Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
drW0xB3OBb.dll

Overview

General Information

Sample name:drW0xB3OBb.dll
(renamed file extension from none to dll, renamed because original name is a hash value)
Original sample name:756f935f0e564a2bcda2a4d13f57313be2d5e15834732bed53447988fdd60e6e
Analysis ID:1589178
MD5:6541e8070a34e26ec1461671189c5276
SHA1:2c66fe410dab036ddb12a3471f88f8e6be2aa6f4
SHA256:756f935f0e564a2bcda2a4d13f57313be2d5e15834732bed53447988fdd60e6e
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Found evasive API chain (may stop execution after checking a module file name)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6536 cmdline: loaddll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 1276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6396 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 5544 cmdline: rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6520 cmdline: rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,EssenceHoliestExamination MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6564 cmdline: rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,FactInsensibilityExplication MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 5808 cmdline: rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,FaultedMonolayersInterocular MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7084 cmdline: rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",5thVJ7vnbPDxdRJf MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: drW0xB3OBb.dllAvira: detected
Source: drW0xB3OBb.dllVirustotal: Detection: 73%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: drW0xB3OBb.dllJoe Sandbox ML: detected
Source: drW0xB3OBb.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: drW0xB3OBb.dllBinary or memory string: OriginalFilenameLonglasting.exeH vs drW0xB3OBb.dll
Source: drW0xB3OBb.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal64.winDLL@14/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1276:120:WilError_03
Source: drW0xB3OBb.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,EssenceHoliestExamination
Source: drW0xB3OBb.dllVirustotal: Detection: 73%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,EssenceHoliestExamination
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,FactInsensibilityExplication
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,FaultedMonolayersInterocular
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",5thVJ7vnbPDxdRJf
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,EssenceHoliestExaminationJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,FactInsensibilityExplicationJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,FaultedMonolayersInterocularJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",5thVJ7vnbPDxdRJfJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: drW0xB3OBb.dllStatic file information: File size 7969472 > 1048576
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100078A4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_100078A4
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10003475 push ecx; ret 0_2_10003488
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\loaddll32.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-4153
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: rundll32.exe, 00000003.00000002.2064804854.000000000282A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2065065757.000000000333A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2094575416.000000000345A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
Source: rundll32.exe, 00000003.00000002.2064804854.000000000282A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2065065757.000000000333A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2094575416.000000000345A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
Source: rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicshutdown
Source: rundll32.exe, 00000003.00000002.2064804854.000000000282A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2065065757.000000000333A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2094575416.000000000345A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
Source: rundll32.exe, 00000003.00000002.2064804854.000000000282A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2065065757.000000000333A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2094575416.000000000345A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
Source: rundll32.exe, 00000003.00000002.2064804854.000000000282A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2065065757.000000000333A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2094575416.000000000345A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
Source: rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicvss
Source: rundll32.exe, 00000003.00000002.2064804854.000000000282A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2065065757.000000000333A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2094575416.000000000345A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
Source: rundll32.exe, 00000003.00000002.2064804854.000000000282A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2065065757.000000000333A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2094575416.000000000345A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
Source: rundll32.exe, 00000003.00000002.2064804854.000000000282A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000002.2065065757.000000000333A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.2094575416.000000000345A000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
Source: rundll32.exe, 00000007.00000002.2124672253.0000000002C85000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
Source: C:\Windows\System32\loaddll32.exeAPI call chain: ExitProcess graph end nodegraph_0-4155
Source: C:\Windows\System32\loaddll32.exeAPI call chain: ExitProcess graph end nodegraph_0-4691
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100028BE _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_100028BE
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100078A4 LoadLibraryW,GetProcAddress,GetProcAddress,EncodePointer,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_100078A4
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100028BE _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_100028BE
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10005718 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_10005718
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10003E16 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_10003E16
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
DLL Side-Loading
11
Process Injection
1
Rundll32
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1589178 Sample: drW0xB3OBb Startdate: 11/01/2025 Architecture: WINDOWS Score: 64 19 Antivirus / Scanner detection for submitted sample 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Machine Learning detection for sample 2->23 25 AI detected suspicious sample 2->25 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        15 3 other processes 7->15 process5 17 rundll32.exe 9->17         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
drW0xB3OBb.dll74%VirustotalBrowse
drW0xB3OBb.dll100%AviraTR/Crypt.ZPACK.Gen4
drW0xB3OBb.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    No contacted IP infos
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1589178
    Start date and time:2025-01-11 14:34:42 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 2m 49s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:drW0xB3OBb.dll
    (renamed file extension from none to dll, renamed because original name is a hash value)
    Original Sample Name:756f935f0e564a2bcda2a4d13f57313be2d5e15834732bed53447988fdd60e6e
    Detection:MAL
    Classification:mal64.winDLL@14/0@0/0
    EGA Information:
    • Successful, ratio: 20%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 5
    • Number of non-executed functions: 9
    Cookbook Comments:
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.45
    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, otelrules.afd.azureedge.net, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    s-part-0017.t-0009.t-msedge.netFEdTp2g4xD.exeGet hashmaliciousFormBookBrowse
    • 13.107.246.45
    305861283730376077.jsGet hashmaliciousStrela DownloaderBrowse
    • 13.107.246.45
    1274320496157183071.jsGet hashmaliciousStrela DownloaderBrowse
    • 13.107.246.45
    944924352317221058.jsGet hashmaliciousStrela DownloaderBrowse
    • 13.107.246.45
    kzQ25HVUbf.exeGet hashmaliciousLokibotBrowse
    • 13.107.246.45
    huuG7N3jOv.exeGet hashmaliciousFormBookBrowse
    • 13.107.246.45
    x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
    • 13.107.246.45
    4287eV6mBc.exeGet hashmaliciousAgentTeslaBrowse
    • 13.107.246.45
    Yv24LkKBY6.exeGet hashmaliciousUnknownBrowse
    • 13.107.246.45
    11626244731900027402.jsGet hashmaliciousStrela DownloaderBrowse
    • 13.107.246.45
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.822820017678726
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:drW0xB3OBb.dll
    File size:7'969'472 bytes
    MD5:6541e8070a34e26ec1461671189c5276
    SHA1:2c66fe410dab036ddb12a3471f88f8e6be2aa6f4
    SHA256:756f935f0e564a2bcda2a4d13f57313be2d5e15834732bed53447988fdd60e6e
    SHA512:ab0d95766ecc6e141fda2e6929031721fb18a6c667e63695988ad42b028f10c5f08b08b2f7e7b2f42b9d71dfcd77bdc31ce43f4dfdc3ddf5ae816b8a93c18791
    SSDEEP:196608:sy5//5aDtFAiCnTtLJBNbMZoI7A3u57yHMYw:socFA5HMCI7A3u5EMYw
    TLSH:4F863332D315B02ED9F79DFC8BA76E0B520A5758E9F5BD5F102807E886412ACF7134A2
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............o...o...o...p...o...o...o...p...o...o...o...p...o..Mi...o...p...o..Rich.o..........PE..L......T...........!..........)....
    Icon Hash:7ae282899bbab082
    Entrypoint:0x1001c36b
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL
    DLL Characteristics:
    Time Stamp:0x54E000B6 [Sun Feb 15 02:13:10 2015 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:b3ef76d9ad1113ae5cd50c92e0d84081
    Instruction
    push ebp
    mov ebp, esp
    push ebx
    mov ebx, dword ptr [ebp+08h]
    push esi
    mov esi, dword ptr [ebp+0Ch]
    push edi
    mov edi, dword ptr [ebp+10h]
    test esi, esi
    jne 00007F82E050E26Bh
    cmp dword ptr [102B06F4h], 00000000h
    jmp 00007F82E050E288h
    cmp esi, 01h
    je 00007F82E050E267h
    cmp esi, 02h
    jne 00007F82E050E284h
    mov eax, dword ptr [102B0704h]
    test eax, eax
    je 00007F82E050E26Bh
    push edi
    push esi
    push ebx
    call eax
    test eax, eax
    je 00007F82E050E26Eh
    push edi
    push esi
    push ebx
    call 00007F82E050E17Ah
    test eax, eax
    jne 00007F82E050E266h
    xor eax, eax
    jmp 00007F82E050E2B0h
    push edi
    push esi
    push ebx
    call 00007F82E0501423h
    cmp esi, 01h
    mov dword ptr [ebp+0Ch], eax
    jne 00007F82E050E26Eh
    test eax, eax
    jne 00007F82E050E299h
    push edi
    push eax
    push ebx
    call 00007F82E050E156h
    test esi, esi
    je 00007F82E050E267h
    cmp esi, 03h
    jne 00007F82E050E288h
    push edi
    push esi
    push ebx
    call 00007F82E050E145h
    test eax, eax
    jne 00007F82E050E265h
    and dword ptr [ebp+0Ch], eax
    cmp dword ptr [ebp+0Ch], 00000000h
    je 00007F82E050E273h
    mov eax, dword ptr [102B0704h]
    test eax, eax
    je 00007F82E050E26Ah
    push edi
    push esi
    push ebx
    call eax
    mov dword ptr [ebp+0Ch], eax
    mov eax, dword ptr [ebp+0Ch]
    pop edi
    pop esi
    pop ebx
    pop ebp
    retn 000Ch
    jmp dword ptr [1001D034h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    Programming Language:
    • [ C ] VS98 (6.0) build 8168
    • [C++] VS98 (6.0) build 8168
    • [RES] VS98 (6.0) cvtres build 1720
    • [LNK] VS98 (6.0) imp/exp build 8168
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x2aeb00x15c.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x2ac800x50.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x2b10000xb58.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x2b20000x2b3c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x1d0000x3c.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1b40e0x1c00095372599b6ccb27f9a9c50abc350114bFalse0.3187953404017857data5.614924578094291IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x1d0000xe00c0xf00043fbf61b295f5047ef8ecb1c098fd9ffFalse0.856396484375data7.166580296143949IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x2c0000x2847080x100020030f05337d41a4bce8f7b8bccdf644unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x2b10000xb580x100037f3ef2540fdbd792ddb7c35e8025b03False0.332275390625data2.5655831123569213IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x2b20000x45520x5000dfb828f78dc981c78596654f2a95aa50False0.426025390625data4.619158081251188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MENU0x2b13700xa2dataEnglishAustralia0.7716049382716049
    RT_MENU0x2b12a00xccdataEnglishAustralia0.7107843137254902
    RT_MENU0x2b14180x3cdataEnglishAustralia0.95
    RT_GROUP_ICON0x2b17f80x3edataEnglishAustralia0.6129032258064516
    RT_VERSION0x2b18680x2ecdataEnglishAustralia0.5240641711229946
    RT_ICON0x2b17100x49dDevice independent bitmap graphic, 16 x 32 x 4, image size 0EnglishAustralia0.5105842506350551
    RT_ICON0x2b15400x419Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishAustralia0.544327931363203
    RT_ICON0x2b16280x40cDevice independent bitmap graphic, 16 x 32 x 4, image size 0EnglishAustralia0.5463320463320464
    RT_ICON0x2b14580x47cDevice independent bitmap graphic, 16 x 32 x 4, image size 0EnglishAustralia0.5139372822299652
    DLLImport
    SETUPAPI.dllSetupDiClassGuidsFromNameA, SetupDiEnumDeviceInterfaces
    MPR.dllWNetGetUniversalNameW, WNetAddConnection2W, WNetCancelConnection2W, WNetGetConnectionA, WNetGetProviderNameA, WNetOpenEnumA, WNetConnectionDialog1W, WNetAddConnection2A
    KERNEL32.dllThread32Next, Process32First
    NameOrdinalAddress
    EssenceHoliestExamination10x10011106
    FactInsensibilityExplication20x100175de
    FaultedMonolayersInterocular30x100179de
    FrightedMonolithsIrons40x1001167e
    LigandsHyphensMisinformation50x1000f3fd
    LimitsNearsightedLounges60x1001bd71
    MetallisedMisidentificationEons70x1001c080
    5thVJ7vnbPDxdRJf80x10001370
    Language of compilation systemCountry where language is spokenMap
    EnglishAustralia
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 11, 2025 14:35:50.427156925 CET1.1.1.1192.168.2.50xb248No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
    Jan 11, 2025 14:35:50.427156925 CET1.1.1.1192.168.2.50xb248No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:08:35:34
    Start date:11/01/2025
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll"
    Imagebase:0xba0000
    File size:126'464 bytes
    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:08:35:34
    Start date:11/01/2025
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6d64d0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:08:35:34
    Start date:11/01/2025
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",#1
    Imagebase:0x790000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:08:35:34
    Start date:11/01/2025
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,EssenceHoliestExamination
    Imagebase:0x640000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:08:35:34
    Start date:11/01/2025
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",#1
    Imagebase:0x640000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:6
    Start time:08:35:37
    Start date:11/01/2025
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,FactInsensibilityExplication
    Imagebase:0x640000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:08:35:40
    Start date:11/01/2025
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\drW0xB3OBb.dll,FaultedMonolayersInterocular
    Imagebase:0x640000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:08:35:43
    Start date:11/01/2025
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):false
    Commandline:rundll32.exe "C:\Users\user\Desktop\drW0xB3OBb.dll",5thVJ7vnbPDxdRJf
    Imagebase:0x640000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:7.2%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:2.7%
      Total number of Nodes:1217
      Total number of Limit Nodes:8
      execution_graph 5198 100016e3 5199 10003277 _abort 66 API calls 5198->5199 5200 100016ee 5199->5200 5201 10002b06 ___set_flsgetvalue 3 API calls 5200->5201 5202 100016fa 5201->5202 5203 10002ae6 TlsGetValue 5202->5203 5204 10001705 5203->5204 5205 10001733 5204->5205 5206 10001709 5204->5206 5207 10002cdb __freefls@4 75 API calls 5205->5207 5209 10002b3a ___fls_setvalue@8 DecodePointer 5206->5209 5208 1000174e 5207->5208 5210 100016ae 125 API calls 5208->5210 5211 10001718 5209->5211 5212 10001753 5210->5212 5213 10001729 GetCurrentThreadId 5211->5213 5214 1000171c GetLastError ExitThread 5211->5214 5213->5208 5018 100074c5 IsProcessorFeaturePresent 5215 10007d66 5216 10007d70 5215->5216 5217 10007d7c 5215->5217 5216->5217 5218 10007d75 CloseHandle 5216->5218 5218->5217 5019 10004947 5026 10006aa1 5019->5026 5022 1000495a 5024 1000361f _free 66 API calls 5022->5024 5025 10004965 5024->5025 5039 100069c7 5026->5039 5028 1000494c 5028->5022 5029 1000687b 5028->5029 5030 10006887 _raise 5029->5030 5031 100059c4 __lock 66 API calls 5030->5031 5033 10006893 5031->5033 5032 100068f9 5080 1000690e 5032->5080 5033->5032 5037 100068ce DeleteCriticalSection 5033->5037 5067 10007dea 5033->5067 5035 10006905 _raise 5035->5022 5038 1000361f _free 66 API calls 5037->5038 5038->5033 5040 100069d3 _raise 5039->5040 5041 100059c4 __lock 66 API calls 5040->5041 5048 100069e2 5041->5048 5042 10006a7a 5057 10006a98 5042->5057 5045 10006a86 _raise 5045->5028 5047 1000697f 101 API calls __fflush_nolock 5047->5048 5048->5042 5048->5047 5049 100049a8 5048->5049 5054 10006a69 5048->5054 5050 100049b5 5049->5050 5051 100049cb EnterCriticalSection 5049->5051 5052 100059c4 __lock 66 API calls 5050->5052 5051->5048 5053 100049be 5052->5053 5053->5048 5060 10004a16 5054->5060 5056 10006a77 5056->5048 5066 100058eb LeaveCriticalSection 5057->5066 5059 10006a9f 5059->5045 5061 10004a26 5060->5061 5062 10004a39 LeaveCriticalSection 5060->5062 5065 100058eb LeaveCriticalSection 5061->5065 5062->5056 5064 10004a36 5064->5056 5065->5064 5066->5059 5068 10007df6 _raise 5067->5068 5069 10007e08 5068->5069 5070 10007e1d 5068->5070 5071 10002a8b __dosmaperr 66 API calls 5069->5071 5076 10007e18 _raise 5070->5076 5083 10004967 5070->5083 5073 10007e0d 5071->5073 5075 10002a39 __fclose_nolock 11 API calls 5073->5075 5075->5076 5076->5033 5189 100058eb LeaveCriticalSection 5080->5189 5082 10006915 5082->5035 5084 10004979 5083->5084 5085 1000499b EnterCriticalSection 5083->5085 5084->5085 5086 10004981 5084->5086 5088 10004991 5085->5088 5087 100059c4 __lock 66 API calls 5086->5087 5087->5088 5089 10007d7d 5088->5089 5090 10007da2 5089->5090 5091 10007d8e 5089->5091 5093 10007d9e 5090->5093 5108 10006917 5090->5108 5092 10002a8b __dosmaperr 66 API calls 5091->5092 5094 10007d93 5092->5094 5105 10007e56 5093->5105 5096 10002a39 __fclose_nolock 11 API calls 5094->5096 5096->5093 5100 10004a45 __flsbuf 66 API calls 5101 10007dbc 5100->5101 5118 1000810b 5101->5118 5103 10007dc2 5103->5093 5104 1000361f _free 66 API calls 5103->5104 5104->5093 5182 100049da 5105->5182 5107 10007e5c 5107->5076 5109 10006930 5108->5109 5113 10006952 5108->5113 5110 10004a45 __flsbuf 66 API calls 5109->5110 5109->5113 5111 1000694b 5110->5111 5112 1000471d __write 97 API calls 5111->5112 5112->5113 5114 100081cf 5113->5114 5115 10007db6 5114->5115 5116 100081df 5114->5116 5115->5100 5116->5115 5117 1000361f _free 66 API calls 5116->5117 5117->5115 5119 10008117 _raise 5118->5119 5120 1000813a 5119->5120 5121 1000811f 5119->5121 5123 10008146 5120->5123 5126 10008180 5120->5126 5122 10002a9e __dosmaperr 66 API calls 5121->5122 5124 10008124 5122->5124 5125 10002a9e __dosmaperr 66 API calls 5123->5125 5127 10002a8b __dosmaperr 66 API calls 5124->5127 5128 1000814b 5125->5128 5129 1000660e ___lock_fhandle 68 API calls 5126->5129 5136 1000812c _raise 5127->5136 5130 10002a8b __dosmaperr 66 API calls 5128->5130 5131 10008186 5129->5131 5132 10008153 5130->5132 5134 100081a0 5131->5134 5135 10008194 5131->5135 5133 10002a39 __fclose_nolock 11 API calls 5132->5133 5133->5136 5138 10002a8b __dosmaperr 66 API calls 5134->5138 5141 1000806f 5135->5141 5136->5103 5139 1000819a 5138->5139 5156 100081c7 5139->5156 5159 100065a5 5141->5159 5143 100080d5 5172 1000651f 5143->5172 5144 1000807f 5144->5143 5146 100080b3 5144->5146 5148 100065a5 __close_nolock 66 API calls 5144->5148 5146->5143 5149 100065a5 __close_nolock 66 API calls 5146->5149 5151 100080aa 5148->5151 5152 100080bf CloseHandle 5149->5152 5150 100080ff 5150->5139 5154 100065a5 __close_nolock 66 API calls 5151->5154 5152->5143 5155 100080cb GetLastError 5152->5155 5153 10002ab1 __dosmaperr 66 API calls 5153->5150 5154->5146 5155->5143 5181 100066ad LeaveCriticalSection 5156->5181 5158 100081cd 5158->5136 5160 100065b2 5159->5160 5161 100065ca 5159->5161 5162 10002a9e __dosmaperr 66 API calls 5160->5162 5163 10002a9e __dosmaperr 66 API calls 5161->5163 5166 10006609 5161->5166 5164 100065b7 5162->5164 5165 100065db 5163->5165 5167 10002a8b __dosmaperr 66 API calls 5164->5167 5168 10002a8b __dosmaperr 66 API calls 5165->5168 5166->5144 5171 100065bf 5167->5171 5169 100065e3 5168->5169 5170 10002a39 __fclose_nolock 11 API calls 5169->5170 5170->5171 5171->5144 5173 10006530 5172->5173 5174 1000658b 5172->5174 5173->5174 5178 1000655b 5173->5178 5175 10002a8b __dosmaperr 66 API calls 5174->5175 5176 10006590 5175->5176 5177 10002a9e __dosmaperr 66 API calls 5176->5177 5179 10006581 5177->5179 5178->5179 5180 1000657b SetStdHandle 5178->5180 5179->5150 5179->5153 5180->5179 5181->5158 5183 10004a0a LeaveCriticalSection 5182->5183 5184 100049eb 5182->5184 5183->5107 5184->5183 5185 100049f2 5184->5185 5188 100058eb LeaveCriticalSection 5185->5188 5187 10004a07 5187->5107 5188->5187 5189->5082 5003 10001a2b 5006 10003404 5003->5006 5005 10001a39 5007 10003420 5006->5007 5008 10003413 5006->5008 5007->5005 5011 100032ba 5008->5011 5012 10002c48 __getptd_noexit 66 API calls 5011->5012 5013 100032c5 5012->5013 5013->5005 3786 10001a4e 3787 10001a59 3786->3787 3788 10001a5e 3786->3788 3804 10003e16 3787->3804 3792 10001958 3788->3792 3791 10001a6c 3794 10001964 _raise 3792->3794 3793 100019b1 3802 10001a01 _raise 3793->3802 3861 100015c0 3793->3861 3794->3793 3794->3802 3808 100017f4 3794->3808 3798 100019e1 3800 100017f4 __CRT_INIT@12 149 API calls 3798->3800 3798->3802 3799 100015c0 ___DllMainCRTStartup 133 API calls 3801 100019d8 3799->3801 3800->3802 3803 100017f4 __CRT_INIT@12 149 API calls 3801->3803 3802->3791 3803->3798 3805 10003e48 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 3804->3805 3806 10003e3b 3804->3806 3807 10003e3f 3805->3807 3806->3805 3806->3807 3807->3788 3809 10001800 _raise 3808->3809 3810 10001882 3809->3810 3811 10001808 3809->3811 3813 100018e3 3810->3813 3814 10001888 3810->3814 3867 10003de4 HeapCreate 3811->3867 3815 10001941 3813->3815 3816 100018e8 3813->3816 3819 100018a6 3814->3819 3826 10001811 _raise 3814->3826 3968 1000328d 3814->3968 3815->3826 4004 10002e0a 3815->4004 3976 10002b06 TlsGetValue 3816->3976 3817 1000180d 3817->3826 3868 10002e78 GetModuleHandleW 3817->3868 3824 100018ba 3819->3824 3829 1000397d __ioterm 67 API calls 3819->3829 3972 100018cd 3824->3972 3826->3793 3828 1000181d __RTC_Initialize 3831 10001821 3828->3831 3837 1000182d GetCommandLineA 3828->3837 3832 100018b0 3829->3832 3919 10003e02 HeapDestroy 3831->3919 3835 10002b57 __mtterm 70 API calls 3832->3835 3833 10001905 DecodePointer 3839 1000191a 3833->3839 3836 100018b5 3835->3836 3971 10003e02 HeapDestroy 3836->3971 3893 10003d01 GetEnvironmentStringsW 3837->3893 3842 10001935 3839->3842 3843 1000191e 3839->3843 3998 1000361f 3842->3998 3985 10002b94 3843->3985 3848 10001925 GetCurrentThreadId 3848->3826 3849 10001852 3930 10003c46 3849->3930 3850 1000184b 3920 10002b57 3850->3920 3854 1000186b 3860 10001870 3854->3860 3963 1000397d 3854->3963 3860->3826 3862 100015d4 3861->3862 3863 100015d2 3861->3863 4629 10001754 3862->4629 3863->3798 3863->3799 3866 100015f6 CloseHandle 3866->3863 3867->3817 3869 10002e95 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 3868->3869 3870 10002e8c 3868->3870 3872 10002edf TlsAlloc 3869->3872 3871 10002b57 __mtterm 70 API calls 3870->3871 3874 10002e91 3871->3874 3875 10002f2d TlsSetValue 3872->3875 3876 10002fee 3872->3876 3874->3828 3875->3876 3877 10002f3e 3875->3877 3876->3828 4015 10003049 3877->4015 3882 10002f86 DecodePointer 3885 10002f9b 3882->3885 3883 10002fe9 3884 10002b57 __mtterm 70 API calls 3883->3884 3884->3876 3885->3883 3886 1000369e __calloc_crt 66 API calls 3885->3886 3887 10002fb1 3886->3887 3887->3883 3888 10002fb9 DecodePointer 3887->3888 3889 10002fca 3888->3889 3889->3883 3890 10002fce 3889->3890 3891 10002b94 __getptd_noexit 66 API calls 3890->3891 3892 10002fd6 GetCurrentThreadId 3891->3892 3892->3876 3894 10003d1d WideCharToMultiByte 3893->3894 3898 1000183d 3893->3898 3896 10003d52 3894->3896 3897 10003d8a FreeEnvironmentStringsW 3894->3897 4026 10003659 3896->4026 3897->3898 3906 10003738 GetStartupInfoW 3898->3906 3901 10003d60 WideCharToMultiByte 3902 10003d72 3901->3902 3903 10003d7e FreeEnvironmentStringsW 3901->3903 3904 1000361f _free 66 API calls 3902->3904 3903->3898 3905 10003d7a 3904->3905 3905->3903 3907 1000369e __calloc_crt 66 API calls 3906->3907 3908 10003756 3907->3908 3910 1000369e __calloc_crt 66 API calls 3908->3910 3913 1000384b 3908->3913 3914 10001847 3908->3914 3915 100038cb 3908->3915 3909 10003901 GetStdHandle 3909->3915 3910->3908 3911 10003965 SetHandleCount 3911->3914 3912 10003913 GetFileType 3912->3915 3913->3915 3916 10003882 InitializeCriticalSectionAndSpinCount 3913->3916 3917 10003877 GetFileType 3913->3917 3914->3849 3914->3850 3915->3909 3915->3911 3915->3912 3918 10003939 InitializeCriticalSectionAndSpinCount 3915->3918 3916->3913 3916->3914 3917->3913 3917->3916 3918->3914 3918->3915 3919->3826 3921 10002b61 DecodePointer 3920->3921 3922 10002b70 3920->3922 3921->3922 3923 10002b81 TlsFree 3922->3923 3924 10002b8f 3922->3924 3923->3924 3925 100058b0 DeleteCriticalSection 3924->3925 3926 100058c8 3924->3926 3927 1000361f _free 66 API calls 3925->3927 3928 100058da DeleteCriticalSection 3926->3928 3929 100058e8 3926->3929 3927->3924 3928->3926 3929->3831 3931 10003c60 GetModuleFileNameA 3930->3931 3932 10003c5b 3930->3932 3934 10003c87 3931->3934 4170 10005131 3932->4170 4174 10003aac 3934->4174 3936 10001857 3936->3854 3941 100039d0 3936->3941 3938 10003659 __malloc_crt 66 API calls 3939 10003cc9 3938->3939 3939->3936 3940 10003aac _parse_cmdline 76 API calls 3939->3940 3940->3936 3942 100039d9 3941->3942 3945 100039de _strlen 3941->3945 3943 10005131 ___initmbctable 94 API calls 3942->3943 3943->3945 3944 1000369e __calloc_crt 66 API calls 3951 10003a13 _strlen 3944->3951 3945->3944 3948 10001860 3945->3948 3946 10003a62 3947 1000361f _free 66 API calls 3946->3947 3947->3948 3948->3854 3957 100030a0 3948->3957 3949 1000369e __calloc_crt 66 API calls 3949->3951 3950 10003a88 3952 1000361f _free 66 API calls 3950->3952 3951->3946 3951->3948 3951->3949 3951->3950 3954 10003a9f 3951->3954 4490 10006455 3951->4490 3952->3948 3955 100029e7 __invoke_watson 10 API calls 3954->3955 3956 10003aab 3955->3956 3958 100030ae __IsNonwritableInCurrentImage 3957->3958 4499 10005488 3958->4499 3960 100030cc __initterm_e 3962 100030ed __IsNonwritableInCurrentImage 3960->3962 4502 10005dbe 3960->4502 3962->3854 3966 10003986 3963->3966 3964 10001880 3964->3850 3965 1000361f _free 66 API calls 3965->3966 3966->3964 3966->3965 3967 1000399f DeleteCriticalSection 3966->3967 3967->3966 3969 10003137 _doexit 66 API calls 3968->3969 3970 10003298 3969->3970 3970->3819 3971->3824 3973 100018e0 3972->3973 3974 100018d2 3972->3974 3973->3826 3974->3973 3975 10002b57 __mtterm 70 API calls 3974->3975 3975->3973 3977 100018ed 3976->3977 3978 10002b1b DecodePointer TlsSetValue 3976->3978 3979 1000369e 3977->3979 3978->3977 3982 100036a7 3979->3982 3981 100018f9 3981->3826 3981->3833 3982->3981 3983 100036c5 Sleep 3982->3983 4567 10006326 3982->4567 3984 100036da 3983->3984 3984->3981 3984->3982 4576 10003430 3985->4576 3987 10002ba0 GetModuleHandleW 3988 100059c4 __lock 64 API calls 3987->3988 3989 10002bde InterlockedIncrement 3988->3989 4577 10002c36 3989->4577 3992 100059c4 __lock 64 API calls 3993 10002bff 3992->3993 3994 1000514f ___addlocaleref 8 API calls 3993->3994 3995 10002c1d 3994->3995 4580 10002c3f 3995->4580 3997 10002c2a _raise 3997->3848 3999 10003653 __dosmaperr 3998->3999 4000 1000362a HeapFree 3998->4000 3999->3826 4000->3999 4001 1000363f 4000->4001 4002 10002a8b __dosmaperr 64 API calls 4001->4002 4003 10003645 GetLastError 4002->4003 4003->3999 4005 10002e63 4004->4005 4006 10002e18 4004->4006 4007 10002e76 4005->4007 4008 10002e6d TlsSetValue 4005->4008 4009 10002e45 DecodePointer 4006->4009 4010 10002e1e TlsGetValue 4006->4010 4007->3826 4008->4007 4013 10002e5b 4009->4013 4011 10002e31 TlsGetValue 4010->4011 4012 10002e41 4010->4012 4011->4012 4012->4009 4585 10002cdb 4013->4585 4024 10002ad4 EncodePointer 4015->4024 4017 10003051 __init_pointers __initp_misc_winsig 4025 10005a30 EncodePointer 4017->4025 4019 10002f43 EncodePointer EncodePointer EncodePointer EncodePointer 4020 1000584a 4019->4020 4021 10005855 4020->4021 4022 1000585f InitializeCriticalSectionAndSpinCount 4021->4022 4023 10002f82 4021->4023 4022->4021 4022->4023 4023->3882 4023->3883 4024->4017 4025->4019 4028 10003662 4026->4028 4029 10003698 4028->4029 4030 10003679 Sleep 4028->4030 4031 10006292 4028->4031 4029->3897 4029->3901 4030->4028 4032 1000630f 4031->4032 4038 100062a0 4031->4038 4033 10005c73 _malloc DecodePointer 4032->4033 4034 10006315 4033->4034 4035 10002a8b __dosmaperr 65 API calls 4034->4035 4046 10006307 4035->4046 4037 100062ce HeapAlloc 4037->4038 4037->4046 4038->4037 4040 100062fb 4038->4040 4044 100062f9 4038->4044 4047 10006103 4038->4047 4056 10005f54 4038->4056 4080 1000301f 4038->4080 4083 10005c73 DecodePointer 4038->4083 4085 10002a8b 4040->4085 4045 10002a8b __dosmaperr 65 API calls 4044->4045 4045->4046 4046->4028 4088 10007bd0 4047->4088 4049 1000610a 4050 10006117 4049->4050 4051 10007bd0 __NMSG_WRITE 66 API calls 4049->4051 4052 10005f54 __NMSG_WRITE 66 API calls 4050->4052 4054 10006139 4050->4054 4051->4050 4053 1000612f 4052->4053 4055 10005f54 __NMSG_WRITE 66 API calls 4053->4055 4054->4038 4055->4054 4057 10005f75 __NMSG_WRITE 4056->4057 4059 10007bd0 __NMSG_WRITE 63 API calls 4057->4059 4079 10006091 4057->4079 4061 10005f8f 4059->4061 4060 10006101 4060->4038 4062 100060a0 GetStdHandle 4061->4062 4063 10007bd0 __NMSG_WRITE 63 API calls 4061->4063 4066 100060ae _strlen 4062->4066 4062->4079 4064 10005fa0 4063->4064 4064->4062 4065 10005fb2 4064->4065 4065->4079 4107 10007b6d 4065->4107 4069 100060e4 WriteFile 4066->4069 4066->4079 4069->4079 4070 10005fde GetModuleFileNameW 4071 10005fff 4070->4071 4074 1000600b _wcslen 4070->4074 4072 10007b6d __NMSG_WRITE 63 API calls 4071->4072 4072->4074 4073 100029e7 __invoke_watson 10 API calls 4073->4074 4074->4073 4076 10007a10 63 API calls __NMSG_WRITE 4074->4076 4077 10006081 4074->4077 4116 10007a85 4074->4116 4076->4074 4125 100078a4 4077->4125 4143 10005718 4079->4143 4153 10002ff4 GetModuleHandleW 4080->4153 4084 10005c88 4083->4084 4084->4038 4156 10002c48 GetLastError 4085->4156 4087 10002a90 4087->4044 4089 10007bdc 4088->4089 4090 10002a8b __dosmaperr 66 API calls 4089->4090 4091 10007be6 4089->4091 4092 10007bff 4090->4092 4091->4049 4095 10002a39 4092->4095 4098 10002a0c DecodePointer 4095->4098 4099 10002a21 4098->4099 4104 100029e7 4099->4104 4101 10002a38 4102 10002a0c __fclose_nolock 10 API calls 4101->4102 4103 10002a45 4102->4103 4103->4049 4105 100028be __call_reportfault 8 API calls 4104->4105 4106 100029f9 GetCurrentProcess TerminateProcess 4105->4106 4106->4101 4108 10007b82 4107->4108 4109 10007b7b 4107->4109 4110 10002a8b __dosmaperr 66 API calls 4108->4110 4109->4108 4111 10007ba3 4109->4111 4115 10007b87 4110->4115 4113 10005fd3 4111->4113 4114 10002a8b __dosmaperr 66 API calls 4111->4114 4112 10002a39 __fclose_nolock 11 API calls 4112->4113 4113->4070 4113->4074 4114->4115 4115->4112 4119 10007a97 4116->4119 4117 10007a9b 4118 10002a8b __dosmaperr 66 API calls 4117->4118 4120 10007aa0 4117->4120 4124 10007ab7 4118->4124 4119->4117 4119->4120 4121 10007ade 4119->4121 4120->4074 4121->4120 4123 10002a8b __dosmaperr 66 API calls 4121->4123 4122 10002a39 __fclose_nolock 11 API calls 4122->4120 4123->4124 4124->4122 4151 10002ad4 EncodePointer 4125->4151 4127 100078ca 4128 10007957 4127->4128 4129 100078da LoadLibraryW 4127->4129 4135 10007971 DecodePointer DecodePointer 4128->4135 4140 10007984 4128->4140 4130 100079ef 4129->4130 4131 100078ef GetProcAddress 4129->4131 4136 10005718 __setmbcp_nolock 5 API calls 4130->4136 4131->4130 4134 10007905 7 API calls 4131->4134 4132 100079e3 DecodePointer 4132->4130 4133 100079ba DecodePointer 4133->4132 4137 100079c1 4133->4137 4134->4128 4138 10007947 GetProcAddress EncodePointer 4134->4138 4135->4140 4139 10007a0e 4136->4139 4137->4132 4141 100079d4 DecodePointer 4137->4141 4138->4128 4139->4079 4140->4132 4140->4133 4142 100079a7 4140->4142 4141->4132 4141->4142 4142->4132 4144 10005720 4143->4144 4145 10005722 IsDebuggerPresent 4143->4145 4144->4060 4152 100057c5 4145->4152 4148 100073d2 SetUnhandledExceptionFilter UnhandledExceptionFilter 4149 100073f7 GetCurrentProcess TerminateProcess 4148->4149 4150 100073ef __call_reportfault 4148->4150 4149->4060 4150->4149 4151->4127 4152->4148 4154 10003008 GetProcAddress 4153->4154 4155 10003018 ExitProcess 4153->4155 4154->4155 4157 10002b06 ___set_flsgetvalue 3 API calls 4156->4157 4158 10002c5f 4157->4158 4159 10002cb5 SetLastError 4158->4159 4160 1000369e __calloc_crt 62 API calls 4158->4160 4159->4087 4161 10002c73 4160->4161 4161->4159 4162 10002c7b DecodePointer 4161->4162 4163 10002c90 4162->4163 4164 10002c94 4163->4164 4165 10002cac 4163->4165 4167 10002b94 __getptd_noexit 62 API calls 4164->4167 4166 1000361f _free 62 API calls 4165->4166 4168 10002cb2 4166->4168 4169 10002c9c GetCurrentThreadId 4167->4169 4168->4159 4169->4159 4171 1000513a 4170->4171 4172 10005141 4170->4172 4180 10004f97 4171->4180 4172->3931 4176 10003acb 4174->4176 4178 10003b38 4176->4178 4484 10006507 4176->4484 4177 10003c36 4177->3936 4177->3938 4178->4177 4179 10006507 76 API calls _parse_cmdline 4178->4179 4179->4178 4181 10004fa3 _raise 4180->4181 4211 10002cc1 4181->4211 4185 10004fb6 4232 10004d32 4185->4232 4188 10003659 __malloc_crt 66 API calls 4189 10004fd7 4188->4189 4190 100050f6 _raise 4189->4190 4239 10004dae 4189->4239 4190->4172 4193 10005103 4193->4190 4197 10005116 4193->4197 4199 1000361f _free 66 API calls 4193->4199 4194 10005007 InterlockedDecrement 4195 10005017 4194->4195 4196 10005028 InterlockedIncrement 4194->4196 4195->4196 4201 1000361f _free 66 API calls 4195->4201 4196->4190 4198 1000503e 4196->4198 4200 10002a8b __dosmaperr 66 API calls 4197->4200 4198->4190 4249 100059c4 4198->4249 4199->4197 4200->4190 4202 10005027 4201->4202 4202->4196 4205 10005052 InterlockedDecrement 4206 100050e1 InterlockedIncrement 4205->4206 4207 100050ce 4205->4207 4256 100050f8 4206->4256 4207->4206 4209 1000361f _free 66 API calls 4207->4209 4210 100050e0 4209->4210 4210->4206 4212 10002c48 __getptd_noexit 66 API calls 4211->4212 4214 10002cc9 4212->4214 4213 10002cd6 4216 10004c8e 4213->4216 4214->4213 4259 1000329c 4214->4259 4217 10004c9a _raise 4216->4217 4218 10002cc1 __getptd 66 API calls 4217->4218 4219 10004c9f 4218->4219 4220 100059c4 __lock 66 API calls 4219->4220 4228 10004cb1 4219->4228 4221 10004ccf 4220->4221 4222 10004d18 4221->4222 4226 10004d00 InterlockedIncrement 4221->4226 4227 10004ce6 InterlockedDecrement 4221->4227 4298 10004d29 4222->4298 4223 1000329c __amsg_exit 66 API calls 4225 10004cbf _raise 4223->4225 4225->4185 4226->4222 4227->4226 4229 10004cf1 4227->4229 4228->4223 4228->4225 4229->4226 4230 1000361f _free 66 API calls 4229->4230 4231 10004cff 4230->4231 4231->4226 4302 10001bd5 4232->4302 4235 10004d51 GetOEMCP 4238 10004d61 4235->4238 4236 10004d6f 4237 10004d74 GetACP 4236->4237 4236->4238 4237->4238 4238->4188 4238->4190 4240 10004d32 getSystemCP 78 API calls 4239->4240 4241 10004dce 4240->4241 4242 10004dd9 setSBCS 4241->4242 4245 10004e1d IsValidCodePage 4241->4245 4248 10004e42 _memset __setmbcp_nolock 4241->4248 4243 10005718 __setmbcp_nolock 5 API calls 4242->4243 4244 10004f95 4243->4244 4244->4193 4244->4194 4245->4242 4246 10004e2f GetCPInfo 4245->4246 4246->4242 4246->4248 4393 10004afe GetCPInfo 4248->4393 4250 100059d9 4249->4250 4251 100059ec EnterCriticalSection 4249->4251 4454 10005902 4250->4454 4251->4205 4253 100059df 4253->4251 4254 1000329c __amsg_exit 65 API calls 4253->4254 4255 100059eb 4254->4255 4255->4251 4483 100058eb LeaveCriticalSection 4256->4483 4258 100050ff 4258->4190 4260 10006103 __FF_MSGBANNER 66 API calls 4259->4260 4261 100032a6 4260->4261 4262 10005f54 __NMSG_WRITE 66 API calls 4261->4262 4263 100032ae 4262->4263 4266 10003277 4263->4266 4269 10003137 4266->4269 4268 10003288 4270 10003143 _raise 4269->4270 4271 100059c4 __lock 61 API calls 4270->4271 4272 1000314a 4271->4272 4274 10003175 DecodePointer 4272->4274 4279 100031f4 4272->4279 4276 1000318c DecodePointer 4274->4276 4274->4279 4288 1000319f 4276->4288 4277 10003271 _raise 4277->4268 4292 10003262 4279->4292 4280 10003259 4282 10003262 4280->4282 4283 1000301f _malloc 3 API calls 4280->4283 4284 1000326f 4282->4284 4297 100058eb LeaveCriticalSection 4282->4297 4283->4282 4284->4268 4285 100031b6 DecodePointer 4291 10002ad4 EncodePointer 4285->4291 4288->4279 4288->4285 4289 100031c5 DecodePointer DecodePointer 4288->4289 4290 10002ad4 EncodePointer 4288->4290 4289->4288 4290->4288 4291->4288 4293 10003242 4292->4293 4294 10003268 4292->4294 4293->4277 4296 100058eb LeaveCriticalSection 4293->4296 4295 100058eb _doexit LeaveCriticalSection 4294->4295 4295->4293 4296->4280 4297->4284 4301 100058eb LeaveCriticalSection 4298->4301 4300 10004d30 4300->4228 4301->4300 4303 10001be8 4302->4303 4309 10001c35 4302->4309 4304 10002cc1 __getptd 66 API calls 4303->4304 4305 10001bed 4304->4305 4306 10001c15 4305->4306 4310 1000540f 4305->4310 4308 10004c8e _LocaleUpdate::_LocaleUpdate 68 API calls 4306->4308 4306->4309 4308->4309 4309->4235 4309->4236 4311 1000541b _raise 4310->4311 4312 10002cc1 __getptd 66 API calls 4311->4312 4313 10005420 4312->4313 4314 1000544e 4313->4314 4316 10005432 4313->4316 4315 100059c4 __lock 66 API calls 4314->4315 4318 10005455 4315->4318 4317 10002cc1 __getptd 66 API calls 4316->4317 4319 10005437 4317->4319 4325 100053c2 4318->4325 4322 10005445 _raise 4319->4322 4324 1000329c __amsg_exit 66 API calls 4319->4324 4322->4306 4324->4322 4326 10005404 4325->4326 4327 100053cf 4325->4327 4333 1000547c 4326->4333 4327->4326 4336 1000514f InterlockedIncrement 4327->4336 4329 100053e5 4329->4326 4348 100051de 4329->4348 4392 100058eb LeaveCriticalSection 4333->4392 4335 10005483 4335->4319 4337 10005170 4336->4337 4338 1000516d InterlockedIncrement 4336->4338 4339 1000517a InterlockedIncrement 4337->4339 4340 1000517d 4337->4340 4338->4337 4339->4340 4341 10005187 InterlockedIncrement 4340->4341 4342 1000518a 4340->4342 4341->4342 4343 10005194 InterlockedIncrement 4342->4343 4345 10005197 4342->4345 4343->4345 4344 100051b0 InterlockedIncrement 4344->4345 4345->4344 4346 100051cb InterlockedIncrement 4345->4346 4347 100051c0 InterlockedIncrement 4345->4347 4346->4329 4347->4345 4349 10005272 4348->4349 4350 100051ef InterlockedDecrement 4348->4350 4349->4326 4362 10005277 4349->4362 4351 10005204 InterlockedDecrement 4350->4351 4352 10005207 4350->4352 4351->4352 4353 10005211 InterlockedDecrement 4352->4353 4354 10005214 4352->4354 4353->4354 4355 10005221 4354->4355 4356 1000521e InterlockedDecrement 4354->4356 4357 1000522b InterlockedDecrement 4355->4357 4358 1000522e 4355->4358 4356->4355 4357->4358 4359 10005247 InterlockedDecrement 4358->4359 4360 10005257 InterlockedDecrement 4358->4360 4361 10005262 InterlockedDecrement 4358->4361 4359->4358 4360->4358 4361->4349 4363 100052fb 4362->4363 4365 1000528e 4362->4365 4364 10005348 4363->4364 4366 1000361f _free 66 API calls 4363->4366 4367 10006e1e ___free_lc_time 66 API calls 4364->4367 4377 10005371 4364->4377 4365->4363 4373 1000361f _free 66 API calls 4365->4373 4388 100052c2 4365->4388 4368 1000531c 4366->4368 4369 10005366 4367->4369 4370 1000361f _free 66 API calls 4368->4370 4372 1000361f _free 66 API calls 4369->4372 4375 1000532f 4370->4375 4371 1000361f _free 66 API calls 4376 100052f0 4371->4376 4372->4377 4378 100052b7 4373->4378 4374 100053b6 4379 1000361f _free 66 API calls 4374->4379 4382 1000361f _free 66 API calls 4375->4382 4383 1000361f _free 66 API calls 4376->4383 4377->4374 4381 1000361f 66 API calls _free 4377->4381 4384 100071fe ___free_lconv_mon 66 API calls 4378->4384 4385 100053bc 4379->4385 4380 1000361f _free 66 API calls 4386 100052d8 4380->4386 4381->4377 4387 1000533d 4382->4387 4383->4363 4384->4388 4385->4326 4389 10007195 ___free_lconv_num 66 API calls 4386->4389 4390 1000361f _free 66 API calls 4387->4390 4388->4380 4391 100052e3 4388->4391 4389->4391 4390->4364 4391->4371 4392->4335 4394 10004be6 4393->4394 4397 10004b32 _memset 4393->4397 4399 10005718 __setmbcp_nolock 5 API calls 4394->4399 4403 10006dde 4397->4403 4401 10004c8c 4399->4401 4401->4248 4402 10006cb1 ___crtLCMapStringA 82 API calls 4402->4394 4404 10001bd5 _LocaleUpdate::_LocaleUpdate 76 API calls 4403->4404 4405 10006df1 4404->4405 4413 10006cf7 4405->4413 4408 10006cb1 4409 10001bd5 _LocaleUpdate::_LocaleUpdate 76 API calls 4408->4409 4410 10006cc4 4409->4410 4430 10006aca 4410->4430 4414 10006d20 MultiByteToWideChar 4413->4414 4415 10006d15 4413->4415 4416 10006d49 4414->4416 4418 10006d4d 4414->4418 4415->4414 4417 10005718 __setmbcp_nolock 5 API calls 4416->4417 4419 10004ba1 4417->4419 4421 10006d62 _memset __crtGetStringTypeA_stat 4418->4421 4422 10006292 _malloc 66 API calls 4418->4422 4419->4408 4420 10006d9b MultiByteToWideChar 4423 10006db1 GetStringTypeW 4420->4423 4424 10006dc2 4420->4424 4421->4416 4421->4420 4422->4421 4423->4424 4426 10006aaa 4424->4426 4427 10006ab6 4426->4427 4428 10006ac7 4426->4428 4427->4428 4429 1000361f _free 66 API calls 4427->4429 4428->4416 4429->4428 4432 10006ae8 MultiByteToWideChar 4430->4432 4433 10006b46 4432->4433 4437 10006b4d 4432->4437 4434 10005718 __setmbcp_nolock 5 API calls 4433->4434 4436 10004bc1 4434->4436 4435 10006b9a MultiByteToWideChar 4439 10006c92 4435->4439 4440 10006bb3 LCMapStringW 4435->4440 4436->4402 4438 10006292 _malloc 66 API calls 4437->4438 4443 10006b66 __crtGetStringTypeA_stat 4437->4443 4438->4443 4441 10006aaa __freea 66 API calls 4439->4441 4440->4439 4442 10006bd2 4440->4442 4441->4433 4444 10006bdc 4442->4444 4446 10006c05 4442->4446 4443->4433 4443->4435 4444->4439 4445 10006bf0 LCMapStringW 4444->4445 4445->4439 4448 10006c20 __crtGetStringTypeA_stat 4446->4448 4449 10006292 _malloc 66 API calls 4446->4449 4447 10006c54 LCMapStringW 4450 10006c6a WideCharToMultiByte 4447->4450 4451 10006c8c 4447->4451 4448->4439 4448->4447 4449->4448 4450->4451 4452 10006aaa __freea 66 API calls 4451->4452 4452->4439 4455 1000590e _raise 4454->4455 4456 10005934 4455->4456 4457 10006103 __FF_MSGBANNER 65 API calls 4455->4457 4459 10003659 __malloc_crt 65 API calls 4456->4459 4462 10005944 _raise 4456->4462 4458 10005923 4457->4458 4460 10005f54 __NMSG_WRITE 65 API calls 4458->4460 4461 1000594f 4459->4461 4463 1000592a 4460->4463 4464 10005965 4461->4464 4465 10005956 4461->4465 4462->4253 4466 1000301f _malloc 3 API calls 4463->4466 4468 100059c4 __lock 65 API calls 4464->4468 4467 10002a8b __dosmaperr 65 API calls 4465->4467 4466->4456 4467->4462 4469 1000596c 4468->4469 4470 10005974 InitializeCriticalSectionAndSpinCount 4469->4470 4471 1000599f 4469->4471 4472 10005984 4470->4472 4478 10005990 4470->4478 4473 1000361f _free 65 API calls 4471->4473 4474 1000361f _free 65 API calls 4472->4474 4473->4478 4475 1000598a 4474->4475 4477 10002a8b __dosmaperr 65 API calls 4475->4477 4477->4478 4479 100059bb 4478->4479 4482 100058eb LeaveCriticalSection 4479->4482 4481 100059c2 4481->4462 4482->4481 4483->4258 4487 100064b4 4484->4487 4488 10001bd5 _LocaleUpdate::_LocaleUpdate 76 API calls 4487->4488 4489 100064c7 4488->4489 4489->4176 4491 10006463 4490->4491 4492 1000646a 4490->4492 4491->4492 4495 10006488 4491->4495 4493 10002a8b __dosmaperr 66 API calls 4492->4493 4498 1000646f 4493->4498 4494 10002a39 __fclose_nolock 11 API calls 4497 10006479 4494->4497 4496 10002a8b __dosmaperr 66 API calls 4495->4496 4495->4497 4496->4498 4497->3951 4498->4494 4500 1000548e EncodePointer 4499->4500 4500->4500 4501 100054a8 4500->4501 4501->3960 4505 10005d82 4502->4505 4504 10005dcb 4504->3962 4506 10005d8e _raise 4505->4506 4513 10003037 4506->4513 4512 10005daf _raise 4512->4504 4514 100059c4 __lock 66 API calls 4513->4514 4515 1000303e 4514->4515 4516 10005c9b DecodePointer DecodePointer 4515->4516 4517 10005cc9 4516->4517 4518 10005d4a 4516->4518 4517->4518 4530 10007871 4517->4530 4527 10005db8 4518->4527 4520 10005d2d EncodePointer EncodePointer 4520->4518 4521 10005cff 4521->4518 4524 100036ea __realloc_crt 70 API calls 4521->4524 4525 10005d1b EncodePointer 4521->4525 4522 10005cdb 4522->4520 4522->4521 4537 100036ea 4522->4537 4526 10005d15 4524->4526 4525->4520 4526->4518 4526->4525 4563 10003040 4527->4563 4531 10007891 HeapSize 4530->4531 4532 1000787c 4530->4532 4531->4522 4533 10002a8b __dosmaperr 66 API calls 4532->4533 4534 10007881 4533->4534 4535 10002a39 __fclose_nolock 11 API calls 4534->4535 4536 1000788c 4535->4536 4536->4522 4540 100036f3 4537->4540 4539 10003732 4539->4521 4540->4539 4541 10003713 Sleep 4540->4541 4542 100063a8 4540->4542 4541->4540 4543 100063b3 4542->4543 4544 100063be 4542->4544 4545 10006292 _malloc 66 API calls 4543->4545 4546 100063c6 4544->4546 4554 100063d3 4544->4554 4547 100063bb 4545->4547 4548 1000361f _free 66 API calls 4546->4548 4547->4540 4560 100063ce __dosmaperr 4548->4560 4549 1000640b 4551 10005c73 _malloc DecodePointer 4549->4551 4550 100063db HeapReAlloc 4550->4554 4550->4560 4552 10006411 4551->4552 4555 10002a8b __dosmaperr 66 API calls 4552->4555 4553 1000643b 4557 10002a8b __dosmaperr 66 API calls 4553->4557 4554->4549 4554->4550 4554->4553 4556 10005c73 _malloc DecodePointer 4554->4556 4559 10006423 4554->4559 4555->4560 4556->4554 4558 10006440 GetLastError 4557->4558 4558->4560 4561 10002a8b __dosmaperr 66 API calls 4559->4561 4560->4540 4562 10006428 GetLastError 4561->4562 4562->4560 4566 100058eb LeaveCriticalSection 4563->4566 4565 10003047 4565->4512 4566->4565 4568 10006332 4567->4568 4574 1000634d 4567->4574 4569 1000633e 4568->4569 4568->4574 4571 10002a8b __dosmaperr 65 API calls 4569->4571 4570 10006360 HeapAlloc 4570->4574 4575 10006387 4570->4575 4572 10006343 4571->4572 4572->3982 4573 10005c73 _malloc DecodePointer 4573->4574 4574->4570 4574->4573 4574->4575 4575->3982 4576->3987 4583 100058eb LeaveCriticalSection 4577->4583 4579 10002bf8 4579->3992 4584 100058eb LeaveCriticalSection 4580->4584 4582 10002c46 4582->3997 4583->4579 4584->4582 4587 10002ce7 _raise 4585->4587 4586 10002cff 4590 10002d0d 4586->4590 4591 1000361f _free 66 API calls 4586->4591 4587->4586 4588 10002de9 _raise 4587->4588 4589 1000361f _free 66 API calls 4587->4589 4588->4005 4589->4586 4592 10002d1b 4590->4592 4593 1000361f _free 66 API calls 4590->4593 4591->4590 4594 10002d29 4592->4594 4595 1000361f _free 66 API calls 4592->4595 4593->4592 4596 10002d37 4594->4596 4597 1000361f _free 66 API calls 4594->4597 4595->4594 4598 10002d45 4596->4598 4599 1000361f _free 66 API calls 4596->4599 4597->4596 4600 10002d53 4598->4600 4601 1000361f _free 66 API calls 4598->4601 4599->4598 4602 10002d64 4600->4602 4603 1000361f _free 66 API calls 4600->4603 4601->4600 4604 100059c4 __lock 66 API calls 4602->4604 4603->4602 4605 10002d6c 4604->4605 4606 10002d78 InterlockedDecrement 4605->4606 4612 10002d91 4605->4612 4608 10002d83 4606->4608 4606->4612 4610 1000361f _free 66 API calls 4608->4610 4608->4612 4610->4612 4611 100059c4 __lock 66 API calls 4613 10002da5 4611->4613 4621 10002df5 4612->4621 4614 10002dd6 4613->4614 4616 100051de ___removelocaleref 8 API calls 4613->4616 4624 10002e01 4614->4624 4619 10002dba 4616->4619 4618 1000361f _free 66 API calls 4618->4588 4619->4614 4620 10005277 ___freetlocinfo 66 API calls 4619->4620 4620->4614 4627 100058eb LeaveCriticalSection 4621->4627 4623 10002d9e 4623->4611 4628 100058eb LeaveCriticalSection 4624->4628 4626 10002de3 4626->4618 4627->4623 4628->4626 4630 10001764 4629->4630 4631 10001778 4629->4631 4633 10002a8b __dosmaperr 66 API calls 4630->4633 4632 10002b06 ___set_flsgetvalue 3 API calls 4631->4632 4634 1000177e 4632->4634 4635 10001769 4633->4635 4636 1000369e __calloc_crt 66 API calls 4634->4636 4637 10002a39 __fclose_nolock 11 API calls 4635->4637 4638 1000178a 4636->4638 4645 100015ea 4637->4645 4639 100017db 4638->4639 4640 10002cc1 __getptd 66 API calls 4638->4640 4641 1000361f _free 66 API calls 4639->4641 4642 10001797 4640->4642 4643 100017e1 4641->4643 4644 10002b94 __getptd_noexit 66 API calls 4642->4644 4643->4645 4650 10002ab1 4643->4650 4647 100017a0 CreateThread 4644->4647 4645->3863 4645->3866 4647->4645 4649 100017d3 GetLastError 4647->4649 4658 100016ef 4647->4658 4649->4639 4655 10002a9e 4650->4655 4652 10002abc __dosmaperr 4653 10002a8b __dosmaperr 66 API calls 4652->4653 4654 10002acf 4653->4654 4654->4645 4656 10002c48 __getptd_noexit 66 API calls 4655->4656 4657 10002aa3 4656->4657 4657->4652 4659 10002b06 ___set_flsgetvalue 3 API calls 4658->4659 4660 100016fa 4659->4660 4673 10002ae6 TlsGetValue 4660->4673 4663 10001733 4665 10002cdb __freefls@4 75 API calls 4663->4665 4664 10001709 4685 10002b3a DecodePointer 4664->4685 4666 1000174e 4665->4666 4675 100016ae 4666->4675 4671 10001729 GetCurrentThreadId 4671->4666 4672 1000171c GetLastError ExitThread 4674 10001705 4673->4674 4674->4663 4674->4664 4676 100016ba _raise 4675->4676 4677 10002cc1 __getptd 66 API calls 4676->4677 4678 100016bf 4677->4678 4687 10001390 4678->4687 4679 100016c9 4680 1000168f 80 API calls 4679->4680 4681 100016cf 4680->4681 4682 100032ba 66 API calls 4681->4682 4683 100016e0 4682->4683 4686 10001718 4685->4686 4686->4671 4686->4672 4688 100013b3 _memset 4687->4688 4689 100013ed GetModuleFileNameA 4688->4689 4690 10001461 PathFindFileNameA PathRemoveFileSpecA 4689->4690 4691 10001459 ExitProcess 4689->4691 4701 1000160b 4690->4701 4694 100014d0 GetFileSize VirtualAlloc VirtualAlloc ReadFile CloseHandle 4712 10001340 4694->4712 4695 100014c8 ExitProcess 4698 1000160b _sprintf 102 API calls 4699 10001583 SetEnvironmentVariableA 4698->4699 4700 100015a0 ExitProcess 4699->4700 4702 10001629 4701->4702 4703 1000163e 4701->4703 4704 10002a8b __dosmaperr 66 API calls 4702->4704 4703->4702 4705 10001645 4703->4705 4706 1000162e 4704->4706 4715 10001d03 4705->4715 4708 10002a39 __fclose_nolock 11 API calls 4706->4708 4710 1000149d CreateFileA 4708->4710 4709 1000166b 4709->4710 4741 10001a71 4709->4741 4710->4694 4710->4695 4919 10001100 4712->4919 4716 10001bd5 _LocaleUpdate::_LocaleUpdate 76 API calls 4715->4716 4717 10001d6a 4716->4717 4718 10001d6e 4717->4718 4723 10001da5 __output_l __aulldvrm _strlen 4717->4723 4762 10004a45 4717->4762 4719 10002a8b __dosmaperr 66 API calls 4718->4719 4720 10001d73 4719->4720 4722 10002a39 __fclose_nolock 11 API calls 4720->4722 4724 10001d7e 4722->4724 4723->4718 4723->4724 4728 1000361f _free 66 API calls 4723->4728 4729 1000210b 4723->4729 4731 100056b0 78 API calls __cftof 4723->4731 4739 10001c8f 97 API calls _write_string 4723->4739 4740 10001c5c 97 API calls __output_l 4723->4740 4769 100056cd 4723->4769 4725 10005718 __setmbcp_nolock 5 API calls 4724->4725 4726 1000288a 4725->4726 4726->4709 4728->4723 4730 100023fa DecodePointer 4729->4730 4733 10003659 __malloc_crt 66 API calls 4729->4733 4735 10002148 4729->4735 4732 10002449 4730->4732 4731->4723 4734 10002475 4732->4734 4736 10002463 DecodePointer 4732->4736 4733->4735 4737 10002496 4734->4737 4738 10002484 DecodePointer 4734->4738 4735->4730 4736->4734 4737->4709 4738->4737 4739->4723 4740->4723 4742 10004a45 __flsbuf 66 API calls 4741->4742 4743 10001a81 4742->4743 4744 10001aa3 4743->4744 4745 10001a8c 4743->4745 4747 10001aa7 4744->4747 4755 10001ab4 __flsbuf 4744->4755 4746 10002a8b __dosmaperr 66 API calls 4745->4746 4749 10001a91 4746->4749 4748 10002a8b __dosmaperr 66 API calls 4747->4748 4748->4749 4749->4710 4750 10001ba4 4752 1000471d __write 97 API calls 4750->4752 4751 10001b24 4753 10001b3b 4751->4753 4756 10001b58 4751->4756 4752->4749 4784 1000471d 4753->4784 4755->4749 4758 10001b0a 4755->4758 4761 10001b15 4755->4761 4772 1000483a 4755->4772 4756->4749 4809 10003f36 4756->4809 4758->4761 4781 100047f1 4758->4781 4761->4750 4761->4751 4763 10004a51 4762->4763 4764 10004a66 4762->4764 4765 10002a8b __dosmaperr 66 API calls 4763->4765 4764->4723 4766 10004a56 4765->4766 4767 10002a39 __fclose_nolock 11 API calls 4766->4767 4768 10004a61 4767->4768 4768->4723 4770 10001bd5 _LocaleUpdate::_LocaleUpdate 76 API calls 4769->4770 4771 100056e0 4770->4771 4771->4723 4773 10004856 4772->4773 4774 10004847 4772->4774 4777 10004874 4773->4777 4778 10002a8b __dosmaperr 66 API calls 4773->4778 4775 10002a8b __dosmaperr 66 API calls 4774->4775 4776 1000484c 4775->4776 4776->4758 4777->4758 4779 10004867 4778->4779 4780 10002a39 __fclose_nolock 11 API calls 4779->4780 4780->4776 4782 10003659 __malloc_crt 66 API calls 4781->4782 4783 10004806 4782->4783 4783->4761 4785 10004729 _raise 4784->4785 4786 10004731 4785->4786 4787 1000474c 4785->4787 4788 10002a9e __dosmaperr 66 API calls 4786->4788 4789 10004758 4787->4789 4792 10004792 4787->4792 4790 10004736 4788->4790 4791 10002a9e __dosmaperr 66 API calls 4789->4791 4793 10002a8b __dosmaperr 66 API calls 4790->4793 4794 1000475d 4791->4794 4834 1000660e 4792->4834 4802 1000473e _raise 4793->4802 4796 10002a8b __dosmaperr 66 API calls 4794->4796 4798 10004765 4796->4798 4797 10004798 4800 100047a6 4797->4800 4801 100047ba 4797->4801 4799 10002a39 __fclose_nolock 11 API calls 4798->4799 4799->4802 4844 10004020 4800->4844 4804 10002a8b __dosmaperr 66 API calls 4801->4804 4802->4749 4806 100047bf 4804->4806 4805 100047b2 4903 100047e9 4805->4903 4807 10002a9e __dosmaperr 66 API calls 4806->4807 4807->4805 4810 10003f42 _raise 4809->4810 4811 10003f53 4810->4811 4812 10003f6f 4810->4812 4814 10002a9e __dosmaperr 66 API calls 4811->4814 4813 10003f7b 4812->4813 4819 10003fb5 4812->4819 4815 10002a9e __dosmaperr 66 API calls 4813->4815 4816 10003f58 4814->4816 4818 10003f80 4815->4818 4817 10002a8b __dosmaperr 66 API calls 4816->4817 4820 10003f60 _raise 4817->4820 4821 10002a8b __dosmaperr 66 API calls 4818->4821 4822 1000660e ___lock_fhandle 68 API calls 4819->4822 4820->4749 4823 10003f88 4821->4823 4824 10003fbb 4822->4824 4827 10002a39 __fclose_nolock 11 API calls 4823->4827 4825 10003fe5 4824->4825 4826 10003fc9 4824->4826 4829 10002a8b __dosmaperr 66 API calls 4825->4829 4906 10003eb1 4826->4906 4827->4820 4830 10003fea 4829->4830 4832 10002a9e __dosmaperr 66 API calls 4830->4832 4831 10003fda 4916 10004016 4831->4916 4832->4831 4835 1000661a _raise 4834->4835 4836 10006674 4835->4836 4838 100059c4 __lock 66 API calls 4835->4838 4837 10006679 EnterCriticalSection 4836->4837 4840 10006696 _raise 4836->4840 4837->4840 4839 10006646 4838->4839 4841 10006662 4839->4841 4842 1000664f InitializeCriticalSectionAndSpinCount 4839->4842 4840->4797 4843 100066a4 ___lock_fhandle LeaveCriticalSection 4841->4843 4842->4841 4843->4836 4845 1000402f __write_nolock 4844->4845 4846 10004084 4845->4846 4847 10004065 4845->4847 4876 1000405a 4845->4876 4852 100040e0 4846->4852 4853 100040c3 4846->4853 4848 10002a9e __dosmaperr 66 API calls 4847->4848 4850 1000406a 4848->4850 4849 10005718 __setmbcp_nolock 5 API calls 4851 1000471b 4849->4851 4855 10002a8b __dosmaperr 66 API calls 4850->4855 4851->4805 4854 100040f3 4852->4854 4857 10003eb1 __lseeki64_nolock 68 API calls 4852->4857 4856 10002a9e __dosmaperr 66 API calls 4853->4856 4859 1000483a __flsbuf 66 API calls 4854->4859 4858 10004071 4855->4858 4860 100040c8 4856->4860 4857->4854 4861 10002a39 __fclose_nolock 11 API calls 4858->4861 4862 100040fc 4859->4862 4863 10002a8b __dosmaperr 66 API calls 4860->4863 4861->4876 4865 1000439e 4862->4865 4869 10002cc1 __getptd 66 API calls 4862->4869 4864 100040d0 4863->4864 4866 10002a39 __fclose_nolock 11 API calls 4864->4866 4867 100043ad 4865->4867 4868 1000464e WriteFile 4865->4868 4866->4876 4870 10004468 4867->4870 4880 100043c0 4867->4880 4872 10004681 GetLastError 4868->4872 4873 10004380 4868->4873 4871 10004117 GetConsoleMode 4869->4871 4886 10004475 4870->4886 4894 10004542 4870->4894 4871->4865 4875 10004140 4871->4875 4872->4873 4874 100046cc 4873->4874 4873->4876 4879 1000469f 4873->4879 4874->4876 4878 10002a8b __dosmaperr 66 API calls 4874->4878 4875->4865 4877 10004150 GetConsoleCP 4875->4877 4876->4849 4877->4873 4898 10004173 4877->4898 4882 100046ef 4878->4882 4884 100046aa 4879->4884 4885 100046be 4879->4885 4880->4873 4880->4874 4881 1000440a WriteFile 4880->4881 4881->4872 4881->4880 4888 10002a9e __dosmaperr 66 API calls 4882->4888 4883 100045b3 WideCharToMultiByte 4883->4872 4890 100045ea WriteFile 4883->4890 4889 10002a8b __dosmaperr 66 API calls 4884->4889 4891 10002ab1 __dosmaperr 66 API calls 4885->4891 4886->4873 4886->4874 4887 100044e4 WriteFile 4886->4887 4887->4872 4887->4886 4888->4876 4892 100046af 4889->4892 4893 10004621 GetLastError 4890->4893 4890->4894 4891->4876 4896 10002a9e __dosmaperr 66 API calls 4892->4896 4893->4894 4894->4873 4894->4874 4894->4883 4894->4890 4895 10005705 __write_nolock 76 API calls 4895->4898 4896->4876 4897 1000421f WideCharToMultiByte 4897->4873 4899 10004250 WriteFile 4897->4899 4898->4872 4898->4873 4898->4895 4898->4897 4900 1000682c 78 API calls __fassign 4898->4900 4901 100066d4 WriteConsoleW CreateFileW __write_nolock 4898->4901 4902 100042a4 WriteFile 4898->4902 4899->4872 4899->4898 4900->4898 4901->4898 4902->4872 4902->4898 4904 100066ad __unlock_fhandle LeaveCriticalSection 4903->4904 4905 100047ef 4904->4905 4905->4802 4907 100065a5 __close_nolock 66 API calls 4906->4907 4908 10003ecf 4907->4908 4909 10003ed7 4908->4909 4910 10003ee8 SetFilePointer 4908->4910 4911 10002a8b __dosmaperr 66 API calls 4909->4911 4912 10003f00 GetLastError 4910->4912 4913 10003edc 4910->4913 4911->4913 4912->4913 4914 10003f0a 4912->4914 4913->4831 4915 10002ab1 __dosmaperr 66 API calls 4914->4915 4915->4913 4917 100066ad __unlock_fhandle LeaveCriticalSection 4916->4917 4918 1000401e 4917->4918 4918->4820 4920 1000114c HeapCreate 4919->4920 4921 1000116f HeapAlloc 4919->4921 4920->4921 4922 100011a1 _memset 4921->4922 4926 1000118d _invalid_parameter 4921->4926 4923 100011b4 lstrlenA 4922->4923 4923->4926 4924 1000131c HeapFree 4925 1000132f 4924->4925 4925->4698 4926->4924 4926->4925 4927 10007c10 RtlUnwind 4928 10003490 4929 100034c9 4928->4929 4930 100034bc 4928->4930 4932 10005718 __setmbcp_nolock 5 API calls 4929->4932 4931 10005718 __setmbcp_nolock 5 API calls 4930->4931 4931->4929 4938 100034d9 __except_handler4 __IsNonwritableInCurrentImage 4932->4938 4933 1000355c 4934 10003532 __except_handler4 4934->4933 4935 1000354c 4934->4935 4936 10005718 __setmbcp_nolock 5 API calls 4934->4936 4937 10005718 __setmbcp_nolock 5 API calls 4935->4937 4936->4935 4937->4933 4938->4933 4938->4934 4944 10006262 RtlUnwind 4938->4944 4940 100035ae __except_handler4 4941 100035e2 4940->4941 4942 10005718 __setmbcp_nolock 5 API calls 4940->4942 4943 10005718 __setmbcp_nolock 5 API calls 4941->4943 4942->4941 4943->4934 4945 10006276 4944->4945 4945->4940 5190 100061d0 5191 100061e2 5190->5191 5193 100061f0 @_EH4_CallFilterFunc@8 5190->5193 5192 10005718 __setmbcp_nolock 5 API calls 5191->5192 5192->5193 5219 10001370 5220 10001373 Sleep 5219->5220 5220->5220 5194 10005d51 5195 1000369e __calloc_crt 66 API calls 5194->5195 5196 10005d5d EncodePointer 5195->5196 5197 10005d76 5196->5197 4946 10004896 4947 100048a3 4946->4947 4948 1000369e __calloc_crt 66 API calls 4947->4948 4949 100048bd 4948->4949 4950 1000369e __calloc_crt 66 API calls 4949->4950 4951 100048d6 4949->4951 4950->4951 5221 100059f7 5222 10005a03 _raise 5221->5222 5223 10002cc1 __getptd 66 API calls 5222->5223 5226 10005a08 5223->5226 5224 100074d5 _abort 68 API calls 5225 10005a2a _raise 5224->5225 5226->5224 4952 10005a1b 4953 10005a1e 4952->4953 4956 100074d5 4953->4956 4965 10005a96 DecodePointer 4956->4965 4958 100074da 4959 100074e5 4958->4959 4966 10005aa3 4958->4966 4960 100074fd 4959->4960 4987 100028be 4959->4987 4963 10003277 _abort 66 API calls 4960->4963 4964 10007507 4963->4964 4965->4958 4968 10005aaf _raise 4966->4968 4967 10005b0a 4970 10005aec DecodePointer 4967->4970 4973 10005b19 4967->4973 4968->4967 4969 10005ad6 4968->4969 4968->4970 4976 10005ad2 4968->4976 4971 10002c48 __getptd_noexit 66 API calls 4969->4971 4974 10005adb _siglookup 4970->4974 4971->4974 4975 10002a8b __dosmaperr 66 API calls 4973->4975 4978 10005b76 4974->4978 4980 10003277 _abort 66 API calls 4974->4980 4986 10005ae4 _raise 4974->4986 4977 10005b1e 4975->4977 4976->4969 4976->4973 4979 10002a39 __fclose_nolock 11 API calls 4977->4979 4981 100059c4 __lock 66 API calls 4978->4981 4982 10005b81 4978->4982 4979->4986 4980->4978 4981->4982 4984 10005bb6 4982->4984 4993 10002ad4 EncodePointer 4982->4993 4994 10005c0a 4984->4994 4986->4959 4988 100028dd _memset __call_reportfault 4987->4988 4989 100028fb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4988->4989 4990 100029c9 __call_reportfault 4989->4990 4991 10005718 __setmbcp_nolock 5 API calls 4990->4991 4992 100029e5 4991->4992 4992->4960 4993->4984 4995 10005c10 4994->4995 4996 10005c17 4994->4996 4998 100058eb LeaveCriticalSection 4995->4998 4996->4986 4998->4996 4999 1000119c 5000 10001316 4999->5000 5001 1000131c HeapFree 5000->5001 5002 1000132f 5000->5002 5001->5002 5227 100072fc 5228 1000329c __amsg_exit 66 API calls 5227->5228 5229 10007303 5228->5229

      Control-flow Graph

      APIs
      • _memset.LIBCMT ref: 100013AE
      • _memset.LIBCMT ref: 100013CB
      • _memset.LIBCMT ref: 100013E8
      • GetModuleFileNameA.KERNEL32(?,00000000,00000104), ref: 1000144F
      • ExitProcess.KERNEL32 ref: 1000145B
      • PathFindFileNameA.KERNELBASE(00000000), ref: 10001468
      • PathRemoveFileSpecA.SHLWAPI(00000000), ref: 10001478
      • _sprintf.LIBCMT ref: 10001498
      • CreateFileA.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 100014B9
      • ExitProcess.KERNEL32 ref: 100014CA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: File$_memset$ExitNamePathProcess$CreateFindModuleRemoveSpec_sprintf
      • String ID: %s;%s$%s\%s$IndexerVolumeGuid$obj
      • API String ID: 1379166682-3908985639
      • Opcode ID: 9ce22b888ba396c86282d7d1c5d8dd1e82bb51e039faa061e3dc903898f1bbe5
      • Instruction ID: 11934aba6a6d82af50ff4d1170108ca0fc61c31a7be9c98851ec31a19c21b1cc
      • Opcode Fuzzy Hash: 9ce22b888ba396c86282d7d1c5d8dd1e82bb51e039faa061e3dc903898f1bbe5
      • Instruction Fuzzy Hash: 9F514175D00228AFEB24DBA4DC89FDE7778EB48741F1082D4F609A6294DB70AB84CF50

      Control-flow Graph

      APIs
      • ___set_flsgetvalue.LIBCMT ref: 10001779
      • __calloc_crt.LIBCMT ref: 10001785
      • __getptd.LIBCMT ref: 10001792
      • CreateThread.KERNELBASE(00000000,00000001,100016EF,00000000,00000000,100015EA), ref: 100017C9
      • GetLastError.KERNEL32(?,?,?,?,100015EA,00000000,00000000,10001390,00000001,00000000,00000000), ref: 100017D3
      • _free.LIBCMT ref: 100017DC
      • __dosmaperr.LIBCMT ref: 100017E7
        • Part of subcall function 10002A8B: __getptd_noexit.LIBCMT ref: 10002A8B
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
      • String ID:
      • API String ID: 155776804-0
      • Opcode ID: e9f6d561a35eafe30b3c43bd9c9ec922b3de078d27478f1db668e7d5792b6699
      • Instruction ID: 79c8d16da109cea8c7571228eefc485e8bf4ab3e6a293bb9cbb3722af672f881
      • Opcode Fuzzy Hash: e9f6d561a35eafe30b3c43bd9c9ec922b3de078d27478f1db668e7d5792b6699
      • Instruction Fuzzy Hash: BE11E136208756AFF711DFA5DC81ECB37E8EF053E0B114029FA188615ADB71E80186A1

      Control-flow Graph

      APIs
      • ___set_flsgetvalue.LIBCMT ref: 100016F5
        • Part of subcall function 10002B06: TlsGetValue.KERNEL32(00000000,10002C5F,?,1000366A,00000000,00000001,00000000,?,1000594F,00000018,1000ABE0,0000000C,100059DF,00000000,00000000), ref: 10002B0F
        • Part of subcall function 10002B06: DecodePointer.KERNEL32(?,1000366A,00000000,00000001,00000000,?,1000594F,00000018,1000ABE0,0000000C,100059DF,00000000,00000000,?,10002D6C,0000000D), ref: 10002B21
        • Part of subcall function 10002B06: TlsSetValue.KERNEL32(00000000,?,1000366A,00000000,00000001,00000000,?,1000594F,00000018,1000ABE0,0000000C,100059DF,00000000,00000000,?,10002D6C), ref: 10002B30
        • Part of subcall function 10002AE6: TlsGetValue.KERNEL32(?,?,10001705,00000000), ref: 10002AF4
      • ___fls_setvalue@8.LIBCMT ref: 10001713
        • Part of subcall function 10002B3A: DecodePointer.KERNEL32(?,?,?,10001718,00000000,?,00000000), ref: 10002B4B
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 1000171C
      • ExitThread.KERNEL32 ref: 10001723
      • GetCurrentThreadId.KERNEL32 ref: 10001729
      • __freefls@4.LIBCMT ref: 10001749
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_setvalue@8___set_flsgetvalue__freefls@4
      • String ID:
      • API String ID: 3110252859-0
      • Opcode ID: 571a5129c8629ef6a61f47f14aafb24b4d0d90b9a79542c3be7ed8fa38f4a147
      • Instruction ID: 8666cf25805c1949398de7327572bc0550b4f786466ac6920d6c4ce1d1aab4c5
      • Opcode Fuzzy Hash: 571a5129c8629ef6a61f47f14aafb24b4d0d90b9a79542c3be7ed8fa38f4a147
      • Instruction Fuzzy Hash: B9F01D78504250AFF714EF61C98998E7BA9EF443D47268854F9088721ADB39E842CAA5

      Control-flow Graph

      APIs
      • __getptd.LIBCMT ref: 100016BA
        • Part of subcall function 10002CC1: __getptd_noexit.LIBCMT ref: 10002CC4
        • Part of subcall function 10002CC1: __amsg_exit.LIBCMT ref: 10002CD1
        • Part of subcall function 1000168F: __getptd_noexit.LIBCMT ref: 10001694
        • Part of subcall function 1000168F: __freeptd.LIBCMT ref: 1000169E
        • Part of subcall function 1000168F: ExitThread.KERNEL32 ref: 100016A7
        • Part of subcall function 100032BA: __getptd_noexit.LIBCMT ref: 100032C0
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: __getptd_noexit$ExitThread__amsg_exit__freeptd__getptd
      • String ID:
      • API String ID: 133325885-0
      • Opcode ID: 83ad2ebf7f696f820aa80431895e1c76c70af60a1a82b4259af0543fd83246cc
      • Instruction ID: 36ec94d3bf5e501a61b48b70baf921cf64d82fdf01f5dc028b5212b391babb78
      • Opcode Fuzzy Hash: 83ad2ebf7f696f820aa80431895e1c76c70af60a1a82b4259af0543fd83246cc
      • Instruction Fuzzy Hash: FFE0ECB9900600DFFB19EBA0CD06E6F776AEF05241F214188F5025B2A6CB75B940DA21

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 76 100015c0-100015d0 77 100015d2 76->77 78 100015d4-100015f4 call 10001754 76->78 79 10001600-10001608 77->79 78->79 82 100015f6-100015fa CloseHandle 78->82 82->79
      APIs
      • CloseHandle.KERNELBASE(00000000), ref: 100015FA
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: CloseHandle
      • String ID:
      • API String ID: 2962429428-0
      • Opcode ID: 454ce44414151608d1c995ac9d7ba9363c5714aee8e93da3b5eeb4d5bde4f229
      • Instruction ID: 02f71e687b8cfa14bd804cb1cda3e5d8e469acde5cf7711a7b8d5e77c9aca63c
      • Opcode Fuzzy Hash: 454ce44414151608d1c995ac9d7ba9363c5714aee8e93da3b5eeb4d5bde4f229
      • Instruction Fuzzy Hash: FAF03934A44208FBE700DFA0CC46BDEB774DB047C2F208059FE056B284E6B26A40D795
      APIs
      • IsDebuggerPresent.KERNEL32 ref: 100073C0
      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 100073D5
      • UnhandledExceptionFilter.KERNEL32(1000A8A0), ref: 100073E0
      • GetCurrentProcess.KERNEL32(C0000409), ref: 100073FC
      • TerminateProcess.KERNEL32(00000000), ref: 10007403
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
      • String ID:
      • API String ID: 2579439406-0
      • Opcode ID: 8cfc860e7d71a43308aa844feb8814c1bf683eeea7ef7db07b15b2a1cc4011f0
      • Instruction ID: 6c0105081ba97dd14de7cc5129ab3df667f7e5be7fae7de6ae74d75b996b5305
      • Opcode Fuzzy Hash: 8cfc860e7d71a43308aa844feb8814c1bf683eeea7ef7db07b15b2a1cc4011f0
      • Instruction Fuzzy Hash: 8521ADB8808324DFF741EF24D8C5A483BF8FB083C5F50816BE50887269EBB159858F65

      Control-flow Graph

      APIs
      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,1000181D,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002E80
      • __mtterm.LIBCMT ref: 10002E8C
        • Part of subcall function 10002B57: DecodePointer.KERNEL32(00000007,100018E0,100018C6,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002B68
        • Part of subcall function 10002B57: TlsFree.KERNEL32(00000004,100018E0,100018C6,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002B82
        • Part of subcall function 10002B57: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,100018E0,100018C6,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 100058B1
        • Part of subcall function 10002B57: _free.LIBCMT ref: 100058B4
        • Part of subcall function 10002B57: DeleteCriticalSection.KERNEL32(00000004,?,?,100018E0,100018C6,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 100058DB
      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 10002EA2
      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 10002EAF
      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 10002EBC
      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 10002EC9
      • TlsAlloc.KERNEL32(?,?,1000181D,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002F19
      • TlsSetValue.KERNEL32(00000000,?,?,1000181D,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002F34
      • __init_pointers.LIBCMT ref: 10002F3E
      • EncodePointer.KERNEL32(?,?,1000181D,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002F4F
      • EncodePointer.KERNEL32(?,?,1000181D,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002F5C
      • EncodePointer.KERNEL32(?,?,1000181D,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002F69
      • EncodePointer.KERNEL32(?,?,1000181D,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002F76
      • DecodePointer.KERNEL32(Function_00002CDB,?,?,1000181D,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002F97
      • __calloc_crt.LIBCMT ref: 10002FAC
      • DecodePointer.KERNEL32(00000000,?,?,1000181D,1000AA90,00000008,100019B1,?,?,?,1000AAB0,0000000C,10001A6C,?), ref: 10002FC6
      • GetCurrentThreadId.KERNEL32 ref: 10002FD8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
      • API String ID: 3698121176-3819984048
      • Opcode ID: 65ecac7d99460653824d24721e6b6a1f9ef2c05018b795cb5a6407283cee1e54
      • Instruction ID: f9515cef82375df93055ac1c51bf32e8499a8c8854a21009f9eb68b0d8fba6bb
      • Opcode Fuzzy Hash: 65ecac7d99460653824d24721e6b6a1f9ef2c05018b795cb5a6407283cee1e54
      • Instruction Fuzzy Hash: 37313935C403299EFB52EBB59C88E5A3FB4EB842E0B110537E515D62BCEB74A441DF90

      Control-flow Graph

      APIs
      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,1000AAD0,00000008,10002C9C,00000000,00000000,?,1000366A,00000000,00000001,00000000,?,1000594F,00000018,1000ABE0,0000000C), ref: 10002BA5
      • __lock.LIBCMT ref: 10002BD9
        • Part of subcall function 100059C4: __mtinitlocknum.LIBCMT ref: 100059DA
        • Part of subcall function 100059C4: __amsg_exit.LIBCMT ref: 100059E6
        • Part of subcall function 100059C4: EnterCriticalSection.KERNEL32(00000000,00000000,?,10002D6C,0000000D,1000AAF8,00000008,10002E63,00000000,?,1000194C,00000000,1000AA90,00000008,100019B1,?), ref: 100059EE
      • InterlockedIncrement.KERNEL32(?), ref: 10002BE6
      • __lock.LIBCMT ref: 10002BFA
      • ___addlocaleref.LIBCMT ref: 10002C18
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
      • String ID: KERNEL32.DLL
      • API String ID: 637971194-2576044830
      • Opcode ID: 97924be442746e9732caaa8d248f900dcf517d2c907d4645b013bd58f8786c0a
      • Instruction ID: 97837aec5ba493832c0b60c026770d3edfcd57ba82cd4a2dc75fe8f111e0a6f6
      • Opcode Fuzzy Hash: 97924be442746e9732caaa8d248f900dcf517d2c907d4645b013bd58f8786c0a
      • Instruction Fuzzy Hash: 64016D75900B40EEF720CF65C80578ABBE0EF403A5F10890EE4DA976A9CBB5B640CB15

      Control-flow Graph

      APIs
      • __getptd.LIBCMT ref: 10004C9A
        • Part of subcall function 10002CC1: __getptd_noexit.LIBCMT ref: 10002CC4
        • Part of subcall function 10002CC1: __amsg_exit.LIBCMT ref: 10002CD1
      • __amsg_exit.LIBCMT ref: 10004CBA
      • __lock.LIBCMT ref: 10004CCA
      • InterlockedDecrement.KERNEL32(?), ref: 10004CE7
      • _free.LIBCMT ref: 10004CFA
      • InterlockedIncrement.KERNEL32(02DF1668), ref: 10004D12
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
      • String ID:
      • API String ID: 3470314060-0
      • Opcode ID: 04ec4214d8d2f3a391c210fc52827fd238fd0e56b8e593cab31e7bf9642cbb21
      • Instruction ID: d89644744f8d692614713f4e4def8bf6a6cf7038741693287a3fec22e8344d90
      • Opcode Fuzzy Hash: 04ec4214d8d2f3a391c210fc52827fd238fd0e56b8e593cab31e7bf9642cbb21
      • Instruction Fuzzy Hash: BF018075A01725ABF742DB659885B4E77E0EF017E1F128106E804AB29DCF34B940CBD9

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 329 10001100-1000114a 330 1000114c-1000116a HeapCreate 329->330 331 1000116f-1000118b HeapAlloc 329->331 330->331 332 100011a1-1000120b call 100057d0 lstrlenA call 10007510 * 2 call 10001000 331->332 333 1000118d-10001197 331->333 345 1000121c-10001225 332->345 334 10001316-1000131a 333->334 337 1000131c-10001329 HeapFree 334->337 338 1000132f-10001338 334->338 337->338 346 1000130b-10001314 345->346 347 1000122b-10001239 345->347 346->334 348 10001242-10001261 347->348 349 1000123b-10001241 347->349 350 10001263-1000126a 348->350 351 1000126b-100012d0 348->351 349->348 350->351 352 100012d2-100012d9 351->352 353 100012da-10001306 351->353 352->353 353->345
      APIs
      • HeapCreate.KERNEL32(00000004,00100000,00000000), ref: 10001164
      • HeapAlloc.KERNEL32(?,00000008,?), ref: 1000117E
      • HeapFree.KERNEL32(?,00000000,00000000), ref: 10001329
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: Heap$AllocCreateFree
      • String ID:
      • API String ID: 2624134045-0
      • Opcode ID: 6a5c909b94824dba32dbcf7fec093b1e58d70b677558fe493c2980c8329a0760
      • Instruction ID: 3ab6a4c733ccc05e21c4eca3519ffc180f0ee3ee931f4afd76ffc78135e1d0db
      • Opcode Fuzzy Hash: 6a5c909b94824dba32dbcf7fec093b1e58d70b677558fe493c2980c8329a0760
      • Instruction Fuzzy Hash: 9E5150F4A002689BDB24CF14CC90BD9B7B5FF88344F1481E9EA099738AC7755A90DF68

      Control-flow Graph

      APIs
      • _malloc.LIBCMT ref: 100063B6
        • Part of subcall function 10006292: __FF_MSGBANNER.LIBCMT ref: 100062AB
        • Part of subcall function 10006292: __NMSG_WRITE.LIBCMT ref: 100062B2
        • Part of subcall function 10006292: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,1000366A,00000000,00000001,00000000,?,1000594F,00000018,1000ABE0,0000000C,100059DF), ref: 100062D7
      • _free.LIBCMT ref: 100063C9
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: AllocHeap_free_malloc
      • String ID:
      • API String ID: 2734353464-0
      • Opcode ID: 2ef28af96406d57cda09433356c6c6d232c7a79e7209623b33e964d1e15878cc
      • Instruction ID: 8949a381e5abe6c59d1dfe708fd0d5785e380f8dca62d0dc011644e46dc76215
      • Opcode Fuzzy Hash: 2ef28af96406d57cda09433356c6c6d232c7a79e7209623b33e964d1e15878cc
      • Instruction Fuzzy Hash: E3110636504636AFFB21EF74AC0464E3BD6DF892F0B318425F9489A16CDE34D98186E1
      APIs
      • __getptd.LIBCMT ref: 1000541B
        • Part of subcall function 10002CC1: __getptd_noexit.LIBCMT ref: 10002CC4
        • Part of subcall function 10002CC1: __amsg_exit.LIBCMT ref: 10002CD1
      • __getptd.LIBCMT ref: 10005432
      • __amsg_exit.LIBCMT ref: 10005440
      • __lock.LIBCMT ref: 10005450
      • __updatetlocinfoEx_nolock.LIBCMT ref: 10005464
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
      • String ID:
      • API String ID: 938513278-0
      • Opcode ID: f79b989668c8ccd27b69621636dc58f31b9c8691f111070a715e6816e7db83cd
      • Instruction ID: aeee0797ed671212263c57fe7e8277db1ba1cc8d7fce2db9afc0bdf321d877bc
      • Opcode Fuzzy Hash: f79b989668c8ccd27b69621636dc58f31b9c8691f111070a715e6816e7db83cd
      • Instruction Fuzzy Hash: B1F09036944714AAF712EB648803B8F37A0EF007EBF118209F8446B2DBCB656980DA56
      APIs
      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 1000674A
      • __isleadbyte_l.LIBCMT ref: 1000677D
      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,?,00000000,?,?,?,00000000,?), ref: 100067AE
      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000001,?,00000000,?,?,?,00000000,?), ref: 1000681C
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
      • String ID:
      • API String ID: 3058430110-0
      • Opcode ID: 842b7c24f02017a700a26092038c8788b415bca02b510dfed88b7a7602d6a3f8
      • Instruction ID: 67233041ff4a871e789e2f2152f5e49daddfe712b74483894f3393ec538c8b61
      • Opcode Fuzzy Hash: 842b7c24f02017a700a26092038c8788b415bca02b510dfed88b7a7602d6a3f8
      • Instruction Fuzzy Hash: C9319331608296EFEB10CF64CC859AE3BF6EF092D4F2185A9F4588B199EB31DD40DB50
      APIs
        • Part of subcall function 10003277: _doexit.LIBCMT ref: 10003283
      • ___set_flsgetvalue.LIBCMT ref: 100016F5
        • Part of subcall function 10002B06: TlsGetValue.KERNEL32(00000000,10002C5F,?,1000366A,00000000,00000001,00000000,?,1000594F,00000018,1000ABE0,0000000C,100059DF,00000000,00000000), ref: 10002B0F
        • Part of subcall function 10002B06: DecodePointer.KERNEL32(?,1000366A,00000000,00000001,00000000,?,1000594F,00000018,1000ABE0,0000000C,100059DF,00000000,00000000,?,10002D6C,0000000D), ref: 10002B21
        • Part of subcall function 10002B06: TlsSetValue.KERNEL32(00000000,?,1000366A,00000000,00000001,00000000,?,1000594F,00000018,1000ABE0,0000000C,100059DF,00000000,00000000,?,10002D6C), ref: 10002B30
        • Part of subcall function 10002AE6: TlsGetValue.KERNEL32(?,?,10001705,00000000), ref: 10002AF4
      • ___fls_setvalue@8.LIBCMT ref: 10001713
        • Part of subcall function 10002B3A: DecodePointer.KERNEL32(?,?,?,10001718,00000000,?,00000000), ref: 10002B4B
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 1000171C
      • ExitThread.KERNEL32 ref: 10001723
      • GetCurrentThreadId.KERNEL32 ref: 10001729
      • __freefls@4.LIBCMT ref: 10001749
      Memory Dump Source
      • Source File: 00000000.00000002.2155516329.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
      • Associated: 00000000.00000002.2155505772.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155527250.0000000010009000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155541282.000000001000C000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2155552613.000000001000F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_10000000_loaddll32.jbxd
      Similarity
      • API ID: Value$DecodePointerThread$CurrentErrorExitLast___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
      • String ID:
      • API String ID: 2378278055-0
      • Opcode ID: 9cc1f96be69159933d7988f9e2d49098ef267b745f4c5564f43377fff8724517
      • Instruction ID: 932c7c281f5e220c9720b23ae0f092ab003ef3288ce2c04f0584120973822085
      • Opcode Fuzzy Hash: 9cc1f96be69159933d7988f9e2d49098ef267b745f4c5564f43377fff8724517
      • Instruction Fuzzy Hash: 4CE0BF7980425567FF01ABB18D4AA8F37ACEF112D4B154810FA149311DDB28F91286A5