuzzy Hash: 07B19BB1D102059FDB22DFA5C895BFEBBF8BF08300F04856DE559AB241DB39A845DB20
    APIs
    • __malloc_crt.LIBCMT ref: 0037C1E6
    • __calloc_crt.LIBCMT ref: 0037C1F6
    • __calloc_crt.LIBCMT ref: 0037C201
    • __calloc_crt.LIBCMT ref: 0037C20C
    • __calloc_crt.LIBCMT ref: 0037C21B
    • GetCPInfo.KERNEL32(?,?), ref: 0037C26E
    • ___crtGetStringTypeA.LIBCMT ref: 0037C2DC
    • ___crtLCMapStringA.LIBCMT ref: 0037C30F
      • Part of subcall function 00381BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00381C16
      • Part of subcall function 00381BCC: GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00381C24
      • Part of subcall function 00381BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00381C3D
      • Part of subcall function 00381BCC: __calloc_crt.LIBCMT ref: 00381C52
      • Part of subcall function 00381BCC: ___crtGetLocaleInfoA.LIBCMT ref: 00381C78
      • Part of subcall function 00381BCC: __calloc_crt.LIBCMT ref: 00381C89
      • Part of subcall function 00381BCC: _free.LIBCMT ref: 00381CA1
    • _free.LIBCMT ref: 0037C4A4
    • _free.LIBCMT ref: 0037C4B1
    • _free.LIBCMT ref: 0037C4B9
    • _free.LIBCMT ref: 0037C4C1
    • _free.LIBCMT ref: 0037C4C9
    • InterlockedDecrement.KERNEL32(?), ref: 0037C4E1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: __calloc_crt_free$___crt$Info$Locale$String$DecrementErrorInterlockedLastType__malloc_crt
    • String ID: 7
    • API String ID: 1207360155-1790921346
    • Opcode ID: 525c972aaa64f45874ea8425cf3937d37314957464ed4215b72fed4f5e169e43
    • Instruction ID: 995e02aabab79dd456b0fae475178bd7fea875e508feba1b5ee945ebb2732d01
    • Opcode Fuzzy Hash: 525c972aaa64f45874ea8425cf3937d37314957464ed4215b72fed4f5e169e43
    • Instruction Fuzzy Hash: 1BB19DB1D142459FDB32CFA4C895AEEBBF8BF19300F04856EE459AB242D7399845CB21
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00377456
      • Part of subcall function 003773C3: __EH_prolog3_GS.LIBCMT ref: 003773CA
      • Part of subcall function 00372520: _memmove.LIBCMT ref: 00372539
    • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00000002,?,00000001,00000001,FyYnOTg1ICwkGCQIDh0bAQYeMDU9OgYaFgYPNzU9LhoGAAwWMD8EHxwdHQckGDsUAw==,Diamotrix,00000060,0037756E,?), ref: 003774C5
    • RegSetValueExW.ADVAPI32(?,SystemHandler,00000000,00000001,?,?), ref: 00377502
    • RegCloseKey.ADVAPI32(?), ref: 0037750F
    Strings
    • FyYnOTg1ICwkGCQIDh0bAQYeMDU9OgYaFgYPNzU9LhoGAAwWMD8EHxwdHQckGDsUAw==, xrefs: 00377472
    • Diamotrix, xrefs: 0037745E
    • SystemHandler, xrefs: 003774FA
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: H_prolog3_$CloseOpenValue_memmove
    • String ID: Diamotrix$FyYnOTg1ICwkGCQIDh0bAQYeMDU9OgYaFgYPNzU9LhoGAAwWMD8EHxwdHQckGDsUAw==$SystemHandler
    • API String ID: 1044828830-2798639340
    • Opcode ID: 665e8c58c7b0fe1cf1c89f21d12dbbe5942b7b75c098e4262d509d651c3ac584
    • Instruction ID: fa5ce6ba87247464ae7861afc3d62b4a0b732048c8cae9bd7980524064f96eea
    • Opcode Fuzzy Hash: 665e8c58c7b0fe1cf1c89f21d12dbbe5942b7b75c098e4262d509d651c3ac584
    • Instruction Fuzzy Hash: 3B216271A04308AFEB22DBA4DC46FDEB7B5EF05700F108054F6187B191DAB5AD45DB61
    APIs
    • __EH_prolog3.LIBCMT ref: 00372873
    • std::_Lockit::_Lockit.LIBCPMT ref: 0037287D
      • Part of subcall function 00371430: std::_Lockit::_Lockit.LIBCPMT ref: 0037143E
    • __CxxThrowException@8.LIBCMT ref: 003728DA
    • std::locale::facet::_Incref.LIBCPMT ref: 003728EA
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 003728F0
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prolog3IncrefRegisterThrow
    • String ID: bad cast$xu8
    • API String ID: 2049877948-2309142124
    • Opcode ID: 28589f42d701f0bedffbca5a17ef5d57cfa364bcb0d0a74c5dd0567edc26b74d
    • Instruction ID: 899f34f55562318336ee4d10e945234ec27268de577b7800e72516527ac10b6a
    • Opcode Fuzzy Hash: 28589f42d701f0bedffbca5a17ef5d57cfa364bcb0d0a74c5dd0567edc26b74d
    • Instruction Fuzzy Hash: 5E018B3281062AABCF23FB74C842AAE73347F04760F558299E4287F291DF3C9E019791
    APIs
    • __EH_prolog3.LIBCMT ref: 00374109
    • std::_Lockit::_Lockit.LIBCPMT ref: 00374115
      • Part of subcall function 00371430: std::_Lockit::_Lockit.LIBCPMT ref: 0037143E
    • __CxxThrowException@8.LIBCMT ref: 0037416B
    • std::locale::facet::_Incref.LIBCPMT ref: 0037417B
    • std::locale::facet::_Facet_Register.LIBCPMT ref: 00374181
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: LockitLockit::_std::_std::locale::facet::_$Exception@8Facet_H_prolog3IncrefRegisterThrow
    • String ID: #H7$bad cast
    • API String ID: 2049877948-4086602006
    • Opcode ID: 7e71fea3e2dfac5b1c23e8ccb67dc8402e716b25621118971eb6c3c7d77cde2b
    • Instruction ID: d8d6d1cc6f259ae6ab81ed698d89a2175acfca430ec0e2bf017aec2b4c10c182
    • Opcode Fuzzy Hash: 7e71fea3e2dfac5b1c23e8ccb67dc8402e716b25621118971eb6c3c7d77cde2b
    • Instruction Fuzzy Hash: FD01C03591062997CF33FB74CC42AAD73346F14760F958298E4287B2D1DB7C6E048790
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00377171
      • Part of subcall function 00378329: std::exception::exception.LIBCMT ref: 0037833E
      • Part of subcall function 00378329: __CxxThrowException@8.LIBCMT ref: 00378353
      • Part of subcall function 00378329: std::exception::exception.LIBCMT ref: 00378364
    • _memmove.LIBCMT ref: 003771A6
    • _memmove.LIBCMT ref: 003771B2
    • _memmove.LIBCMT ref: 003771C4
    • _memmove.LIBCMT ref: 003771FA
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: _memmove$std::exception::exception$Exception@8ThrowXinvalid_argumentstd::_
    • String ID: vector<T> too long
    • API String ID: 4034224661-3788999226
    • Opcode ID: 604c009bdf02242858cf1b781fedbeef7f82567b54ec96e55865313723b6d315
    • Instruction ID: 155c768fd29ded7f9d33266399f899d7fb7aa798396451be948f5a2e41ce6237
    • Opcode Fuzzy Hash: 604c009bdf02242858cf1b781fedbeef7f82567b54ec96e55865313723b6d315
    • Instruction Fuzzy Hash: EA218175A00205AFCB26EF78DC8596EBBE9EF44304700C82DF45AD7341DA34E900CBA0
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,003881B8,00000008,0037D831,00000000,00000000,?,?,0037A8CC,00378FA7,?,?,00378B1B,?,?,003712F0), ref: 0037D73A
    • __lock.LIBCMT ref: 0037D76E
      • Part of subcall function 003808F6: __mtinitlocknum.LIBCMT ref: 0038090C
      • Part of subcall function 003808F6: __amsg_exit.LIBCMT ref: 00380918
      • Part of subcall function 003808F6: EnterCriticalSection.KERNEL32(00000000,00000000,?,0037D773,0000000D), ref: 00380920
    • InterlockedIncrement.KERNEL32(?), ref: 0037D77B
    • __lock.LIBCMT ref: 0037D78F
    • ___addlocaleref.LIBCMT ref: 0037D7AD
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
    • String ID: KERNEL32.DLL
    • API String ID: 637971194-2576044830
    • Opcode ID: 96590516bbe5dc3803e6951742a567ca0abaed541c3b42c03d3cd8f31ff7d371
    • Instruction ID: 95149ae5eba1e952f238e9d6d89a91086c48aec1d504e6298c0a02534ec89d19
    • Opcode Fuzzy Hash: 96590516bbe5dc3803e6951742a567ca0abaed541c3b42c03d3cd8f31ff7d371
    • Instruction Fuzzy Hash: E1016D75440B009FE722AF79D84674AFBF0AF50321F10898EE59A9A6A0CBB4A644CF51
    APIs
    • __EH_prolog3.LIBCMT ref: 0037132A
    • std::_Lockit::_Lockit.LIBCPMT ref: 00371337
    • std::exception::exception.LIBCMT ref: 0037136E
      • Part of subcall function 00378B26: std::exception::_Copy_str.LIBCMT ref: 00378B41
    • __CxxThrowException@8.LIBCMT ref: 00371383
      • Part of subcall function 0037935C: RaiseException.KERNEL32(?,00372868,h(7,?,?,?,?,?,00372868,?,00388518,00000000), ref: 0037939E
    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0037138C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: std::_$Copy_strExceptionException@8H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_RaiseThrowstd::exception::_std::exception::exception
    • String ID: bad locale name
    • API String ID: 637683493-1405518554
    • Opcode ID: 562d1bcf8ba30a00fbb9cb3afadcd94f30f069cd2ec06d449813acf85e9848c1
    • Instruction ID: 5cd045337cdbfdb13f223f51cfb063d5e2b6eb9e3ee9d4b7e54ae58ec4b3ac3a
    • Opcode Fuzzy Hash: 562d1bcf8ba30a00fbb9cb3afadcd94f30f069cd2ec06d449813acf85e9848c1
    • Instruction Fuzzy Hash: 9A018475541745DECB32EF59C4815CEBFE0BF28310B90C55EE18D5B601CB74A609CBA5
    APIs
    • __getptd.LIBCMT ref: 0037E2EA
      • Part of subcall function 0037D856: __getptd_noexit.LIBCMT ref: 0037D859
      • Part of subcall function 0037D856: __amsg_exit.LIBCMT ref: 0037D866
    • __getptd.LIBCMT ref: 0037E2FB
    • __getptd.LIBCMT ref: 0037E309
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: MOC$RCC$csm
    • API String ID: 803148776-2671469338
    • Opcode ID: 3595e75553568fa1a7dc9b2ad10d36955dc1367fb4177b3df410771cda05f294
    • Instruction ID: 783f7c01e0814c5da8637556e98200daa89620161c8c4db45bdfbc7a68c82995
    • Opcode Fuzzy Hash: 3595e75553568fa1a7dc9b2ad10d36955dc1367fb4177b3df410771cda05f294
    • Instruction Fuzzy Hash: 17E09239114104DEDB31A768C04A76836A9BF4D314F5684F9E54DCF223D73CD9509597
    APIs
    • __CreateFrameInfo.LIBCMT ref: 0037E5A3
      • Part of subcall function 00379687: __getptd.LIBCMT ref: 00379695
      • Part of subcall function 00379687: __getptd.LIBCMT ref: 003796A3
    • __getptd.LIBCMT ref: 0037E5AD
      • Part of subcall function 0037D856: __getptd_noexit.LIBCMT ref: 0037D859
      • Part of subcall function 0037D856: __amsg_exit.LIBCMT ref: 0037D866
    • __getptd.LIBCMT ref: 0037E5BB
    • __getptd.LIBCMT ref: 0037E5C9
    • __getptd.LIBCMT ref: 0037E5D4
    • _CallCatchBlock2.LIBCMT ref: 0037E5FA
      • Part of subcall function 0037972C: __CallSettingFrame@12.LIBCMT ref: 00379778
      • Part of subcall function 0037E6A1: __getptd.LIBCMT ref: 0037E6B0
      • Part of subcall function 0037E6A1: __getptd.LIBCMT ref: 0037E6BE
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
    • String ID:
    • API String ID: 1602911419-0
    • Opcode ID: 31505768013823702ad4d14694dc82dd0c242db22febdfc1eaa0503b65b7b758
    • Instruction ID: 50d5e4d2c892c9658f557741a314d0f4504571db36cb0192c46445e73523dc0f
    • Opcode Fuzzy Hash: 31505768013823702ad4d14694dc82dd0c242db22febdfc1eaa0503b65b7b758
    • Instruction Fuzzy Hash: DE11D7B1D10209EFDB11EFA4C546BADBBB0FF08311F11C1A9F818AB251DB389A159F55
    APIs
    • __getptd.LIBCMT ref: 00380B58
      • Part of subcall function 0037D856: __getptd_noexit.LIBCMT ref: 0037D859
      • Part of subcall function 0037D856: __amsg_exit.LIBCMT ref: 0037D866
    • __amsg_exit.LIBCMT ref: 00380B78
    • __lock.LIBCMT ref: 00380B88
    • InterlockedDecrement.KERNEL32(?), ref: 00380BA5
    • _free.LIBCMT ref: 00380BB8
    • InterlockedIncrement.KERNEL32(00BC2D18), ref: 00380BD0
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
    • String ID:
    • API String ID: 3470314060-0
    • Opcode ID: a741a39e6fc7c592f246307dc5d870936a6e815558c1a77940ce5bc88c55c745
    • Instruction ID: a160b0c1d20b7cc15b1a4d215c8ed7a5b2dc15607d5f7acf3a81abdd38d48786
    • Opcode Fuzzy Hash: a741a39e6fc7c592f246307dc5d870936a6e815558c1a77940ce5bc88c55c745
    • Instruction Fuzzy Hash: 6701D635D01B119BDB67BBA5984574EB3A4BF04724F0241C5F8146B6A0CB38DC85DBD2
    APIs
    • __EH_prolog3.LIBCMT ref: 003713A4
    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 003713B4
      • Part of subcall function 00378137: _setlocale.LIBCMT ref: 00378149
    • _free.LIBCMT ref: 003713C2
      • Part of subcall function 00378F81: HeapFree.KERNEL32(00000000,00000000,?,00378B1B,?,?,003712F0), ref: 00378F97
      • Part of subcall function 00378F81: GetLastError.KERNEL32(?,?,00378B1B,?,?,003712F0), ref: 00378FA9
    • _free.LIBCMT ref: 003713D4
    • _free.LIBCMT ref: 003713E6
    • _free.LIBCMT ref: 003713F8
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: _free$ErrorFreeH_prolog3HeapLastLocinfo::_Locinfo_dtor_setlocalestd::_
    • String ID:
    • API String ID: 2259855018-0
    • Opcode ID: 8bf83d82cc2554b2413a2bf30fcbd7bfb660c55c2de1c6fbb0213c74f1cec3ea
    • Instruction ID: ca424a4c24ffd74fd12f05fd1c883b86c99e4d60bbe3c5fe7690884cebeb2252
    • Opcode Fuzzy Hash: 8bf83d82cc2554b2413a2bf30fcbd7bfb660c55c2de1c6fbb0213c74f1cec3ea
    • Instruction Fuzzy Hash: 51018F36640B019BEB32AF64D50AB4B73E89F00726F04CA0CE049DB9C1CF7CE5058B60
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID:
    • String ID: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789_$xu8$A8
    • API String ID: 0-1802606187
    • Opcode ID: 1a571e319f9e63047a56886a367350974b41259edd6d31f73a507b68040bc120
    • Instruction ID: 1f2c848b9db98849f98363fb37a3d5ec6f5cfcbc9540fe2560449f818eca5c60
    • Opcode Fuzzy Hash: 1a571e319f9e63047a56886a367350974b41259edd6d31f73a507b68040bc120
    • Instruction Fuzzy Hash: 22B18131204245AFDB26DF18C4C5BA57BE5AF46310F59C4A9EC8D8F246C378EA44EB62
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID:
    • String ID: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789_$xu8$A8
    • API String ID: 0-1802606187
    • Opcode ID: 0f2f0a9f8533811a7c8001c4a1842df9374ae7bbd94d9fefc5704d072c76ddcd
    • Instruction ID: b03441cd446db6ce787f3248bea42eca23cc31d96abbb8a56bcb6047bd88e6a3
    • Opcode Fuzzy Hash: 0f2f0a9f8533811a7c8001c4a1842df9374ae7bbd94d9fefc5704d072c76ddcd
    • Instruction Fuzzy Hash: 3DB1C071204B42DFD73BCF28C085BAAB7E5AF49300F55884DE4DE8B681C7B8A984DB51
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 00376D07
    • std::_Xinvalid_argument.LIBCPMT ref: 00376D2D
      • Part of subcall function 00378329: std::exception::exception.LIBCMT ref: 0037833E
      • Part of subcall function 00378329: __CxxThrowException@8.LIBCMT ref: 00378353
      • Part of subcall function 00378329: std::exception::exception.LIBCMT ref: 00378364
    • _memmove.LIBCMT ref: 00376D69
    • _memmove.LIBCMT ref: 00376D8C
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: _memmovestd::exception::exception$Exception@8H_prolog3_catchThrowXinvalid_argumentstd::_
    • String ID: vector<T> too long
    • API String ID: 3478911975-3788999226
    • Opcode ID: 709893b6add2088a32cba9ac0a4b65b3e50a6de1f3af4c2a12f5630ae943385a
    • Instruction ID: c550fc31a15f00d3d876c4a2bea864f598b34274c8ea3444fac5fb2c715acaca
    • Opcode Fuzzy Hash: 709893b6add2088a32cba9ac0a4b65b3e50a6de1f3af4c2a12f5630ae943385a
    • Instruction Fuzzy Hash: D5218575A00605AFCB26EF78CD569AE7BA2EF44300B14C42DF85D9B351DE35E910CB90
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00377D64
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 0037838B
      • Part of subcall function 00378376: __CxxThrowException@8.LIBCMT ref: 003783A0
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 003783B1
    • std::_Xinvalid_argument.LIBCPMT ref: 00377D83
    • _memmove.LIBCMT ref: 00377DC6
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
    • String ID: invalid string position$string too long
    • API String ID: 3404309857-4289949731
    • Opcode ID: 4593194b4d58e0bc295e7d77278df2e7b7449f6f9d04cb0c35754f5dc429b064
    • Instruction ID: 403ca08cb31a3d4538888b9e1626e9c2bfc72eb9f2acfea7869ef39e53cd7883
    • Opcode Fuzzy Hash: 4593194b4d58e0bc295e7d77278df2e7b7449f6f9d04cb0c35754f5dc429b064
    • Instruction Fuzzy Hash: 7411DD302186049BCB36DF2CD885C6AB3F6FF807147218A5DF45ACB660EB34EA04CB90
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 003725F0
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 0037838B
      • Part of subcall function 00378376: __CxxThrowException@8.LIBCMT ref: 003783A0
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 003783B1
    • std::_Xinvalid_argument.LIBCPMT ref: 00372604
    • _memmove.LIBCMT ref: 0037263F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
    • String ID: invalid string position$string too long
    • API String ID: 3404309857-4289949731
    • Opcode ID: c8c2e0bb4935b81373c0cd4324870cfa712a3cbe529d5285b06042df0b4efc09
    • Instruction ID: e62eaa07bc947920c067b9e6e78ed7d8daf74878d60a8e2bc3962a197f59161f
    • Opcode Fuzzy Hash: c8c2e0bb4935b81373c0cd4324870cfa712a3cbe529d5285b06042df0b4efc09
    • Instruction Fuzzy Hash: 4C01D6703002019BD72BAF2C9895D6AF367AF91710F54861AF41ADB682DBA8ED548390
    APIs
    • ___BuildCatchObject.LIBCMT ref: 0037E93B
      • Part of subcall function 0037E896: ___BuildCatchObjectHelper.LIBCMT ref: 0037E8CC
    • _UnwindNestedFrames.LIBCMT ref: 0037E952
    • ___FrameUnwindToState.LIBCMT ref: 0037E960
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
    • String ID: csm$csm
    • API String ID: 2163707966-3733052814
    • Opcode ID: 25b235255ab6597edc552ed3ef3507b70867476e850620615844bf3548dffac4
    • Instruction ID: 27e573e4d8ec3cdc2e49ec6dc99ac4c6db73ecd699b89dc328eac2cbee2f4fec
    • Opcode Fuzzy Hash: 25b235255ab6597edc552ed3ef3507b70867476e850620615844bf3548dffac4
    • Instruction Fuzzy Hash: 5C01E836401109BBDF235F51CC45EEA7F6AEF0A354F048054FD1C19161D73A9971EBA1
    APIs
    • __EH_prolog3.LIBCMT ref: 00371853
    • GlobalAlloc.KERNEL32(00000002,?,00000000,00371B3D,?), ref: 00371863
    • GlobalLock.KERNEL32(00000000), ref: 0037187A
    • _memmove.LIBCMT ref: 00371881
    • GlobalUnlock.KERNEL32(00000000), ref: 0037188A
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Global$AllocH_prolog3LockUnlock_memmove
    • String ID:
    • API String ID: 2164542303-0
    • Opcode ID: baeb6bdfc46616442d242ffb53335b39678153d5316dbc22c3c47df5442dd526
    • Instruction ID: cb45063f8fc9e64f3483898b88574bab87da8f137aa85d0982ea6827ccabce47
    • Opcode Fuzzy Hash: baeb6bdfc46616442d242ffb53335b39678153d5316dbc22c3c47df5442dd526
    • Instruction Fuzzy Hash: E2F04F76401205EFDB12AFA0EC0DB9F7E2CEF55751F004054F60A9A191CBB56941DBA1
    APIs
    • __getptd.LIBCMT ref: 0038070F
      • Part of subcall function 0037D856: __getptd_noexit.LIBCMT ref: 0037D859
      • Part of subcall function 0037D856: __amsg_exit.LIBCMT ref: 0037D866
    • __getptd.LIBCMT ref: 00380726
    • __amsg_exit.LIBCMT ref: 00380734
    • __lock.LIBCMT ref: 00380744
    • __updatetlocinfoEx_nolock.LIBCMT ref: 00380758
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
    • String ID:
    • API String ID: 938513278-0
    • Opcode ID: dd5b12a0275ff284389f7ee8be1f1a09ee9dcee5aefc0f5937ce47c1839cbc27
    • Instruction ID: 57b586dc89eff2dfdb0ad6e53b7b9354063d75600d11341747894cc155ef1903
    • Opcode Fuzzy Hash: dd5b12a0275ff284389f7ee8be1f1a09ee9dcee5aefc0f5937ce47c1839cbc27
    • Instruction Fuzzy Hash: A3F096319407009BE77BBB74980374933A0AF00720F1281C9F4496E2D2DB686945CB56
    APIs
    • __EH_prolog3.LIBCMT ref: 003735EE
    • __Strxfrm.LIBCPMT ref: 003736A3
    • std::_Xinvalid_argument.LIBCPMT ref: 003736D2
      • Part of subcall function 0037266F: std::_Xinvalid_argument.LIBCPMT ref: 0037267E
      • Part of subcall function 0037266F: _memmove.LIBCMT ref: 003726B4
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_$H_prolog3Strxfrm_memmove
    • String ID: string too long
    • API String ID: 1992344758-2556327735
    • Opcode ID: c39e55a1c0b75a537e9da3f5760e18c41d49c23a91e239913151e5f7c0d72070
    • Instruction ID: d4216fc04f1dd798aff4f4a41dd49dd1db91de1782df8bdd8ef6b428823c5e13
    • Opcode Fuzzy Hash: c39e55a1c0b75a537e9da3f5760e18c41d49c23a91e239913151e5f7c0d72070
    • Instruction Fuzzy Hash: 8E31A770700202ABCB3AEF38C4D067EB772BF44310B65C61DE41A9B791D778AE50A791
    APIs
    • GetEnvironmentStringsW.KERNEL32(00000000,003789D7), ref: 0037D3C0
    • __malloc_crt.LIBCMT ref: 0037D3EF
    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0037D3FC
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: EnvironmentStrings$Free__malloc_crt
    • String ID:
    • API String ID: 237123855-0
    • Opcode ID: f2daf633ae3358b24cc1a37fd6714d6b9a0da05adabc4a1b971eca608bc7fa1b
    • Instruction ID: 1e2e7cdef2681c62fd46b126d87c7fd5444635a4468852ea8f060b9dd722d949
    • Opcode Fuzzy Hash: f2daf633ae3358b24cc1a37fd6714d6b9a0da05adabc4a1b971eca608bc7fa1b
    • Instruction Fuzzy Hash: 4BF0E2BB504110AAEA337734BC4986B6638DED132631BC055F58AD7240FA68CD4187A2
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 00377897
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 0037838B
      • Part of subcall function 00378376: __CxxThrowException@8.LIBCMT ref: 003783A0
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 003783B1
      • Part of subcall function 00377A44: std::_Xinvalid_argument.LIBCPMT ref: 00377A57
    • _memmove.LIBCMT ref: 003778F2
    Strings
    • invalid string position, xrefs: 00377892
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
    • String ID: invalid string position
    • API String ID: 3404309857-1799206989
    • Opcode ID: 59396cc7608f6fe53a81899a4f9d737761b2948f3bcb95f655673eb154d1c552
    • Instruction ID: c6e7088e08011bba319c646ea42f573bd3a075c151de5e39d651a9c5df5519ef
    • Opcode Fuzzy Hash: 59396cc7608f6fe53a81899a4f9d737761b2948f3bcb95f655673eb154d1c552
    • Instruction Fuzzy Hash: C311E631728309EBCB32EE2CD485869B3A9FB413243108529E55DDF201E774E940CB92
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Xinvalid_argument_memmovestd::_
    • String ID: string too long
    • API String ID: 256744135-2556327735
    • Opcode ID: 7f5df2946be1776883a616938bb0e53246722e2b52f024bc2d8a6c2f1c1e92f3
    • Instruction ID: 5336e9204c88b55b1774ff93ed08fab710275438cb5ac9975b59799034930b67
    • Opcode Fuzzy Hash: 7f5df2946be1776883a616938bb0e53246722e2b52f024bc2d8a6c2f1c1e92f3
    • Instruction Fuzzy Hash: EC11A3703087049BCA32DE6CDC858AAB3E9EF057447218A5DF98ECBA51E738AD14C7D5
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 003724AB
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 0037838B
      • Part of subcall function 00378376: __CxxThrowException@8.LIBCMT ref: 003783A0
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 003783B1
      • Part of subcall function 003726D9: std::_Xinvalid_argument.LIBCPMT ref: 003726E3
    • _memmove.LIBCMT ref: 003724FD
    Strings
    • invalid string position, xrefs: 003724A6
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: Xinvalid_argumentstd::_std::exception::exception$Exception@8Throw_memmove
    • String ID: invalid string position
    • API String ID: 3404309857-1799206989
    • Opcode ID: 90bf30146eae2638dc23dc3557adb9b522d9a24e6c56cc07d95545fe2a4229a1
    • Instruction ID: c172ca3bbfdb90f8e1fd53a8ca191f35720117ba9b03dc51a68c45a8767f4dd9
    • Opcode Fuzzy Hash: 90bf30146eae2638dc23dc3557adb9b522d9a24e6c56cc07d95545fe2a4229a1
    • Instruction Fuzzy Hash: B911ED313002009BDB36EE2DC88496BB369AF45320B048619F81ECF642D778ED80CBE1
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 00375ADE
    • std::_Xinvalid_argument.LIBCPMT ref: 00375AF4
      • Part of subcall function 00378329: std::exception::exception.LIBCMT ref: 0037833E
      • Part of subcall function 00378329: __CxxThrowException@8.LIBCMT ref: 00378353
      • Part of subcall function 00378329: std::exception::exception.LIBCMT ref: 00378364
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: std::exception::exception$Exception@8H_prolog3_catchThrowXinvalid_argumentstd::_
    • String ID: vector<T> too long
    • API String ID: 1877048013-3788999226
    • Opcode ID: c010e001247fe0058f213dcf292f4267de87281bd412054213632ab9f85586dd
    • Instruction ID: 7ed98a6bf21674ee3672a3a62954c8f7e7bf76681823ebc4ebce77925dbf8220
    • Opcode Fuzzy Hash: c010e001247fe0058f213dcf292f4267de87281bd412054213632ab9f85586dd
    • Instruction Fuzzy Hash: 0B117376A007018BC73AEFA9C582B2DF7E1EF54710B31842EE05DDB680DAB499008B10
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 003779E2
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 0037838B
      • Part of subcall function 00378376: __CxxThrowException@8.LIBCMT ref: 003783A0
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 003783B1
    • _memmove.LIBCMT ref: 00377A1D
    Strings
    • invalid string position, xrefs: 003779DD
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
    • String ID: invalid string position
    • API String ID: 1785806476-1799206989
    • Opcode ID: 12d72bf8ea4d161c6d8ce699b09655e60acf928a016096f0dac1ca0d0a81fae6
    • Instruction ID: 18b47fc76de0d5a7b0f0b29cdb273d4f9714b7b20818b48b2701b028b5b71ae4
    • Opcode Fuzzy Hash: 12d72bf8ea4d161c6d8ce699b09655e60acf928a016096f0dac1ca0d0a81fae6
    • Instruction Fuzzy Hash: 23017C313186058BD773CE6CD98481FB3AAAFC57443208A2DD08ACBB19FB34DA46C790
    APIs
    • std::_Xinvalid_argument.LIBCPMT ref: 0037267E
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 0037838B
      • Part of subcall function 00378376: __CxxThrowException@8.LIBCMT ref: 003783A0
      • Part of subcall function 00378376: std::exception::exception.LIBCMT ref: 003783B1
    • _memmove.LIBCMT ref: 003726B4
    Strings
    • invalid string position, xrefs: 00372679
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: std::exception::exception$Exception@8ThrowXinvalid_argument_memmovestd::_
    • String ID: invalid string position
    • API String ID: 1785806476-1799206989
    • Opcode ID: bb8be379d194b17ac7b8841cd7bd6ac3ba745ff0fb997a5c0bf46f18a39421c4
    • Instruction ID: 26bd7592bf2f14a72bd0feb52eca64239a3d2e62dd8da524563f90dff4f7ba43
    • Opcode Fuzzy Hash: bb8be379d194b17ac7b8841cd7bd6ac3ba745ff0fb997a5c0bf46f18a39421c4
    • Instruction Fuzzy Hash: B30181713106418BD7369E6899C481BB2F6DBC47013318D3ED48ACBA45DBF8E88697A0
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 00377E8A
    • std::_Xinvalid_argument.LIBCPMT ref: 00377EC4
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: H_prolog3_catchXinvalid_argumentstd::_
    • String ID: string too long
    • API String ID: 4202626062-2556327735
    • Opcode ID: 3081f875d89ba89bc3e736e8ffc5ff373ccf4c4caee8f67ed365f5ff42215e8f
    • Instruction ID: 35dfb5c3771fcb40e79924c9c21a7b7132ff6238d99b3b67af9fc5945161f02d
    • Opcode Fuzzy Hash: 3081f875d89ba89bc3e736e8ffc5ff373ccf4c4caee8f67ed365f5ff42215e8f
    • Instruction Fuzzy Hash: C511AD34218244DBCB32EF28C481A6D73B1BF05701F118989F49A9FA91CB78EE04CB50
    APIs
      • Part of subcall function 003796DA: __getptd.LIBCMT ref: 003796E0
      • Part of subcall function 003796DA: __getptd.LIBCMT ref: 003796F0
    • __getptd.LIBCMT ref: 0037E6B0
      • Part of subcall function 0037D856: __getptd_noexit.LIBCMT ref: 0037D859
      • Part of subcall function 0037D856: __amsg_exit.LIBCMT ref: 0037D866
    • __getptd.LIBCMT ref: 0037E6BE
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: csm
    • API String ID: 803148776-1018135373
    • Opcode ID: 2b657408d7d58b165f9881259de63ca9f2c423451cb0bacc366fca116bd4e8e8
    • Instruction ID: e7af5f36010194808629a878777299bfb99bdc8da1ee6a449541c68d6c759f3f
    • Opcode Fuzzy Hash: 2b657408d7d58b165f9881259de63ca9f2c423451cb0bacc366fca116bd4e8e8
    • Instruction Fuzzy Hash: CD016D38800304DBCF3A9FA4C5406ACB3B5AF58311F65C5AEE44D6A651DB389980CF51
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: __invoke_watson_strcat_s
    • String ID: xC8
    • API String ID: 228796091-1458914466
    • Opcode ID: 5bd9e7f66acca802be05aafd13a64e3d15df58761cecbc98076716d1073d3281
    • Instruction ID: b3d2f5b4464a943e1f407e8ec334192916247ddc7f241c729913527c4c5aecbe
    • Opcode Fuzzy Hash: 5bd9e7f66acca802be05aafd13a64e3d15df58761cecbc98076716d1073d3281
    • Instruction Fuzzy Hash: 33E092735002097BCF221E56DC8199A771EFBC1365B024572FD1C56011D232D96297A1
    APIs
    • LoadLibraryA.KERNEL32(User32.dll), ref: 003717D2
    • GetProcAddress.KERNEL32(00000000,?), ref: 003717E0
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.2192516628.0000000000371000.00000020.00000001.01000000.00000004.sdmp, Offset: 00370000, based on PE: true
    • Associated: 00000003.00000002.2192495060.0000000000370000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192534368.0000000000384000.00000002.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192547431.000000000038A000.00000004.00000001.01000000.00000004.sdmpDownload File
    • Associated: 00000003.00000002.2192558879.000000000038D000.00000002.00000001.01000000.00000004.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_370000_svcapp.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: User32.dll
    • API String ID: 2574300362-1293261179
    • Opcode ID: e2240f867026b4e40be70e038f51955eaed80701a67e5cba25cc1da17c670945
    • Instruction ID: b1109889a97cc2c7fce4099ccd86b8eac67ae2a5ebd61ed73be4125bfcfbb601
    • Opcode Fuzzy Hash: e2240f867026b4e40be70e038f51955eaed80701a67e5cba25cc1da17c670945
    • Instruction Fuzzy Hash: 8EC08C76284309AB8F222FF5BC099977B9CEB00792B040091FA0CC0810EA76C41097A1