Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
AB5tAhygtM.dll

Overview

General Information

Sample name:AB5tAhygtM.dll
renamed because original name is a hash value
Original sample name:6655c5686b9b0292cf5121fc6346341bb888704b421a85a15011456a9a2c192a.dll
Analysis ID:1524368
MD5:1e6c67456dd21d7fb2967364cf4735af
SHA1:42a3d252faa7d7457c7f708ec6f44f3c1afd843e
SHA256:6655c5686b9b0292cf5121fc6346341bb888704b421a85a15011456a9a2c192a
Tags:CeranaKeeperdlluser-JAMESWT_MHT
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6764 cmdline: loaddll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 6932 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7004 cmdline: rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6956 cmdline: rundll32.exe C:\Users\user\Desktop\AB5tAhygtM.dll,ModuleMain MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7116 cmdline: rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",ModuleMain MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: AB5tAhygtM.dllAvira: detected
Source: AB5tAhygtM.dllReversingLabs: Detection: 31%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 90.9% probability
Source: AB5tAhygtM.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: AB5tAhygtM.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDF0C06 FindFirstFileExW,_free,3_2_6CDF0C06
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC2A10 lstrlenW,lstrcatW,lstrlenW,FindFirstFileW,GetLastError,FindClose,3_2_6CDC2A10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC3420 lstrcatW,lstrlenW,lstrcpyW,FindFirstFileW,lstrcatW,_memcpy_s,FindNextFileW,3_2_6CDC3420
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC30F0 lstrlenW,lstrcatW,lstrlenW,lstrcpyW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,FindNextFileW,FindClose,GetFileAttributesW,SetFileAttributesW,RemoveDirectoryW,GetLastError,SetFileAttributesW,GetLastError,3_2_6CDC30F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D080C06 FindFirstFileExW,_free,5_2_6D080C06
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D052A10 lstrlenW,lstrcatW,lstrlenW,FindFirstFileW,GetLastError,FindClose,5_2_6D052A10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D053420 lstrcatW,lstrlenW,lstrcpyW,FindFirstFileW,lstrcatW,_memcpy_s,FindNextFileW,5_2_6D053420
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D0530F0 lstrlenW,lstrcatW,lstrlenW,lstrcpyW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,FindNextFileW,FindClose,GetFileAttributesW,SetFileAttributesW,RemoveDirectoryW,GetLastError,SetFileAttributesW,GetLastError,5_2_6D0530F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC1200 GetLogicalDriveStringsW,GetDriveTypeW,GetDiskFreeSpaceExW,3_2_6CDC1200
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE6D293_2_6CDE6D29
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDDAFD03_2_6CDDAFD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDF38D43_2_6CDF38D4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDCB8B03_2_6CDCB8B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE6B003_2_6CDE6B00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDEE7E03_2_6CDEE7E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDDB7603_2_6CDDB760
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDDB01E3_2_6CDDB01E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDDB2303_2_6CDDB230
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDF22263_2_6CDF2226
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDF23523_2_6CDF2352
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D076D295_2_6D076D29
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D06AFD05_2_6D06AFD0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D05B8B05_2_6D05B8B0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D0838D45_2_6D0838D4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D076B005_2_6D076B00
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D06B7605_2_6D06B760
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D07E7E05_2_6D07E7E0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D06B01E5_2_6D06B01E
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D0823525_2_6D082352
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D0822265_2_6D082226
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D06B2305_2_6D06B230
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6D072C80 appears 32 times
Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 6CDE2C80 appears 32 times
Source: AB5tAhygtM.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal60.winDLL@10/0@0/0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC1200 GetLogicalDriveStringsW,GetDriveTypeW,GetDiskFreeSpaceExW,3_2_6CDC1200
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC66B0 CreateToolhelp32Snapshot,Process32First,CloseHandle,CloseHandle,Process32Next,CloseHandle,3_2_6CDC66B0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6788:120:WilError_03
Source: AB5tAhygtM.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\AB5tAhygtM.dll,ModuleMain
Source: AB5tAhygtM.dllReversingLabs: Detection: 31%
Source: C:\Windows\SysWOW64\rundll32.exeEvasive API call chain: GetCommandLine,DecisionNodes,ExitProcessgraph_5-19696
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\AB5tAhygtM.dll,ModuleMain
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",ModuleMain
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\AB5tAhygtM.dll,ModuleMainJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",ModuleMainJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: dbgcore.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: AB5tAhygtM.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: AB5tAhygtM.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDCCF60 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_6CDCCF60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE2CC6 push ecx; ret 3_2_6CDE2CD9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDF4168 push ecx; ret 3_2_6CDF4166
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D072CC6 push ecx; ret 5_2_6D072CD9
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D084168 push ecx; ret 5_2_6D084166
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 1.6 %
Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 1.6 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDF0C06 FindFirstFileExW,_free,3_2_6CDF0C06
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC2A10 lstrlenW,lstrcatW,lstrlenW,FindFirstFileW,GetLastError,FindClose,3_2_6CDC2A10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC3420 lstrcatW,lstrlenW,lstrcpyW,FindFirstFileW,lstrcatW,_memcpy_s,FindNextFileW,3_2_6CDC3420
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC30F0 lstrlenW,lstrcatW,lstrlenW,lstrcpyW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,FindNextFileW,FindClose,GetFileAttributesW,SetFileAttributesW,RemoveDirectoryW,GetLastError,SetFileAttributesW,GetLastError,3_2_6CDC30F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D080C06 FindFirstFileExW,_free,5_2_6D080C06
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D052A10 lstrlenW,lstrcatW,lstrlenW,FindFirstFileW,GetLastError,FindClose,5_2_6D052A10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D053420 lstrcatW,lstrlenW,lstrcpyW,FindFirstFileW,lstrcatW,_memcpy_s,FindNextFileW,5_2_6D053420
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D0530F0 lstrlenW,lstrcatW,lstrlenW,lstrcpyW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcatW,lstrcatW,FindNextFileW,FindClose,GetFileAttributesW,SetFileAttributesW,RemoveDirectoryW,GetLastError,SetFileAttributesW,GetLastError,5_2_6D0530F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC1200 GetLogicalDriveStringsW,GetDriveTypeW,GetDiskFreeSpaceExW,3_2_6CDC1200
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE5874 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6CDE5874
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDCCF60 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_6CDCCF60
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDEBD10 mov eax, dword ptr fs:[00000030h]3_2_6CDEBD10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE8899 mov eax, dword ptr fs:[00000030h]3_2_6CDE8899
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D07BD10 mov eax, dword ptr fs:[00000030h]5_2_6D07BD10
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D078899 mov eax, dword ptr fs:[00000030h]5_2_6D078899
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDECD0A GetProcessHeap,3_2_6CDECD0A
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE5874 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6CDE5874
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE2B02 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_6CDE2B02
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDDA450 SetUnhandledExceptionFilter,3_2_6CDDA450
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE2157 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_6CDE2157
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D075874 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_6D075874
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D072B02 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_6D072B02
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D06A450 SetUnhandledExceptionFilter,5_2_6D06A450
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 5_2_6D072157 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_6D072157
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE2CDC cpuid 3_2_6CDE2CDC
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDC7FA0 CreateNamedPipeA,CreateEventA,ConnectNamedPipe,GetLastError,WaitForSingleObject,CloseHandle,3_2_6CDC7FA0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6CDE2733 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,3_2_6CDE2733
Source: C:\Windows\SysWOW64\rundll32.exeCode function: cmd.exe /c 3_2_6CDC5F20
Source: C:\Windows\SysWOW64\rundll32.exeCode function: cmd.exe /c 5_2_6D055F20
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Command and Scripting Interpreter
1
DLL Side-Loading
12
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts11
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
12
Process Injection
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials13
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1524368 Sample: AB5tAhygtM.dll Startdate: 02/10/2024 Architecture: WINDOWS Score: 60 19 Antivirus / Scanner detection for submitted sample 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 AI detected suspicious sample 2->23 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 conhost.exe 7->11         started        13 rundll32.exe 7->13         started        15 rundll32.exe 7->15         started        process5 17 rundll32.exe 9->17         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
AB5tAhygtM.dll32%ReversingLabsWin32.Trojan.Generic
AB5tAhygtM.dll100%AviraTR/Agent.ajqud
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1524368
Start date and time:2024-10-02 18:15:30 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:AB5tAhygtM.dll
renamed because original name is a hash value
Original Sample Name:6655c5686b9b0292cf5121fc6346341bb888704b421a85a15011456a9a2c192a.dll
Detection:MAL
Classification:mal60.winDLL@10/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 6
  • Number of non-executed functions: 179
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: AB5tAhygtM.dll
TimeTypeDescription
12:16:22API Interceptor1x Sleep call for process: loaddll32.exe modified
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
Entropy (8bit):6.480361478505443
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:AB5tAhygtM.dll
File size:280'576 bytes
MD5:1e6c67456dd21d7fb2967364cf4735af
SHA1:42a3d252faa7d7457c7f708ec6f44f3c1afd843e
SHA256:6655c5686b9b0292cf5121fc6346341bb888704b421a85a15011456a9a2c192a
SHA512:b155f06c3688e87093c9099cb54ecfee28f266ae193cb421afea690ed5ff5670008ec10f16d8cfd950a426f3bba591e42a454dbe4346918b296a1b4132ca42cc
SSDEEP:6144:zz11tl29svfzBgdhAZihii86QP+KTBk2NhVGU:f1t/vfzBgdhRu6QP/Te2NhVb
TLSH:CD548D10F141C136E8FB047B8EFA99BE956CBB21039490C793CC2A6E5F264F17A3155B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........bJ5..$f..$f..$f.g'g..$f.g!g;.$f.g g..$f.k g..$f.k'g..$f.k!g..$f.g%g..$f..%f..$f.j-g..$f.j$g..$f.j&g..$fRich..$f...............
Icon Hash:7ae282899bbab082
Entrypoint:0x1002269e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x10000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x64181471 [Mon Mar 20 08:08:17 2023 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:373fbafe0063f9900a2de867dbe96fa1
Instruction
push ebp
mov ebp, esp
cmp dword ptr [ebp+0Ch], 01h
jne 00007FC930CD0367h
call 00007FC930CD0439h
push dword ptr [ebp+10h]
push dword ptr [ebp+0Ch]
push dword ptr [ebp+08h]
call 00007FC930CD0218h
add esp, 0Ch
pop ebp
retn 000Ch
push ebp
mov ebp, esp
push esi
push dword ptr [ebp+08h]
mov esi, ecx
call 00007FC930CCFC78h
mov dword ptr [esi], 1003636Ch
mov eax, esi
pop esi
pop ebp
retn 0004h
and dword ptr [ecx+04h], 00000000h
mov eax, ecx
and dword ptr [ecx+08h], 00000000h
mov dword ptr [ecx+04h], 10036374h
mov dword ptr [ecx], 1003636Ch
ret
push ebp
mov ebp, esp
sub esp, 0Ch
lea ecx, dword ptr [ebp-0Ch]
call 00007FC930CCFC2Dh
push 10041534h
lea eax, dword ptr [ebp-0Ch]
push eax
call 00007FC930CD1073h
int3
push ebp
mov ebp, esp
sub esp, 0Ch
lea ecx, dword ptr [ebp-0Ch]
call 00007FC930CD0322h
push 1004163Ch
lea eax, dword ptr [ebp-0Ch]
push eax
call 00007FC930CD1056h
int3
jmp 00007FC930CD5641h
push ebp
mov ebp, esp
sub esp, 14h
and dword ptr [ebp-0Ch], 00000000h
lea eax, dword ptr [ebp-0Ch]
and dword ptr [ebp-08h], 00000000h
push eax
call dword ptr [100361E8h]
mov eax, dword ptr [ebp-08h]
xor eax, dword ptr [ebp-0Ch]
mov dword ptr [ebp-04h], eax
call dword ptr [1003612Ch]
xor dword ptr [ebp-04h], eax
call dword ptr [10036130h]
xor dword ptr [ebp-04h], eax
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x41b600x48.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x41ba80xa0.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x460000x1fd4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x3f9e00x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x3fab80x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3fa180x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x360000x2b4.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x34b800x34c00f06874a8f9fd5c51cf7714bb8d25f642False0.46019697867298576data6.349757647880202IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x360000xcb120xcc0006b08a20aacf8437cbb8b274307b965dFalse0.5280522365196079data5.891693036481658IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x430000x255c0xc0054fedaa6507a806ffee94ebd0affafc9False0.2431640625data3.223015662132781IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x460000x1fd40x2000bdafd52ce01017805fd7a22199c3f91eFalse0.79296875data6.631484854475961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
KERNEL32.dllFindClose, GetFileAttributesW, SetFileAttributesW, GetLastError, lstrcatW, DeleteFileW, CreateThread, CreateProcessW, CopyFileW, lstrcpyW, lstrcmpW, MoveFileW, ReadFile, WriteFile, WaitForSingleObject, Sleep, SetFilePointerEx, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, SetFilePointer, lstrcatA, CreateFileA, CreatePipe, PeekNamedPipe, SetEvent, GetStartupInfoA, DeleteCriticalSection, CreateProcessA, CreateEventA, Process32First, TerminateProcess, OpenProcess, CreateToolhelp32Snapshot, LoadLibraryA, SetFileTime, GetProcAddress, FormatMessageA, GetEnvironmentVariableW, TerminateThread, GetTickCount, CreateNamedPipeA, lstrcpyA, ConnectNamedPipe, ReleaseSemaphore, WaitForMultipleObjects, CreateSemaphoreA, GlobalAlloc, GlobalFree, GlobalLock, GlobalUnlock, SetEndOfFile, UnmapViewOfFile, CreateFileMappingA, GetFileSize, MapViewOfFile, ResetEvent, GetCommandLineW, ExitProcess, WideCharToMultiByte, SetUnhandledExceptionFilter, GetCurrentProcess, GetCurrentThreadId, GetCurrentProcessId, GetModuleFileNameW, LocalAlloc, LocalFree, WriteConsoleW, HeapReAlloc, HeapSize, GetStringTypeW, SetStdHandle, GetConsoleMode, RemoveDirectoryW, lstrlenW, FindNextFileW, FindFirstFileW, GetStartupInfoW, CreateDirectoryW, GetDriveTypeW, CloseHandle, GetDiskFreeSpaceExW, GetLogicalDriveStringsW, CreateFileW, Process32Next, GetConsoleCP, FlushFileBuffers, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, MultiByteToWideChar, GetCommandLineA, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, FindFirstFileExW, GetFileType, GetStdHandle, LCMapStringW, HeapFree, HeapAlloc, GetModuleHandleExW, LoadLibraryExW, FreeLibrary, TlsFree, UnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetModuleHandleW, RtlUnwind, RaiseException, InterlockedFlushSList, SetLastError, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, DecodePointer
USER32.dllwsprintfA, GetDC, EnumDisplaySettingsA, ReleaseDC
GDI32.dllDeleteDC, BitBlt, SelectObject, CreateCompatibleDC, RealizePalette, GetStockObject, GetDIBits, GetDeviceCaps, SelectPalette, DeleteObject, CreateDCA, GetObjectA
SHELL32.dllCommandLineToArgvW
ole32.dllStgCreateDocfile, CreateStreamOnHGlobal
gdiplus.dllGdipSetWorldTransform, GdipCloneBitmapArea, GdipLoadImageFromStreamICM, GdipFree, GdipTranslateMatrix, GdipCreateBitmapFromGraphics, GdipGetImageGraphicsContext, GdipDisposeImage, GdipGetImageEncodersSize, GdipDeleteGraphics, GdipGetImageWidth, GdipSaveImageToStream, GdipDeleteMatrix, GdipLoadImageFromStream, GdiplusStartup, GdiplusShutdown, GdipGetImageHeight, GdipCreateMatrix, GdipAlloc, GdipCloneImage, GdipTransformMatrixPoints, GdipGetImageEncoders, GdipDrawImage
dbghelp.dllMiniDumpWriteDump
NameOrdinalAddress
ModuleMain10x1001a720
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:12:16:19
Start date:02/10/2024
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll"
Imagebase:0xad0000
File size:126'464 bytes
MD5 hash:51E6071F9CBA48E79F10C84515AAE618
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:1
Start time:12:16:19
Start date:02/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:2
Start time:12:16:19
Start date:02/10/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",#1
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:12:16:19
Start date:02/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\AB5tAhygtM.dll,ModuleMain
Imagebase:0x190000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:12:16:19
Start date:02/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",#1
Imagebase:0x190000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:12:16:22
Start date:02/10/2024
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\AB5tAhygtM.dll",ModuleMain
Imagebase:0x190000
File size:61'440 bytes
MD5 hash:889B99C52A60DD49227C5E485A016679
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:0.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:5.3%
    Total number of Nodes:1740
    Total number of Limit Nodes:27
    execution_graph 21508 6cde24db 21509 6cde24e7 ___scrt_is_nonwritable_in_current_image 21508->21509 21510 6cde250f 21509->21510 21511 6cde2565 21509->21511 21523 6cde24f0 21509->21523 21530 6cde2915 21510->21530 21512 6cde2b02 ___scrt_fastfail 4 API calls 21511->21512 21517 6cde256c ___scrt_is_nonwritable_in_current_image 21512->21517 21514 6cde2514 21539 6cde27d7 21514->21539 21516 6cde2519 __RTC_Initialize 21542 6cde2556 21516->21542 21518 6cde25a2 dllmain_raw 21517->21518 21526 6cde259d 21517->21526 21529 6cde2588 21517->21529 21520 6cde25bc dllmain_crt_dispatch 21518->21520 21518->21529 21520->21526 21520->21529 21521 6cde2531 21545 6cde2ad4 21521->21545 21524 6cde2609 21525 6cde2612 dllmain_crt_dispatch 21524->21525 21524->21529 21527 6cde2625 dllmain_raw 21525->21527 21525->21529 21526->21524 21528 6cde25f5 dllmain_crt_dispatch dllmain_raw 21526->21528 21527->21529 21528->21524 21531 6cde291a ___scrt_release_startup_lock 21530->21531 21532 6cde291e 21531->21532 21535 6cde292a 21531->21535 21551 6cde9049 21532->21551 21536 6cde2937 21535->21536 21537 6cde8833 __purecall 28 API calls 21535->21537 21536->21514 21538 6cde89a3 21537->21538 21538->21514 21573 6cde3663 InterlockedFlushSList 21539->21573 21577 6cde2938 21542->21577 21544 6cde255b ___scrt_release_startup_lock 21544->21521 21546 6cde2ae0 21545->21546 21547 6cde2af6 21546->21547 21596 6cde91e9 21546->21596 21547->21523 21549 6cde2aee 21550 6cde36c5 ___vcrt_uninitialize 8 API calls 21549->21550 21550->21547 21554 6cde8ed4 21551->21554 21553 6cde2928 21553->21514 21555 6cde8ee0 ___scrt_is_nonwritable_in_current_image 21554->21555 21562 6cdebcb1 EnterCriticalSection 21555->21562 21557 6cde8eee 21563 6cde8f25 21557->21563 21561 6cde8f0c __vfwprintf_l 21561->21553 21562->21557 21566 6cde8f4d 21563->21566 21567 6cde8f45 21563->21567 21564 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21565 6cde8efb 21564->21565 21569 6cde8f19 21565->21569 21566->21567 21568 6cde99a9 _free 19 API calls 21566->21568 21567->21564 21568->21567 21572 6cdebcf9 LeaveCriticalSection 21569->21572 21571 6cde8f23 21571->21561 21572->21571 21575 6cde3673 21573->21575 21576 6cde27e1 21573->21576 21574 6cde7a0f ___std_exception_destroy 19 API calls 21574->21575 21575->21574 21575->21576 21576->21516 21582 6cde9219 21577->21582 21580 6cde396f ___vcrt_uninitialize_ptd 6 API calls 21581 6cde36e9 21580->21581 21581->21544 21585 6cde9932 21582->21585 21586 6cde993c 21585->21586 21587 6cde293f 21585->21587 21589 6cde9c0e 21586->21589 21587->21580 21590 6cde9adf pair 5 API calls 21589->21590 21591 6cde9c35 21590->21591 21592 6cde9c4d TlsFree 21591->21592 21593 6cde9c41 21591->21593 21592->21593 21594 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21593->21594 21595 6cde9c5e 21594->21595 21595->21587 21597 6cde9206 21596->21597 21598 6cde91f4 21596->21598 21606 6cdecda8 21597->21606 21599 6cde9202 21598->21599 21603 6cdea1b4 21598->21603 21599->21549 21610 6cdea066 21603->21610 21607 6cdecdc1 21606->21607 21608 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21607->21608 21609 6cde9215 21608->21609 21609->21549 21613 6cde9fc4 21610->21613 21612 6cdea0a5 21612->21599 21614 6cde9fd0 ___scrt_is_nonwritable_in_current_image 21613->21614 21621 6cdebcb1 EnterCriticalSection 21614->21621 21616 6cdea046 21630 6cdea05a 21616->21630 21618 6cde9fda ___scrt_uninitialize_crt 21618->21616 21622 6cde9f43 21618->21622 21619 6cdea052 __vfwprintf_l 21619->21612 21621->21618 21623 6cde9f4f ___scrt_is_nonwritable_in_current_image 21622->21623 21633 6cde5bbe EnterCriticalSection 21623->21633 21625 6cde9f91 21644 6cde9fb8 21625->21644 21626 6cde9f59 ___scrt_uninitialize_crt 21626->21625 21634 6cdea16d 21626->21634 21628 6cde9fb0 __vfwprintf_l 21628->21618 21774 6cdebcf9 LeaveCriticalSection 21630->21774 21632 6cdea064 21632->21619 21633->21626 21635 6cdea17a 21634->21635 21636 6cdea183 21634->21636 21637 6cdea066 ___scrt_uninitialize_crt 63 API calls 21635->21637 21647 6cdea10a 21636->21647 21640 6cdea180 21637->21640 21640->21625 21642 6cdea1a3 21658 6cded774 21642->21658 21773 6cde5bd2 LeaveCriticalSection 21644->21773 21646 6cde9fc2 21646->21628 21648 6cdea146 21647->21648 21649 6cdea121 21647->21649 21648->21640 21653 6cdeb651 21648->21653 21649->21648 21650 6cdeb651 __vfwprintf_l 19 API calls 21649->21650 21651 6cdea13f 21650->21651 21667 6cdedd9e 21651->21667 21654 6cdeb65d 21653->21654 21655 6cdeb672 21653->21655 21656 6cde7993 __dosmaperr 19 API calls 21654->21656 21655->21642 21657 6cdeb662 _memcpy_s 21656->21657 21657->21642 21659 6cded785 21658->21659 21660 6cded792 21658->21660 21661 6cde7993 __dosmaperr 19 API calls 21659->21661 21662 6cded7db 21660->21662 21664 6cded7b9 21660->21664 21665 6cded78a _memcpy_s 21661->21665 21663 6cde7993 __dosmaperr 19 API calls 21662->21663 21663->21665 21744 6cded6dc 21664->21744 21665->21640 21668 6cdeddaa ___scrt_is_nonwritable_in_current_image 21667->21668 21669 6cdeddca 21668->21669 21670 6cdeddb2 21668->21670 21672 6cdede65 21669->21672 21677 6cdeddfc 21669->21677 21690 6cde7980 21670->21690 21674 6cde7980 __dosmaperr 19 API calls 21672->21674 21676 6cdede6a 21674->21676 21675 6cde7993 __dosmaperr 19 API calls 21687 6cdeddbf _memcpy_s __vfwprintf_l 21675->21687 21678 6cde7993 __dosmaperr 19 API calls 21676->21678 21693 6cdee1db EnterCriticalSection 21677->21693 21678->21687 21680 6cdede02 21681 6cdede1e 21680->21681 21682 6cdede33 21680->21682 21684 6cde7993 __dosmaperr 19 API calls 21681->21684 21694 6cdede86 21682->21694 21686 6cdede23 21684->21686 21685 6cdede2e 21741 6cdede5d 21685->21741 21688 6cde7980 __dosmaperr 19 API calls 21686->21688 21687->21648 21688->21685 21691 6cde9859 __dosmaperr 19 API calls 21690->21691 21692 6cde7985 21691->21692 21692->21675 21693->21680 21695 6cdedeb3 21694->21695 21725 6cdedeac _memcpy_s 21694->21725 21696 6cdeded7 21695->21696 21697 6cdedeb7 21695->21697 21700 6cdedf09 21696->21700 21701 6cdedf26 21696->21701 21699 6cde7980 __dosmaperr 19 API calls 21697->21699 21698 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21702 6cdee094 21698->21702 21703 6cdedebc 21699->21703 21704 6cde7980 __dosmaperr 19 API calls 21700->21704 21705 6cdedf39 21701->21705 21708 6cdf1543 __vfwprintf_l 21 API calls 21701->21708 21702->21685 21706 6cde7993 __dosmaperr 19 API calls 21703->21706 21707 6cdedf0e 21704->21707 21709 6cdeda2c __vfwprintf_l 35 API calls 21705->21709 21706->21725 21710 6cde7993 __dosmaperr 19 API calls 21707->21710 21708->21705 21711 6cdedf4a 21709->21711 21710->21725 21712 6cdedf8e 21711->21712 21713 6cdedf4f 21711->21713 21714 6cdedfe7 WriteFile 21712->21714 21715 6cdedfa2 21712->21715 21716 6cdedf78 21713->21716 21717 6cdedf53 21713->21717 21718 6cdee00b GetLastError 21714->21718 21724 6cdedf6e 21714->21724 21720 6cdedfad 21715->21720 21721 6cdedfd7 21715->21721 21719 6cded7f3 __vfwprintf_l 40 API calls 21716->21719 21722 6cded9c2 __vfwprintf_l 6 API calls 21717->21722 21717->21724 21718->21724 21719->21724 21726 6cdedfc7 21720->21726 21727 6cdedfb2 21720->21727 21723 6cdedaa2 __vfwprintf_l 7 API calls 21721->21723 21722->21724 21723->21724 21724->21725 21729 6cdee055 21724->21729 21730 6cdee031 21724->21730 21725->21698 21728 6cdedc6a __vfwprintf_l 8 API calls 21726->21728 21727->21724 21731 6cdedb7f __vfwprintf_l 7 API calls 21727->21731 21728->21724 21729->21725 21735 6cde7993 __dosmaperr 19 API calls 21729->21735 21732 6cdee04c 21730->21732 21733 6cdee038 21730->21733 21731->21724 21734 6cde795d __dosmaperr 19 API calls 21732->21734 21736 6cde7993 __dosmaperr 19 API calls 21733->21736 21734->21725 21737 6cdee071 21735->21737 21738 6cdee03d 21736->21738 21739 6cde7980 __dosmaperr 19 API calls 21737->21739 21740 6cde7980 __dosmaperr 19 API calls 21738->21740 21739->21725 21740->21725 21742 6cdee1fe __vfwprintf_l LeaveCriticalSection 21741->21742 21743 6cdede63 21742->21743 21743->21687 21745 6cded6e8 ___scrt_is_nonwritable_in_current_image 21744->21745 21758 6cdee1db EnterCriticalSection 21745->21758 21747 6cded6f7 21748 6cded73e 21747->21748 21759 6cdee2b2 21747->21759 21750 6cde7993 __dosmaperr 19 API calls 21748->21750 21753 6cded743 21750->21753 21751 6cded723 FlushFileBuffers 21752 6cded72f 21751->21752 21751->21753 21754 6cde7980 __dosmaperr 19 API calls 21752->21754 21770 6cded768 21753->21770 21756 6cded734 GetLastError 21754->21756 21756->21748 21757 6cded75b __vfwprintf_l 21757->21665 21758->21747 21760 6cdee2bf 21759->21760 21761 6cdee2d4 21759->21761 21762 6cde7980 __dosmaperr 19 API calls 21760->21762 21764 6cde7980 __dosmaperr 19 API calls 21761->21764 21766 6cdee2f9 21761->21766 21763 6cdee2c4 21762->21763 21765 6cde7993 __dosmaperr 19 API calls 21763->21765 21767 6cdee304 21764->21767 21769 6cdee2cc _memcpy_s 21765->21769 21766->21751 21768 6cde7993 __dosmaperr 19 API calls 21767->21768 21768->21769 21769->21751 21771 6cdee1fe __vfwprintf_l LeaveCriticalSection 21770->21771 21772 6cded772 21771->21772 21772->21757 21773->21646 21774->21632 19649 6cde269e 19650 6cde26ac dllmain_dispatch 19649->19650 19651 6cde26a7 19649->19651 19653 6cde2780 19651->19653 19654 6cde2796 19653->19654 19656 6cde279f 19654->19656 19657 6cde2733 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 19654->19657 19656->19650 19657->19656 22528 6cdeb812 22531 6cdeb7a3 22528->22531 22530 6cdeb837 22532 6cdeb7af ___scrt_is_nonwritable_in_current_image 22531->22532 22539 6cdebcb1 EnterCriticalSection 22532->22539 22534 6cdeb7e7 22540 6cdeb7fb 22534->22540 22535 6cdeb7b9 22535->22534 22537 6cded4b7 __fassign 19 API calls 22535->22537 22537->22535 22538 6cdeb7f3 __vfwprintf_l 22538->22530 22539->22535 22543 6cdebcf9 LeaveCriticalSection 22540->22543 22542 6cdeb805 22542->22538 22543->22542 21304 6cde23d1 21305 6cde23dd ___scrt_is_nonwritable_in_current_image 21304->21305 21322 6cde2945 21305->21322 21307 6cde23e4 21308 6cde240e 21307->21308 21309 6cde24d3 21307->21309 21318 6cde23e9 ___scrt_is_nonwritable_in_current_image 21307->21318 21333 6cde28a7 21308->21333 21349 6cde2b02 IsProcessorFeaturePresent 21309->21349 21312 6cde241d __RTC_Initialize 21312->21318 21336 6cde27cb InitializeSListHead 21312->21336 21313 6cde24da 21315 6cde242b ___scrt_initialize_default_local_stdio_options 21337 6cde8536 21315->21337 21320 6cde244a 21320->21318 21345 6cde84da 21320->21345 21323 6cde294e 21322->21323 21353 6cde2cdc IsProcessorFeaturePresent 21323->21353 21327 6cde295f 21328 6cde2963 21327->21328 21364 6cde91c4 21327->21364 21328->21307 21331 6cde297a 21331->21307 21480 6cde297e 21333->21480 21335 6cde28ae 21335->21312 21336->21315 21340 6cde854d 21337->21340 21338 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21339 6cde243f 21338->21339 21339->21318 21341 6cde287c 21339->21341 21340->21338 21342 6cde2881 ___scrt_release_startup_lock 21341->21342 21343 6cde288a 21342->21343 21344 6cde2cdc ___isa_available_init IsProcessorFeaturePresent 21342->21344 21343->21320 21344->21343 21346 6cde8509 21345->21346 21347 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21346->21347 21348 6cde8532 21347->21348 21348->21318 21350 6cde2b17 ___scrt_fastfail 21349->21350 21351 6cde2bc2 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 21350->21351 21352 6cde2c0d ___scrt_fastfail 21351->21352 21352->21313 21354 6cde295a 21353->21354 21355 6cde3686 21354->21355 21356 6cde368b ___vcrt_initialize_winapi_thunks 21355->21356 21375 6cde48a7 21356->21375 21360 6cde36a1 21361 6cde36ac 21360->21361 21389 6cde48e3 21360->21389 21361->21327 21363 6cde3699 21363->21327 21412 6cdecd25 21364->21412 21367 6cde36c5 21368 6cde36ce 21367->21368 21369 6cde36df 21367->21369 21370 6cde396f ___vcrt_uninitialize_ptd 6 API calls 21368->21370 21369->21328 21371 6cde36d3 21370->21371 21372 6cde48e3 ___vcrt_uninitialize_locks DeleteCriticalSection 21371->21372 21373 6cde36d8 21372->21373 21476 6cde4bc1 21373->21476 21376 6cde48b0 21375->21376 21378 6cde48d9 21376->21378 21380 6cde3695 21376->21380 21393 6cde4b51 21376->21393 21379 6cde48e3 ___vcrt_uninitialize_locks DeleteCriticalSection 21378->21379 21379->21380 21380->21363 21381 6cde393c 21380->21381 21398 6cde4a62 21381->21398 21384 6cde3951 21384->21360 21385 6cde4b13 ___vcrt_FlsSetValue 6 API calls 21386 6cde395f 21385->21386 21387 6cde396c 21386->21387 21403 6cde396f 21386->21403 21387->21360 21390 6cde490d 21389->21390 21391 6cde48ee 21389->21391 21390->21363 21392 6cde48f8 DeleteCriticalSection 21391->21392 21392->21390 21392->21392 21394 6cde49f3 try_get_function 5 API calls 21393->21394 21395 6cde4b6b 21394->21395 21396 6cde4b89 InitializeCriticalSectionAndSpinCount 21395->21396 21397 6cde4b74 21395->21397 21396->21397 21397->21376 21399 6cde49f3 try_get_function 5 API calls 21398->21399 21400 6cde4a7c 21399->21400 21401 6cde4a95 TlsAlloc 21400->21401 21402 6cde3946 21400->21402 21402->21384 21402->21385 21404 6cde3979 21403->21404 21405 6cde397f 21403->21405 21407 6cde4a9d 21404->21407 21405->21384 21408 6cde49f3 try_get_function 5 API calls 21407->21408 21409 6cde4ab7 21408->21409 21410 6cde4acf TlsFree 21409->21410 21411 6cde4ac3 21409->21411 21410->21411 21411->21405 21413 6cdecd42 21412->21413 21416 6cdecd3e 21412->21416 21413->21416 21418 6cdea367 21413->21418 21414 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21415 6cde296c 21414->21415 21415->21331 21415->21367 21416->21414 21419 6cdea373 ___scrt_is_nonwritable_in_current_image 21418->21419 21430 6cdebcb1 EnterCriticalSection 21419->21430 21421 6cdea37a 21431 6cdee147 21421->21431 21423 6cdea389 21424 6cdea398 21423->21424 21442 6cdea1fb GetStartupInfoW 21423->21442 21453 6cdea3b4 21424->21453 21428 6cdea3a9 __vfwprintf_l 21428->21413 21430->21421 21432 6cdee153 ___scrt_is_nonwritable_in_current_image 21431->21432 21433 6cdee15c 21432->21433 21434 6cdee173 21432->21434 21436 6cde7993 __dosmaperr 19 API calls 21433->21436 21456 6cdebcb1 EnterCriticalSection 21434->21456 21438 6cdee161 _memcpy_s __vfwprintf_l 21436->21438 21437 6cdee17f 21441 6cdee1ab 21437->21441 21457 6cdee098 21437->21457 21438->21423 21464 6cdee1d2 21441->21464 21443 6cdea218 21442->21443 21445 6cdea2ac 21442->21445 21444 6cdee147 20 API calls 21443->21444 21443->21445 21446 6cdea240 21444->21446 21448 6cdea2b3 21445->21448 21446->21445 21447 6cdea270 GetFileType 21446->21447 21447->21446 21449 6cdea2ba 21448->21449 21450 6cdea2fd GetStdHandle 21449->21450 21451 6cdea363 21449->21451 21452 6cdea310 GetFileType 21449->21452 21450->21449 21451->21424 21452->21449 21475 6cdebcf9 LeaveCriticalSection 21453->21475 21455 6cdea3bb 21455->21428 21456->21437 21458 6cde994c pair 19 API calls 21457->21458 21461 6cdee0aa 21458->21461 21459 6cdee0b7 21460 6cde99a9 _free 19 API calls 21459->21460 21463 6cdee109 21460->21463 21461->21459 21467 6cde9d13 21461->21467 21463->21437 21474 6cdebcf9 LeaveCriticalSection 21464->21474 21466 6cdee1d9 21466->21438 21468 6cde9adf pair 5 API calls 21467->21468 21469 6cde9d3a 21468->21469 21470 6cde9d58 InitializeCriticalSectionAndSpinCount 21469->21470 21471 6cde9d43 21469->21471 21470->21471 21472 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21471->21472 21473 6cde9d6f 21472->21473 21473->21461 21474->21466 21475->21455 21478 6cde4bca 21476->21478 21479 6cde4bf0 21476->21479 21477 6cde4bda FreeLibrary 21477->21478 21478->21477 21478->21479 21479->21369 21481 6cde298d 21480->21481 21482 6cde2991 21480->21482 21481->21335 21483 6cde2b02 ___scrt_fastfail 4 API calls 21482->21483 21485 6cde299e ___scrt_release_startup_lock 21482->21485 21484 6cde2a22 21483->21484 21485->21335 19658 6cde237e 19659 6cde23bc dllmain_crt_process_detach 19658->19659 19660 6cde2389 19658->19660 19667 6cde2398 19659->19667 19661 6cde23ae dllmain_crt_process_attach 19660->19661 19662 6cde238e 19660->19662 19661->19667 19663 6cde23a4 19662->19663 19664 6cde2393 19662->19664 19673 6cde28b5 19663->19673 19664->19667 19668 6cde28d4 19664->19668 19681 6cde91e1 19668->19681 20017 6cde36af 19673->20017 19676 6cde28be 19676->19667 19679 6cde28d1 19679->19667 19680 6cde36ba 26 API calls 19680->19676 19687 6cde96dc 19681->19687 19684 6cde36ba 19979 6cde3866 19684->19979 19688 6cde96e6 19687->19688 19689 6cde28d9 19687->19689 19695 6cde9c64 19688->19695 19689->19684 19715 6cde9adf 19695->19715 19697 6cde9c8b 19698 6cde9ca3 TlsGetValue 19697->19698 19701 6cde9c97 19697->19701 19698->19701 19700 6cde96ed 19700->19689 19702 6cde9cba 19700->19702 19721 6cde2103 19701->19721 19703 6cde9adf pair 5 API calls 19702->19703 19704 6cde9ce1 19703->19704 19705 6cde9cfc TlsSetValue 19704->19705 19706 6cde9cf0 19704->19706 19705->19706 19707 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19706->19707 19708 6cde9700 19707->19708 19709 6cde95a1 19708->19709 19710 6cde95bc 19709->19710 19711 6cde95ac 19709->19711 19710->19689 19736 6cde95c2 19711->19736 19716 6cde9b0c 19715->19716 19720 6cde9b08 __crt_fast_encode_pointer 19715->19720 19716->19720 19728 6cde9a17 19716->19728 19719 6cde9b26 GetProcAddress 19719->19720 19720->19697 19722 6cde210e IsProcessorFeaturePresent 19721->19722 19723 6cde210c 19721->19723 19725 6cde2193 19722->19725 19723->19700 19735 6cde2157 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19725->19735 19727 6cde2276 19727->19700 19729 6cde9a28 try_get_first_available_module 19728->19729 19730 6cde9ad2 19729->19730 19731 6cde9a45 LoadLibraryExW 19729->19731 19733 6cde9abb FreeLibrary 19729->19733 19734 6cde9a93 LoadLibraryExW 19729->19734 19730->19719 19730->19720 19731->19729 19732 6cde9a60 GetLastError 19731->19732 19732->19729 19733->19729 19734->19729 19735->19727 19737 6cde95d7 19736->19737 19740 6cde95dd 19736->19740 19739 6cde99a9 _free 19 API calls 19737->19739 19738 6cde99a9 _free 19 API calls 19741 6cde95e9 19738->19741 19739->19740 19740->19738 19742 6cde99a9 _free 19 API calls 19741->19742 19743 6cde95f4 19742->19743 19744 6cde99a9 _free 19 API calls 19743->19744 19745 6cde95ff 19744->19745 19746 6cde99a9 _free 19 API calls 19745->19746 19747 6cde960a 19746->19747 19748 6cde99a9 _free 19 API calls 19747->19748 19749 6cde9615 19748->19749 19750 6cde99a9 _free 19 API calls 19749->19750 19751 6cde9620 19750->19751 19752 6cde99a9 _free 19 API calls 19751->19752 19753 6cde962b 19752->19753 19754 6cde99a9 _free 19 API calls 19753->19754 19755 6cde9636 19754->19755 19756 6cde99a9 _free 19 API calls 19755->19756 19757 6cde9644 19756->19757 19768 6cde940a 19757->19768 19759 6cde966a 19776 6cde946b 19759->19776 19761 6cde95b4 19762 6cde99a9 19761->19762 19763 6cde99b4 HeapFree 19762->19763 19764 6cde99dd __dosmaperr 19762->19764 19763->19764 19765 6cde99c9 19763->19765 19764->19710 19908 6cde7993 19765->19908 19769 6cde9416 ___scrt_is_nonwritable_in_current_image 19768->19769 19784 6cdebcb1 EnterCriticalSection 19769->19784 19771 6cde944a 19785 6cde945f 19771->19785 19773 6cde9420 19773->19771 19775 6cde99a9 _free 19 API calls 19773->19775 19774 6cde9457 __vfwprintf_l 19774->19759 19775->19771 19777 6cde9477 ___scrt_is_nonwritable_in_current_image 19776->19777 19789 6cdebcb1 EnterCriticalSection 19777->19789 19779 6cde9481 19790 6cde9691 19779->19790 19781 6cde9494 19794 6cde94aa 19781->19794 19783 6cde94a2 __vfwprintf_l 19783->19761 19784->19773 19788 6cdebcf9 LeaveCriticalSection 19785->19788 19787 6cde9469 19787->19774 19788->19787 19789->19779 19791 6cde96a0 __fassign 19790->19791 19793 6cde96c7 __fassign 19790->19793 19791->19793 19797 6cded1f3 19791->19797 19793->19781 19907 6cdebcf9 LeaveCriticalSection 19794->19907 19796 6cde94b4 19796->19783 19798 6cded209 19797->19798 19822 6cded273 19797->19822 19802 6cded23c 19798->19802 19807 6cde99a9 _free 19 API calls 19798->19807 19798->19822 19800 6cde99a9 _free 19 API calls 19801 6cded295 19800->19801 19803 6cde99a9 _free 19 API calls 19801->19803 19804 6cded25e 19802->19804 19809 6cde99a9 _free 19 API calls 19802->19809 19805 6cded2a8 19803->19805 19806 6cde99a9 _free 19 API calls 19804->19806 19808 6cde99a9 _free 19 API calls 19805->19808 19810 6cded268 19806->19810 19812 6cded231 19807->19812 19814 6cded2b6 19808->19814 19815 6cded253 19809->19815 19816 6cde99a9 _free 19 API calls 19810->19816 19811 6cded32f 19817 6cde99a9 _free 19 API calls 19811->19817 19825 6cdf0219 19812->19825 19813 6cded2cf 19813->19811 19819 6cde99a9 19 API calls _free 19813->19819 19820 6cde99a9 _free 19 API calls 19814->19820 19853 6cdf0317 19815->19853 19816->19822 19823 6cded335 19817->19823 19819->19813 19824 6cded2c1 19820->19824 19822->19800 19822->19824 19823->19793 19865 6cded366 19824->19865 19826 6cdf022a 19825->19826 19852 6cdf0313 19825->19852 19827 6cdf023b 19826->19827 19828 6cde99a9 _free 19 API calls 19826->19828 19829 6cdf024d 19827->19829 19830 6cde99a9 _free 19 API calls 19827->19830 19828->19827 19831 6cdf025f 19829->19831 19832 6cde99a9 _free 19 API calls 19829->19832 19830->19829 19833 6cdf0271 19831->19833 19834 6cde99a9 _free 19 API calls 19831->19834 19832->19831 19835 6cdf0283 19833->19835 19836 6cde99a9 _free 19 API calls 19833->19836 19834->19833 19837 6cdf0295 19835->19837 19838 6cde99a9 _free 19 API calls 19835->19838 19836->19835 19839 6cde99a9 _free 19 API calls 19837->19839 19840 6cdf02a7 19837->19840 19838->19837 19839->19840 19841 6cde99a9 _free 19 API calls 19840->19841 19843 6cdf02b9 19840->19843 19841->19843 19842 6cdf02cb 19845 6cdf02dd 19842->19845 19846 6cde99a9 _free 19 API calls 19842->19846 19843->19842 19844 6cde99a9 _free 19 API calls 19843->19844 19844->19842 19847 6cdf02ef 19845->19847 19848 6cde99a9 _free 19 API calls 19845->19848 19846->19845 19849 6cdf0301 19847->19849 19850 6cde99a9 _free 19 API calls 19847->19850 19848->19847 19851 6cde99a9 _free 19 API calls 19849->19851 19849->19852 19850->19849 19851->19852 19852->19802 19854 6cdf0324 19853->19854 19864 6cdf037c 19853->19864 19855 6cdf0334 19854->19855 19857 6cde99a9 _free 19 API calls 19854->19857 19856 6cdf0346 19855->19856 19858 6cde99a9 _free 19 API calls 19855->19858 19859 6cdf0358 19856->19859 19860 6cde99a9 _free 19 API calls 19856->19860 19857->19855 19858->19856 19861 6cde99a9 _free 19 API calls 19859->19861 19862 6cdf036a 19859->19862 19860->19859 19861->19862 19863 6cde99a9 _free 19 API calls 19862->19863 19862->19864 19863->19864 19864->19804 19866 6cded391 19865->19866 19867 6cded373 19865->19867 19866->19813 19867->19866 19871 6cdf03b8 19867->19871 19870 6cde99a9 _free 19 API calls 19870->19866 19872 6cded38b 19871->19872 19873 6cdf03c9 19871->19873 19872->19870 19874 6cdf0380 __fassign 19 API calls 19873->19874 19875 6cdf03d1 19874->19875 19876 6cdf0380 __fassign 19 API calls 19875->19876 19877 6cdf03dc 19876->19877 19878 6cdf0380 __fassign 19 API calls 19877->19878 19879 6cdf03e7 19878->19879 19880 6cdf0380 __fassign 19 API calls 19879->19880 19881 6cdf03f2 19880->19881 19882 6cdf0380 __fassign 19 API calls 19881->19882 19883 6cdf0400 19882->19883 19884 6cde99a9 _free 19 API calls 19883->19884 19885 6cdf040b 19884->19885 19886 6cde99a9 _free 19 API calls 19885->19886 19887 6cdf0416 19886->19887 19888 6cde99a9 _free 19 API calls 19887->19888 19889 6cdf0421 19888->19889 19890 6cdf0380 __fassign 19 API calls 19889->19890 19891 6cdf042f 19890->19891 19892 6cdf0380 __fassign 19 API calls 19891->19892 19893 6cdf043d 19892->19893 19894 6cdf0380 __fassign 19 API calls 19893->19894 19895 6cdf044e 19894->19895 19896 6cdf0380 __fassign 19 API calls 19895->19896 19897 6cdf045c 19896->19897 19898 6cdf0380 __fassign 19 API calls 19897->19898 19899 6cdf046a 19898->19899 19900 6cde99a9 _free 19 API calls 19899->19900 19901 6cdf0475 19900->19901 19902 6cde99a9 _free 19 API calls 19901->19902 19903 6cdf0480 19902->19903 19904 6cde99a9 _free 19 API calls 19903->19904 19905 6cdf048b 19904->19905 19906 6cde99a9 _free 19 API calls 19905->19906 19906->19872 19907->19796 19911 6cde9859 GetLastError 19908->19911 19910 6cde7998 GetLastError 19910->19764 19912 6cde9870 19911->19912 19916 6cde9876 19911->19916 19914 6cde9c64 pair 11 API calls 19912->19914 19913 6cde9cba pair 11 API calls 19915 6cde9892 19913->19915 19914->19916 19932 6cde987c SetLastError 19915->19932 19934 6cde994c 19915->19934 19916->19913 19916->19932 19920 6cde98aa 19922 6cde9cba pair 11 API calls 19920->19922 19921 6cde98c1 19923 6cde9cba pair 11 API calls 19921->19923 19924 6cde98b8 19922->19924 19925 6cde98cd 19923->19925 19930 6cde99a9 _free 17 API calls 19924->19930 19926 6cde98e2 19925->19926 19927 6cde98d1 19925->19927 19941 6cde9506 19926->19941 19928 6cde9cba pair 11 API calls 19927->19928 19928->19924 19930->19932 19932->19910 19933 6cde99a9 _free 17 API calls 19933->19932 19939 6cde9959 pair 19934->19939 19935 6cde9999 19938 6cde7993 __dosmaperr 18 API calls 19935->19938 19936 6cde9984 RtlAllocateHeap 19937 6cde98a2 19936->19937 19936->19939 19937->19920 19937->19921 19938->19937 19939->19935 19939->19936 19946 6cde8444 19939->19946 19957 6cde93c2 19941->19957 19943 6cde9574 19963 6cde94b6 19943->19963 19945 6cde959d 19945->19933 19951 6cde8488 19946->19951 19948 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 19949 6cde8484 19948->19949 19949->19939 19950 6cde845a 19950->19948 19952 6cde8494 ___scrt_is_nonwritable_in_current_image 19951->19952 19953 6cdebcb1 __purecall EnterCriticalSection 19952->19953 19954 6cde849f 19953->19954 19955 6cde84d1 _Allocate LeaveCriticalSection 19954->19955 19956 6cde84c6 __vfwprintf_l 19955->19956 19956->19950 19958 6cde93ce ___scrt_is_nonwritable_in_current_image 19957->19958 19971 6cdebcb1 EnterCriticalSection 19958->19971 19960 6cde93d8 19972 6cde93fe 19960->19972 19962 6cde93f6 __vfwprintf_l 19962->19943 19964 6cde94c2 ___scrt_is_nonwritable_in_current_image 19963->19964 19975 6cdebcb1 EnterCriticalSection 19964->19975 19966 6cde94cc 19967 6cde9691 pair 19 API calls 19966->19967 19968 6cde94e4 19967->19968 19976 6cde94fa 19968->19976 19970 6cde94f2 __vfwprintf_l 19970->19945 19971->19960 19973 6cdebcf9 __purecall LeaveCriticalSection 19972->19973 19974 6cde9408 19973->19974 19974->19962 19975->19966 19977 6cdebcf9 __purecall LeaveCriticalSection 19976->19977 19978 6cde9504 19977->19978 19978->19970 19980 6cde28de 19979->19980 19981 6cde3873 19979->19981 19980->19667 19982 6cde3881 19981->19982 19987 6cde4ad8 19981->19987 19992 6cde4b13 19982->19992 20001 6cde49f3 19987->20001 19989 6cde4af2 19990 6cde4b0a TlsGetValue 19989->19990 19991 6cde4afe 19989->19991 19990->19991 19991->19982 19993 6cde49f3 try_get_function 5 API calls 19992->19993 19994 6cde4b2d 19993->19994 19995 6cde3891 19994->19995 19996 6cde4b48 TlsSetValue 19994->19996 19997 6cde384a 19995->19997 19996->19995 19998 6cde3854 19997->19998 19999 6cde3861 19997->19999 19998->19999 20014 6cde7a0f 19998->20014 19999->19980 20002 6cde4a1b 20001->20002 20006 6cde4a17 __crt_fast_encode_pointer 20001->20006 20002->20006 20007 6cde492f 20002->20007 20005 6cde4a35 GetProcAddress 20005->20006 20006->19989 20011 6cde493e try_get_first_available_module 20007->20011 20008 6cde495b LoadLibraryExW 20009 6cde4976 GetLastError 20008->20009 20008->20011 20009->20011 20010 6cde49d1 FreeLibrary 20010->20011 20011->20008 20011->20010 20012 6cde49e8 20011->20012 20013 6cde49a9 LoadLibraryExW 20011->20013 20012->20005 20012->20006 20013->20011 20015 6cde99a9 _free 19 API calls 20014->20015 20016 6cde7a27 20015->20016 20016->19999 20023 6cde38aa 20017->20023 20019 6cde28ba 20019->19676 20020 6cde91d6 20019->20020 20021 6cde9859 __dosmaperr 19 API calls 20020->20021 20022 6cde28c6 20021->20022 20022->19679 20022->19680 20024 6cde38b6 GetLastError 20023->20024 20025 6cde38b3 20023->20025 20026 6cde4ad8 ___vcrt_FlsGetValue 6 API calls 20024->20026 20025->20019 20028 6cde38cb 20026->20028 20027 6cde38ea 20029 6cde3930 SetLastError 20027->20029 20028->20027 20028->20029 20030 6cde4b13 ___vcrt_FlsSetValue 6 API calls 20028->20030 20029->20019 20031 6cde38e4 __InternalCxxFrameHandler 20030->20031 20031->20027 20032 6cde390c 20031->20032 20033 6cde4b13 ___vcrt_FlsSetValue 6 API calls 20031->20033 20034 6cde4b13 ___vcrt_FlsSetValue 6 API calls 20032->20034 20035 6cde3920 20032->20035 20033->20032 20034->20035 20036 6cde7a0f ___std_exception_destroy 19 API calls 20035->20036 20036->20027 26623 6cde5b72 26624 6cdea1b4 ___scrt_uninitialize_crt 63 API calls 26623->26624 26625 6cde5b7a 26624->26625 26633 6cde9ea3 26625->26633 26627 6cde5b7f 26643 6cdea1bd 26627->26643 26630 6cde5ba9 26631 6cde99a9 _free 19 API calls 26630->26631 26632 6cde5bb4 26631->26632 26634 6cde9eaf ___scrt_is_nonwritable_in_current_image 26633->26634 26647 6cdebcb1 EnterCriticalSection 26634->26647 26636 6cde9f25 26659 6cde9f3a 26636->26659 26638 6cde9eba 26638->26636 26640 6cde9ef9 DeleteCriticalSection 26638->26640 26648 6cded663 26638->26648 26639 6cde9f31 __vfwprintf_l 26639->26627 26642 6cde99a9 _free 19 API calls 26640->26642 26642->26638 26644 6cde5b8e DeleteCriticalSection 26643->26644 26645 6cdea1d3 26643->26645 26644->26627 26644->26630 26645->26644 26646 6cde99a9 _free 19 API calls 26645->26646 26646->26644 26647->26638 26649 6cded66f ___scrt_is_nonwritable_in_current_image 26648->26649 26650 6cded68e 26649->26650 26651 6cded679 26649->26651 26653 6cded67e _memcpy_s __vfwprintf_l 26650->26653 26662 6cde5bbe EnterCriticalSection 26650->26662 26652 6cde7993 __dosmaperr 19 API calls 26651->26652 26652->26653 26653->26638 26655 6cded6aa 26663 6cded5ed 26655->26663 26657 6cded6b5 26677 6cded6d2 26657->26677 26734 6cdebcf9 LeaveCriticalSection 26659->26734 26661 6cde9f41 26661->26639 26662->26655 26664 6cded60f 26663->26664 26665 6cded5fa 26663->26665 26667 6cdea10a __vfwprintf_l 59 API calls 26664->26667 26668 6cded5ff _memcpy_s 26664->26668 26666 6cde7993 __dosmaperr 19 API calls 26665->26666 26666->26668 26669 6cded623 26667->26669 26668->26657 26670 6cdea1bd 19 API calls 26669->26670 26671 6cded62b 26670->26671 26672 6cdeb651 __vfwprintf_l 19 API calls 26671->26672 26673 6cded631 26672->26673 26680 6cdf1242 26673->26680 26675 6cded637 26675->26668 26676 6cde99a9 _free 19 API calls 26675->26676 26676->26668 26733 6cde5bd2 LeaveCriticalSection 26677->26733 26679 6cded6da 26679->26653 26681 6cdf1268 26680->26681 26682 6cdf1253 26680->26682 26684 6cdf12b1 26681->26684 26687 6cdf128f 26681->26687 26683 6cde7980 __dosmaperr 19 API calls 26682->26683 26686 6cdf1258 26683->26686 26685 6cde7980 __dosmaperr 19 API calls 26684->26685 26688 6cdf12b6 26685->26688 26689 6cde7993 __dosmaperr 19 API calls 26686->26689 26693 6cdf11c0 26687->26693 26691 6cde7993 __dosmaperr 19 API calls 26688->26691 26692 6cdf1260 _memcpy_s 26689->26692 26691->26692 26692->26675 26694 6cdf11cc ___scrt_is_nonwritable_in_current_image 26693->26694 26704 6cdee1db EnterCriticalSection 26694->26704 26696 6cdf11da 26697 6cdf120c 26696->26697 26698 6cdf1201 26696->26698 26700 6cde7993 __dosmaperr 19 API calls 26697->26700 26705 6cdf12d1 26698->26705 26701 6cdf1207 26700->26701 26720 6cdf1236 26701->26720 26703 6cdf1229 __vfwprintf_l 26703->26692 26704->26696 26706 6cdee2b2 ___scrt_uninitialize_crt 19 API calls 26705->26706 26709 6cdf12e1 26706->26709 26707 6cdf12e7 26723 6cdee221 26707->26723 26709->26707 26710 6cdf1319 26709->26710 26713 6cdee2b2 ___scrt_uninitialize_crt 19 API calls 26709->26713 26710->26707 26711 6cdee2b2 ___scrt_uninitialize_crt 19 API calls 26710->26711 26714 6cdf1325 CloseHandle 26711->26714 26716 6cdf1310 26713->26716 26714->26707 26717 6cdf1331 GetLastError 26714->26717 26715 6cdf1361 26715->26701 26719 6cdee2b2 ___scrt_uninitialize_crt 19 API calls 26716->26719 26717->26707 26718 6cde795d __dosmaperr 19 API calls 26718->26715 26719->26710 26732 6cdee1fe LeaveCriticalSection 26720->26732 26722 6cdf1240 26722->26703 26724 6cdee297 26723->26724 26725 6cdee230 26723->26725 26726 6cde7993 __dosmaperr 19 API calls 26724->26726 26725->26724 26731 6cdee25a 26725->26731 26727 6cdee29c 26726->26727 26728 6cde7980 __dosmaperr 19 API calls 26727->26728 26729 6cdee287 26728->26729 26729->26715 26729->26718 26730 6cdee281 SetStdHandle 26730->26729 26731->26729 26731->26730 26732->26722 26733->26679 26734->26661 20037 6cde256d 20039 6cde2579 ___scrt_is_nonwritable_in_current_image 20037->20039 20038 6cde2588 20039->20038 20040 6cde25a2 dllmain_raw 20039->20040 20044 6cde259d 20039->20044 20040->20038 20041 6cde25bc dllmain_crt_dispatch 20040->20041 20041->20038 20041->20044 20042 6cde2609 20042->20038 20043 6cde2612 dllmain_crt_dispatch 20042->20043 20043->20038 20045 6cde2625 dllmain_raw 20043->20045 20044->20042 20046 6cde25f5 dllmain_crt_dispatch dllmain_raw 20044->20046 20045->20038 20046->20042 20047 6cdda76a 20048 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20047->20048 20049 6cdda774 20048->20049 20050 6cdda720 GetCommandLineW CommandLineToArgvW 20053 6cdda450 SetUnhandledExceptionFilter 20050->20053 20056 6cdda490 ___scrt_fastfail 20053->20056 20076 6cdda69c 20053->20076 20054 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20055 6cdda6cd ExitProcess 20054->20055 20085 6cdda420 WideCharToMultiByte 20056->20085 20058 6cdda512 20086 6cdda420 WideCharToMultiByte 20058->20086 20060 6cdda534 20087 6cdda420 WideCharToMultiByte 20060->20087 20062 6cdda557 20088 6cdda420 WideCharToMultiByte 20062->20088 20064 6cdda57a 20089 6cde2114 20064->20089 20067 6cdda62f 20129 6cdcdca0 20067->20129 20068 6cdda5a4 _DebugHeapAllocator 20099 6cde7fa2 20068->20099 20076->20054 20081 6cdd9510 27 API calls 20082 6cdda60c 20081->20082 20109 6cdcd8a0 20082->20109 20085->20058 20086->20060 20087->20062 20088->20064 20091 6cde2119 20089->20091 20092 6cdda587 20091->20092 20093 6cde8444 _Allocate 7 API calls 20091->20093 20094 6cde2135 _Allocate 20091->20094 20150 6cde7a2c 20091->20150 20092->20067 20092->20068 20093->20091 20098 6cde2710 _Allocate 20094->20098 20157 6cde341e 20094->20157 20095 6cde341e __CxxThrowException@8 RaiseException 20096 6cde272d 20095->20096 20098->20095 20160 6cde7cd2 20099->20160 20101 6cdda5c0 20102 6cde8020 20101->20102 20456 6cde7aa9 20102->20456 20104 6cdda5d0 20105 6cdd9510 20104->20105 20106 6cdd953e 20105->20106 20472 6cdc6bf0 20106->20472 20562 6cdc8f50 20109->20562 20111 6cdcd8dd ___scrt_fastfail 20112 6cdcd959 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 20111->20112 20121 6cdcd990 _DebugHeapAllocator 20112->20121 20113 6cde2114 _Allocate 21 API calls 20113->20121 20114 6cde2114 _Allocate 21 API calls 20115 6cdcdaa6 _DebugHeapAllocator 20114->20115 20118 6cdcdad9 Concurrency::details::ContextBase::GetWorkQueueIdentity 20115->20118 20577 6cdd4760 20115->20577 20608 6cdd9940 20118->20608 20121->20113 20125 6cdcda38 Sleep 20121->20125 20127 6cdcda91 20121->20127 20565 6cdc8570 20121->20565 20570 6cdc8680 20121->20570 20124 6cdcdb27 20126 6cdc68e0 11 API calls 20124->20126 20125->20121 20125->20127 20128 6cdcdb36 20126->20128 20127->20114 20128->20067 21037 6cdd99e0 20129->21037 20133 6cdcdcc6 21041 6cdd9d00 CreateThread 20133->21041 20135 6cdcdce0 21042 6cdd9b70 20135->21042 20138 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20139 6cdcdd29 20138->20139 20140 6cdcdd30 20139->20140 20141 6cdcdd62 20140->20141 20142 6cdcdd43 WaitForSingleObject 20140->20142 20143 6cdcdd8d 20141->20143 20144 6cdcdd6e WaitForSingleObject 20141->20144 20142->20141 21099 6cdd9a10 20143->21099 20144->20143 20147 6cdda6e0 21103 6cdcdb80 20147->21103 20149 6cdda6ef _MallocaArrayHolder 20149->20076 20155 6cdea5ff pair 20150->20155 20151 6cdea63d 20153 6cde7993 __dosmaperr 19 API calls 20151->20153 20152 6cdea628 HeapAlloc 20154 6cdea63b 20152->20154 20152->20155 20153->20154 20154->20091 20155->20151 20155->20152 20156 6cde8444 _Allocate 7 API calls 20155->20156 20156->20155 20159 6cde343e RaiseException 20157->20159 20159->20098 20176 6cde74b3 20160->20176 20162 6cde7d27 20181 6cde6101 20162->20181 20164 6cde7cfa 20166 6cde7993 __dosmaperr 19 API calls 20164->20166 20165 6cde7ce5 20165->20162 20165->20164 20175 6cde7cff _memcpy_s 20165->20175 20166->20175 20168 6cde7d32 20169 6cde7d66 20168->20169 20189 6cde7fed 20168->20189 20172 6cde7dda __aulldvrm 20169->20172 20196 6cde7f79 20169->20196 20171 6cde7f79 __vfwprintf_l 19 API calls 20173 6cde7f00 20171->20173 20172->20171 20174 6cde7993 __dosmaperr 19 API calls 20173->20174 20173->20175 20174->20175 20175->20101 20177 6cde74cb 20176->20177 20178 6cde74b8 20176->20178 20177->20165 20179 6cde7993 __dosmaperr 19 API calls 20178->20179 20180 6cde74bd _memcpy_s 20179->20180 20180->20165 20182 6cde6121 20181->20182 20184 6cde6118 20181->20184 20182->20184 20200 6cde9708 GetLastError 20182->20200 20184->20168 20190 6cde800f 20189->20190 20191 6cde7ff9 20189->20191 20415 6cde7fc7 20190->20415 20191->20190 20192 6cde8001 20191->20192 20406 6cdeb8cc 20192->20406 20195 6cde800d 20195->20168 20197 6cde7f93 _memcpy_s 20196->20197 20198 6cde7f8a 20196->20198 20197->20172 20198->20197 20199 6cde7993 __dosmaperr 19 API calls 20198->20199 20199->20197 20201 6cde971f 20200->20201 20202 6cde9725 20200->20202 20203 6cde9c64 pair 11 API calls 20201->20203 20204 6cde9cba pair 11 API calls 20202->20204 20223 6cde972b SetLastError 20202->20223 20203->20202 20205 6cde9741 20204->20205 20207 6cde994c pair 19 API calls 20205->20207 20205->20223 20208 6cde9751 20207->20208 20212 6cde9759 20208->20212 20213 6cde9770 20208->20213 20209 6cde97b9 20235 6cde9267 20209->20235 20210 6cde6141 20227 6cdeac04 20210->20227 20216 6cde9cba pair 11 API calls 20212->20216 20215 6cde9cba pair 11 API calls 20213->20215 20217 6cde977c 20215->20217 20224 6cde9767 20216->20224 20218 6cde9780 20217->20218 20219 6cde9791 20217->20219 20221 6cde9cba pair 11 API calls 20218->20221 20222 6cde9506 pair 19 API calls 20219->20222 20220 6cde99a9 _free 19 API calls 20220->20223 20221->20224 20225 6cde979c 20222->20225 20223->20209 20223->20210 20224->20220 20226 6cde99a9 _free 19 API calls 20225->20226 20226->20223 20228 6cde6157 20227->20228 20229 6cdeac17 20227->20229 20231 6cdeac31 20228->20231 20229->20228 20363 6cded440 20229->20363 20232 6cdeac59 20231->20232 20233 6cdeac44 20231->20233 20232->20184 20233->20232 20385 6cdec804 20233->20385 20246 6cdeceb4 20235->20246 20238 6cde9277 20240 6cde9281 IsProcessorFeaturePresent 20238->20240 20245 6cde92a0 20238->20245 20242 6cde928d 20240->20242 20276 6cde5874 20242->20276 20282 6cde89a7 20245->20282 20285 6cdecdf0 20246->20285 20248 6cde926c 20248->20238 20249 6cdecf04 20248->20249 20250 6cdecf10 pair 20249->20250 20251 6cde9859 __dosmaperr 19 API calls 20250->20251 20252 6cdecf37 __purecall 20250->20252 20256 6cdecf3d __purecall 20250->20256 20251->20252 20253 6cdecf84 20252->20253 20255 6cdecf6e _memcpy_s 20252->20255 20252->20256 20254 6cde7993 __dosmaperr 19 API calls 20253->20254 20254->20255 20304 6cdf4319 20255->20304 20258 6cdecfb0 20256->20258 20296 6cdebcb1 EnterCriticalSection 20256->20296 20261 6cdecfff 20258->20261 20262 6cdecff2 20258->20262 20274 6cded02d 20258->20274 20261->20274 20297 6cdecefb 20261->20297 20265 6cdecffa 20262->20265 20307 6cdebcf9 LeaveCriticalSection 20262->20307 20269 6cde89a7 __purecall 28 API calls 20265->20269 20267 6cded093 20267->20255 20275 6cde9708 pair 34 API calls 20267->20275 20272 6cded105 20269->20272 20270 6cde9708 pair 34 API calls 20270->20267 20273 6cdecefb __purecall 34 API calls 20273->20274 20300 6cded0ad 20274->20300 20275->20255 20277 6cde5890 ___scrt_fastfail 20276->20277 20278 6cde58bc IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 20277->20278 20281 6cde598d ___scrt_fastfail 20278->20281 20279 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20280 6cde59ab 20279->20280 20280->20245 20281->20279 20309 6cde8833 20282->20309 20286 6cdecdfc ___scrt_is_nonwritable_in_current_image 20285->20286 20291 6cdebcb1 EnterCriticalSection 20286->20291 20288 6cdece0a 20292 6cdece3e 20288->20292 20290 6cdece31 __vfwprintf_l 20290->20248 20291->20288 20295 6cdebcf9 LeaveCriticalSection 20292->20295 20294 6cdece48 20294->20290 20295->20294 20296->20258 20298 6cde9708 pair 34 API calls 20297->20298 20299 6cdecf00 20298->20299 20299->20273 20301 6cded084 20300->20301 20302 6cded0b3 20300->20302 20301->20255 20301->20267 20301->20270 20308 6cdebcf9 LeaveCriticalSection 20302->20308 20305 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20304->20305 20306 6cdf4324 20305->20306 20306->20306 20307->20265 20308->20301 20310 6cde8841 20309->20310 20318 6cde8852 20309->20318 20320 6cde88db GetModuleHandleW 20310->20320 20313 6cde8886 20315 6cde888c 20313->20315 20337 6cde8899 20313->20337 20329 6cde8701 20318->20329 20321 6cde8846 20320->20321 20321->20318 20322 6cde891f GetModuleHandleExW 20321->20322 20323 6cde8949 GetProcAddress 20322->20323 20324 6cde895e 20322->20324 20323->20324 20325 6cde897b 20324->20325 20326 6cde8972 FreeLibrary 20324->20326 20327 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20325->20327 20326->20325 20328 6cde8985 20327->20328 20328->20318 20330 6cde870d ___scrt_is_nonwritable_in_current_image 20329->20330 20345 6cdebcb1 EnterCriticalSection 20330->20345 20332 6cde8717 20346 6cde8744 20332->20346 20336 6cde8730 __vfwprintf_l 20336->20313 20359 6cdebd10 GetPEB 20337->20359 20340 6cde88c8 20343 6cde891f __purecall 8 API calls 20340->20343 20341 6cde88a8 GetPEB 20341->20340 20342 6cde88b8 GetCurrentProcess TerminateProcess 20341->20342 20342->20340 20344 6cde88d0 ExitProcess 20343->20344 20345->20332 20349 6cde8750 pair 20346->20349 20347 6cde87eb 20348 6cdf4319 __purecall 5 API calls 20347->20348 20350 6cde8724 20348->20350 20349->20347 20351 6cde87bd 20349->20351 20353 6cde9049 __purecall 19 API calls 20349->20353 20356 6cde8738 20350->20356 20352 6cde87da 20351->20352 20354 6cde84da __purecall 5 API calls 20351->20354 20355 6cde84da __purecall 5 API calls 20352->20355 20353->20351 20354->20352 20355->20347 20357 6cdebcf9 __purecall LeaveCriticalSection 20356->20357 20358 6cde8742 20357->20358 20358->20336 20360 6cdebd2a 20359->20360 20362 6cde88a3 20359->20362 20361 6cde9b61 __purecall 10 API calls 20360->20361 20361->20362 20362->20340 20362->20341 20364 6cded44c ___scrt_is_nonwritable_in_current_image 20363->20364 20365 6cde9708 pair 34 API calls 20364->20365 20366 6cded455 20365->20366 20367 6cded49b __vfwprintf_l 20366->20367 20376 6cdebcb1 EnterCriticalSection 20366->20376 20367->20228 20369 6cded473 20377 6cded4b7 20369->20377 20374 6cde9267 __purecall 34 API calls 20375 6cded4b6 20374->20375 20376->20369 20378 6cded4c5 __fassign 20377->20378 20379 6cded484 20377->20379 20378->20379 20380 6cded1f3 __fassign 19 API calls 20378->20380 20381 6cded4a0 20379->20381 20380->20379 20384 6cdebcf9 LeaveCriticalSection 20381->20384 20383 6cded497 20383->20367 20383->20374 20384->20383 20386 6cde9708 pair 34 API calls 20385->20386 20387 6cdec80e 20386->20387 20390 6cdec726 20387->20390 20389 6cdec814 20389->20232 20391 6cdec732 ___scrt_is_nonwritable_in_current_image 20390->20391 20392 6cdec74c 20391->20392 20401 6cdebcb1 EnterCriticalSection 20391->20401 20396 6cde9267 __purecall 34 API calls 20392->20396 20399 6cdec753 __vfwprintf_l 20392->20399 20394 6cdec788 20402 6cdec7a5 20394->20402 20397 6cdec7bb 20396->20397 20398 6cdec75c 20398->20394 20400 6cde99a9 _free 19 API calls 20398->20400 20399->20389 20400->20394 20401->20398 20405 6cdebcf9 LeaveCriticalSection 20402->20405 20404 6cdec7ac 20404->20392 20405->20404 20407 6cde6101 __fassign 34 API calls 20406->20407 20408 6cdeb8ea 20407->20408 20409 6cdeb8fa 20408->20409 20419 6cdee31c 20408->20419 20412 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20409->20412 20413 6cdeb9a0 20412->20413 20413->20195 20416 6cde7fde 20415->20416 20417 6cde7fd8 20415->20417 20451 6cdeb83b 20416->20451 20417->20195 20420 6cde6101 __fassign 34 API calls 20419->20420 20421 6cdeb91d 20420->20421 20422 6cdf049c 20421->20422 20423 6cde6101 __fassign 34 API calls 20422->20423 20424 6cdf04bc 20423->20424 20437 6cdecaac 20424->20437 20426 6cdf057a 20427 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20426->20427 20430 6cdf059d 20427->20430 20428 6cdf04e9 20428->20426 20433 6cdf050f __alloca_probe_16 ___scrt_fastfail 20428->20433 20440 6cdea5ff 20428->20440 20430->20409 20431 6cdf0574 20447 6cdee58c 20431->20447 20433->20431 20434 6cdecaac __fassign MultiByteToWideChar 20433->20434 20435 6cdf055d 20434->20435 20435->20431 20436 6cdf0564 GetStringTypeW 20435->20436 20436->20431 20438 6cdecabd MultiByteToWideChar 20437->20438 20438->20428 20441 6cdea63d 20440->20441 20445 6cdea60d pair 20440->20445 20443 6cde7993 __dosmaperr 19 API calls 20441->20443 20442 6cdea628 HeapAlloc 20444 6cdea63b 20442->20444 20442->20445 20443->20444 20444->20433 20445->20441 20445->20442 20446 6cde8444 _Allocate 7 API calls 20445->20446 20446->20445 20448 6cdee5a9 20447->20448 20449 6cdee598 20447->20449 20448->20426 20449->20448 20450 6cde99a9 _free 19 API calls 20449->20450 20450->20448 20452 6cde9708 pair 34 API calls 20451->20452 20453 6cdeb846 20452->20453 20454 6cdeac04 __fassign 34 API calls 20453->20454 20455 6cdeb856 20454->20455 20455->20417 20457 6cde74b3 __vswprintf_s_l 19 API calls 20456->20457 20460 6cde7abb 20457->20460 20458 6cde7af6 20459 6cde6101 __fassign 34 API calls 20458->20459 20464 6cde7b02 20459->20464 20460->20458 20461 6cde7ad0 20460->20461 20471 6cde7ad5 _memcpy_s 20460->20471 20462 6cde7993 __dosmaperr 19 API calls 20461->20462 20462->20471 20463 6cde7fed __vfwprintf_l 37 API calls 20463->20464 20464->20463 20465 6cde7b31 20464->20465 20467 6cde7f79 __vfwprintf_l 19 API calls 20465->20467 20468 6cde7b9b 20465->20468 20466 6cde7f79 __vfwprintf_l 19 API calls 20469 6cde7c65 __vfwprintf_l 20466->20469 20467->20468 20468->20466 20470 6cde7993 __dosmaperr 19 API calls 20469->20470 20469->20471 20470->20471 20471->20104 20473 6cdc6c00 construct char_traits 20472->20473 20476 6cdc6c20 20473->20476 20475 6cdc6c19 20475->20081 20477 6cdc6c31 std::_Mutex_base::~_Mutex_base 20476->20477 20479 6cdc6c3f 20477->20479 20480 6cdc6df0 20477->20480 20479->20475 20493 6cdc6b70 20480->20493 20483 6cdc6e15 std::_Mutex_base::~_Mutex_base 20500 6cdc6ef0 20483->20500 20486 6cdc6e35 std::_Mutex_base::~_Mutex_base 20505 6cdc6d90 20486->20505 20488 6cdc6e5b construct Concurrency::details::ContextBase::GetWorkQueueIdentity 20490 6cdc6eb0 construct 20488->20490 20509 6cdc6dc0 20488->20509 20491 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20490->20491 20492 6cdc6ee4 20491->20492 20492->20479 20494 6cdc6b8b _DebugHeapAllocator _Min_value _Max_value std::_Mutex_base::~_Mutex_base 20493->20494 20495 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20494->20495 20496 6cdc6be0 20495->20496 20496->20483 20497 6cdc4d90 20496->20497 20512 6cde20d6 20497->20512 20501 6cdc6b70 5 API calls 20500->20501 20502 6cdc6f0b _Max_value std::_Mutex_base::~_Mutex_base 20501->20502 20503 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20502->20503 20504 6cdc6f73 20503->20504 20504->20486 20506 6cdc6da0 construct 20505->20506 20531 6cdc1f90 20506->20531 20554 6cdc1fd0 20509->20554 20511 6cdc6dd4 20511->20490 20517 6cde205e 20512->20517 20515 6cde341e __CxxThrowException@8 RaiseException 20516 6cdc4d9d 20515->20516 20516->20483 20520 6cde200e 20517->20520 20523 6cde339c 20520->20523 20524 6cde203a 20523->20524 20525 6cde33a9 20523->20525 20524->20515 20525->20524 20526 6cde7a2c std::exception::exception 20 API calls 20525->20526 20527 6cde33c6 20526->20527 20528 6cde33d6 20527->20528 20529 6cde92ab std::exception::exception 19 API calls 20527->20529 20530 6cde7a0f ___std_exception_destroy 19 API calls 20528->20530 20529->20528 20530->20524 20532 6cdc1f9c 20531->20532 20533 6cdc1faa 20531->20533 20537 6cdc2440 20532->20537 20535 6cdc1fa5 20533->20535 20543 6cdc1030 20533->20543 20535->20488 20538 6cdc2457 20537->20538 20539 6cdc1030 _Allocate 21 API calls 20538->20539 20541 6cdc2467 20539->20541 20542 6cdc2482 20541->20542 20546 6cde5a49 20541->20546 20542->20535 20544 6cde2114 _Allocate 21 API calls 20543->20544 20545 6cdc103c 20544->20545 20545->20535 20547 6cde5a58 20546->20547 20550 6cde5a66 IsProcessorFeaturePresent 20547->20550 20549 6cde5a65 20551 6cde5a72 20550->20551 20552 6cde5874 __purecall 8 API calls 20551->20552 20553 6cde5a87 GetCurrentProcess TerminateProcess 20552->20553 20553->20549 20555 6cdc1fe9 _MallocaArrayHolder 20554->20555 20556 6cdc1fdc 20554->20556 20555->20511 20558 6cdc1050 20556->20558 20559 6cdc108e 20558->20559 20560 6cde5a49 _Deallocate 11 API calls 20559->20560 20561 6cdc10a9 20559->20561 20560->20559 20561->20555 20617 6cdc93c0 20562->20617 20566 6cde2114 _Allocate 21 API calls 20565->20566 20567 6cdc85b6 _DebugHeapAllocator 20566->20567 20568 6cdc85e6 20567->20568 20634 6cdc78a0 lstrcpyA lstrcatA lstrcpyA lstrcatA 20567->20634 20568->20121 20638 6cdc7a40 20570->20638 20573 6cdc869c 20573->20121 20574 6cdc86a0 CreateEventA 20574->20573 20575 6cdc86c1 CreateThread 20574->20575 20575->20573 20576 6cdc86e7 CloseHandle 20575->20576 20736 6cdc8760 20575->20736 20576->20573 20772 6cdc8910 20577->20772 20579 6cdd4793 20580 6cdc8910 28 API calls 20579->20580 20581 6cdd47a5 20580->20581 20779 6cdd5860 20581->20779 20584 6cdd5860 27 API calls 20585 6cdd47c9 20584->20585 20586 6cdd4828 InitializeCriticalSection InitializeCriticalSection 20585->20586 20588 6cde2114 _Allocate 21 API calls 20585->20588 20587 6cdd4858 20586->20587 20589 6cde2114 _Allocate 21 API calls 20587->20589 20592 6cdd47e0 _DebugHeapAllocator 20588->20592 20594 6cdd486b _DebugHeapAllocator 20589->20594 20590 6cdd4809 20590->20586 20591 6cdd488d 20595 6cde2114 _Allocate 21 API calls 20591->20595 20592->20590 20783 6cdd8cc0 20592->20783 20594->20591 20787 6cdc10c0 20594->20787 20598 6cdd48b6 _DebugHeapAllocator 20595->20598 20597 6cdd48dc 20599 6cde2114 _Allocate 21 API calls 20597->20599 20598->20597 20790 6cdce460 20598->20790 20603 6cdd4908 _DebugHeapAllocator 20599->20603 20601 6cdd4931 20796 6cdc8a40 20601->20796 20603->20601 20793 6cdce8b0 20603->20793 20606 6cdc8a40 5 API calls 20607 6cdd497d 20606->20607 20607->20118 20609 6cdd996e 20608->20609 20610 6cdcdb18 20608->20610 20611 6cde2114 _Allocate 21 API calls 20609->20611 20614 6cdc68e0 20610->20614 20612 6cdd9978 _DebugHeapAllocator 20611->20612 20612->20610 21021 6cdd95f0 20612->21021 21033 6cdc6a70 20614->21033 20616 6cdc690e 20616->20124 20620 6cdc9500 20617->20620 20621 6cdc9516 20620->20621 20624 6cdc99a0 20621->20624 20625 6cdc99bc std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 20624->20625 20630 6cdc9b00 20625->20630 20627 6cdc99cf construct std::_Iterator_base::_Iterator_base std::_Mutex_base::~_Mutex_base shared_ptr 20628 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20627->20628 20629 6cdc8f5f 20628->20629 20629->20111 20631 6cdc9b10 _Get_size_of_n 20630->20631 20632 6cdc1f90 _Allocate 27 API calls 20631->20632 20633 6cdc9b19 20632->20633 20633->20627 20635 6cdc79c5 ___scrt_fastfail 20634->20635 20636 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20635->20636 20637 6cdc7a32 20636->20637 20637->20568 20649 6cdc7e20 20638->20649 20645 6cdc7fa0 12 API calls 20646 6cdc7a9a 20645->20646 20647 6cdc7a7e 20646->20647 20681 6cdc7f60 20646->20681 20647->20573 20647->20574 20685 6cdc8230 20649->20685 20652 6cdc7f60 CloseHandle 20653 6cdc7e40 20652->20653 20654 6cdc7f60 CloseHandle 20653->20654 20655 6cdc7a4f 20654->20655 20656 6cdc80e0 8 API calls 20655->20656 20657 6cdc81bd 20656->20657 20714 6cdc8460 20656->20714 20717 6cdc8450 20656->20717 20658 6cdc8230 16 API calls 20657->20658 20659 6cdc7a57 20657->20659 20658->20659 20660 6cdc7fa0 20659->20660 20661 6cdc7fc9 CreateNamedPipeA 20660->20661 20663 6cdc800e CreateEventA 20661->20663 20664 6cdc8006 20661->20664 20665 6cdc8039 ConnectNamedPipe 20663->20665 20666 6cdc8025 20663->20666 20668 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20664->20668 20669 6cdc808c WaitForSingleObject 20665->20669 20670 6cdc8062 GetLastError 20665->20670 20667 6cdc7f60 CloseHandle 20666->20667 20667->20664 20673 6cdc7a69 20668->20673 20671 6cdc80bc CloseHandle 20669->20671 20672 6cdc809f 20669->20672 20670->20669 20674 6cdc806f 20670->20674 20671->20664 20675 6cdc7f60 CloseHandle 20672->20675 20673->20645 20673->20647 20676 6cdc7f60 CloseHandle 20674->20676 20678 6cdc80ab 20675->20678 20677 6cdc807b 20676->20677 20679 6cdc7f60 CloseHandle 20677->20679 20680 6cdc7f60 CloseHandle 20678->20680 20679->20664 20680->20664 20682 6cdc7f8c 20681->20682 20683 6cdc7f6f 20681->20683 20682->20647 20683->20682 20684 6cdc7f77 CloseHandle 20683->20684 20684->20682 20686 6cdc8253 20685->20686 20687 6cdc8243 SetEvent 20685->20687 20688 6cdc826f 20686->20688 20689 6cdc825f SetEvent 20686->20689 20687->20686 20690 6cdc828b 20688->20690 20691 6cdc827b SetEvent 20688->20691 20689->20688 20692 6cdc82a7 20690->20692 20693 6cdc8297 SetEvent 20690->20693 20691->20690 20694 6cdc82f1 20692->20694 20695 6cdc82b3 WaitForSingleObject 20692->20695 20693->20692 20698 6cdc82fd WaitForSingleObject 20694->20698 20699 6cdc833b 20694->20699 20696 6cdc82cf TerminateThread 20695->20696 20697 6cdc82e1 CloseHandle 20695->20697 20696->20697 20697->20694 20702 6cdc8319 TerminateThread 20698->20702 20703 6cdc832b CloseHandle 20698->20703 20700 6cdc8357 20699->20700 20701 6cdc8347 CloseHandle 20699->20701 20704 6cdc8373 20700->20704 20705 6cdc8363 CloseHandle 20700->20705 20701->20700 20702->20703 20703->20699 20706 6cdc838f 20704->20706 20707 6cdc837f CloseHandle 20704->20707 20705->20704 20708 6cdc83ab 20706->20708 20709 6cdc839b CloseHandle 20706->20709 20707->20706 20710 6cdc83c7 20708->20710 20711 6cdc83b7 CloseHandle 20708->20711 20709->20708 20712 6cdc7e2f 20710->20712 20713 6cdc83d3 CloseHandle 20710->20713 20711->20710 20712->20652 20713->20712 20720 6cdc84f0 20714->20720 20728 6cdc8470 20717->20728 20724 6cdc84f7 20720->20724 20721 6cdc8500 WaitForSingleObject 20722 6cdc8518 WaitForSingleObject 20721->20722 20727 6cdc846b 20721->20727 20723 6cdc852e WaitForSingleObject 20722->20723 20722->20724 20723->20724 20725 6cdc854f 20723->20725 20724->20721 20724->20727 20726 6cdc7e20 17 API calls 20725->20726 20726->20727 20732 6cdc8477 20728->20732 20729 6cdc8480 WaitForSingleObject 20730 6cdc8498 WaitForSingleObject 20729->20730 20735 6cdc845b 20729->20735 20731 6cdc84ae WaitForSingleObject 20730->20731 20730->20732 20731->20732 20733 6cdc84cf 20731->20733 20732->20729 20732->20735 20734 6cdc7e20 17 API calls 20733->20734 20734->20735 20739 6cdc8770 20736->20739 20744 6cdc8799 20739->20744 20740 6cdc87bf WaitForSingleObject 20741 6cdc87d2 std::_Container_base12::~_Container_base12 20740->20741 20740->20744 20743 6cdc7e20 17 API calls 20741->20743 20745 6cdc8835 20743->20745 20744->20740 20744->20741 20748 6cdc7c10 20744->20748 20746 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20745->20746 20747 6cdc876b 20746->20747 20764 6cdf4430 20748->20764 20751 6cdc7c9f PeekNamedPipe 20758 6cdc7c90 20751->20758 20763 6cdc7c89 _wmemmove 20751->20763 20752 6cdc7d25 SetEvent 20754 6cdc7d51 ___scrt_fastfail 20752->20754 20753 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20756 6cdc7e0f 20753->20756 20766 6cdc7ee0 20754->20766 20755 6cdc7cf8 Sleep 20755->20758 20756->20744 20758->20751 20758->20752 20758->20755 20760 6cdc7d1e 20758->20760 20758->20763 20760->20752 20761 6cdc7d8f SetEvent 20761->20763 20762 6cdc7d78 SetEvent 20762->20763 20763->20753 20765 6cdc7c1d GetTickCount 20764->20765 20765->20758 20765->20763 20767 6cdc7f01 20766->20767 20768 6cdc7f09 ReadFile 20767->20768 20769 6cdc7f31 20767->20769 20768->20767 20768->20769 20770 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20769->20770 20771 6cdc7d71 20770->20771 20771->20761 20771->20762 20773 6cdc8f50 27 API calls 20772->20773 20774 6cdc894a 20773->20774 20775 6cdc8f50 27 API calls 20774->20775 20776 6cdc895c 20775->20776 20777 6cdc8f50 27 API calls 20776->20777 20778 6cdc896b InitializeCriticalSection 20777->20778 20778->20579 20780 6cdd5871 Concurrency::details::ContextBase::GetWorkQueueIdentity 20779->20780 20802 6cdd5c50 20780->20802 20896 6cdca840 20783->20896 20786 6cdd8d59 ___scrt_fastfail 20786->20590 20935 6cdc17a0 20787->20935 20956 6cdc2990 20790->20956 20968 6cdc4fa0 20793->20968 20797 6cdc8a4f 20796->20797 20798 6cdc8a56 CreateSemaphoreA 20796->20798 20797->20798 20799 6cdc8a80 20798->20799 20801 6cdc8a87 20798->20801 20799->20606 20800 6cdc8ad5 CreateThread 20800->20799 20800->20801 21016 6cdc8d80 20800->21016 20801->20799 20801->20800 20803 6cdd5c84 _Subatomic 20802->20803 20808 6cdd6010 20803->20808 20805 6cdd5c93 _DebugHeapAllocator std::_Container_base12::~_Container_base12 20811 6cdd6050 20805->20811 20816 6cdd6fa0 20808->20816 20831 6cdd6370 20811->20831 20813 6cdd606a _DebugHeapAllocator 20837 6cdd63b0 20813->20837 20815 6cdd47b7 20815->20584 20817 6cdd6fb0 construct 20816->20817 20820 6cdd79b0 20817->20820 20819 6cdd6023 20819->20805 20821 6cdd79c3 construct shared_ptr 20820->20821 20824 6cdd69f0 20821->20824 20823 6cdd79dc shared_ptr 20823->20819 20827 6cdd6ae0 20824->20827 20826 6cdd6a03 20826->20823 20828 6cdd6b19 std::_Mutex_base::~_Mutex_base 20827->20828 20829 6cdd6c00 allocator 27 API calls 20828->20829 20830 6cdd6b20 construct std::_Mutex_base::~_Mutex_base 20829->20830 20830->20826 20833 6cdd637f _DebugHeapAllocator std::_Container_base12::~_Container_base12 20831->20833 20832 6cdd63a2 20832->20813 20833->20832 20834 6cdd6396 20833->20834 20850 6cdd6770 20833->20850 20853 6cdd6910 20834->20853 20838 6cdd63c2 Concurrency::details::ContextBase::GetWorkQueueIdentity _DebugHeapAllocator std::_Container_base12::~_Container_base12 20837->20838 20839 6cdd63e4 _DebugHeapAllocator 20838->20839 20843 6cdd6486 _DebugHeapAllocator std::_Container_base12::~_Container_base12 shared_ptr 20838->20843 20840 6cdd6770 _DebugHeapAllocator 21 API calls 20839->20840 20846 6cdd63f6 _DebugHeapAllocator std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 shared_ptr 20839->20846 20840->20846 20841 6cdd644e 20879 6cdd6780 20841->20879 20845 6cdd6880 _DebugHeapAllocator 5 API calls 20843->20845 20847 6cdd6475 _DebugHeapAllocator std::_Container_base12::~_Container_base12 shared_ptr 20843->20847 20844 6cdd645a shared_ptr 20885 6cdd6880 20844->20885 20845->20847 20846->20841 20849 6cdc9400 std::_Container_base12::~_Container_base12 11 API calls 20846->20849 20847->20815 20849->20841 20851 6cde20d6 std::_Xinvalid_argument 21 API calls 20850->20851 20852 6cdd677d 20851->20852 20852->20834 20854 6cdd6947 _DebugHeapAllocator std::_Mutex_base::~_Mutex_base 20853->20854 20861 6cdc98e0 20854->20861 20856 6cdd695d std::_Container_base12::~_Container_base12 shared_ptr 20865 6cdd6ab0 20856->20865 20860 6cdd69d5 20860->20832 20862 6cdc98f0 allocator 20861->20862 20863 6cdc1f90 _Allocate 27 API calls 20862->20863 20864 6cdc98f9 20863->20864 20864->20856 20872 6cdd6bd0 20865->20872 20868 6cdd6a10 20870 6cdd6a20 Concurrency::details::ContextBase::GetWorkQueueIdentity std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 shared_ptr 20868->20870 20869 6cdd6a6e std::_Container_base12::~_Container_base12 shared_ptr 20869->20860 20870->20869 20876 6cdc9400 20870->20876 20873 6cdd6bdf std::_Mutex_base::~_Mutex_base 20872->20873 20874 6cdd7100 _DebugHeapAllocator 5 API calls 20873->20874 20875 6cdd6989 20874->20875 20875->20868 20877 6cdc1fd0 _Deallocate 11 API calls 20876->20877 20878 6cdc9417 20877->20878 20878->20869 20881 6cdd6790 _DebugHeapAllocator std::_Container_base12::~_Container_base12 shared_ptr 20879->20881 20880 6cdd67ce std::_Mutex_base::~_Mutex_base 20883 6cdc98e0 allocator 27 API calls 20880->20883 20881->20880 20882 6cdd6770 _DebugHeapAllocator 21 API calls 20881->20882 20884 6cdd67b8 std::_Container_base12::~_Container_base12 shared_ptr 20881->20884 20882->20880 20883->20884 20884->20844 20886 6cdd688f std::_Mutex_base::~_Mutex_base 20885->20886 20889 6cdd70d0 20886->20889 20892 6cdd7ae0 20889->20892 20893 6cdd7b12 _DebugHeapAllocator _Debug_range 20892->20893 20894 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20893->20894 20895 6cdd68a1 20894->20895 20895->20847 20899 6cdccf60 20896->20899 20900 6cdccf8b ___scrt_fastfail 20899->20900 20901 6cdcd013 20900->20901 20927 6cde2278 20900->20927 20902 6cdcd01a LoadLibraryA 20901->20902 20904 6cdcd039 20902->20904 20905 6cdcd4e5 20902->20905 20907 6cdcd0ca 20904->20907 20910 6cde2278 5 API calls 20904->20910 20906 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20905->20906 20908 6cdca8f2 InitializeCriticalSection InitializeCriticalSection 20906->20908 20909 6cdcd0d1 GetProcAddress 20907->20909 20908->20786 20911 6cdcd170 20909->20911 20912 6cdcd172 20909->20912 20910->20909 20913 6cdcd177 GetProcAddress 20911->20913 20914 6cde2278 5 API calls 20912->20914 20915 6cdcd2a1 20913->20915 20916 6cdcd2a3 20913->20916 20914->20913 20917 6cdcd2a8 GetProcAddress 20915->20917 20918 6cde2278 5 API calls 20916->20918 20919 6cdcd355 20917->20919 20920 6cdcd357 20917->20920 20918->20917 20921 6cdcd35c GetProcAddress 20919->20921 20922 6cde2278 5 API calls 20920->20922 20923 6cdcd4be 20921->20923 20924 6cdcd4c0 20921->20924 20922->20921 20925 6cdcd4c5 GetProcAddress 20923->20925 20926 6cde2278 5 API calls 20924->20926 20925->20905 20926->20925 20930 6cde2284 IsProcessorFeaturePresent 20927->20930 20931 6cde2298 20930->20931 20934 6cde2157 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20931->20934 20933 6cde2282 20933->20902 20934->20933 20938 6cdc1980 20935->20938 20941 6cdc1b40 20938->20941 20940 6cdc10cf 20940->20591 20942 6cdc1b57 20941->20942 20945 6cdc1bb0 20942->20945 20944 6cdc1b5f shared_ptr 20944->20940 20948 6cdc1bd0 20945->20948 20947 6cdc1bc3 20947->20944 20949 6cdc1c09 std::_Mutex_base::~_Mutex_base 20948->20949 20952 6cdc1cc0 20949->20952 20951 6cdc1c10 construct std::_Mutex_base::~_Mutex_base 20951->20947 20953 6cdc1cd0 allocator 20952->20953 20954 6cdc1f90 _Allocate 27 API calls 20953->20954 20955 6cdc1cd9 20954->20955 20955->20951 20957 6cdc29ad std::_Iterator_base::_Iterator_base 20956->20957 20960 6cdc6460 20957->20960 20967 6cdc2050 20960->20967 20962 6cdc6478 LoadLibraryA 20963 6cdc65da 20962->20963 20964 6cdc64c3 GetProcAddress GetProcAddress 20962->20964 20965 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20963->20965 20964->20963 20966 6cdc29c0 InitializeCriticalSection InitializeCriticalSection 20965->20966 20966->20597 20967->20962 20969 6cdc4fdc std::_Iterator_base::_Iterator_base 20968->20969 20970 6cdc6460 8 API calls 20969->20970 20971 6cdc5059 20970->20971 20976 6cdc5b20 20971->20976 20974 6cdc5b20 27 API calls 20975 6cdc509f InitializeCriticalSection 20974->20975 20975->20601 20979 6cdc4430 20976->20979 20980 6cdc4440 construct _WChar_traits 20979->20980 20983 6cdc4460 20980->20983 20982 6cdc4459 20982->20974 20984 6cdc4471 std::_Mutex_base::~_Mutex_base 20983->20984 20986 6cdc447f 20984->20986 20987 6cdc4b90 20984->20987 20986->20982 21000 6cdc4740 20987->21000 20990 6cdc4bb5 std::_Mutex_base::~_Mutex_base 21004 6cdc4da0 20990->21004 20991 6cdc4d90 21 API calls 20991->20990 20993 6cdc4bd5 std::_Mutex_base::~_Mutex_base 21009 6cdc47c0 20993->21009 20995 6cdc4bfb construct Concurrency::details::ContextBase::GetWorkQueueIdentity 20996 6cdc4c50 construct 20995->20996 21013 6cdc47f0 20995->21013 20998 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 20996->20998 20999 6cdc4c84 20998->20999 20999->20986 21001 6cdc475b _DebugHeapAllocator _Min_value _Max_value std::_Mutex_base::~_Mutex_base 21000->21001 21002 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21001->21002 21003 6cdc47b0 21002->21003 21003->20990 21003->20991 21005 6cdc4740 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21004->21005 21006 6cdc4dbb _Max_value std::_Mutex_base::~_Mutex_base 21005->21006 21007 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21006->21007 21008 6cdc4e23 21007->21008 21008->20993 21010 6cdc47d0 _Get_size_of_n 21009->21010 21011 6cdc1f90 _Allocate 27 API calls 21010->21011 21012 6cdc47d9 21011->21012 21012->20995 21014 6cdc1fd0 _Deallocate 11 API calls 21013->21014 21015 6cdc4806 21014->21015 21015->20996 21020 6cdc8d93 21016->21020 21017 6cdc8ea5 21018 6cdc8da0 WaitForSingleObject EnterCriticalSection 21018->21020 21019 6cdc8e47 LeaveCriticalSection 21019->21020 21020->21017 21020->21018 21020->21019 21022 6cdc8f50 27 API calls 21021->21022 21023 6cdd961e 21022->21023 21024 6cdc8f50 27 API calls 21023->21024 21025 6cdd9630 21024->21025 21026 6cdc8f50 27 API calls 21025->21026 21027 6cdd963f 6 API calls 21026->21027 21028 6cdd96c2 21027->21028 21029 6cdd96d8 CreateEventA CreateEventA 21028->21029 21032 6cdd9cd0 EnterCriticalSection LeaveCriticalSection 21029->21032 21031 6cdd9720 21031->20610 21032->21031 21035 6cdc6a81 construct Concurrency::details::ContextBase::GetWorkQueueIdentity collate std::_Mutex_base::~_Mutex_base 21033->21035 21034 6cdc6add 21034->20616 21035->21034 21036 6cdc6dc0 allocator 11 API calls 21035->21036 21036->21034 21062 6cdd9d00 CreateThread 21037->21062 21039 6cdcdcb8 21040 6cdd9d00 CreateThread 21039->21040 21040->20133 21041->20135 21063 6cdd9d30 EnterCriticalSection LeaveCriticalSection 21042->21063 21044 6cdd9b89 21045 6cdd9b90 21044->21045 21047 6cdd9ba9 EnterCriticalSection 21044->21047 21046 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21045->21046 21048 6cdcdd1a 21046->21048 21049 6cdd9c6d EnterCriticalSection 21047->21049 21050 6cdd9bce 21047->21050 21048->20138 21051 6cdc8ed0 27 API calls 21049->21051 21052 6cdd9bd4 21050->21052 21053 6cdd9c26 EnterCriticalSection SetEvent 21050->21053 21054 6cdd9c90 LeaveCriticalSection 21051->21054 21055 6cdd9bdf EnterCriticalSection SetEvent 21052->21055 21056 6cdd9bda 21052->21056 21057 6cdc8ed0 27 API calls 21053->21057 21058 6cdd9ca3 LeaveCriticalSection 21054->21058 21064 6cdc8ed0 21055->21064 21056->21058 21060 6cdd9c58 LeaveCriticalSection 21057->21060 21058->21045 21060->21058 21062->21039 21063->21044 21067 6cdc9110 21064->21067 21066 6cdc8ee3 LeaveCriticalSection 21066->21058 21068 6cdc9122 Concurrency::details::ContextBase::GetWorkQueueIdentity _SyncOriginator std::_Container_base12::~_Container_base12 21067->21068 21070 6cdc916f std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 _SyncOriginator 21068->21070 21073 6cdc9550 21068->21073 21071 6cdc98e0 allocator 27 API calls 21070->21071 21072 6cdc91e1 construct std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 _SyncOriginator 21070->21072 21071->21072 21072->21066 21074 6cdc956c std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 21073->21074 21076 6cdc95db _SyncOriginator std::_Container_base12::~_Container_base12 21074->21076 21092 6cdc9a40 21074->21092 21077 6cdc98e0 allocator 27 API calls 21076->21077 21078 6cdc9611 std::_Container_base12::~_Container_base12 21077->21078 21095 6cdc9ba0 21078->21095 21081 6cdc96c2 std::_Container_base12::~_Container_base12 21083 6cdc9ba0 5 API calls 21081->21083 21082 6cdc9666 std::_Container_base12::~_Container_base12 21084 6cdc9ba0 5 API calls 21082->21084 21085 6cdc96eb std::_Container_base12::~_Container_base12 21083->21085 21087 6cdc968f _Find_unchecked std::_Container_base12::~_Container_base12 21084->21087 21086 6cdc9ba0 5 API calls 21085->21086 21086->21087 21088 6cdc9799 std::_Container_base12::~_Container_base12 21087->21088 21089 6cdc9400 std::_Container_base12::~_Container_base12 11 API calls 21087->21089 21090 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21088->21090 21089->21088 21091 6cdc97c9 21090->21091 21091->21070 21093 6cde20d6 std::_Xinvalid_argument 21 API calls 21092->21093 21094 6cdc9a51 21093->21094 21094->21074 21096 6cdc9bb9 construct _DebugHeapAllocator 21095->21096 21097 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21096->21097 21098 6cdc9658 21097->21098 21098->21081 21098->21082 21100 6cdd9a1c 21099->21100 21101 6cdcdd92 21099->21101 21100->21101 21102 6cdd9a2a WaitForSingleObject 21100->21102 21101->20076 21101->20147 21102->21101 21104 6cdcdb95 21103->21104 21108 6cdcdbb7 21103->21108 21104->21108 21110 6cdcdc60 21104->21110 21105 6cdcdc17 DeleteCriticalSection DeleteCriticalSection DeleteCriticalSection 21113 6cdc89d0 21105->21113 21108->21105 21116 6cdd49f0 21110->21116 21112 6cdcdc6f _MallocaArrayHolder 21112->21108 21276 6cdc8f70 21113->21276 21136 6cdc8b20 21116->21136 21118 6cdd4a23 21119 6cdc8b20 31 API calls 21118->21119 21120 6cdd4a2e 21119->21120 21121 6cdd4a5c 21120->21121 21141 6cdd4bd0 21120->21141 21122 6cdd4aa3 21121->21122 21144 6cdd4c00 21121->21144 21124 6cdd4aea DeleteCriticalSection DeleteCriticalSection 21122->21124 21147 6cdd4c30 21122->21147 21150 6cdd49a0 21124->21150 21130 6cdd49a0 error_info_injector 11 API calls 21131 6cdd4bab 21130->21131 21153 6cdc89f0 DeleteCriticalSection 21131->21153 21134 6cdc89f0 _SyncOriginator 12 API calls 21135 6cdd4bc1 21134->21135 21135->21112 21137 6cdc8b42 21136->21137 21138 6cdc8b64 WaitForMultipleObjects 21137->21138 21160 6cdc8cf0 EnterCriticalSection 21137->21160 21140 6cdc8b7c std::_Container_base12::~_Container_base12 21138->21140 21140->21118 21170 6cdc10e0 21141->21170 21143 6cdd4bdf _MallocaArrayHolder 21143->21121 21210 6cdce4b0 DeleteCriticalSection DeleteCriticalSection 21144->21210 21146 6cdd4c0f _MallocaArrayHolder 21146->21122 21212 6cdce8f0 DeleteCriticalSection 21147->21212 21149 6cdd4c3f _MallocaArrayHolder 21149->21124 21245 6cdd49c0 21150->21245 21154 6cdc89d0 _SyncOriginator 11 API calls 21153->21154 21155 6cdc8a18 21154->21155 21156 6cdc89d0 _SyncOriginator 11 API calls 21155->21156 21157 6cdc8a23 21156->21157 21158 6cdc89d0 _SyncOriginator 11 API calls 21157->21158 21159 6cdc8a2e 21158->21159 21159->21134 21161 6cdc8d20 21160->21161 21162 6cdc8d12 21160->21162 21165 6cdc8ed0 27 API calls 21161->21165 21163 6cdc8d18 21162->21163 21164 6cdc8d31 21162->21164 21166 6cdc8d1e 21163->21166 21169 6cdc8ed0 27 API calls 21163->21169 21167 6cdc8ed0 27 API calls 21164->21167 21165->21166 21168 6cdc8d51 LeaveCriticalSection ReleaseSemaphore 21166->21168 21167->21166 21168->21137 21169->21168 21175 6cdc1130 21170->21175 21176 6cdc114d 6 library calls 21175->21176 21177 6cdc11c1 21176->21177 21188 6cdc1440 21176->21188 21192 6cdc14b0 21177->21192 21181 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21182 6cdc110e 21181->21182 21183 6cdc1670 21182->21183 21200 6cdc19a0 21183->21200 21189 6cdc145d _DebugHeapAllocator Concurrency::task_options::get_scheduler 21188->21189 21190 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21189->21190 21191 6cdc1482 21190->21191 21191->21176 21193 6cdc14e1 std::_Container_base12::~_Container_base12 shared_ptr 21192->21193 21194 6cdc11c9 21193->21194 21196 6cdc1930 21193->21196 21194->21181 21197 6cdc1941 construct collate std::_Mutex_base::~_Mutex_base 21196->21197 21198 6cdc1e80 shared_ptr 11 API calls 21197->21198 21199 6cdc196d 21198->21199 21199->21193 21201 6cdc14b0 shared_ptr 11 API calls 21200->21201 21202 6cdc169e 21201->21202 21203 6cdc17c0 21202->21203 21206 6cdc18e0 21203->21206 21207 6cdc190e shared_ptr 21206->21207 21208 6cdc1b10 shared_ptr 11 API calls 21207->21208 21209 6cdc1116 21208->21209 21209->21143 21211 6cdce4e2 21210->21211 21211->21146 21215 6cdc50c0 21212->21215 21216 6cdc50ff 21215->21216 21217 6cdc510b 21215->21217 21233 6cdc5660 21216->21233 21219 6cdc512b 21217->21219 21220 6cdc5114 CloseHandle 21217->21220 21221 6cdc514b 21219->21221 21222 6cdc5134 CloseHandle 21219->21222 21220->21219 21223 6cdc5b20 27 API calls 21221->21223 21222->21221 21224 6cdc515b 21223->21224 21225 6cdc5b20 27 API calls 21224->21225 21226 6cdc516b 21225->21226 21238 6cdc4030 21226->21238 21228 6cdc5176 21229 6cdc4030 11 API calls 21228->21229 21230 6cdc5181 21229->21230 21231 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21230->21231 21232 6cdc5196 21231->21232 21232->21149 21234 6cdc569b 21233->21234 21236 6cdc5690 21233->21236 21234->21217 21235 6cdc56ad WaitForSingleObject 21235->21236 21237 6cdc56c8 CloseHandle 21235->21237 21236->21234 21236->21235 21237->21234 21241 6cdc4330 21238->21241 21240 6cdc405e 21240->21228 21242 6cdc4341 construct Concurrency::details::ContextBase::GetWorkQueueIdentity collate std::_Mutex_base::~_Mutex_base 21241->21242 21243 6cdc439d 21242->21243 21244 6cdc47f0 allocator 11 API calls 21242->21244 21243->21240 21244->21243 21250 6cdd56e0 21245->21250 21258 6cdd5900 21250->21258 21252 6cdd49d2 21253 6cdd5740 21252->21253 21262 6cdd59e0 21253->21262 21259 6cdd590f Concurrency::details::ContextBase::GetWorkQueueIdentity std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 shared_ptr 21258->21259 21260 6cdc9400 std::_Container_base12::~_Container_base12 11 API calls 21259->21260 21261 6cdd595d std::_Container_base12::~_Container_base12 shared_ptr 21259->21261 21260->21261 21261->21252 21268 6cdd5eb0 21262->21268 21265 6cdd58c0 21272 6cdd5990 21265->21272 21269 6cdd5ee1 std::_Container_base12::~_Container_base12 shared_ptr 21268->21269 21270 6cdd576e 21269->21270 21271 6cdd65b0 _DebugHeapAllocator 11 API calls 21269->21271 21270->21265 21271->21269 21273 6cdd59be shared_ptr 21272->21273 21274 6cdd5e80 _DebugHeapAllocator 11 API calls 21273->21274 21275 6cdd49af 21274->21275 21275->21130 21281 6cdc9000 21276->21281 21282 6cdc901b construct collate std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 _SyncOriginator 21281->21282 21283 6cdc90b6 std::_Container_base12::~_Container_base12 21282->21283 21285 6cdc9400 std::_Container_base12::~_Container_base12 11 API calls 21282->21285 21284 6cdc90e1 std::_Container_base12::~_Container_base12 21283->21284 21286 6cdc9400 std::_Container_base12::~_Container_base12 11 API calls 21283->21286 21287 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21284->21287 21285->21282 21286->21284 21288 6cdc8f9e 21287->21288 21289 6cdc8fc0 21288->21289 21292 6cdc9480 21289->21292 21293 6cdc949b Concurrency::details::ContextBase::GetWorkQueueIdentity collate std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 shared_ptr 21292->21293 21298 6cdc9b60 21293->21298 21295 6cdc94d7 shared_ptr 21296 6cde2103 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 21295->21296 21297 6cdc89df 21296->21297 21297->20149 21301 6cdc9d70 21298->21301 21302 6cdc1fd0 _Deallocate 11 API calls 21301->21302 21303 6cdc9b72 21302->21303 21303->21295

    Control-flow Graph

    APIs
    • GetCommandLineW.KERNEL32(00000000), ref: 6CDDA742
    • CommandLineToArgvW.SHELL32(00000000), ref: 6CDDA749
      • Part of subcall function 6CDDA450: SetUnhandledExceptionFilter.KERNEL32(6CDDA940,EBE653FE), ref: 6CDDA480
    • ExitProcess.KERNEL32 ref: 6CDDA764
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CommandLine$ArgvExceptionExitFilterProcessUnhandled
    • String ID:
    • API String ID: 3999336801-0
    • Opcode ID: 966a434d503bcdb4d0a79381f6d6ebba43f28f1bfa453ef1bc6e8f1de02ea438
    • Instruction ID: af8e29981ce91b6bdfdcd28ae2e6341279a0acfbdecf35a61808c1686a8c03a7
    • Opcode Fuzzy Hash: 966a434d503bcdb4d0a79381f6d6ebba43f28f1bfa453ef1bc6e8f1de02ea438
    • Instruction Fuzzy Hash: 21E0C9B5E00208BBDB00DFE5D849B8EBBFCAB49305F408059E614D3240D73466058FA5

    Control-flow Graph

    APIs
      • Part of subcall function 6CDE994C: RtlAllocateHeap.NTDLL(00000008,?,6CDDA587,?,6CDE98A2,00000001,00000364,FFFFFFFF,000000FF,?,6CDDA587,?,6CDE7998,6CDEA642), ref: 6CDE998D
    • _free.LIBCMT ref: 6CDEE104
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: AllocateHeap_free
    • String ID:
    • API String ID: 614378929-0
    • Opcode ID: a7018ca1b7dab01fa89ae2cc2327009ac45932cccc635d3d6545fe49a90cdd94
    • Instruction ID: f5a01060069596db4a8a8165446458d5dca5e9d4291f3b1860820b7022dc2f16
    • Opcode Fuzzy Hash: a7018ca1b7dab01fa89ae2cc2327009ac45932cccc635d3d6545fe49a90cdd94
    • Instruction Fuzzy Hash: A501F972204305ABE321CF69DC8599AFBE9FB89374F25061DE59483AC0EB30A945C7B4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 16 6cde994c-6cde9957 17 6cde9959-6cde9963 16->17 18 6cde9965-6cde996b 16->18 17->18 19 6cde9999-6cde99a4 call 6cde7993 17->19 20 6cde996d-6cde996e 18->20 21 6cde9984-6cde9995 RtlAllocateHeap 18->21 25 6cde99a6-6cde99a8 19->25 20->21 22 6cde9997 21->22 23 6cde9970-6cde9977 call 6cded507 21->23 22->25 23->19 29 6cde9979-6cde9982 call 6cde8444 23->29 29->19 29->21
    APIs
    • RtlAllocateHeap.NTDLL(00000008,?,6CDDA587,?,6CDE98A2,00000001,00000364,FFFFFFFF,000000FF,?,6CDDA587,?,6CDE7998,6CDEA642), ref: 6CDE998D
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: AllocateHeap
    • String ID:
    • API String ID: 1279760036-0
    • Opcode ID: 57206669541daca6991e3f557c9b072927fd4bd6a81eced77e88ca5725aa5e60
    • Instruction ID: d5d5f5474d16e3986afc4b13ee4029a3a83d8c9e91a4a1f933435695b14f5b6b
    • Opcode Fuzzy Hash: 57206669541daca6991e3f557c9b072927fd4bd6a81eced77e88ca5725aa5e60
    • Instruction Fuzzy Hash: E5F0E931607625A6EB110B269C04BDE3759EF8E774B156116E81CEAAB0CB20D400C6F1
    APIs
    • lstrlenW.KERNEL32(?), ref: 6CDC3120
    • lstrcatW.KERNEL32(?,?), ref: 6CDC3157
    • lstrlenW.KERNEL32(?), ref: 6CDC3164
    • lstrcpyW.KERNEL32(?,*.*), ref: 6CDC31D4
    • FindFirstFileW.KERNEL32(?,?), ref: 6CDC31E8
    • lstrcmpW.KERNEL32(?,6CDFBA58), ref: 6CDC3220
    • lstrcmpW.KERNEL32(?,6CDFBA5C), ref: 6CDC323D
    • lstrcatW.KERNEL32(?,?), ref: 6CDC326C
    • lstrcatW.KERNEL32(?,?), ref: 6CDC32C3
    • FindNextFileW.KERNEL32(000000FF,?), ref: 6CDC3376
    • FindClose.KERNEL32(000000FF), ref: 6CDC338B
    • GetFileAttributesW.KERNEL32(?), ref: 6CDC33AA
    • SetFileAttributesW.KERNEL32(?,00000090), ref: 6CDC33BF
    • RemoveDirectoryW.KERNEL32(?), ref: 6CDC33C9
    • GetLastError.KERNEL32 ref: 6CDC33D3
    • SetFileAttributesW.KERNEL32(?,00000000), ref: 6CDC33E9
    • GetLastError.KERNEL32 ref: 6CDC33F8
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: File$AttributesFindlstrcat$ErrorLastlstrcmplstrlen$CloseDirectoryFirstNextRemovelstrcpy
    • String ID: *.*
    • API String ID: 270640561-438819550
    • Opcode ID: 0d77bc36600086101a088d4dc78554990d4d1a4dca69f05d5ab0d5f0fdbb6896
    • Instruction ID: da022de1fc3de8ff29452108978eb18463e2996818b8d0eec0da2ee2ccaf93d5
    • Opcode Fuzzy Hash: 0d77bc36600086101a088d4dc78554990d4d1a4dca69f05d5ab0d5f0fdbb6896
    • Instruction Fuzzy Hash: 119181B4604218DBDB10CF64C844FEEB77ABF89308F1082D9E92997650DB369EA5CF51
    APIs
    • LoadLibraryA.KERNEL32(00000000), ref: 6CDCD026
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6CDCD0E1
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6CDCD187
      • Part of subcall function 6CDE2278: ___report_securityfailure.LIBCMT ref: 6CDE227D
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6CDCD2B8
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6CDCD36C
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6CDCD4D5
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: AddressProc$LibraryLoad___report_securityfailure
    • String ID: @$@$@@@$@@@@$@@@@@$@@@@@@$p
    • API String ID: 1632341849-4092788838
    • Opcode ID: e26611c22b354305a7b30c3fbc6d4136173b5dd937654292d6a0f5e0ca89d273
    • Instruction ID: 8df59eb4067628834a2bf19e9e7caaeb9651f0b94531a3b5719770541013f8a9
    • Opcode Fuzzy Hash: e26611c22b354305a7b30c3fbc6d4136173b5dd937654292d6a0f5e0ca89d273
    • Instruction Fuzzy Hash: 8802A370A092C98AFB18CFACD2183DDBEA69B91304F28407DC5498F7D5D7FA6A45C361
    APIs
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 6CDC5F68
    • GetStartupInfoA.KERNEL32(00000044), ref: 6CDC5F9D
    • lstrcatA.KERNEL32(?,cmd.exe /c ), ref: 6CDC5FF0
    • lstrcatA.KERNEL32(?,?), ref: 6CDC6001
    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,?), ref: 6CDC602A
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Createlstrcat$InfoPipeProcessStartup
    • String ID: D$cmd.exe /c
    • API String ID: 2132647166-3768262801
    • Opcode ID: 838439182e4ae7c472be70e0ef6698683efa2fcba7fd13d294841983c55282c0
    • Instruction ID: 3b321c0fc0256f3af4f2d1a6df455fd892f743c3d05ceec0f562303566542bb7
    • Opcode Fuzzy Hash: 838439182e4ae7c472be70e0ef6698683efa2fcba7fd13d294841983c55282c0
    • Instruction Fuzzy Hash: B3D14BB4A04218DBDB24CF24C854BEDBBB9AF49308F0082D8E95D9B390D7759AC5CF91
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: *.*$count : %d
    • API String ID: 0-284877241
    • Opcode ID: 00be15ce84df67415605dac2f8227f4e1bad6f9313a337325ac852bb832ff36b
    • Instruction ID: b22fc094cd1f147ef3a8f9fbb20af564fa6b606a35d78df5be4bf1da83c60b97
    • Opcode Fuzzy Hash: 00be15ce84df67415605dac2f8227f4e1bad6f9313a337325ac852bb832ff36b
    • Instruction Fuzzy Hash: 564214B0A402298FCB24CB14CC90BDEB7B9BF89318F1041D9D649A7391DB749E85CF5A
    APIs
    • GdiplusStartup.GDIPLUS(?,?,00000000,EBE653FE), ref: 6CDCB90D
    • GlobalAlloc.KERNEL32(00000000,?), ref: 6CDCB919
    • CreateStreamOnHGlobal.OLE32(?,00000000,?), ref: 6CDCB94C
      • Part of subcall function 6CDCA2D0: GdipLoadImageFromStreamICM.GDIPLUS(?,-00000004), ref: 6CDCA2FB
    • GdiplusShutdown.GDIPLUS(?,00000010), ref: 6CDCC255
      • Part of subcall function 6CDCA4A0: GdipGetImageHeight.GDIPLUS(?,00000000), ref: 6CDCA4C5
      • Part of subcall function 6CDCA450: GdipGetImageWidth.GDIPLUS(?,00000000), ref: 6CDCA475
      • Part of subcall function 6CDCA050: GdipCreateMatrix.GDIPLUS(00000000), ref: 6CDCA06E
      • Part of subcall function 6CDCA0C0: GdipTranslateMatrix.GDIPLUS(?,?,?,?), ref: 6CDCA0E7
      • Part of subcall function 6CDCA180: GdipGetImageGraphicsContext.GDIPLUS(?,00000000), ref: 6CDCA1AB
    • __dtol3.LIBCMT ref: 6CDCBEC5
    • __dtol3.LIBCMT ref: 6CDCBED3
      • Part of subcall function 6CDCA570: GdipCreateBitmapFromGraphics.GDIPLUS(?,?,?,00000000,?,?,?,6CDF5118,000000FF), ref: 6CDCA5CC
      • Part of subcall function 6CDCA200: GdipSetWorldTransform.GDIPLUS(?), ref: 6CDCA213
      • Part of subcall function 6CDCA100: GdipTransformMatrixPoints.GDIPLUS(?,?,?), ref: 6CDCA115
    • GlobalFree.KERNEL32(?), ref: 6CDCC20C
      • Part of subcall function 6CDCC590: StgCreateDocfile.OLE32(00000000,00001012,00000000,00000000,EBE653FE), ref: 6CDCC5DD
      • Part of subcall function 6CDCC590: GetLastError.KERNEL32 ref: 6CDCC6A2
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Gdip$CreateImage$GlobalMatrix$FromGdiplusGraphicsStreamTransform__dtol3$AllocBitmapContextDocfileErrorFreeHeightLastLoadPointsShutdownStartupTranslateWidthWorld
    • String ID:
    • API String ID: 117386901-0
    • Opcode ID: eb9897694fad3ba90f8c4aff4282a5cbdac5c2c25b1a5995c080c19364a74708
    • Instruction ID: 8138fd37da657aab0a3c8ba001eddc4e7eac1bf162ea19fdf1462ae7ad308ece
    • Opcode Fuzzy Hash: eb9897694fad3ba90f8c4aff4282a5cbdac5c2c25b1a5995c080c19364a74708
    • Instruction Fuzzy Hash: 1C520731D0062CDACB66CB66C891BDDF379BF59340F048689E549772A1EB306AC8DF61
    APIs
    • CreateNamedPipeA.KERNEL32(00000000,40000000,00000000,00000001,00000400,00000400,00000000,00000000), ref: 6CDC7FF7
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 6CDC8016
    • ConnectNamedPipe.KERNEL32(000000FF,?), ref: 6CDC8058
    • GetLastError.KERNEL32 ref: 6CDC8062
      • Part of subcall function 6CDC7F60: CloseHandle.KERNEL32(6CDCDA21,00002710,?,6CDC7E40,00002508,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC7F7D
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CreateNamedPipe$CloseConnectErrorEventHandleLast
    • String ID:
    • API String ID: 2388497103-0
    • Opcode ID: f08f78aa82f98f89bb59f9bb9c5bedbc52ff7108b0ae736b824a4c1e4bff9f9f
    • Instruction ID: 4320c7148b2f44c1593bd5a5c2ae0f6ee4de20985744b2b7455416240145c769
    • Opcode Fuzzy Hash: f08f78aa82f98f89bb59f9bb9c5bedbc52ff7108b0ae736b824a4c1e4bff9f9f
    • Instruction Fuzzy Hash: FE411AB0E00208EBDB04CFA5D881FDDBBB9BF49324F20465AE625B76D0D7716A40CB61
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Findlstrlen$CloseErrorFileFirstLastlstrcat
    • String ID:
    • API String ID: 2856486079-0
    • Opcode ID: 7b2f56460a4bf72c04840bf44a73fab7d9a619830ff055a5822925d6167fa991
    • Instruction ID: 7018caa8f072ff3aa1a737d9a06472928d872020818de670d43798177d6f418f
    • Opcode Fuzzy Hash: 7b2f56460a4bf72c04840bf44a73fab7d9a619830ff055a5822925d6167fa991
    • Instruction Fuzzy Hash: D041D5B4A04318CBCF20CF64D898BAD77B9EF46308F1082D9EA5997691DB359E80CF55
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000), ref: 6CDC66EE
    • Process32First.KERNEL32(?,00000128), ref: 6CDC6708
    • CloseHandle.KERNEL32(?), ref: 6CDC676C
      • Part of subcall function 6CDC67B0: OpenProcess.KERNEL32(001FFFFF,00000000,FFFFFFFF), ref: 6CDC67CC
      • Part of subcall function 6CDC67B0: TerminateProcess.KERNEL32(00000000,00000000), ref: 6CDC67E1
    • CloseHandle.KERNEL32(?), ref: 6CDC673A
    • Process32Next.KERNEL32(?,00000128), ref: 6CDC6784
    • CloseHandle.KERNEL32(?), ref: 6CDC6795
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CloseHandle$ProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
    • String ID:
    • API String ID: 3051378104-0
    • Opcode ID: 37df7bc309c2354e0e9861e862bc31e798399d362e16d8066d7e1abbe5c92a4e
    • Instruction ID: 9b0ce89c2dd342c56ae9299c00b222b47675fe9654d52c92db99388f9cc51ebe
    • Opcode Fuzzy Hash: 37df7bc309c2354e0e9861e862bc31e798399d362e16d8066d7e1abbe5c92a4e
    • Instruction Fuzzy Hash: 34218DB4B00218ABDF10EF60DD44BED77B9AF49304F0045C8E649DBA81DA34AA66CF61
    APIs
      • Part of subcall function 6CDC1130: Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6CDC1169
    • GetLogicalDriveStringsW.KERNEL32(00000100,?), ref: 6CDC1246
    • GetDriveTypeW.KERNEL32(?), ref: 6CDC12BB
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 6CDC1307
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Drive$Affinity::operator!=Concurrency::details::DiskFreeHardwareLogicalSpaceStringsType
    • String ID:
    • API String ID: 1757737928-0
    • Opcode ID: 637585f1727e9a1d58f5e77aff46f14c61651521987d62e80f5a2e467591a075
    • Instruction ID: 13cc4238841ca9cccc0f66dfda4ff7f36e0834d42ecca960a7f230cd68674846
    • Opcode Fuzzy Hash: 637585f1727e9a1d58f5e77aff46f14c61651521987d62e80f5a2e467591a075
    • Instruction Fuzzy Hash: DC51F574E012299BCB24DFA4D988B99B7B5BF5C304F1082D9D509A7351E734AEC4CF51
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 6CDE596C
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6CDE5976
    • UnhandledExceptionFilter.KERNEL32(?), ref: 6CDE5983
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$DebuggerPresent
    • String ID:
    • API String ID: 3906539128-0
    • Opcode ID: 30b9b90899bcf074f2d28bfce22b56b3b2d1468db43553ffb7401f17407b6404
    • Instruction ID: 0dd0345dd168c231ba05634282e3614b8685ab7d10c32f281bfee0d87cdbc46c
    • Opcode Fuzzy Hash: 30b9b90899bcf074f2d28bfce22b56b3b2d1468db43553ffb7401f17407b6404
    • Instruction Fuzzy Hash: 7931D4749012299BCB21DF64D9897CDBBB8BF08314F5041EAE91CA7260E7709B858F55
    APIs
    • GetCurrentProcess.KERNEL32(?,?,6CDE8898,?,?,?,?,?,6CDE7D32), ref: 6CDE88BB
    • TerminateProcess.KERNEL32(00000000,?,6CDE8898,?,?,?,?,?,6CDE7D32), ref: 6CDE88C2
    • ExitProcess.KERNEL32 ref: 6CDE88D4
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Process$CurrentExitTerminate
    • String ID:
    • API String ID: 1703294689-0
    • Opcode ID: b6fb774022b638a6bd638c53dee2e106fdc2b5b0a04207613fd797ef6d05d753
    • Instruction ID: 60628f365ddd03b5c0b418c337ef2d8c0ddb267da1240636a75f92eaf984547d
    • Opcode Fuzzy Hash: b6fb774022b638a6bd638c53dee2e106fdc2b5b0a04207613fd797ef6d05d753
    • Instruction Fuzzy Hash: D3E04631140508ABCF012F28EC48A8C3F3DFB0A346F214416FA15D6A31CB35E982CB51
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e768423e87e0488d155602b3877f3a4d4812ba10f35847b57dd0dd41e3f8bf3b
    • Instruction ID: e9a6b041fccba66fdda991c657c8ae16828474d50c967e3b4848131431816c6f
    • Opcode Fuzzy Hash: e768423e87e0488d155602b3877f3a4d4812ba10f35847b57dd0dd41e3f8bf3b
    • Instruction Fuzzy Hash: 28025E71E01219DFDF14CFA9D88069EBBF1FF88314F258269D819A7B94D730AA01CB90
    APIs
    • FindFirstFileExW.KERNEL32(00000140,?,00000140,00000000,?,?,?,?,?,?,00000000,00000140), ref: 6CDF0C4E
    • _free.LIBCMT ref: 6CDF0C5F
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: FileFindFirst_free
    • String ID:
    • API String ID: 689657435-0
    • Opcode ID: cec34a41670aa4116604e4a38f6a388ac0002c8328b46fcf64d2a0d13c735442
    • Instruction ID: 99a4ffb6b5de7a294de3a84b2b946e133fc8b9cea3c3f096fd50e8cd32ec1e05
    • Opcode Fuzzy Hash: cec34a41670aa4116604e4a38f6a388ac0002c8328b46fcf64d2a0d13c735442
    • Instruction Fuzzy Hash: DD01FB71C01159AFCF119FA89D05AEEBFB9FB09294F104165EA28E3260E7318A61DB91
    APIs
    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6CDF38CF,?,?,00000008,?,?,6CDF3563,00000000), ref: 6CDF3B01
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: ExceptionRaise
    • String ID:
    • API String ID: 3997070919-0
    • Opcode ID: 5ea8a0b664eee8baaea155728f0c4e93d8ccd50d6906ef061d111a90d6362d0b
    • Instruction ID: cf3e310a786c503b26c291d7e471c7d134b97aa7766b86d788e1e7b7d5a5d856
    • Opcode Fuzzy Hash: 5ea8a0b664eee8baaea155728f0c4e93d8ccd50d6906ef061d111a90d6362d0b
    • Instruction Fuzzy Hash: 37B13831611608DFD705CF28C496B657BA0FF05368F268658E8E9CF6B1C335E992CB41
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(6CDDA940,EBE653FE), ref: 6CDDA480
      • Part of subcall function 6CDDA420: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,6CDDA512,00000000,00000000,?,6CDDA512,?,?,00000100), ref: 6CDDA439
      • Part of subcall function 6CDCD8A0: InitializeCriticalSection.KERNEL32(-00014F25,?,?,?,?,EBE653FE,?,?,?,?,?,00000000,6CDF525F,000000FF,?,6CDDA61B), ref: 6CDCD963
      • Part of subcall function 6CDCD8A0: InitializeCriticalSection.KERNEL32(-00014F3D,?,?,EBE653FE,?,?,?,?,?,00000000,6CDF525F,000000FF,?,6CDDA61B), ref: 6CDCD973
      • Part of subcall function 6CDCD8A0: InitializeCriticalSection.KERNEL32(-00014F55,?,?,EBE653FE,?,?,?,?,?,00000000,6CDF525F,000000FF,?,6CDDA61B), ref: 6CDCD982
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalInitializeSection$ByteCharExceptionFilterMultiUnhandledWide
    • String ID:
    • API String ID: 1854652003-0
    • Opcode ID: ccccaf0f22b7675cb15fd390c45e2f435d20f9e97eefb47feadb508cb57b9aeb
    • Instruction ID: c111640db029fca378eb7022d81f521c02d2068aa300badafe6856fc7817050a
    • Opcode Fuzzy Hash: ccccaf0f22b7675cb15fd390c45e2f435d20f9e97eefb47feadb508cb57b9aeb
    • Instruction Fuzzy Hash: CC516FB1E002189BDB14DF64CC41BDDB7B8AB48308F4085EDE60867791DBB46B88CFA5
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID: 0-3916222277
    • Opcode ID: 6733b8c9c7a77bf5c2b396d0c5ee1ffcc4a3b0c4165d0667381d1402247bad94
    • Instruction ID: e3fb4aea0688e4d250e62945953d433b604d7c381ff079c03251d234c92cde48
    • Opcode Fuzzy Hash: 6733b8c9c7a77bf5c2b396d0c5ee1ffcc4a3b0c4165d0667381d1402247bad94
    • Instruction Fuzzy Hash: 3B0280B1A00209DFDB18DF5CC551A6DB7B2FF84344F6182BCD612AB785D634AB12EB84
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID: 0-3916222277
    • Opcode ID: 4f34cfa1c1386cb9cd492dc50e0acebe2c933d552dbdfac325c79aebe2ae507d
    • Instruction ID: 222ee886cd95b54f99e1acdc30be4fc45f17c48c540465790464d6ca869570fc
    • Opcode Fuzzy Hash: 4f34cfa1c1386cb9cd492dc50e0acebe2c933d552dbdfac325c79aebe2ae507d
    • Instruction Fuzzy Hash: EBF16D71900219DFEB18DF5CC541BADB7B2FF84344F6182B9D612AB785C634AB12EB84
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 0602973c8348926d14db4c4d52be7a6099397672f203efc74e5928c6cbd81c24
    • Instruction ID: a498df954f7df05b505060c9ac8c29e7f20db21e122b254f76ba39bb8e6fb4f8
    • Opcode Fuzzy Hash: 0602973c8348926d14db4c4d52be7a6099397672f203efc74e5928c6cbd81c24
    • Instruction Fuzzy Hash: B8518D60605A4CEADB208B68C8527AE37E59F0EB0CF94461DD791CBEF1D715E9478322
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 190da6d08d3742a4bc67a58751aadbb8d6133a82a09750eceb8583532665fccc
    • Instruction ID: ff06a9ff66b9c3fa1c1da9d60eabc22a68703a8e86f357fe36563a18341a7bf1
    • Opcode Fuzzy Hash: 190da6d08d3742a4bc67a58751aadbb8d6133a82a09750eceb8583532665fccc
    • Instruction Fuzzy Hash: A0518B70645A4CD6DB10AB2888607FF3BEADB1E30CF240619D795CBFB1D611DA0B8366
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: HeapProcess
    • String ID:
    • API String ID: 54951025-0
    • Opcode ID: c38ab069228f69a84ec9083003953a565755d72603e57629f5805ae0dc5d412e
    • Instruction ID: 62c22c7bfd51528a3a12d74212d2be8a94e8412a367a9ce203f0524201f5ec5c
    • Opcode Fuzzy Hash: c38ab069228f69a84ec9083003953a565755d72603e57629f5805ae0dc5d412e
    • Instruction Fuzzy Hash: ADA02230300202CFAF008F30A30830C3AFCBB832CB300802FA228C2002EB30C0308B80
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e3fdef121e712e85f8aca1e58f09848c50b3d34f4ea610ed7c79a969d03c2c6a
    • Instruction ID: 37675a6117765e3f2b43d40d74a26758740a5717f6b22012d4174bdc15b144cc
    • Opcode Fuzzy Hash: e3fdef121e712e85f8aca1e58f09848c50b3d34f4ea610ed7c79a969d03c2c6a
    • Instruction Fuzzy Hash: 17815D71600249AFDB08DF29C891BAA3BA2FF89354F10C16DFD298F695D234E651DF84
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7623a9441ac869241e450a9134a09c6abc2b9583dd523e29ca60dd7655be095c
    • Instruction ID: f1d7206fef55be965ab1a4344f6dcd93f7abd43273d994795f9b833b8f383e06
    • Opcode Fuzzy Hash: 7623a9441ac869241e450a9134a09c6abc2b9583dd523e29ca60dd7655be095c
    • Instruction Fuzzy Hash: 49512970110249AFDB08DF2DC491AA97BA2FF85394F14C16EFE298F685C238E651DF84
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5aaf34044b757032f7c8f5584b7b3528ae721adfc6b52e0a391e92367490ca29
    • Instruction ID: 347ef642304e59c212c193d2b2505166489e863c4fa4f055cf1c33bee83dedc7
    • Opcode Fuzzy Hash: 5aaf34044b757032f7c8f5584b7b3528ae721adfc6b52e0a391e92367490ca29
    • Instruction Fuzzy Hash: 2E21A473F20538477B0CC47E8C56279B6E1C78C501745427AE8A6DA2C1D968D927E2E4
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 312c2737cabb85fc57b4bcbe01e7f3393355f9094cc98c53bf1aee16ee81ced4
    • Instruction ID: 0581084866548f13769b5b891d88fef638b00d8b4858b38fcc4058238380f46d
    • Opcode Fuzzy Hash: 312c2737cabb85fc57b4bcbe01e7f3393355f9094cc98c53bf1aee16ee81ced4
    • Instruction Fuzzy Hash: D6118223F30C295B275C816D8C1727AA2D2EBDC25030F533AE866EB284E954DE239290
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2357ccda04ebdad8f9ed0823f690bbb3a9e885cd6e0b45a8cc48df8e37af03f3
    • Instruction ID: ea776b81210e7b9b0124b734c972071d6735c3f9f509ebcee86b5a7d2607f5d9
    • Opcode Fuzzy Hash: 2357ccda04ebdad8f9ed0823f690bbb3a9e885cd6e0b45a8cc48df8e37af03f3
    • Instruction Fuzzy Hash: 6FE04F32912328EBC711DB8885409D9B3ACE709A10B1105D6F505D3611C270AE00C7D4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 235 6cdd9d70-6cdd9d76 236 6cdd9d7a-6cdd9d81 235->236 237 6cdda0fd 236->237 238 6cdd9d87-6cdd9d8e 236->238 240 6cdda0ff-6cdda102 237->240 239 6cdd9d95-6cdd9da5 call 6cdc8f10 238->239 243 6cdd9dab-6cdd9e07 EnterCriticalSection call 6cdc8ef0 call 6cdc8eb0 GetTickCount call 6cdc8700 239->243 244 6cdd9e71-6cdd9e7e call 6cdc8f10 239->244 264 6cdd9e3c-6cdd9e6c LeaveCriticalSection call 6cdc2860 GetTickCount 243->264 265 6cdd9e09-6cdd9e37 LeaveCriticalSection call 6cdc2860 call 6cdd9b30 243->265 250 6cdd9e84-6cdd9e9f EnterCriticalSection 244->250 251 6cdd9f87-6cdd9f8d 244->251 252 6cdd9ee1-6cdd9f25 call 6cdc8ef0 call 6cdc8eb0 GetTickCount call 6cdc8700 250->252 253 6cdd9ea1-6cdd9eb5 WaitForSingleObject 250->253 255 6cdd9f8f 251->255 256 6cdd9f94-6cdd9fa4 call 6cdc8f10 251->256 285 6cdd9f5a-6cdd9f82 LeaveCriticalSection call 6cdc2860 252->285 286 6cdd9f27-6cdd9f55 LeaveCriticalSection call 6cdc2860 call 6cdd9b30 252->286 253->252 257 6cdd9eb7-6cdd9edc ResetEvent LeaveCriticalSection 253->257 255->236 267 6cdd9faa-6cdd9fc5 EnterCriticalSection 256->267 268 6cdda0f0-6cdda0f8 Sleep 256->268 257->251 264->239 265->240 271 6cdd9fc7-6cdd9fdb WaitForSingleObject 267->271 272 6cdda003-6cdda00d 267->272 268->236 271->272 276 6cdd9fdd-6cdd9ffe ResetEvent LeaveCriticalSection 271->276 277 6cdda00f-6cdda023 WaitForSingleObject 272->277 278 6cdda04b-6cdda095 call 6cdc8ef0 call 6cdc8eb0 GetTickCount call 6cdc8700 272->278 276->268 277->278 282 6cdda025-6cdda046 ResetEvent LeaveCriticalSection 277->282 298 6cdda0c7-6cdda0eb LeaveCriticalSection call 6cdc2860 278->298 299 6cdda097-6cdda0c5 LeaveCriticalSection call 6cdc2860 call 6cdd9b30 278->299 282->268 285->244 286->240 298->256 299->240
    APIs
    • EnterCriticalSection.KERNEL32(-00000090), ref: 6CDD9DB8
    • GetTickCount.KERNEL32 ref: 6CDD9DDF
    • LeaveCriticalSection.KERNEL32(-00000090,-00000004), ref: 6CDD9E16
    • LeaveCriticalSection.KERNEL32(-00000090,-00000004), ref: 6CDD9E49
    • GetTickCount.KERNEL32 ref: 6CDD9E66
    • EnterCriticalSection.KERNEL32(-000000A8), ref: 6CDD9E8F
    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 6CDD9EAD
    • ResetEvent.KERNEL32(?), ref: 6CDD9EC5
    • LeaveCriticalSection.KERNEL32(-000000A8), ref: 6CDD9ED6
    • GetTickCount.KERNEL32 ref: 6CDD9EFC
    • LeaveCriticalSection.KERNEL32(-000000A8,-00000004,00000000), ref: 6CDD9F34
    • LeaveCriticalSection.KERNEL32(-000000A8,-00000004,00000000), ref: 6CDD9F65
    • EnterCriticalSection.KERNEL32(-000000C0), ref: 6CDD9FB5
    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 6CDD9FD3
    • ResetEvent.KERNEL32(?), ref: 6CDD9FE7
    • LeaveCriticalSection.KERNEL32(-000000C0), ref: 6CDD9FF8
    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 6CDDA01B
    • ResetEvent.KERNEL32(?), ref: 6CDDA02F
    • LeaveCriticalSection.KERNEL32(-000000C0), ref: 6CDDA040
    • GetTickCount.KERNEL32 ref: 6CDDA06C
    • LeaveCriticalSection.KERNEL32(-000000C0,-00000004,00000000), ref: 6CDDA0A4
    • LeaveCriticalSection.KERNEL32(-000000C0,-00000004,00000000), ref: 6CDDA0D2
    • Sleep.KERNEL32(0000000A), ref: 6CDDA0F2
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Leave$CountTick$EnterEventObjectResetSingleWait$Sleep
    • String ID:
    • API String ID: 22041548-0
    • Opcode ID: 5372543f279e06e60563c1d8d97e476ab4f1d1ebd1ae57cc02df7f348e169b86
    • Instruction ID: 541293147d03debad2d29c3fa0a50d0b2a12773015879e94bb7a4b06781fc11b
    • Opcode Fuzzy Hash: 5372543f279e06e60563c1d8d97e476ab4f1d1ebd1ae57cc02df7f348e169b86
    • Instruction Fuzzy Hash: 1FA18DB4B40204EFEB04DB68D998B6E7B79FF8630CF108119E5029B791DB36E455CBA1

    Control-flow Graph

    APIs
    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 6CDCC328
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 6CDCC337
    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 6CDCC345
    • DeleteDC.GDI32(00000000), ref: 6CDCC355
    • GetObjectA.GDI32(?,00000018,?), ref: 6CDCC3A1
    • GlobalAlloc.KERNEL32(00000042,00000028), ref: 6CDCC42D
    • GlobalLock.KERNEL32(00000000), ref: 6CDCC43A
    • GetStockObject.GDI32(0000000F), ref: 6CDCC452
    • GetDC.USER32(00000000), ref: 6CDCC463
    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 6CDCC476
    • RealizePalette.GDI32(00000000), ref: 6CDCC483
    • GetDIBits.GDI32(00000000,?,00000000,?,00000028,00000000,00000000), ref: 6CDCC4A8
    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 6CDCC4BE
    • RealizePalette.GDI32(00000000), ref: 6CDCC4C8
    • ReleaseDC.USER32(00000000,00000000), ref: 6CDCC4D4
    • GlobalUnlock.KERNEL32(00000000), ref: 6CDCC560
    • GlobalFree.KERNEL32(00000000), ref: 6CDCC56A
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: GlobalPalette$CapsDeviceObjectRealizeSelect$AllocBitsCreateDeleteFreeLockReleaseStockUnlock
    • String ID: ($DISPLAY
    • API String ID: 2569495461-216271742
    • Opcode ID: a2780b55b0967e9ad717de92a10b6c6a6cd00460d55c13b33b459266880e7ca9
    • Instruction ID: 787d01638777dd8b72b537169d9a11e1a16f6815f76e7a930099747149fa1569
    • Opcode Fuzzy Hash: a2780b55b0967e9ad717de92a10b6c6a6cd00460d55c13b33b459266880e7ca9
    • Instruction Fuzzy Hash: 17A1F4B5E00208DBEB14CFE4D844B9EBBB9FF89304F208129E619AB394D7759945CF54
    APIs
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 6CDC70A7
    • GetLastError.KERNEL32 ref: 6CDC70BC
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 6CDC7109
    • GetLastError.KERNEL32 ref: 6CDC711E
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CreateErrorLastPipe
    • String ID: $
    • API String ID: 269057482-227171996
    • Opcode ID: a51509cdcd6c489f86354b7bd775885f4577445af34942864efe998ea691a228
    • Instruction ID: 60f443fc48f8899da423918ea0b6ddfea95038dc511ca50115af362350c1695d
    • Opcode Fuzzy Hash: a51509cdcd6c489f86354b7bd775885f4577445af34942864efe998ea691a228
    • Instruction Fuzzy Hash: B4B18CB0B002189BEB24CF64C95579EBBB9EF49304F1040BDD60D9B791DB795A84CF29
    APIs
    • GetObjectA.GDI32(?,00000018,?), ref: 6CDCCD7B
    • GlobalAlloc.KERNEL32(00000042,00000028), ref: 6CDCCDF9
    • GlobalLock.KERNEL32(00000000), ref: 6CDCCE06
    • GetStockObject.GDI32(0000000F), ref: 6CDCCE1E
    • GetDC.USER32(00000000), ref: 6CDCCE2F
    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 6CDCCE42
    • RealizePalette.GDI32(00000000), ref: 6CDCCE4F
    • GetDIBits.GDI32(00000000,?,00000000,?,00000028,00000000,00000000), ref: 6CDCCE74
    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 6CDCCE8A
    • RealizePalette.GDI32(00000000), ref: 6CDCCE94
    • ReleaseDC.USER32(00000000,00000000), ref: 6CDCCEA0
    • GlobalUnlock.KERNEL32(00000000), ref: 6CDCCF35
    • GlobalFree.KERNEL32(00000000), ref: 6CDCCF3F
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: GlobalPalette$ObjectRealizeSelect$AllocBitsFreeLockReleaseStockUnlock
    • String ID: ($DISPLAY
    • API String ID: 4021622762-216271742
    • Opcode ID: 96d930b94b5284b2c62cf0ef5c46817281f6484d59d421d957996a2483160853
    • Instruction ID: c69ba7741bf049234c773a4bc3c8f083f83e889f0484299df87ca9d32dd0e72c
    • Opcode Fuzzy Hash: 96d930b94b5284b2c62cf0ef5c46817281f6484d59d421d957996a2483160853
    • Instruction Fuzzy Hash: 80A1B2B4E002189FDB14CFA9D884BDEBBB9FF88304F208129EA19AB350D7759945CF51
    APIs
    • ___free_lconv_mon.LIBCMT ref: 6CDED237
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF0236
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF0248
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF025A
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF026C
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF027E
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF0290
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF02A2
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF02B4
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF02C6
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF02D8
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF02EA
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF02FC
      • Part of subcall function 6CDF0219: _free.LIBCMT ref: 6CDF030E
    • _free.LIBCMT ref: 6CDED22C
      • Part of subcall function 6CDE99A9: HeapFree.KERNEL32(00000000,00000000,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587), ref: 6CDE99BF
      • Part of subcall function 6CDE99A9: GetLastError.KERNEL32(6CDDA587,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587,6CDDA587), ref: 6CDE99D1
    • _free.LIBCMT ref: 6CDED24E
    • _free.LIBCMT ref: 6CDED263
    • _free.LIBCMT ref: 6CDED26E
    • _free.LIBCMT ref: 6CDED290
    • _free.LIBCMT ref: 6CDED2A3
    • _free.LIBCMT ref: 6CDED2B1
    • _free.LIBCMT ref: 6CDED2BC
    • _free.LIBCMT ref: 6CDED2F4
    • _free.LIBCMT ref: 6CDED2FB
    • _free.LIBCMT ref: 6CDED318
    • _free.LIBCMT ref: 6CDED330
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
    • String ID: (7l
    • API String ID: 161543041-474830763
    • Opcode ID: 639672c489d1a7d916833241796462f78419e5fd7577c68ca4cfc58fa62456fb
    • Instruction ID: 1e7a6ed5f5f4d25c094ea0b7c5cd2c041d1a00d772bf80c4bd133c5d1f0627bd
    • Opcode Fuzzy Hash: 639672c489d1a7d916833241796462f78419e5fd7577c68ca4cfc58fa62456fb
    • Instruction Fuzzy Hash: 57315A71605605EFEB218B79DC40B8AB3E8FF88358F205519E468D7AB0DF72E8448725
    APIs
    • SetEvent.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC824D
    • SetEvent.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC8269
    • SetEvent.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC8285
    • SetEvent.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC82A1
    • WaitForSingleObject.KERNEL32(?,000003E8,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC82C2
    • TerminateThread.KERNEL32(?,00000000,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC82DB
    • CloseHandle.KERNEL32(?,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC82EB
    • WaitForSingleObject.KERNEL32(?,000003E8,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC830C
    • TerminateThread.KERNEL32(?,00000000,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC8325
    • CloseHandle.KERNEL32(?,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC8335
    • CloseHandle.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC8351
    • CloseHandle.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC836D
    • CloseHandle.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC8389
    • CloseHandle.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC83A5
    • CloseHandle.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC83C1
    • CloseHandle.KERNEL32(?,00002710,?,6CDC7E2F,00002710,?,6CDC7A4F,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC83DD
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CloseHandle$Event$ObjectSingleTerminateThreadWait
    • String ID:
    • API String ID: 1594280071-0
    • Opcode ID: 35731d590245691e84e2ae4684ee2bfd956f600aa5fafb316396223d9aeb8118
    • Instruction ID: 876ed0d3a31e1b33841e16a120639a7dcfef8da10e6cca4c99d14f14fa954622
    • Opcode Fuzzy Hash: 35731d590245691e84e2ae4684ee2bfd956f600aa5fafb316396223d9aeb8118
    • Instruction Fuzzy Hash: 3A61D674641108EFDB04CB90D58CFEDB3B6BB48309F3446A8E5199B792C775AE82DB80
    APIs
    • EnumDisplaySettingsA.USER32(00000000,000000FF,?), ref: 6CDCAC51
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: DisplayEnumSettings
    • String ID: ($6$DISPLAY
    • API String ID: 3434046153-2676095719
    • Opcode ID: 3eb19e57366e75cfa6b5729c83bd4525574193d7a4cb612da4b2db0230faf57c
    • Instruction ID: 4de505bf2df0dcd712cd96d8fa57531cd932d4e977050625b17ac59d3275ef29
    • Opcode Fuzzy Hash: 3eb19e57366e75cfa6b5729c83bd4525574193d7a4cb612da4b2db0230faf57c
    • Instruction Fuzzy Hash: 0FE125B4E002199BDB24CF65CC85BDEB7B8AF58304F1081E9E65CA7650E7709E85CF91
    APIs
    • EnterCriticalSection.KERNEL32(-00000048,EBE653FE,00000000,?,6CDD9ACD,00000001), ref: 6CDD976F
    • LeaveCriticalSection.KERNEL32(?), ref: 6CDD9786
    • EnterCriticalSection.KERNEL32(?), ref: 6CDD9793
    • LeaveCriticalSection.KERNEL32(?), ref: 6CDD9866
    • DeleteCriticalSection.KERNEL32(?), ref: 6CDD988A
    • DeleteCriticalSection.KERNEL32(?), ref: 6CDD9897
    • DeleteCriticalSection.KERNEL32(?), ref: 6CDD98A4
    • DeleteCriticalSection.KERNEL32(?), ref: 6CDD98B4
    • DeleteCriticalSection.KERNEL32(?), ref: 6CDD98C4
    • DeleteCriticalSection.KERNEL32(?), ref: 6CDD98D3
    • CloseHandle.KERNEL32(?), ref: 6CDD98E0
    • CloseHandle.KERNEL32(?), ref: 6CDD98ED
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Delete$CloseEnterHandleLeave
    • String ID:
    • API String ID: 547864322-0
    • Opcode ID: d92b77d799a36fe69ec0482de33277333a77fe2edc368078ec5d6b54fb30bc8e
    • Instruction ID: a3f95e863a08539642b8d26d001789fe2d92541933c413b55d0f6116aa1685de
    • Opcode Fuzzy Hash: d92b77d799a36fe69ec0482de33277333a77fe2edc368078ec5d6b54fb30bc8e
    • Instruction Fuzzy Hash: C25139B4A0021ADFDF04DFA8DC94ABFB779BF45308F104619E422ABB91CB35A405CB65
    APIs
      • Part of subcall function 6CDD9D30: EnterCriticalSection.KERNEL32(-00000048,?,?,6CDD9B89,6CDCDD1A,?,00000010,00000002), ref: 6CDD9D41
      • Part of subcall function 6CDD9D30: LeaveCriticalSection.KERNEL32(-00000048,?,6CDD9B89,6CDCDD1A,?,00000010,00000002), ref: 6CDD9D5F
    • EnterCriticalSection.KERNEL32(-00000078,?,?,6CDCDD1A,?,00000010,00000002), ref: 6CDD9BB8
    • LeaveCriticalSection.KERNEL32(-00000078), ref: 6CDD9CAC
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: 18e80323893dd72ff22c35e7392824682fb08c2de54e00189609b1fb0b95ee32
    • Instruction ID: c823dcda3ff4f4baa5be4e4135eba1f11c71fb23fd9204050b71d71a50c146ae
    • Opcode Fuzzy Hash: 18e80323893dd72ff22c35e7392824682fb08c2de54e00189609b1fb0b95ee32
    • Instruction Fuzzy Hash: 163199B0B00208EFDB04DBB8E954FAE7BB9FB9630DF104519E4159B751CB36A418CBA4
    APIs
    • _free.LIBCMT ref: 6CDE95D8
      • Part of subcall function 6CDE99A9: HeapFree.KERNEL32(00000000,00000000,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587), ref: 6CDE99BF
      • Part of subcall function 6CDE99A9: GetLastError.KERNEL32(6CDDA587,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587,6CDDA587), ref: 6CDE99D1
    • _free.LIBCMT ref: 6CDE95E4
    • _free.LIBCMT ref: 6CDE95EF
    • _free.LIBCMT ref: 6CDE95FA
    • _free.LIBCMT ref: 6CDE9605
    • _free.LIBCMT ref: 6CDE9610
    • _free.LIBCMT ref: 6CDE961B
    • _free.LIBCMT ref: 6CDE9626
    • _free.LIBCMT ref: 6CDE9631
    • _free.LIBCMT ref: 6CDE963F
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: 0d9ddbf12ffc119118f743e0ad67a0f35845041ab24e3aed87dee8b00e1673ca
    • Instruction ID: e2db9c4133f2bfd015c0f4fbc86539f7943801d0db636f5e513c6d286c9ed572
    • Opcode Fuzzy Hash: 0d9ddbf12ffc119118f743e0ad67a0f35845041ab24e3aed87dee8b00e1673ca
    • Instruction Fuzzy Hash: 2621D676911108EFCB01DF95DC80DDE7BB8FF88204F0091A6E6199B631DB72EA48CB91
    APIs
    • _swprintf.LIBCMTD ref: 6CDD1529
    • _memcpy_s.LIBCPMTD ref: 6CDD15AB
      • Part of subcall function 6CDD9B70: EnterCriticalSection.KERNEL32(-00000090), ref: 6CDD9BEC
      • Part of subcall function 6CDD9B70: SetEvent.KERNEL32(?), ref: 6CDD9BFB
      • Part of subcall function 6CDD9B70: LeaveCriticalSection.KERNEL32(-00000090,00000010), ref: 6CDD9C1E
    • _memcpy_s.LIBCPMTD ref: 6CDD12F9
      • Part of subcall function 6CDD9B70: EnterCriticalSection.KERNEL32(-00000078,?,?,6CDCDD1A,?,00000010,00000002), ref: 6CDD9BB8
      • Part of subcall function 6CDD9B70: LeaveCriticalSection.KERNEL32(-00000078), ref: 6CDD9CAC
      • Part of subcall function 6CDD5400: EnterCriticalSection.KERNEL32(?), ref: 6CDD5418
      • Part of subcall function 6CDD5400: LeaveCriticalSection.KERNEL32(?,0000001E), ref: 6CDD5445
    • _swprintf.LIBCMTD ref: 6CDD1277
      • Part of subcall function 6CDC5C90: __vswprintf_s_l.LIBCONCRTD ref: 6CDC5CAE
      • Part of subcall function 6CDCEFD0: lstrcatA.KERNEL32(00000000,00000000,?,6CDCF449), ref: 6CDCEFEC
    • _memcpy_s.LIBCPMTD ref: 6CDD14A6
    Strings
    • TwoPipeShell [%d] Create Error!, xrefs: 6CDD1518
    • TwoPipeShell [%d] Create Error! It's Already Exists!, xrefs: 6CDD1266
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave_memcpy_s$_swprintf$Event__vswprintf_s_llstrcat
    • String ID: TwoPipeShell [%d] Create Error!$TwoPipeShell [%d] Create Error! It's Already Exists!
    • API String ID: 3699697941-232176239
    • Opcode ID: 3dee85c900c7530c2174dd0636183481c91da27bada5cdca03bdcf3b284aa3fd
    • Instruction ID: 2712f33dd930104b36dcc98b86e07b483579a237e40d79f2e0c62ffb466ade9c
    • Opcode Fuzzy Hash: 3dee85c900c7530c2174dd0636183481c91da27bada5cdca03bdcf3b284aa3fd
    • Instruction Fuzzy Hash: 1AD13EB5A002189FDB14DF54CC91BDAB376FF88304F104599E9099B7A0DB32AE95CFA1
    APIs
    • lstrlenW.KERNEL32(?,?,?,00000000,00000021,?,?,EBE653FE), ref: 6CDD06D3
    • _memcpy_s.LIBCPMTD ref: 6CDD079E
    • _memcpy_s.LIBCPMTD ref: 6CDD0810
    • _memcpy_s.LIBCPMTD ref: 6CDD0842
      • Part of subcall function 6CDC6800: FormatMessageA.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 6CDC685D
      • Part of subcall function 6CDCEFD0: lstrcatA.KERNEL32(00000000,00000000,?,6CDCF449), ref: 6CDCEFEC
    • _swprintf.LIBCMTD ref: 6CDD08BF
    • _memcpy_s.LIBCPMTD ref: 6CDD0941
    Strings
    • Download [%S] error! Is running Download, xrefs: 6CDD08AE
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _memcpy_s$FormatMessage_swprintflstrcatlstrlen
    • String ID: Download [%S] error! Is running Download
    • API String ID: 1768301414-4225480886
    • Opcode ID: 8ecddcb21d754c507057c3051793e7cb2f99e27555b6e4eb6db27a2acd097398
    • Instruction ID: f827334de98ff4eae8db5dd06ede1e7b5e988e645b90e7d2b0cf75176f139331
    • Opcode Fuzzy Hash: 8ecddcb21d754c507057c3051793e7cb2f99e27555b6e4eb6db27a2acd097398
    • Instruction Fuzzy Hash: F8B141B5A002089FDB04DF54CC91FAAB376FF89304F148598E9199B791DB32AE54CFA1
    APIs
    • ReadFile.KERNEL32(0000FFEF,?,00000008,0000FFEF,00000000), ref: 6CDD203B
    • SetFilePointerEx.KERNEL32(00000008,?,?,6CDD2382,00000001), ref: 6CDD2077
    • SetFilePointerEx.KERNEL32(00000008,?,?,6CDD2382,00000001), ref: 6CDD20A9
    • ReadFile.KERNEL32(00000000,6CE04548,?,00000000,00000000), ref: 6CDD212A
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: File$PointerRead
    • String ID: $8l$$8l$fkpioefpoea$@^Tf0-0-gepwf09IJGEJ0IFAPKO456SG894E
    • API String ID: 3154509469-3171088924
    • Opcode ID: 2638eae6ddc648f3abbf81b84d255e44acb354295f4b2896a3a309f0d4b6a471
    • Instruction ID: 3dd74927ead999c24b52fd43d5d166a1498bb6db6a360f8d3cb02955b084b136
    • Opcode Fuzzy Hash: 2638eae6ddc648f3abbf81b84d255e44acb354295f4b2896a3a309f0d4b6a471
    • Instruction Fuzzy Hash: 4C8108B5E00209EFDB04CFD8D985AEEBBB5BF88308F208219E515B7754D735A945CBA0
    APIs
    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 6CDD2283
    • GetLastError.KERNEL32 ref: 6CDD2292
      • Part of subcall function 6CDC6800: FormatMessageA.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 6CDC685D
    • SetFilePointerEx.KERNEL32(000000FF,?,?,?,00000002), ref: 6CDD22D6
    • SetFilePointerEx.KERNEL32(000000FF,?,?,00000000,00000000), ref: 6CDD22EC
    • CloseHandle.KERNEL32(000000FF), ref: 6CDD247B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: File$Pointer$CloseCreateErrorFormatHandleLastMessage
    • String ID: GetDecodeLog Error !
    • API String ID: 2400116906-3583251517
    • Opcode ID: c106fdf91c1337fd2aa68e5a7cb95779dbbdb893abd13d735609159a52776d3d
    • Instruction ID: 10528e866a3da55c6575a76c246f4541c9a9c3b3a005417eae6d876ce1fb320b
    • Opcode Fuzzy Hash: c106fdf91c1337fd2aa68e5a7cb95779dbbdb893abd13d735609159a52776d3d
    • Instruction Fuzzy Hash: E38105B1E00209DBDB04CF98D888BEEBBB5FF48308F148219E515A7791D775A945CFA1
    APIs
    • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 6CDC6473
    • LoadLibraryA.KERNEL32(Kernel32.dll), ref: 6CDC64B0
    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 6CDC65C0
    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 6CDC65D1
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: AddressProc$Iterator_baseIterator_base::_LibraryLoadstd::_
    • String ID: Kernel32.dll$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection
    • API String ID: 4189866332-1575494070
    • Opcode ID: 844d1ebeb4f5173d365654c8726589fe8cb83cc4234850d0d5a14add93d57ec4
    • Instruction ID: 97499ecb6b3aa00040aee3d0cdf7c079fb2e24bf209bc39dd1245a66a3e39d3a
    • Opcode Fuzzy Hash: 844d1ebeb4f5173d365654c8726589fe8cb83cc4234850d0d5a14add93d57ec4
    • Instruction Fuzzy Hash: 3C617D20D0C2C8D9EB12C7E8D5487DEBFB65F26748F084099D5887B282C7BB1659C77A
    APIs
      • Part of subcall function 6CDCB0C0: DeleteObject.GDI32(00000000), ref: 6CDCB129
    • WaitForSingleObject.KERNEL32(?,00000001), ref: 6CDCB4DD
    Strings
    • ./img_src/QScreen_%d.bmp, xrefs: 6CDCB5B2
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Object$DeleteSingleWait
    • String ID: ./img_src/QScreen_%d.bmp
    • API String ID: 1609116822-2525806235
    • Opcode ID: 1f98cf342bed310e66ccdf9c0093fe9c9902d734bbb0ac39191debfb27661d11
    • Instruction ID: 7304c81f512702decfda8c158aaa96f2038cc9f2d267d49a21a8d99e736d446a
    • Opcode Fuzzy Hash: 1f98cf342bed310e66ccdf9c0093fe9c9902d734bbb0ac39191debfb27661d11
    • Instruction Fuzzy Hash: BF3139B0748214EBDB54CB65D880BAA7379BB59308F100198E6C59B7E0DB72EDC1CF55
    APIs
    • GetStartupInfoW.KERNEL32(00000044), ref: 6CDC2D44
    • lstrcatW.KERNEL32(?,cmd.exe /c ), ref: 6CDC2D9F
    • lstrcatW.KERNEL32(?,?), ref: 6CDC2DB0
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,?), ref: 6CDC2DD9
    • GetLastError.KERNEL32 ref: 6CDC2DF5
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: lstrcat$CreateErrorInfoLastProcessStartup
    • String ID: D$cmd.exe /c
    • API String ID: 3475696678-3768262801
    • Opcode ID: bd6bcc57c2415ccd77afd7093fb091577c294806958cd3d2832c698a925bb1c5
    • Instruction ID: c7c617f7d569daf6a7b31e5707efe88cc456eaa891b0a7933b59657d46d6b645
    • Opcode Fuzzy Hash: bd6bcc57c2415ccd77afd7093fb091577c294806958cd3d2832c698a925bb1c5
    • Instruction Fuzzy Hash: 553151F0B04258ABEB20CF60CC45BDD7779EB49704F1044D9E719A7281EBB56A84CF6A
    APIs
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00002710,?,6CDC7A57,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC80EF
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6CDC7A57,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC8106
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6CDC7A57,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC811D
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6CDC7A57,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC8134
    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,6CDC7A57,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC814B
    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,6CDC7A57,?,?,6CDC8695,6CDCDA21,?,?,6CDCDA21,00002710), ref: 6CDC8162
    • CreateThread.KERNEL32(00000000,00000000,6CDC8460,00002710,00000000,00000000), ref: 6CDC8182
    • CreateThread.KERNEL32(00000000,00000000,6CDC8450,00002710,00000000,00000000), ref: 6CDC81A2
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Create$Event$Thread
    • String ID:
    • API String ID: 2525963256-0
    • Opcode ID: 7b20de3deb91d227fa0c0b67060c0a26ff17f030fb5a7bae509172e565ecbcdf
    • Instruction ID: 9b90c620ec748bbb3d54178c981d93fb5ee496e3e5a06f39648b2abbbd8b2d39
    • Opcode Fuzzy Hash: 7b20de3deb91d227fa0c0b67060c0a26ff17f030fb5a7bae509172e565ecbcdf
    • Instruction Fuzzy Hash: 1B41C574781204FFEB10CB90DD4AFA9B3B6AB04706F3001A9EA096F6D1D7B12E81DB55
    APIs
    • InitializeCriticalSection.KERNEL32(?,EBE653FE,00000000,6CDCDB18,6CDF5A9E,000000FF,?,6CDD99A4,6CDCDB18), ref: 6CDD9661
    • InitializeCriticalSection.KERNEL32(?,?,6CDD99A4,6CDCDB18), ref: 6CDD966E
    • InitializeCriticalSection.KERNEL32(?,?,6CDD99A4,6CDCDB18), ref: 6CDD967B
    • InitializeCriticalSection.KERNEL32(?,?,6CDD99A4,6CDCDB18), ref: 6CDD968B
    • InitializeCriticalSection.KERNEL32(?,?,6CDD99A4,6CDCDB18), ref: 6CDD969A
    • InitializeCriticalSection.KERNEL32(?,?,6CDD99A4,6CDCDB18), ref: 6CDD96AA
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6CDD99A4,6CDCDB18), ref: 6CDD96F4
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6CDD99A4,6CDCDB18), ref: 6CDD9708
      • Part of subcall function 6CDD9CD0: EnterCriticalSection.KERNEL32(-0000005E,?,?,6CDD9720,6CDCDB18,?,6CDD99A4,6CDCDB18), ref: 6CDD9CDE
      • Part of subcall function 6CDD9CD0: LeaveCriticalSection.KERNEL32(-0000005E,?,6CDD9720,6CDCDB18,?,6CDD99A4,6CDCDB18), ref: 6CDD9CF4
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Initialize$CreateEvent$EnterLeave
    • String ID:
    • API String ID: 465080375-0
    • Opcode ID: 0f27bd0097d0c56c8bdf31f71ee96f1dca921777d999b4e951defed5d0042080
    • Instruction ID: ed997ea473404a59a87aafdb0cdda0c8d36e015528e69d6937893077d7ac7f32
    • Opcode Fuzzy Hash: 0f27bd0097d0c56c8bdf31f71ee96f1dca921777d999b4e951defed5d0042080
    • Instruction Fuzzy Hash: 164149B4A0021A9FDB14CFA8CC94FAEB775FF45318F104A59E526AB7C1CB75A801CB64
    APIs
    • _memcpy_s.LIBCPMTD ref: 6CDD28EA
    • _memcpy_s.LIBCPMTD ref: 6CDD2849
      • Part of subcall function 6CDCEFD0: lstrcatA.KERNEL32(00000000,00000000,?,6CDCF449), ref: 6CDCEFEC
    • _memcpy_s.LIBCPMTD ref: 6CDD298B
    Strings
    • Screen Start error!, xrefs: 6CDD27E3
    • Screen Start With XOR error!, xrefs: 6CDD2884
    • Screen Start error, Class is NULL!, xrefs: 6CDD2925
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _memcpy_s$lstrcat
    • String ID: Screen Start With XOR error!$Screen Start error!$Screen Start error, Class is NULL!
    • API String ID: 3156544786-2901572510
    • Opcode ID: 1917839f3258c842a6c40e45019cd46af37dd0407bf7addb401c90ec4a22c2b5
    • Instruction ID: 8563cacf0917ce3ab93135f6222fc1e367287eb2cfa7ac155775657952575925
    • Opcode Fuzzy Hash: 1917839f3258c842a6c40e45019cd46af37dd0407bf7addb401c90ec4a22c2b5
    • Instruction Fuzzy Hash: B3B15BB4A00209DFCB04DF68D890AEEB7B5FF49308F148659F8159B3A1DB31E955CBA0
    APIs
    • _ValidateLocalCookies.LIBCMT ref: 6CDE34FB
    • ___except_validate_context_record.LIBVCRUNTIME ref: 6CDE3503
    • _ValidateLocalCookies.LIBCMT ref: 6CDE3591
    • __IsNonwritableInCurrentImage.LIBCMT ref: 6CDE35BC
    • _ValidateLocalCookies.LIBCMT ref: 6CDE3611
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
    • String ID: csm
    • API String ID: 1170836740-1018135373
    • Opcode ID: e027b9cb145871593d77df1dd660f4bb2a9c6de46bef1738866fc7c3f23c9c04
    • Instruction ID: 4aee808aee5fe166e675ee203ad12bec9f1f6cfedf6a06bc57c971af3e588a15
    • Opcode Fuzzy Hash: e027b9cb145871593d77df1dd660f4bb2a9c6de46bef1738866fc7c3f23c9c04
    • Instruction Fuzzy Hash: C7415434E05209DBCF00CF69C884AAEBBF5AF49328F148155E9299B771D731D915CB90
    APIs
    • lstrcpyA.KERNEL32(?,\\.\pipe\), ref: 6CDC78E3
    • lstrcatA.KERNEL32(?,0000005C), ref: 6CDC78F1
    • lstrcpyA.KERNEL32(?,\\.\pipe\), ref: 6CDC7905
    • lstrcatA.KERNEL32(?,pipe\), ref: 6CDC7919
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: lstrcatlstrcpy
    • String ID: \\.\pipe\$pipe\
    • API String ID: 3905823039-868360898
    • Opcode ID: 0b35af9af6e64d4d4aced2215bed1037e189fc099573aa1d49a84304a122b0e5
    • Instruction ID: a8df176a47f6938bdbbdaee191ff04416b97a62a7d9df65567682f4b0a3e884a
    • Opcode Fuzzy Hash: 0b35af9af6e64d4d4aced2215bed1037e189fc099573aa1d49a84304a122b0e5
    • Instruction Fuzzy Hash: DE41EEB4A00249DFDB04CF94C598BEFBBF5AF58304F2441A8E5086B391C77A6A45CBB5
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: api-ms-$ext-ms-
    • API String ID: 0-537541572
    • Opcode ID: 8d704fbde6091bad227e0a1ce78a5a2131fab613181b350ad7422d110527123e
    • Instruction ID: d68bd423579234e358c1993e04b9a86ce1cb5685e98146422365ecb1d6064107
    • Opcode Fuzzy Hash: 8d704fbde6091bad227e0a1ce78a5a2131fab613181b350ad7422d110527123e
    • Instruction Fuzzy Hash: FF21DB71B07631FBD721AB659CC0BCE3778AF4A764F150511ED65E7AA0E630E901C6D0
    APIs
      • Part of subcall function 6CDF0380: _free.LIBCMT ref: 6CDF03A5
    • _free.LIBCMT ref: 6CDF0406
      • Part of subcall function 6CDE99A9: HeapFree.KERNEL32(00000000,00000000,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587), ref: 6CDE99BF
      • Part of subcall function 6CDE99A9: GetLastError.KERNEL32(6CDDA587,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587,6CDDA587), ref: 6CDE99D1
    • _free.LIBCMT ref: 6CDF0411
    • _free.LIBCMT ref: 6CDF041C
    • _free.LIBCMT ref: 6CDF0470
    • _free.LIBCMT ref: 6CDF047B
    • _free.LIBCMT ref: 6CDF0486
    • _free.LIBCMT ref: 6CDF0491
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: a27d45a320cfdaef14d7d4f740b74aae9e16b72bb56c33c5b9f1cb88268fc740
    • Instruction ID: afa85249c7b64c4965be372df485f93db6efeec81d256e1c5464ab9bd55af684
    • Opcode Fuzzy Hash: a27d45a320cfdaef14d7d4f740b74aae9e16b72bb56c33c5b9f1cb88268fc740
    • Instruction Fuzzy Hash: EA11B132501B44BBD760A7B0CC45FCB77DCBF04388F408814E6A9A7AB0CBA5B4094671
    APIs
    • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 6CDD1F54
    • MapViewOfFile.KERNEL32(000000FF,00000006,00000000,00000000,00000000,?,6CDD2474,000000FF,00000000), ref: 6CDD1F69
    • GetFileSize.KERNEL32(000000FF,00000000,?,6CDD2474,000000FF,00000000), ref: 6CDD1F78
    • UnmapViewOfFile.KERNEL32(00000000,?,?,?,?,6CDD2474,000000FF,00000000), ref: 6CDD1FAB
    • CloseHandle.KERNEL32(000000FF,?,?,?,?,6CDD2474,000000FF,00000000), ref: 6CDD1FB5
    • SetFilePointer.KERNEL32(000000FF,6CDD2474,00000000,00000000,?,?,?,?,6CDD2474,000000FF,00000000), ref: 6CDD1FC7
    • SetEndOfFile.KERNEL32(000000FF,?,?,?,?,6CDD2474,000000FF,00000000), ref: 6CDD1FD1
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: File$View$CloseCreateHandleMappingPointerSizeUnmap
    • String ID:
    • API String ID: 2211241848-0
    • Opcode ID: 2ae008600de12144e561dc29da672a0ebef713a50b9593e3808b43e6fdf6fa2e
    • Instruction ID: 66063914bdcf789599260a9bda3cbf4e46c74af06181e71ff959bc8cf97429f7
    • Opcode Fuzzy Hash: 2ae008600de12144e561dc29da672a0ebef713a50b9593e3808b43e6fdf6fa2e
    • Instruction Fuzzy Hash: 7611ECB9A40208BBEF10DFA4DC45F9E7B78FB48700F108545FB15EB281D671AA018B54
    APIs
    • Sleep.KERNEL32(00000005), ref: 6CDC5818
    • SetFilePointerEx.KERNEL32(000000FF,?,?,00000000,00000000), ref: 6CDC58B2
    • ReadFile.KERNEL32(000000FF,000000FF,00000000,00000000,00000000), ref: 6CDC5934
    • GetLastError.KERNEL32 ref: 6CDC593E
    • CloseHandle.KERNEL32(000000FF), ref: 6CDC595F
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: File$CloseErrorHandleLastPointerReadSleep
    • String ID:
    • API String ID: 4017491889-0
    • Opcode ID: adfdfe73fd784d19992194fdb8f51725a54ff5af1dda6481317814d46e439507
    • Instruction ID: 1480f38e2617427393ad6f2ae490da3ad62c3bac4bbf106b2f121b9373fe76b6
    • Opcode Fuzzy Hash: adfdfe73fd784d19992194fdb8f51725a54ff5af1dda6481317814d46e439507
    • Instruction Fuzzy Hash: CAC1F8B4E00219CFDB04CFD9C994BAEBBB6BF48314F208659D425AB790D774A942CF61
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6CDC95B9
    • allocator.LIBCONCRTD ref: 6CDC960C
    • _Find_unchecked.LIBCPMTD ref: 6CDC96A4
    • _Find_unchecked.LIBCPMTD ref: 6CDC96B8
    • _Find_unchecked.LIBCPMTD ref: 6CDC9766
      • Part of subcall function 6CDC9400: _Deallocate.LIBCONCRTD ref: 6CDC9412
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Find_unchecked$DeallocateMutex_baseMutex_base::~_allocatorstd::_
    • String ID:
    • API String ID: 565782535-0
    • Opcode ID: d62bbacb975abbd80a5b30e74483aa1233af9884f31577fcd89f8eab63e22884
    • Instruction ID: 983064919bd82d208c8b1c9a261992c16b75aff7a426461475009d47b78a1b33
    • Opcode Fuzzy Hash: d62bbacb975abbd80a5b30e74483aa1233af9884f31577fcd89f8eab63e22884
    • Instruction Fuzzy Hash: 8C91BCB5E04109EFCB04DFD4D890CEEB3BAEF89348B11465DD515AB764DB30AA05CBA1
    APIs
    • GetConsoleCP.KERNEL32(00000000,00000001,00000020,?,?,?,?,?,?,?,?,6CDEDF89,00000008,00000001,00000020,0000002C), ref: 6CDED835
    • __fassign.LIBCMT ref: 6CDED8BF
    • __fassign.LIBCMT ref: 6CDED8DE
    • WriteFile.KERNEL32(?,00000020,00000000,?,00000000), ref: 6CDED92D
    • WriteFile.KERNEL32(?,6CDEDF89,00000001,?,00000000), ref: 6CDED967
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: FileWrite__fassign$Console
    • String ID:
    • API String ID: 3692784241-0
    • Opcode ID: c8d993dd3ad44c6e9811712495ddaa30f9c211e05d766f6e48869ddd700db0fc
    • Instruction ID: 1461d7906c7f1961439e621fcd0f39ad649d46846f52ac3582e99ad8307cf387
    • Opcode Fuzzy Hash: c8d993dd3ad44c6e9811712495ddaa30f9c211e05d766f6e48869ddd700db0fc
    • Instruction Fuzzy Hash: 99518CB2A00248AFDF00DFA8DC81AEEBBF8EF4D314F14412AE565E7651D7309945CB61
    APIs
    • GetTickCount.KERNEL32 ref: 6CDC7C4B
    • PeekNamedPipe.KERNEL32(?,?,?,?,?,?,?,6CDC87F7,?,00000000,0002BF20), ref: 6CDC7CCF
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CountNamedPeekPipeTick
    • String ID:
    • API String ID: 741616749-0
    • Opcode ID: 607dc3483fda248fd8e8206eedef4d61a447916969dae0abe8cb698496b42415
    • Instruction ID: d0f56d742cac891a843f64dc83b335ab13f2e3d140fe46fd07f568c55b4b3c75
    • Opcode Fuzzy Hash: 607dc3483fda248fd8e8206eedef4d61a447916969dae0abe8cb698496b42415
    • Instruction Fuzzy Hash: 34512B74A0021CEBCB26CF24C844FD9B3B9BB4D304F1241D8E5899B654CBB5AAC5DF61
    APIs
    • GetLastError.KERNEL32(00000001,?,6CDE36B4,6CDE28BA,6CDE23A9,?,6CDE25C6,?,00000001,?,?,00000001,?,6CE01620,0000000C,6CDE26BA), ref: 6CDE38B8
    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6CDE38C6
    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6CDE38DF
    • SetLastError.KERNEL32(00000000,6CDE25C6,?,00000001,?,?,00000001,?,6CE01620,0000000C,6CDE26BA,?,00000001,?), ref: 6CDE3931
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: ErrorLastValue___vcrt_
    • String ID:
    • API String ID: 3852720340-0
    • Opcode ID: 722775b0082054691fffbebced8653149b9b75c0f936aa0577423a4ac82eab51
    • Instruction ID: 08b7d7ae34e2f94f4fd79815bd8743b8765ecab90fb6f3d64a50ba31aa6bc5b0
    • Opcode Fuzzy Hash: 722775b0082054691fffbebced8653149b9b75c0f936aa0577423a4ac82eab51
    • Instruction Fuzzy Hash: DC01753270EB11AEE72517B56C84BBA3678EB1E77C720032DE12097AF0EF1248155394
    APIs
    • CreateFileA.KERNEL32(?,C0000000,00000002,00000000,00000002,00000080,00000000), ref: 6CDDA8B6
    • GetCurrentThreadId.KERNEL32 ref: 6CDDA8CB
    • GetCurrentProcessId.KERNEL32(000000FF,00000000,00000000,00000000,6CDDA820), ref: 6CDDA914
    • GetCurrentProcess.KERNEL32(00000000), ref: 6CDDA91B
    • MiniDumpWriteDump.DBGHELP(00000000), ref: 6CDDA922
    • CloseHandle.KERNEL32(000000FF), ref: 6CDDA92C
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Current$DumpProcess$CloseCreateFileHandleMiniThreadWrite
    • String ID:
    • API String ID: 1764008985-0
    • Opcode ID: 01588b9ca5a6ecc8ac28b49ca7550316c3e6e59cadfdaefa1c9769887d3dbe35
    • Instruction ID: 2dfb3772dc79a4d0f9d9d1a6763f85651e3728306f14d91caaefae5d4c1e35a8
    • Opcode Fuzzy Hash: 01588b9ca5a6ecc8ac28b49ca7550316c3e6e59cadfdaefa1c9769887d3dbe35
    • Instruction Fuzzy Hash: D8111F70E40209EFEF00DFA0D849BAEBBB8FB09304F508119EA25A7680D7745545CF90
    APIs
    • GetFileAttributesW.KERNEL32(00000000), ref: 6CDC2F61
    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 6CDC2F73
    • CopyFileW.KERNEL32(00000000,?,?), ref: 6CDC2F86
    • GetLastError.KERNEL32 ref: 6CDC2F90
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6CDC2FA3
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6CDC2FB5
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: File$Attributes$CopyErrorLast
    • String ID:
    • API String ID: 2106489313-0
    • Opcode ID: 733250d87ea9ae963ecc856b1ccaca4732f68d151a48d254902f8de53575002c
    • Instruction ID: 587f204264dd6add9961f87f1e5c873c76f409d63ad3f553bd3a449b9c77611f
    • Opcode Fuzzy Hash: 733250d87ea9ae963ecc856b1ccaca4732f68d151a48d254902f8de53575002c
    • Instruction Fuzzy Hash: 1311D7B9604248FFDB00DFA4D858B9E7FB8BB49741F108188FE55D7340D6369A46CBA0
    APIs
    • GetFileAttributesW.KERNEL32(00000000), ref: 6CDC2EE1
    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 6CDC2EF3
    • MoveFileW.KERNEL32(00000000,?), ref: 6CDC2F01
    • GetLastError.KERNEL32 ref: 6CDC2F0B
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6CDC2F1E
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6CDC2F30
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: File$Attributes$ErrorLastMove
    • String ID:
    • API String ID: 4019241439-0
    • Opcode ID: d4b12d95c75a7d81abf26faf56f2384962cb6f6566d5cf330f289effe37dc73a
    • Instruction ID: 67742af3b6dc00800aebaaff8c59535baaf53c98a1dc1057407096fe83c9bc2f
    • Opcode Fuzzy Hash: d4b12d95c75a7d81abf26faf56f2384962cb6f6566d5cf330f289effe37dc73a
    • Instruction Fuzzy Hash: 9A01E9B9604208FFDB10DFA4D449B9EBFB8BB49741F108188FE15D7340C6369585CBA0
    APIs
    • GetFileAttributesW.KERNEL32(00000000), ref: 6CDC3088
    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 6CDC309A
    • DeleteFileW.KERNEL32(00000000), ref: 6CDC30A4
    • GetLastError.KERNEL32 ref: 6CDC30AE
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6CDC30C1
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6CDC30D3
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: File$Attributes$DeleteErrorLast
    • String ID:
    • API String ID: 2267219331-0
    • Opcode ID: 91041c4c82cb2602d89bfb1c860629fb503042c3b1ba109c625db226e2fb9d0c
    • Instruction ID: 29da0b43c6d68565b54ab906ad63cb4cb5b17018d9b74e9c5ac315b84d86cdc4
    • Opcode Fuzzy Hash: 91041c4c82cb2602d89bfb1c860629fb503042c3b1ba109c625db226e2fb9d0c
    • Instruction Fuzzy Hash: 470116B9A04208BBDB00DFA4D448A9EBF78BB49741F108188FE15D7340C6369686CBA0
    APIs
      • Part of subcall function 6CDC1200: GetLogicalDriveStringsW.KERNEL32(00000100,?), ref: 6CDC1246
      • Part of subcall function 6CDC1200: GetDriveTypeW.KERNEL32(?), ref: 6CDC12BB
      • Part of subcall function 6CDC1200: GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 6CDC1307
    • Concurrency::task_options::get_scheduler.LIBCPMTD ref: 6CDCF078
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6CDCF0BA
    • _swprintf.LIBCMTD ref: 6CDCF119
      • Part of subcall function 6CDC5C90: __vswprintf_s_l.LIBCONCRTD ref: 6CDC5CAE
    • _memcpy_s.LIBCPMTD ref: 6CDCF17B
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Drive$Affinity::operator!=Concurrency::details::Concurrency::task_options::get_schedulerDiskFreeHardwareLogicalSpaceStringsType__vswprintf_s_l_memcpy_s_swprintf
    • String ID: %c:\
    • API String ID: 2504515757-3142399695
    • Opcode ID: ec6990495a0a493a74fcd50cb762d14400c77d2768fa8ea6d8683bc6be17d267
    • Instruction ID: a408d17669a186ce6d7ef033e9d68d26514bf98c8b1a2d65536aa3471478e1af
    • Opcode Fuzzy Hash: ec6990495a0a493a74fcd50cb762d14400c77d2768fa8ea6d8683bc6be17d267
    • Instruction Fuzzy Hash: 86610C75A00209DFCB04DF94C890AEEB7B9FF48304F108559E416AB7A0DB35EE09CBA1
    APIs
    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,6CDE88D0,?,?,6CDE8898,?,?), ref: 6CDE893F
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6CDE8952
    • FreeLibrary.KERNEL32(00000000,?,?,?,6CDE88D0,?,?,6CDE8898,?,?), ref: 6CDE8975
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: b8c2cfd5e64ae62cf023924bb7f4db96db76995e97a17e3700427d56f8cc7e01
    • Instruction ID: f8993ea6d2511f91d66d43bd0fe8595590584cb259e0933ed77c149898a74248
    • Opcode Fuzzy Hash: b8c2cfd5e64ae62cf023924bb7f4db96db76995e97a17e3700427d56f8cc7e01
    • Instruction Fuzzy Hash: 6AF04F30A01518BFEF019BA5DC08B9EBFB8FF09715F500069FA15E2A60DB319A46CB91
    APIs
    • __alloca_probe_16.LIBCMT ref: 6CDEE3D9
    • __alloca_probe_16.LIBCMT ref: 6CDEE49F
    • __freea.LIBCMT ref: 6CDEE50B
      • Part of subcall function 6CDEA5FF: HeapAlloc.KERNEL32(00000000,6CDDA587,?,?,6CDE212E,6CDDA587,?,6CDDA587,0001507C), ref: 6CDEA631
    • __freea.LIBCMT ref: 6CDEE514
    • __freea.LIBCMT ref: 6CDEE539
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: __freea$__alloca_probe_16$AllocHeap
    • String ID:
    • API String ID: 1096550386-0
    • Opcode ID: c8fdefa32a98e87d1bc93fa1c213803440fec1c7b01d4488aa4173e233138ac5
    • Instruction ID: 7ed7897348c04c3c5e95f5e86304dca5b6c264b861fd60dacf45dee3767be191
    • Opcode Fuzzy Hash: c8fdefa32a98e87d1bc93fa1c213803440fec1c7b01d4488aa4173e233138ac5
    • Instruction Fuzzy Hash: F851C272601616ABEB118F64CC44EEB3BA9EF88758F210168FD1897E60E731DD15C7E1
    APIs
    • EnterCriticalSection.KERNEL32(?,EBE653FE), ref: 6CDD4ED0
    • _DebugHeapAllocator.LIBCPMTD ref: 6CDD4EE2
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6CDD4F2A
    • error_info_injector.LIBCPMTD ref: 6CDD4F96
    • LeaveCriticalSection.KERNEL32(?,?,?,00000004), ref: 6CDD4FB1
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Affinity::operator!=AllocatorConcurrency::details::DebugEnterHardwareHeapLeaveerror_info_injector
    • String ID:
    • API String ID: 176887040-0
    • Opcode ID: 14e1a135754d1f966993dea00ef83c7026e5e794cdd4d983f8ff84d9fe65e0d8
    • Instruction ID: 07afd466d1e4a52cb19d8624020172abc7af27ca3b30ccb0e24b615d4432df88
    • Opcode Fuzzy Hash: 14e1a135754d1f966993dea00ef83c7026e5e794cdd4d983f8ff84d9fe65e0d8
    • Instruction Fuzzy Hash: 3F51D5B0E04219EFDB04DFA4D891BEEBBB5FF48304F108129E511A77A0DB74A909CB61
    APIs
    • EnterCriticalSection.KERNEL32(?,EBE653FE), ref: 6CDD4CF0
    • _DebugHeapAllocator.LIBCPMTD ref: 6CDD4D02
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6CDD4D4A
    • error_info_injector.LIBCPMTD ref: 6CDD4DB2
    • LeaveCriticalSection.KERNEL32(?,?,?,00000004), ref: 6CDD4DCD
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Affinity::operator!=AllocatorConcurrency::details::DebugEnterHardwareHeapLeaveerror_info_injector
    • String ID:
    • API String ID: 176887040-0
    • Opcode ID: 57e48dc58ffa0216b12d318317dfa761cad92aa10de2c3e97284becacd74bedc
    • Instruction ID: 6b8d016958733b7d393369d589cd7fb3e77a3746a14ff915eb54fc7e60f60a3c
    • Opcode Fuzzy Hash: 57e48dc58ffa0216b12d318317dfa761cad92aa10de2c3e97284becacd74bedc
    • Instruction Fuzzy Hash: B341C2B0E00209EFDB08DFA4D995BEEBBB5BF48304F104129E512A77A0DB746949CB61
    APIs
    • EnterCriticalSection.KERNEL32(?,?,?,?,?,6CDD18F1,?,?,?,EBE653FE), ref: 6CDD54DC
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6CDD5518
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6CDD5527
    • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,?,?,00000004), ref: 6CDD5581
    • LeaveCriticalSection.KERNEL32(?,00000000,?,?,?,00000004,?,?,?,?,6CDD18F1,?,?,?,EBE653FE), ref: 6CDD5593
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Leave$Affinity::operator!=Concurrency::details::EnterHardwareMutex_baseMutex_base::~_std::_
    • String ID:
    • API String ID: 3020211749-0
    • Opcode ID: 8a8259e10709d0c0744cd4ef2756c93834453204860e9b4bcb3df52928d728b8
    • Instruction ID: 090204bc95b52ab925373ec5071b18ca121d10af30642dc4678786cb6543b747
    • Opcode Fuzzy Hash: 8a8259e10709d0c0744cd4ef2756c93834453204860e9b4bcb3df52928d728b8
    • Instruction Fuzzy Hash: 21210CB0E00109EBDB08DFD4D854FEEB7B5EF48309F104569E212A7790DB34AA49CBA0
    APIs
    • EnterCriticalSection.KERNEL32(EBE652C2,?,?,?,?,?,6CDD1E39,EBE653FE,EBE653FE,EBE653FE), ref: 6CDD55CC
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6CDD5608
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6CDD5617
    • LeaveCriticalSection.KERNEL32(EBE652C2,?,EBE653FE,00000000,?,EBE653FE,EBE653FE,00000004), ref: 6CDD5671
    • LeaveCriticalSection.KERNEL32(EBE652C2,00000000,?,EBE653FE,EBE653FE,00000004,?,?,?,?,?,6CDD1E39,EBE653FE,EBE653FE,EBE653FE), ref: 6CDD5683
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Leave$Affinity::operator!=Concurrency::details::EnterHardwareMutex_baseMutex_base::~_std::_
    • String ID:
    • API String ID: 3020211749-0
    • Opcode ID: 8f25b166a96a07a5f76e86c1673f3a3f6faf97236697aafc309fe64e32989fac
    • Instruction ID: 72b192492c555f2f6c386175340654383f439dfebd9d3b55113868800816d17f
    • Opcode Fuzzy Hash: 8f25b166a96a07a5f76e86c1673f3a3f6faf97236697aafc309fe64e32989fac
    • Instruction Fuzzy Hash: FC211DB0E00109EBDB08DF94D854FEEBBB4EF49304F104169E612A7791DB34AA09CBA4
    APIs
    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 6CDC2BB0
    • SetFileTime.KERNEL32(000000FF,?,?,?), ref: 6CDC2BCF
    • GetLastError.KERNEL32 ref: 6CDC2BF1
    • CloseHandle.KERNEL32(000000FF), ref: 6CDC2C00
    • GetLastError.KERNEL32 ref: 6CDC2C08
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: ErrorFileLast$CloseCreateHandleTime
    • String ID:
    • API String ID: 1269242970-0
    • Opcode ID: d76bb3c8ccfa3520663851548d1a0278f99b50c2117862b342d8341fbea8b982
    • Instruction ID: a8998b190026fff6300270936b73157d76f3e03787254b6bdc09e276b7258dbc
    • Opcode Fuzzy Hash: d76bb3c8ccfa3520663851548d1a0278f99b50c2117862b342d8341fbea8b982
    • Instruction Fuzzy Hash: 41117074A08348AFDB11CFB4D849BDD7FB8AF19308F108298E951E76C0D675964ACB51
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000), ref: 6CDC6637
    • Process32First.KERNEL32(?,00000128), ref: 6CDC6651
    • CloseHandle.KERNEL32(?), ref: 6CDC666D
    • Process32Next.KERNEL32(?,00000128), ref: 6CDC6685
    • CloseHandle.KERNEL32(?), ref: 6CDC6696
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
    • String ID:
    • API String ID: 1789362936-0
    • Opcode ID: dde9e25583804d6823fb7f0fa6f9e99677bbaf585030db92997a20ccf3be8ad5
    • Instruction ID: 94feefb4897bc81bb1ecdd3575b53d0d6f8b23ee1340801ba5d4a0ae02579c04
    • Opcode Fuzzy Hash: dde9e25583804d6823fb7f0fa6f9e99677bbaf585030db92997a20ccf3be8ad5
    • Instruction Fuzzy Hash: C1111571A50208EBDB20EF70D955BEEB7B8AB0D704F4041D9E609D7680DB30AA66CF91
    APIs
    • _free.LIBCMT ref: 6CDF032F
      • Part of subcall function 6CDE99A9: HeapFree.KERNEL32(00000000,00000000,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587), ref: 6CDE99BF
      • Part of subcall function 6CDE99A9: GetLastError.KERNEL32(6CDDA587,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587,6CDDA587), ref: 6CDE99D1
    • _free.LIBCMT ref: 6CDF0341
    • _free.LIBCMT ref: 6CDF0353
    • _free.LIBCMT ref: 6CDF0365
    • _free.LIBCMT ref: 6CDF0377
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: 481ac887ed7db7ea22f1379955a380609bc8de8049a683bbfa43d8db801709fa
    • Instruction ID: 02333d36ef7af1d7a8b0edfca8bd172b6d52c77df40d24100e28a51e905c6e9c
    • Opcode Fuzzy Hash: 481ac887ed7db7ea22f1379955a380609bc8de8049a683bbfa43d8db801709fa
    • Instruction Fuzzy Hash: 33F06271616B44EBCA10CB64F4C4C9B73F9FB553947651809F064D7E20C7B2F8908AE5
    APIs
    • _swprintf.LIBCMTD ref: 6CDD1A35
      • Part of subcall function 6CDC5C90: __vswprintf_s_l.LIBCONCRTD ref: 6CDC5CAE
      • Part of subcall function 6CDCEFD0: lstrcatA.KERNEL32(00000000,00000000,?,6CDCF449), ref: 6CDCEFEC
    • _memcpy_s.LIBCPMTD ref: 6CDD1AB7
    • _memcpy_s.LIBCPMTD ref: 6CDD1C74
      • Part of subcall function 6CDD9B70: EnterCriticalSection.KERNEL32(-00000078,?,?,6CDCDD1A,?,00000010,00000002), ref: 6CDD9BB8
      • Part of subcall function 6CDD9B70: LeaveCriticalSection.KERNEL32(-00000078), ref: 6CDD9CAC
      • Part of subcall function 6CDD5460: EnterCriticalSection.KERNEL32(?), ref: 6CDD5478
      • Part of subcall function 6CDD5460: LeaveCriticalSection.KERNEL32(?,0000001E), ref: 6CDD54A5
    Strings
    • TOnePipeShell [%d] Create Error! It's Already Exists!, xrefs: 6CDD1A24
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave_memcpy_s$__vswprintf_s_l_swprintflstrcat
    • String ID: TOnePipeShell [%d] Create Error! It's Already Exists!
    • API String ID: 1204231629-2958404492
    • Opcode ID: f6385eee31c04a047e12dc03d467b0ba50184640ab4cbd4a88ce00d7fd3d1fd2
    • Instruction ID: fe451609e7837ac8a43c027257e1081a6e77f1ad7b8832bc656bc30c5440bdde
    • Opcode Fuzzy Hash: f6385eee31c04a047e12dc03d467b0ba50184640ab4cbd4a88ce00d7fd3d1fd2
    • Instruction Fuzzy Hash: 83B10AB5A002189FCB15DF54CC91BAAB3B9FF48704F104599E9099B7A0DB31AF85CFA1
    APIs
    • _memcpy_s.LIBCPMTD ref: 6CDCF392
    • _swprintf.LIBCMTD ref: 6CDCF3FE
    • _memcpy_s.LIBCPMTD ref: 6CDCF480
      • Part of subcall function 6CDCE880: EnterCriticalSection.KERNEL32(EBE653E6,00000000,?,6CDCF2A9,?,00000000,00000000,?,EBE653FE), ref: 6CDCE88E
      • Part of subcall function 6CDCE880: LeaveCriticalSection.KERNEL32(EBE653E6,?,6CDCF2A9,?,00000000,00000000,?,EBE653FE), ref: 6CDCE8A4
      • Part of subcall function 6CDC6800: FormatMessageA.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 6CDC685D
      • Part of subcall function 6CDCEFD0: lstrcatA.KERNEL32(00000000,00000000,?,6CDCF449), ref: 6CDCEFEC
    Strings
    • Query [%S] error! Query is running, xrefs: 6CDCF3ED
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection_memcpy_s$EnterFormatLeaveMessage_swprintflstrcat
    • String ID: Query [%S] error! Query is running
    • API String ID: 1163548326-1242599298
    • Opcode ID: d67129f971030efb3b3f1eba192208feb8726278099a9e338bd5e6c6a543d3cd
    • Instruction ID: 26f1eaccfa6257b5cb3a01b47b6646c606c7781783a23b164570479726f44689
    • Opcode Fuzzy Hash: d67129f971030efb3b3f1eba192208feb8726278099a9e338bd5e6c6a543d3cd
    • Instruction Fuzzy Hash: 7E913EB5A002099FDB04DF64CC91BEEB3B6FF88304F104699E8159B790DB31AE55CBA1
    APIs
      • Part of subcall function 6CDD1ED0: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000), ref: 6CDD1EFD
      • Part of subcall function 6CDD1ED0: CloseHandle.KERNEL32(000000FF), ref: 6CDD1F10
    • _memcpy_s.LIBCPMTD ref: 6CDD2683
      • Part of subcall function 6CDD2230: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 6CDD2283
      • Part of subcall function 6CDD2230: GetLastError.KERNEL32 ref: 6CDD2292
      • Part of subcall function 6CDCEFD0: lstrcatA.KERNEL32(00000000,00000000,?,6CDCF449), ref: 6CDCEFEC
    • _memcpy_s.LIBCPMTD ref: 6CDD25AD
    Strings
    • Send keyboardData error, file is not exit! , xrefs: 6CDD25E8
    • Send keyboardData error, file is not exit!, xrefs: 6CDD2547
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CreateFile_memcpy_s$CloseErrorHandleLastlstrcat
    • String ID: Send keyboardData error, file is not exit!$Send keyboardData error, file is not exit!
    • API String ID: 1386899110-2965487200
    • Opcode ID: 230375f2b74d968314902cf25296b143e658b60b69f63531fd7ffd02b5379c6c
    • Instruction ID: 4dc06319e0152e12359a3e5dafa711e823df44c789ca9703ca7b960f58af7a8e
    • Opcode Fuzzy Hash: 230375f2b74d968314902cf25296b143e658b60b69f63531fd7ffd02b5379c6c
    • Instruction Fuzzy Hash: E3814AB5A00209DFCB04DF98D890EEEB7B5FF48318F148659E8159B3A1DB31E945CBA0
    APIs
      • Part of subcall function 6CDC5E10: EnterCriticalSection.KERNEL32(EBE653F6,EBE653FE,00000004,?), ref: 6CDC5E3A
      • Part of subcall function 6CDC5E10: WaitForSingleObject.KERNEL32(000000FF,000000FF), ref: 6CDC5E60
      • Part of subcall function 6CDC5E10: LeaveCriticalSection.KERNEL32(?), ref: 6CDC5E77
    • _swprintf.LIBCMTD ref: 6CDD1D86
      • Part of subcall function 6CDC5C90: __vswprintf_s_l.LIBCONCRTD ref: 6CDC5CAE
      • Part of subcall function 6CDCEFD0: lstrcatA.KERNEL32(00000000,00000000,?,6CDCF449), ref: 6CDCEFEC
    • _memcpy_s.LIBCPMTD ref: 6CDD1DF3
    • _memcpy_s.LIBCPMTD ref: 6CDD1E63
    Strings
    • OnePipeShell [%d] Close error!, xrefs: 6CDD1D7B
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection_memcpy_s$EnterLeaveObjectSingleWait__vswprintf_s_l_swprintflstrcat
    • String ID: OnePipeShell [%d] Close error!
    • API String ID: 3217904910-2944261958
    • Opcode ID: e4ba52645dd56044d3d4369e6d3806a2a48ccc7a80f3ab5542f97a82d6f6ba56
    • Instruction ID: ba048ed0e1501a0214c3609c690d1fc28a728ec5a69b1933a50adf8da030d8a2
    • Opcode Fuzzy Hash: e4ba52645dd56044d3d4369e6d3806a2a48ccc7a80f3ab5542f97a82d6f6ba56
    • Instruction Fuzzy Hash: FC510DB4A00209DFDB04DF94C890FAEB7B5FF89308F108559E9159F7A5DB31A905CBA1
    APIs
    • _memcpy_s.LIBCPMTD ref: 6CDD2AC2
    • _memcpy_s.LIBCPMTD ref: 6CDD2B63
      • Part of subcall function 6CDCEFD0: lstrcatA.KERNEL32(00000000,00000000,?,6CDCF449), ref: 6CDCEFEC
    Strings
    • Screen Stop error!, xrefs: 6CDD2A5C
    • Screen Stop error, Class is NULL!, xrefs: 6CDD2AFD
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _memcpy_s$lstrcat
    • String ID: Screen Stop error!$Screen Stop error, Class is NULL!
    • API String ID: 3156544786-797384994
    • Opcode ID: 0f36c8cd341d97d34779e2e5a212614df4f810458f3a434f0425d9f26d2bf044
    • Instruction ID: 966595b4fa1793d595451248b1d3e5804e775cdc133cdc508e24dc091b4b04cf
    • Opcode Fuzzy Hash: 0f36c8cd341d97d34779e2e5a212614df4f810458f3a434f0425d9f26d2bf044
    • Instruction Fuzzy Hash: 5D515AB4A00205DFDB04DF68D891EEEB7B5FF49308F108A59E8159B3A0DB31E955CBA0
    APIs
    • EnterCriticalSection.KERNEL32(?,EBE653FE), ref: 6CDD8ED4
    • _memcpy_s.LIBCPMTD ref: 6CDD8F79
    • LeaveCriticalSection.KERNEL32(?,?,?), ref: 6CDD8FB8
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave_memcpy_s
    • String ID: Deal output img error!
    • API String ID: 2615672426-2701914271
    • Opcode ID: 8736ed06052d27914f7e9e34e517181bf4fda042d87829740fad9dadbf92e63a
    • Instruction ID: c241c06be21fe7b9e60a624c52994acd0157cee202fd1789a073e32644d56e9d
    • Opcode Fuzzy Hash: 8736ed06052d27914f7e9e34e517181bf4fda042d87829740fad9dadbf92e63a
    • Instruction Fuzzy Hash: 00414E75A10148AFDB08CFA8DC90FEEB7BAFF48214F044619F515A7791DB31A905CBA4
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _free
    • String ID: @0l$0l
    • API String ID: 269201875-1736274302
    • Opcode ID: ceef473eb37bcaae260a43c5f475f17a850dc3d3bdaf2c0f5f5cb887d3df4e6a
    • Instruction ID: 93a7e7bf1e3183df4f562f7586cd937664f451edd5589d4b3be5e89daf6bd432
    • Opcode Fuzzy Hash: ceef473eb37bcaae260a43c5f475f17a850dc3d3bdaf2c0f5f5cb887d3df4e6a
    • Instruction Fuzzy Hash: 7B110871B11210CBDB205B399C82FCA7775A749738F14131AE921CBAE0F7B1D85147C0
    APIs
    • Sleep.KERNEL32(00000001), ref: 6CDCD605
      • Part of subcall function 6CDCDE10: EnterCriticalSection.KERNEL32(?,?,6CDCD7F9), ref: 6CDCDE26
      • Part of subcall function 6CDCDE10: LeaveCriticalSection.KERNEL32(?,?,6CDCD7F9), ref: 6CDCDE3E
    • EnterCriticalSection.KERNEL32(?), ref: 6CDCD6AF
    • LeaveCriticalSection.KERNEL32(?,00000000), ref: 6CDCD6D0
    • EnterCriticalSection.KERNEL32(?), ref: 6CDCD6E0
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Enter$Leave$Sleep
    • String ID:
    • API String ID: 2452663664-0
    • Opcode ID: 4b4538e569982115c3fd32a39b1ab7c274445c6fc5b1c070a78553a372f93ef3
    • Instruction ID: b1a6f65d42fa1bcfd5cd532f0b2f141e8e48ebb9d22571a2ec87ae77813e45f8
    • Opcode Fuzzy Hash: 4b4538e569982115c3fd32a39b1ab7c274445c6fc5b1c070a78553a372f93ef3
    • Instruction Fuzzy Hash: 18513FB4E00109EFCB04CFD8D844AEEB7B9FF88304F148169E515AB351D735AA44CBA1
    APIs
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _strrchr
    • String ID:
    • API String ID: 3213747228-0
    • Opcode ID: 5e6ba0af27dc66adfa9354b1179fd89244a3ffa8c59286eda5a176f6145826b5
    • Instruction ID: c559bb696e66496ddd5483ffc1b5042d11db861e5004315f01e9a32e1668d229
    • Opcode Fuzzy Hash: 5e6ba0af27dc66adfa9354b1179fd89244a3ffa8c59286eda5a176f6145826b5
    • Instruction Fuzzy Hash: ECB11471A052879FDB11CF68C8507EEBFF5EF49304F1581AAE8589BB61D7388906CB60
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?), ref: 6CDC5518
    • GetLastError.KERNEL32 ref: 6CDC5524
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CreateErrorFileLast
    • String ID:
    • API String ID: 1214770103-0
    • Opcode ID: 4a0f974021d391c5d3577ae8fa81abc9374c9f831e6fc4c93954bb644d94de0d
    • Instruction ID: 7839c2c06744b42324ab61499ad175e3595fd32262b616008b582d4edc63e883
    • Opcode Fuzzy Hash: 4a0f974021d391c5d3577ae8fa81abc9374c9f831e6fc4c93954bb644d94de0d
    • Instruction Fuzzy Hash: B051D6B4A0020ADFDB04CF98D990BAEB7B6FF8D304F208658E515A7790D735A941CFA1
    APIs
    • SetFilePointerEx.KERNEL32(000000FF,?,000000FF,00000000,00000000), ref: 6CDC5310
    • WriteFile.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 6CDC533B
    • GetLastError.KERNEL32 ref: 6CDC5345
    • CloseHandle.KERNEL32(?), ref: 6CDC5357
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: File$CloseErrorHandleLastPointerWrite
    • String ID:
    • API String ID: 2796458406-0
    • Opcode ID: 24783b588f8b7c176fd7fce63752465d1a6d957c2826b3d73974785034ab6eca
    • Instruction ID: a508d8ef29a1158e10a9c1078ec991a8184bc5c83c0aacceb6087e064b36908d
    • Opcode Fuzzy Hash: 24783b588f8b7c176fd7fce63752465d1a6d957c2826b3d73974785034ab6eca
    • Instruction Fuzzy Hash: EC41A9B4A00209DFCB04CF98C494B9EBBB5FF48314F108299E925AB391D771EA41CF95
    APIs
    • GetLastError.KERNEL32(?,?,?,6CDE6141,?,?,?,?,6CDE7D32,?), ref: 6CDE970D
    • _free.LIBCMT ref: 6CDE9768
    • _free.LIBCMT ref: 6CDE979E
    • SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,?,6CDE6141,?,?,?,?,6CDE7D32,?), ref: 6CDE97A9
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: ErrorLast_free
    • String ID:
    • API String ID: 2283115069-0
    • Opcode ID: 3d1831859ca60387dca5579340e6373c670802711d22ded985e3ab43bcb0d155
    • Instruction ID: 98504a6d5d126116e1389d07185f7fb64d3ebfeeabd094c078aa3e774e784de1
    • Opcode Fuzzy Hash: 3d1831859ca60387dca5579340e6373c670802711d22ded985e3ab43bcb0d155
    • Instruction Fuzzy Hash: EA11A9B1307611BEEA013BB66CC4EDB35BCAB5E27DB201624F56496AB1DB914C1C4170
    APIs
    • GetLastError.KERNEL32(?,6CDDA587,?,6CDE7998,6CDEA642,?,?,6CDE212E,6CDDA587,?,6CDDA587,0001507C), ref: 6CDE985E
    • _free.LIBCMT ref: 6CDE98B9
    • _free.LIBCMT ref: 6CDE98EF
    • SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6CDDA587,?,6CDE7998,6CDEA642,?,?,6CDE212E,6CDDA587,?,6CDDA587,0001507C), ref: 6CDE98FA
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: ErrorLast_free
    • String ID:
    • API String ID: 2283115069-0
    • Opcode ID: 91ed0e21f6641fc5eb9ea7fa7992b26aef113a3e07b23fe50222bca28bd303ba
    • Instruction ID: de3fe276fbcefafd777cdaaeeaf70640741aa9df7a3ef97196f6aab1eb6bc675
    • Opcode Fuzzy Hash: 91ed0e21f6641fc5eb9ea7fa7992b26aef113a3e07b23fe50222bca28bd303ba
    • Instruction Fuzzy Hash: B40188B1707201BAEA1127B55CC4EDB79BDAB5E37C7101235F52592AF1DB924C1581B0
    APIs
    • ___BuildCatchObject.LIBVCRUNTIME ref: 6CDE3B7C
      • Part of subcall function 6CDE3AC9: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 6CDE3AF8
      • Part of subcall function 6CDE3AC9: ___AdjustPointer.LIBCMT ref: 6CDE3B13
    • _UnwindNestedFrames.LIBCMT ref: 6CDE3B91
    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 6CDE3BA2
    • CallCatchBlock.LIBVCRUNTIME ref: 6CDE3BCA
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
    • String ID:
    • API String ID: 737400349-0
    • Opcode ID: 1d2cbf3fc5d85ee38127e2180f4d2801c9af14cf3da80acdaadcd3532b5d838e
    • Instruction ID: ad9848ba02c71b88631a613395e4424e2de57327ae2189f0c64c76a68a589731
    • Opcode Fuzzy Hash: 1d2cbf3fc5d85ee38127e2180f4d2801c9af14cf3da80acdaadcd3532b5d838e
    • Instruction Fuzzy Hash: CB01D332500148BBDF125F96CD41EEB7BA9EF8C758F044518FA18A6630C772E861DBA0
    APIs
    • GetModuleFileNameW.KERNEL32(?,?,00000105,6CE03F48), ref: 6CDEC23A
    • GetLastError.KERNEL32 ref: 6CDEC244
    • __dosmaperr.LIBCMT ref: 6CDEC24B
    • _mbstowcs.LIBCMT ref: 6CDEC260
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: ErrorFileLastModuleName__dosmaperr_mbstowcs
    • String ID:
    • API String ID: 2664030482-0
    • Opcode ID: 8ccfd428f5102ef04ab08e086118dfc2f1e0b69c17aa054a800e550ce2e6f4fe
    • Instruction ID: 73d7c2b4da4c52a61d3fa7f70831b4214b6e7fbea9104f347b4cf6f9f585ba96
    • Opcode Fuzzy Hash: 8ccfd428f5102ef04ab08e086118dfc2f1e0b69c17aa054a800e550ce2e6f4fe
    • Instruction Fuzzy Hash: B2F06D72A0020DABCF10DFA5DC49EDF7BBCEB59348F000459E619D7540EA709A558BA5
    APIs
    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000), ref: 6CDD1EFD
    • CloseHandle.KERNEL32(000000FF), ref: 6CDD1F10
    • GetLastError.KERNEL32 ref: 6CDD1F1F
    • GetLastError.KERNEL32 ref: 6CDD1F2C
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: ErrorLast$CloseCreateFileHandle
    • String ID:
    • API String ID: 614986841-0
    • Opcode ID: ff74730eb56bc97493d37e8c3da902478c461a2abfdd4059c2ac30ff35ead0e7
    • Instruction ID: 7aa16cd124680402c08cf676908cb528a64c06b4b94ec2c4bbf91577af5188cd
    • Opcode Fuzzy Hash: ff74730eb56bc97493d37e8c3da902478c461a2abfdd4059c2ac30ff35ead0e7
    • Instruction Fuzzy Hash: F1011D75A40308FBDB10DFB4D849B8C7BB4FB05325F208245EA65AB6D0D770A641CB41
    APIs
    • WriteConsoleW.KERNEL32(?,?,0000002C,00000000,?,?,6CDF1583,?,00000001,?,00000001,?,6CDED9ED,00000020,00000000,00000001), ref: 6CDF1DE6
    • GetLastError.KERNEL32(?,6CDF1583,?,00000001,?,00000001,?,6CDED9ED,00000020,00000000,00000001,00000020,00000001,?,6CDEDF6E,00000008), ref: 6CDF1DF2
      • Part of subcall function 6CDF1DB8: CloseHandle.KERNEL32(FFFFFFFE,6CDF1E02,?,6CDF1583,?,00000001,?,00000001,?,6CDED9ED,00000020,00000000,00000001,00000020,00000001), ref: 6CDF1DC8
    • ___initconout.LIBCMT ref: 6CDF1E02
      • Part of subcall function 6CDF1D7A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6CDF1DA9,6CDF1569,00000001,?,6CDED9ED,00000020,00000000,00000001,00000020), ref: 6CDF1D8D
    • WriteConsoleW.KERNEL32(?,?,0000002C,00000000,?,6CDF1583,?,00000001,?,00000001,?,6CDED9ED,00000020,00000000,00000001,00000020), ref: 6CDF1E17
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
    • String ID:
    • API String ID: 2744216297-0
    • Opcode ID: b38144a2f0dbe5018660eb50085c417b1c8dd8846b0ee1834d29565cc34ba469
    • Instruction ID: f89d407443e0acbbb72af022d2e925dcc427b4041b7eec7b66664abbee944809
    • Opcode Fuzzy Hash: b38144a2f0dbe5018660eb50085c417b1c8dd8846b0ee1834d29565cc34ba469
    • Instruction Fuzzy Hash: 0EF0AC76640654BBCF221F96DC04ACE3F36FB4A3A6B094114FA2996930C732C9259BE0
    APIs
    • _free.LIBCMT ref: 6CDE914F
      • Part of subcall function 6CDE99A9: HeapFree.KERNEL32(00000000,00000000,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587), ref: 6CDE99BF
      • Part of subcall function 6CDE99A9: GetLastError.KERNEL32(6CDDA587,?,6CDF03AA,6CDDA587,00000000,6CDDA587,?,?,6CDF03D1,6CDDA587,00000007,6CDDA587,?,6CDED38B,6CDDA587,6CDDA587), ref: 6CDE99D1
    • _free.LIBCMT ref: 6CDE9162
    • _free.LIBCMT ref: 6CDE9173
    • _free.LIBCMT ref: 6CDE9184
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: cb0975accb1119e91522bdd5472b4f9eefc6d35b62aeaa39075d059593bf07f0
    • Instruction ID: b78f31ad707b06d39334806fd3835f48091a4d7cbb835032a5ce62e780f3ae99
    • Opcode Fuzzy Hash: cb0975accb1119e91522bdd5472b4f9eefc6d35b62aeaa39075d059593bf07f0
    • Instruction Fuzzy Hash: CBE0EC79B11AA29E9E12AF15EE004C93E32F7BA614301640FF42016720C7BB0536DFDA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: __aulldvrm
    • String ID: +$-
    • API String ID: 1302938615-2137968064
    • Opcode ID: 10c0253171a2ec4e6f472f94dc16206b29dc5e93729e83d4680e20ea9da39f78
    • Instruction ID: cdbc481e73a379b1ea44c8d7cc52f1ebffa5308b36507175d93f82e85c6f4dc0
    • Opcode Fuzzy Hash: 10c0253171a2ec4e6f472f94dc16206b29dc5e93729e83d4680e20ea9da39f78
    • Instruction Fuzzy Hash: E791C77090424AFEDF54CF69C4506EDBBB5EF0A328F168256E8B497BA2D33089058B61
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: H?l
    • API String ID: 0-617157424
    • Opcode ID: 23b72a67afc0d4338f39f242450f2dc3809aab1de2e9f12e254a40eb8458dc3d
    • Instruction ID: 63c35ae111ea7047ff7f38f89889376d7bf90f1793cebbb8fe5277f724c4b8b4
    • Opcode Fuzzy Hash: 23b72a67afc0d4338f39f242450f2dc3809aab1de2e9f12e254a40eb8458dc3d
    • Instruction Fuzzy Hash: 22415E71E04764AFDB11DF9EDCC09DEBBB8EB8D314B10416BE80497660E7718A55CBA0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: _free
    • String ID: `Cl$dCl
    • API String ID: 269201875-1368427432
    • Opcode ID: 9422df69a7965d7b7934e9982659c42c6f362d08f4c0d9d7a30be203fde8f364
    • Instruction ID: 77ad557a7b375b2bbb0a9fab2ee7c9ca42adfb4720074408848c7bd0d0f7035a
    • Opcode Fuzzy Hash: 9422df69a7965d7b7934e9982659c42c6f362d08f4c0d9d7a30be203fde8f364
    • Instruction Fuzzy Hash: 24119675505302EFE310AF2AD481B82B7F4EB4D758F20541EE589CBEA0E771F4448798
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: \>l$h>l
    • API String ID: 0-3586915
    • Opcode ID: fb9d2daabb965b8a7ad64244d0eba6be517d17069719c6008181efd71d9731fc
    • Instruction ID: b1ca767e564db4b9bb9c30ced84d5e73045e5a0b9bbaedffc69c672ca37a1a66
    • Opcode Fuzzy Hash: fb9d2daabb965b8a7ad64244d0eba6be517d17069719c6008181efd71d9731fc
    • Instruction Fuzzy Hash: 3011E332E01716AACF00DF788805BCE77B55B0A72CF21425ADE11FBA90D37185058BE0
    APIs
    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 6CDE218A
    • ___raise_securityfailure.LIBCMT ref: 6CDE2271
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: FeaturePresentProcessor___raise_securityfailure
    • String ID: ;lp;l
    • API String ID: 3761405300-2967272459
    • Opcode ID: 76a9edd060a83d5bb41906b0b221c906d89693e648e4b7f8a9100af111a726dc
    • Instruction ID: 8fee196e3eb21f01e4e568351ca2b47cc28dd10829659ddf4611e6905da072c0
    • Opcode Fuzzy Hash: 76a9edd060a83d5bb41906b0b221c906d89693e648e4b7f8a9100af111a726dc
    • Instruction Fuzzy Hash: FE2128B47813049ADB14CF29D185E40BBF0BB5E318F10441EE604CB390DBB299A1CFE4
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6CDC4D1D
    • std::_Xinvalid_argument.LIBCPMT ref: 6CDC4D3B
      • Part of subcall function 6CDE20D6: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6CDE20E2
      • Part of subcall function 6CDE20D6: __CxxThrowException@8.LIBVCRUNTIME ref: 6CDE20F0
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: std::_$Exception@8Mutex_baseMutex_base::~_ThrowXinvalid_argumentstd::invalid_argument::invalid_argument
    • String ID: list<T> too long
    • API String ID: 2057655285-4027344264
    • Opcode ID: c9f287cf20f37714df57318bee88b8decbecfee6e3ee9e228ed4a9bfbaa7b5cb
    • Instruction ID: d2d8f643da1f1815c78df5635e1d0ba740f9efd17e0d9f0f7bb1bbb2df4af722
    • Opcode Fuzzy Hash: c9f287cf20f37714df57318bee88b8decbecfee6e3ee9e228ed4a9bfbaa7b5cb
    • Instruction Fuzzy Hash: A1F05831E04118AF8B08EFA8D9818DCBBB8AF08300B0042A9D80567B24DB30BE44CBD2
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6CDD7D1D
    • std::_Xinvalid_argument.LIBCPMT ref: 6CDD7D3B
      • Part of subcall function 6CDE20D6: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6CDE20E2
      • Part of subcall function 6CDE20D6: __CxxThrowException@8.LIBVCRUNTIME ref: 6CDE20F0
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: std::_$Exception@8Mutex_baseMutex_base::~_ThrowXinvalid_argumentstd::invalid_argument::invalid_argument
    • String ID: list<T> too long
    • API String ID: 2057655285-4027344264
    • Opcode ID: 6d4ed3638c5ae685ad5ddbc38ddaded31e70bd28714d3fbdf1dbda035988bc6c
    • Instruction ID: 4525141f72fd8945508d385565d3fed578304331f2e7ce39ca55810939daec09
    • Opcode Fuzzy Hash: 6d4ed3638c5ae685ad5ddbc38ddaded31e70bd28714d3fbdf1dbda035988bc6c
    • Instruction Fuzzy Hash: 24F05831E04118EF8B08EFA8C9818DCBBB8AF08300B0142A9D80567B24DB30BE44CBD1
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6CDD3FDD
    • std::_Xinvalid_argument.LIBCPMT ref: 6CDD3FFB
      • Part of subcall function 6CDE20D6: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6CDE20E2
      • Part of subcall function 6CDE20D6: __CxxThrowException@8.LIBVCRUNTIME ref: 6CDE20F0
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: std::_$Exception@8Mutex_baseMutex_base::~_ThrowXinvalid_argumentstd::invalid_argument::invalid_argument
    • String ID: list<T> too long
    • API String ID: 2057655285-4027344264
    • Opcode ID: e0b73a14e70f9c11e861fcf42e486aa8e7570624ce519a44bc6bf41ad27c2bf5
    • Instruction ID: 3888133118effbfde4c03e92aa52c7186d26b3844a45d381202a04c682010ec0
    • Opcode Fuzzy Hash: e0b73a14e70f9c11e861fcf42e486aa8e7570624ce519a44bc6bf41ad27c2bf5
    • Instruction Fuzzy Hash: 8DF05831D04128AF8B08EFA8D9819DDBBB8AF08340B1182A9D80567B20DB30BE44CBD1
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6CDC20AD
    • std::_Xinvalid_argument.LIBCPMT ref: 6CDC20CB
      • Part of subcall function 6CDE20D6: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6CDE20E2
      • Part of subcall function 6CDE20D6: __CxxThrowException@8.LIBVCRUNTIME ref: 6CDE20F0
    Strings
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: std::_$Exception@8Mutex_baseMutex_base::~_ThrowXinvalid_argumentstd::invalid_argument::invalid_argument
    • String ID: list<T> too long
    • API String ID: 2057655285-4027344264
    • Opcode ID: befe9dd3abdb9a183c4998c880bab710b3ed0d12791bfe6a2cf2c6c0dc396a88
    • Instruction ID: 65e219d95a9bbcbec4ea0f29eab66ae39bff0c4c04640fefaedd2fc4ff0a3557
    • Opcode Fuzzy Hash: befe9dd3abdb9a183c4998c880bab710b3ed0d12791bfe6a2cf2c6c0dc396a88
    • Instruction Fuzzy Hash: B4F05E31E05118AF8B08DFA8C9818DCBBB8AF04304F0042A5D80567B20DB307E44DBD1
    APIs
    • InitializeCriticalSection.KERNEL32(-00014F25,?,?,?,?,EBE653FE,?,?,?,?,?,00000000,6CDF525F,000000FF,?,6CDDA61B), ref: 6CDCD963
    • InitializeCriticalSection.KERNEL32(-00014F3D,?,?,EBE653FE,?,?,?,?,?,00000000,6CDF525F,000000FF,?,6CDDA61B), ref: 6CDCD973
    • InitializeCriticalSection.KERNEL32(-00014F55,?,?,EBE653FE,?,?,?,?,?,00000000,6CDF525F,000000FF,?,6CDDA61B), ref: 6CDCD982
    • Sleep.KERNEL32(00000064,00002710,?,?,?,EBE653FE), ref: 6CDCDA3A
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalInitializeSection$Sleep
    • String ID:
    • API String ID: 1960909292-0
    • Opcode ID: 51994e7b6d3781a5c1fef0d4266b71e4249d4a2770071ef82d08d88df9841b40
    • Instruction ID: 283006201452a3d35989462a42a531a65240487dcd30c41dd2c004ec57d50b5d
    • Opcode Fuzzy Hash: 51994e7b6d3781a5c1fef0d4266b71e4249d4a2770071ef82d08d88df9841b40
    • Instruction Fuzzy Hash: 85816CB4A00209DFDB04DF94CC94BEEB7B9BF48308F104229E455AB7A0DB74A945CBA1
    APIs
    • EnterCriticalSection.KERNEL32(?), ref: 6CDCE5B8
    • LeaveCriticalSection.KERNEL32(?), ref: 6CDCE5CE
    • EnterCriticalSection.KERNEL32(?), ref: 6CDCE600
    • LeaveCriticalSection.KERNEL32(?), ref: 6CDCE614
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: 4adf687b13f6a32cb5bf9d9c26976e39f4608cbbc3c12382226fd349e4987a5f
    • Instruction ID: e1608235e3972d259eb113dd5d3793debd82b252bbe9cdfc8b508daac51e3ec0
    • Opcode Fuzzy Hash: 4adf687b13f6a32cb5bf9d9c26976e39f4608cbbc3c12382226fd349e4987a5f
    • Instruction Fuzzy Hash: 241166B4E00209DFCF04DFB8E895AAEBBB5EF48304F104159EA05E7341D735AA44CBA5
    APIs
    • EnterCriticalSection.KERNEL32(?,00000000,?,6CDCD534), ref: 6CDCDE68
    • LeaveCriticalSection.KERNEL32(?,?,6CDCD534), ref: 6CDCDE86
    • EnterCriticalSection.KERNEL32(?,?,6CDCD534), ref: 6CDCDE96
    • LeaveCriticalSection.KERNEL32(?), ref: 6CDCDEC9
    Memory Dump Source
    • Source File: 00000003.00000002.1655799969.000000006CDC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 6CDC0000, based on PE: true
    • Associated: 00000003.00000002.1655787473.000000006CDC0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655827033.000000006CDF6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655842206.000000006CE03000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000003.00000002.1655855653.000000006CE06000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_3_2_6cdc0000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: 791b428784e1ccfb4aab6107255ef299580db052e515131977e4c15b8c6e85c2
    • Instruction ID: 887ebf565d4064448687850363d29cdaede0102acae1a99141ab04af589866d5
    • Opcode Fuzzy Hash: 791b428784e1ccfb4aab6107255ef299580db052e515131977e4c15b8c6e85c2
    • Instruction Fuzzy Hash: 1F018174A00604EBDB14DBA4ED54FEEB779FF8830AF2041A8E605AB741C6359E149AA4

    Execution Graph

    Execution Coverage:0.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:1623
    Total number of Limit Nodes:23
    execution_graph 19696 6d06a720 GetCommandLineW CommandLineToArgvW 19699 6d06a450 SetUnhandledExceptionFilter 19696->19699 19700 6d06a69c 19699->19700 19703 6d06a490 _memcpy_s 19699->19703 19731 6d072103 19700->19731 19702 6d06a6cd ExitProcess 19738 6d06a420 WideCharToMultiByte 19703->19738 19705 6d06a512 19739 6d06a420 WideCharToMultiByte 19705->19739 19707 6d06a534 19740 6d06a420 WideCharToMultiByte 19707->19740 19709 6d06a557 19741 6d06a420 WideCharToMultiByte 19709->19741 19711 6d06a57a 19742 6d072114 19711->19742 19714 6d06a5a4 _Debug_range 19752 6d077fa2 19714->19752 19715 6d06a62f 19782 6d05dca0 19715->19782 19727 6d069510 27 API calls 19728 6d06a60c 19727->19728 19762 6d05d8a0 19728->19762 19732 6d07210e IsProcessorFeaturePresent 19731->19732 19733 6d07210c 19731->19733 19735 6d072193 19732->19735 19733->19702 19803 6d072157 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 19735->19803 19737 6d072276 19737->19702 19738->19705 19739->19707 19740->19709 19741->19711 19745 6d072119 19742->19745 19744 6d06a587 19744->19714 19744->19715 19745->19744 19748 6d072135 _Allocate 19745->19748 19804 6d078444 19745->19804 19809 6d077a2c 19745->19809 19747 6d072710 _Allocate 19749 6d07341e __CxxThrowException@8 RaiseException 19747->19749 19748->19747 19816 6d07341e 19748->19816 19750 6d07272d 19749->19750 20003 6d077cd2 19752->20003 19754 6d06a5c0 19755 6d078020 19754->19755 20299 6d077aa9 19755->20299 19757 6d06a5d0 19758 6d069510 19757->19758 19759 6d06953e 19758->19759 20315 6d056bf0 19759->20315 20405 6d058f50 19762->20405 19764 6d05d8dd _memcpy_s 19765 6d05d959 InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 19764->19765 19766 6d05d990 _Debug_range 19765->19766 19768 6d072114 _Allocate 21 API calls 19766->19768 19773 6d05da91 19766->19773 19780 6d05da38 Sleep 19766->19780 20408 6d058570 19766->20408 20413 6d058680 19766->20413 19767 6d072114 _Allocate 21 API calls 19770 6d05daa6 _Debug_range 19767->19770 19768->19766 19771 6d05dad9 Concurrency::details::ContextBase::GetWorkQueueIdentity 19770->19771 20420 6d064760 19770->20420 20451 6d069940 19771->20451 19773->19767 19778 6d05db27 19779 6d0568e0 11 API calls 19778->19779 19781 6d05db36 19779->19781 19780->19766 19780->19773 19781->19715 20880 6d0699e0 19782->20880 19786 6d05dcc6 20884 6d069d00 CreateThread 19786->20884 19788 6d05dce0 20885 6d069b70 19788->20885 19791 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 19792 6d05dd29 19791->19792 19793 6d05dd30 19792->19793 19794 6d05dd43 WaitForSingleObject 19793->19794 19795 6d05dd62 19793->19795 19794->19795 19796 6d05dd8d 19795->19796 19797 6d05dd6e WaitForSingleObject 19795->19797 20942 6d069a10 19796->20942 19797->19796 19800 6d06a6e0 20946 6d05db80 19800->20946 19802 6d06a6ef error_info_injector 19802->19700 19803->19737 19819 6d078488 19804->19819 19806 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 19807 6d078484 19806->19807 19807->19745 19808 6d07845a 19808->19806 19815 6d07a5ff FindHandlerForForeignException 19809->19815 19810 6d07a63d 19830 6d077993 19810->19830 19811 6d07a628 HeapAlloc 19813 6d07a63b 19811->19813 19811->19815 19813->19745 19814 6d078444 _Allocate 7 API calls 19814->19815 19815->19810 19815->19811 19815->19814 19818 6d07343e RaiseException 19816->19818 19818->19747 19820 6d078494 ___scrt_is_nonwritable_in_current_image 19819->19820 19825 6d07bcb1 EnterCriticalSection 19820->19825 19822 6d07849f 19826 6d0784d1 19822->19826 19824 6d0784c6 __vfwprintf_l 19824->19808 19825->19822 19829 6d07bcf9 LeaveCriticalSection 19826->19829 19828 6d0784d8 19828->19824 19829->19828 19833 6d079859 GetLastError 19830->19833 19832 6d077998 19832->19813 19834 6d079870 19833->19834 19835 6d079876 19833->19835 19856 6d079c64 19834->19856 19853 6d07987c SetLastError 19835->19853 19863 6d079cba 19835->19863 19842 6d0798c1 19845 6d079cba FindHandlerForForeignException 11 API calls 19842->19845 19843 6d0798aa 19844 6d079cba FindHandlerForForeignException 11 API calls 19843->19844 19854 6d0798b8 19844->19854 19846 6d0798cd 19845->19846 19847 6d0798e2 19846->19847 19848 6d0798d1 19846->19848 19883 6d079506 19847->19883 19851 6d079cba FindHandlerForForeignException 11 API calls 19848->19851 19851->19854 19853->19832 19877 6d0799a9 19854->19877 19855 6d0799a9 _free 17 API calls 19855->19853 19888 6d079adf 19856->19888 19858 6d079c8b 19859 6d079ca3 TlsGetValue 19858->19859 19860 6d079c97 19858->19860 19859->19860 19861 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 19860->19861 19862 6d079cb4 19861->19862 19862->19835 19864 6d079adf FindHandlerForForeignException 5 API calls 19863->19864 19865 6d079ce1 19864->19865 19866 6d079cfc TlsSetValue 19865->19866 19867 6d079cf0 19865->19867 19866->19867 19868 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 19867->19868 19869 6d079892 19868->19869 19869->19853 19870 6d07994c 19869->19870 19875 6d079959 FindHandlerForForeignException 19870->19875 19871 6d079999 19874 6d077993 _free 18 API calls 19871->19874 19872 6d079984 RtlAllocateHeap 19873 6d0798a2 19872->19873 19872->19875 19873->19842 19873->19843 19874->19873 19875->19871 19875->19872 19876 6d078444 _Allocate 7 API calls 19875->19876 19876->19875 19878 6d0799b4 HeapFree 19877->19878 19879 6d0799dd _free 19877->19879 19878->19879 19880 6d0799c9 19878->19880 19879->19853 19881 6d077993 _free 17 API calls 19880->19881 19882 6d0799cf GetLastError 19881->19882 19882->19879 19901 6d0793c2 19883->19901 19885 6d079574 19907 6d0794b6 19885->19907 19887 6d07959d 19887->19855 19889 6d079b0c 19888->19889 19893 6d079b08 __crt_fast_encode_pointer 19888->19893 19889->19893 19894 6d079a17 19889->19894 19892 6d079b26 GetProcAddress 19892->19893 19893->19858 19899 6d079a28 try_get_first_available_module 19894->19899 19895 6d079ad2 19895->19892 19895->19893 19896 6d079a45 LoadLibraryExW 19897 6d079a60 GetLastError 19896->19897 19896->19899 19897->19899 19898 6d079abb FreeLibrary 19898->19899 19899->19895 19899->19896 19899->19898 19900 6d079a93 LoadLibraryExW 19899->19900 19900->19899 19902 6d0793ce ___scrt_is_nonwritable_in_current_image 19901->19902 19915 6d07bcb1 EnterCriticalSection 19902->19915 19904 6d0793d8 19916 6d0793fe 19904->19916 19906 6d0793f6 __vfwprintf_l 19906->19885 19908 6d0794c2 ___scrt_is_nonwritable_in_current_image 19907->19908 19920 6d07bcb1 EnterCriticalSection 19908->19920 19910 6d0794cc 19921 6d079691 19910->19921 19912 6d0794e4 19925 6d0794fa 19912->19925 19914 6d0794f2 __vfwprintf_l 19914->19887 19915->19904 19919 6d07bcf9 LeaveCriticalSection 19916->19919 19918 6d079408 19918->19906 19919->19918 19920->19910 19922 6d0796c7 FindHandlerForForeignException 19921->19922 19923 6d0796a0 FindHandlerForForeignException 19921->19923 19922->19912 19923->19922 19928 6d07d1f3 19923->19928 20002 6d07bcf9 LeaveCriticalSection 19925->20002 19927 6d079504 19927->19914 19929 6d07d209 19928->19929 19930 6d07d273 19928->19930 19929->19930 19933 6d07d23c 19929->19933 19937 6d0799a9 _free 19 API calls 19929->19937 19932 6d0799a9 _free 19 API calls 19930->19932 19955 6d07d2c1 19930->19955 19934 6d07d295 19932->19934 19935 6d07d25e 19933->19935 19942 6d0799a9 _free 19 API calls 19933->19942 19936 6d0799a9 _free 19 API calls 19934->19936 19939 6d0799a9 _free 19 API calls 19935->19939 19938 6d07d2a8 19936->19938 19941 6d07d231 19937->19941 19943 6d0799a9 _free 19 API calls 19938->19943 19944 6d07d268 19939->19944 19940 6d07d32f 19946 6d0799a9 _free 19 API calls 19940->19946 19956 6d080219 19941->19956 19948 6d07d253 19942->19948 19949 6d07d2b6 19943->19949 19945 6d0799a9 _free 19 API calls 19944->19945 19945->19930 19950 6d07d335 19946->19950 19984 6d080317 19948->19984 19953 6d0799a9 _free 19 API calls 19949->19953 19950->19922 19951 6d07d2cf 19951->19940 19954 6d0799a9 19 API calls _free 19951->19954 19953->19955 19954->19951 19996 6d07d366 19955->19996 19957 6d08022a 19956->19957 19983 6d080313 19956->19983 19958 6d08023b 19957->19958 19959 6d0799a9 _free 19 API calls 19957->19959 19960 6d08024d 19958->19960 19962 6d0799a9 _free 19 API calls 19958->19962 19959->19958 19961 6d08025f 19960->19961 19963 6d0799a9 _free 19 API calls 19960->19963 19964 6d080271 19961->19964 19965 6d0799a9 _free 19 API calls 19961->19965 19962->19960 19963->19961 19966 6d080283 19964->19966 19967 6d0799a9 _free 19 API calls 19964->19967 19965->19964 19968 6d080295 19966->19968 19970 6d0799a9 _free 19 API calls 19966->19970 19967->19966 19969 6d0802a7 19968->19969 19971 6d0799a9 _free 19 API calls 19968->19971 19972 6d0799a9 _free 19 API calls 19969->19972 19973 6d0802b9 19969->19973 19970->19968 19971->19969 19972->19973 19974 6d0799a9 _free 19 API calls 19973->19974 19976 6d0802cb 19973->19976 19974->19976 19975 6d0802dd 19977 6d0802ef 19975->19977 19979 6d0799a9 _free 19 API calls 19975->19979 19976->19975 19978 6d0799a9 _free 19 API calls 19976->19978 19980 6d080301 19977->19980 19981 6d0799a9 _free 19 API calls 19977->19981 19978->19975 19979->19977 19982 6d0799a9 _free 19 API calls 19980->19982 19980->19983 19981->19980 19982->19983 19983->19933 19985 6d08037c 19984->19985 19986 6d080324 19984->19986 19985->19935 19987 6d080334 19986->19987 19988 6d0799a9 _free 19 API calls 19986->19988 19989 6d080346 19987->19989 19990 6d0799a9 _free 19 API calls 19987->19990 19988->19987 19991 6d080358 19989->19991 19992 6d0799a9 _free 19 API calls 19989->19992 19990->19989 19993 6d08036a 19991->19993 19994 6d0799a9 _free 19 API calls 19991->19994 19992->19991 19993->19985 19995 6d0799a9 _free 19 API calls 19993->19995 19994->19993 19995->19985 19997 6d07d373 19996->19997 20001 6d07d391 19996->20001 19998 6d0803b8 FindHandlerForForeignException 19 API calls 19997->19998 19997->20001 19999 6d07d38b 19998->19999 20000 6d0799a9 _free 19 API calls 19999->20000 20000->20001 20001->19951 20002->19927 20019 6d0774b3 20003->20019 20005 6d077d27 20024 6d076101 20005->20024 20006 6d077ce5 20006->20005 20007 6d077cfa 20006->20007 20010 6d077cff _memcpy_s 20006->20010 20009 6d077993 _free 19 API calls 20007->20009 20009->20010 20010->19754 20012 6d077d32 20014 6d077d66 20012->20014 20032 6d077fed 20012->20032 20013 6d077dda __aulldvrm 20016 6d077f79 __vswprintf_s_l 19 API calls 20013->20016 20014->20013 20039 6d077f79 20014->20039 20017 6d077f00 20016->20017 20017->20010 20018 6d077993 _free 19 API calls 20017->20018 20018->20010 20020 6d0774cb 20019->20020 20021 6d0774b8 20019->20021 20020->20006 20022 6d077993 _free 19 API calls 20021->20022 20023 6d0774bd _memcpy_s 20022->20023 20023->20006 20025 6d076121 20024->20025 20026 6d076118 20024->20026 20025->20026 20043 6d079708 GetLastError 20025->20043 20026->20012 20033 6d07800f 20032->20033 20034 6d077ff9 20032->20034 20258 6d077fc7 20033->20258 20034->20033 20035 6d078001 20034->20035 20249 6d07b8cc 20035->20249 20038 6d07800d 20038->20012 20040 6d077f93 _memcpy_s 20039->20040 20041 6d077f8a 20039->20041 20040->20013 20041->20040 20042 6d077993 _free 19 API calls 20041->20042 20042->20040 20044 6d07971f 20043->20044 20045 6d079725 20043->20045 20046 6d079c64 FindHandlerForForeignException 11 API calls 20044->20046 20047 6d079cba FindHandlerForForeignException 11 API calls 20045->20047 20067 6d07972b SetLastError 20045->20067 20046->20045 20048 6d079741 20047->20048 20050 6d07994c FindHandlerForForeignException 19 API calls 20048->20050 20048->20067 20053 6d079751 20050->20053 20051 6d076141 20070 6d07ac04 20051->20070 20052 6d0797b9 20078 6d079267 20052->20078 20055 6d079770 20053->20055 20056 6d079759 20053->20056 20059 6d079cba FindHandlerForForeignException 11 API calls 20055->20059 20057 6d079cba FindHandlerForForeignException 11 API calls 20056->20057 20060 6d079767 20057->20060 20061 6d07977c 20059->20061 20064 6d0799a9 _free 19 API calls 20060->20064 20062 6d079791 20061->20062 20063 6d079780 20061->20063 20066 6d079506 FindHandlerForForeignException 19 API calls 20062->20066 20065 6d079cba FindHandlerForForeignException 11 API calls 20063->20065 20064->20067 20065->20060 20068 6d07979c 20066->20068 20067->20051 20067->20052 20069 6d0799a9 _free 19 API calls 20068->20069 20069->20067 20071 6d07ac17 20070->20071 20072 6d076157 20070->20072 20071->20072 20206 6d07d440 20071->20206 20074 6d07ac31 20072->20074 20075 6d07ac44 20074->20075 20076 6d07ac59 20074->20076 20075->20076 20228 6d07c804 20075->20228 20076->20026 20089 6d07ceb4 20078->20089 20081 6d079277 20083 6d0792a0 20081->20083 20084 6d079281 IsProcessorFeaturePresent 20081->20084 20125 6d0789a7 20083->20125 20086 6d07928d 20084->20086 20119 6d075874 20086->20119 20128 6d07cdf0 20089->20128 20091 6d07926c 20091->20081 20092 6d07cf04 20091->20092 20093 6d07cf10 FindHandlerForForeignException 20092->20093 20094 6d079859 __dosmaperr 19 API calls 20093->20094 20096 6d07cf37 __purecall 20093->20096 20099 6d07cf3d __purecall 20093->20099 20094->20096 20095 6d07cf84 20097 6d077993 _free 19 API calls 20095->20097 20096->20095 20098 6d07cf6e _memcpy_s 20096->20098 20096->20099 20097->20098 20147 6d084319 20098->20147 20101 6d07cfb0 20099->20101 20139 6d07bcb1 EnterCriticalSection 20099->20139 20104 6d07cff2 20101->20104 20105 6d07cfff 20101->20105 20116 6d07d02d 20101->20116 20107 6d07cffa 20104->20107 20150 6d07bcf9 LeaveCriticalSection 20104->20150 20105->20116 20140 6d07cefb 20105->20140 20111 6d0789a7 __purecall 28 API calls 20107->20111 20114 6d07d105 20111->20114 20112 6d079708 FindHandlerForForeignException 34 API calls 20117 6d07d093 20112->20117 20115 6d07cefb __purecall 34 API calls 20115->20116 20143 6d07d0ad 20116->20143 20117->20098 20118 6d079708 FindHandlerForForeignException 34 API calls 20117->20118 20118->20098 20120 6d075890 _memcpy_s ___scrt_fastfail 20119->20120 20121 6d0758bc IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 20120->20121 20122 6d07598d ___scrt_fastfail 20121->20122 20123 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20122->20123 20124 6d0759ab 20123->20124 20124->20083 20152 6d078833 20125->20152 20129 6d07cdfc ___scrt_is_nonwritable_in_current_image 20128->20129 20134 6d07bcb1 EnterCriticalSection 20129->20134 20131 6d07ce0a 20135 6d07ce3e 20131->20135 20133 6d07ce31 __vfwprintf_l 20133->20091 20134->20131 20138 6d07bcf9 LeaveCriticalSection 20135->20138 20137 6d07ce48 20137->20133 20138->20137 20139->20101 20141 6d079708 FindHandlerForForeignException 34 API calls 20140->20141 20142 6d07cf00 20141->20142 20142->20115 20144 6d07d0b3 20143->20144 20146 6d07d084 20143->20146 20151 6d07bcf9 LeaveCriticalSection 20144->20151 20146->20098 20146->20112 20146->20117 20148 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20147->20148 20149 6d084324 20148->20149 20149->20149 20150->20107 20151->20146 20153 6d078841 20152->20153 20161 6d078852 20152->20161 20163 6d0788db GetModuleHandleW 20153->20163 20156 6d078886 20157 6d07888c 20156->20157 20180 6d078899 20156->20180 20172 6d078701 20161->20172 20164 6d078846 20163->20164 20164->20161 20165 6d07891f GetModuleHandleExW 20164->20165 20166 6d078949 GetProcAddress 20165->20166 20167 6d07895e 20165->20167 20166->20167 20168 6d078972 FreeLibrary 20167->20168 20169 6d07897b 20167->20169 20168->20169 20170 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20169->20170 20171 6d078985 20170->20171 20171->20161 20173 6d07870d ___scrt_is_nonwritable_in_current_image 20172->20173 20188 6d07bcb1 EnterCriticalSection 20173->20188 20175 6d078717 20189 6d078744 20175->20189 20179 6d078730 __vfwprintf_l 20179->20156 20202 6d07bd10 GetPEB 20180->20202 20183 6d0788c8 20186 6d07891f __purecall 8 API calls 20183->20186 20184 6d0788a8 GetPEB 20184->20183 20185 6d0788b8 GetCurrentProcess TerminateProcess 20184->20185 20185->20183 20187 6d0788d0 ExitProcess 20186->20187 20188->20175 20192 6d078750 FindHandlerForForeignException 20189->20192 20190 6d084319 __purecall 5 API calls 20191 6d078724 20190->20191 20199 6d078738 20191->20199 20193 6d0787bd 20192->20193 20195 6d079049 __purecall 19 API calls 20192->20195 20198 6d0787eb 20192->20198 20194 6d0787da 20193->20194 20196 6d0784da __purecall 5 API calls 20193->20196 20197 6d0784da __purecall 5 API calls 20194->20197 20195->20193 20196->20194 20197->20198 20198->20190 20200 6d07bcf9 __purecall LeaveCriticalSection 20199->20200 20201 6d078742 20200->20201 20201->20179 20203 6d07bd2a 20202->20203 20204 6d0788a3 20202->20204 20205 6d079b61 __purecall 10 API calls 20203->20205 20204->20183 20204->20184 20205->20204 20207 6d07d44c ___scrt_is_nonwritable_in_current_image 20206->20207 20208 6d079708 FindHandlerForForeignException 34 API calls 20207->20208 20209 6d07d455 20208->20209 20210 6d07d49b __vfwprintf_l 20209->20210 20219 6d07bcb1 EnterCriticalSection 20209->20219 20210->20072 20212 6d07d473 20220 6d07d4b7 20212->20220 20217 6d079267 __purecall 34 API calls 20218 6d07d4b6 20217->20218 20219->20212 20221 6d07d484 20220->20221 20222 6d07d4c5 FindHandlerForForeignException 20220->20222 20224 6d07d4a0 20221->20224 20222->20221 20223 6d07d1f3 FindHandlerForForeignException 19 API calls 20222->20223 20223->20221 20227 6d07bcf9 LeaveCriticalSection 20224->20227 20226 6d07d497 20226->20210 20226->20217 20227->20226 20229 6d079708 FindHandlerForForeignException 34 API calls 20228->20229 20230 6d07c80e 20229->20230 20233 6d07c726 20230->20233 20232 6d07c814 20232->20076 20234 6d07c732 ___scrt_is_nonwritable_in_current_image 20233->20234 20240 6d07c74c 20234->20240 20244 6d07bcb1 EnterCriticalSection 20234->20244 20237 6d07c753 __vfwprintf_l 20237->20232 20238 6d079267 __purecall 34 API calls 20241 6d07c7bb 20238->20241 20239 6d07c788 20245 6d07c7a5 20239->20245 20240->20237 20240->20238 20242 6d07c75c 20242->20239 20243 6d0799a9 _free 19 API calls 20242->20243 20243->20239 20244->20242 20248 6d07bcf9 LeaveCriticalSection 20245->20248 20247 6d07c7ac 20247->20240 20248->20247 20250 6d076101 __fassign 34 API calls 20249->20250 20251 6d07b8ea 20250->20251 20252 6d07b8fa 20251->20252 20262 6d07e31c 20251->20262 20255 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20252->20255 20256 6d07b9a0 20255->20256 20256->20038 20259 6d077fde 20258->20259 20260 6d077fd8 20258->20260 20294 6d07b83b 20259->20294 20260->20038 20263 6d076101 __fassign 34 API calls 20262->20263 20264 6d07b91d 20263->20264 20265 6d08049c 20264->20265 20266 6d076101 __fassign 34 API calls 20265->20266 20267 6d0804bc 20266->20267 20280 6d07caac 20267->20280 20269 6d08057a 20270 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20269->20270 20273 6d08059d 20270->20273 20271 6d0804e9 20271->20269 20276 6d08050f _memcpy_s __alloca_probe_16 20271->20276 20283 6d07a5ff 20271->20283 20273->20252 20274 6d080574 20290 6d07e58c 20274->20290 20276->20274 20277 6d07caac __fassign MultiByteToWideChar 20276->20277 20278 6d08055d 20277->20278 20278->20274 20279 6d080564 GetStringTypeW 20278->20279 20279->20274 20281 6d07cabd MultiByteToWideChar 20280->20281 20281->20271 20284 6d07a63d 20283->20284 20288 6d07a60d FindHandlerForForeignException 20283->20288 20286 6d077993 _free 19 API calls 20284->20286 20285 6d07a628 HeapAlloc 20287 6d07a63b 20285->20287 20285->20288 20286->20287 20287->20276 20288->20284 20288->20285 20289 6d078444 _Allocate 7 API calls 20288->20289 20289->20288 20291 6d07e5a9 20290->20291 20292 6d07e598 20290->20292 20291->20269 20292->20291 20293 6d0799a9 _free 19 API calls 20292->20293 20293->20291 20295 6d079708 FindHandlerForForeignException 34 API calls 20294->20295 20296 6d07b846 20295->20296 20297 6d07ac04 __fassign 34 API calls 20296->20297 20298 6d07b856 20297->20298 20298->20260 20300 6d0774b3 __vswprintf_s_l 19 API calls 20299->20300 20303 6d077abb 20300->20303 20301 6d077af6 20304 6d076101 __fassign 34 API calls 20301->20304 20302 6d077ad0 20305 6d077993 _free 19 API calls 20302->20305 20303->20301 20303->20302 20306 6d077ad5 _memcpy_s 20303->20306 20308 6d077b02 20304->20308 20305->20306 20306->19757 20307 6d077fed __vswprintf_s_l 37 API calls 20307->20308 20308->20307 20309 6d077b31 20308->20309 20310 6d077b9b 20309->20310 20312 6d077f79 __vswprintf_s_l 19 API calls 20309->20312 20311 6d077f79 __vswprintf_s_l 19 API calls 20310->20311 20313 6d077c65 __vswprintf_s_l 20311->20313 20312->20310 20313->20306 20314 6d077993 _free 19 API calls 20313->20314 20314->20306 20316 6d056c00 shared_ptr char_traits 20315->20316 20319 6d056c20 20316->20319 20318 6d056c19 20318->19727 20320 6d056c31 std::_Mutex_base::~_Mutex_base 20319->20320 20322 6d056c3f 20320->20322 20323 6d056df0 20320->20323 20322->20318 20336 6d056b70 20323->20336 20326 6d056e15 std::_Mutex_base::~_Mutex_base 20343 6d056ef0 20326->20343 20329 6d056e35 std::_Mutex_base::~_Mutex_base 20348 6d056d90 20329->20348 20331 6d056e5b Concurrency::details::ContextBase::GetWorkQueueIdentity shared_ptr 20333 6d056eb0 construct shared_ptr 20331->20333 20352 6d056dc0 20331->20352 20334 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20333->20334 20335 6d056ee4 20334->20335 20335->20322 20337 6d056b8b _DebugHeapAllocator _Min_value _Max_value std::_Mutex_base::~_Mutex_base 20336->20337 20338 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20337->20338 20339 6d056be0 20338->20339 20339->20326 20340 6d054d90 20339->20340 20355 6d0720d6 20340->20355 20344 6d056b70 5 API calls 20343->20344 20345 6d056f0b _Max_value std::_Mutex_base::~_Mutex_base 20344->20345 20346 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20345->20346 20347 6d056f73 20346->20347 20347->20329 20349 6d056da0 shared_ptr 20348->20349 20374 6d051f90 20349->20374 20397 6d051fd0 20352->20397 20354 6d056dd4 20354->20333 20360 6d07205e 20355->20360 20358 6d07341e __CxxThrowException@8 RaiseException 20359 6d054d9d 20358->20359 20359->20326 20363 6d07200e 20360->20363 20366 6d07339c 20363->20366 20367 6d07203a 20366->20367 20368 6d0733a9 20366->20368 20367->20358 20368->20367 20369 6d077a2c std::exception::exception 20 API calls 20368->20369 20370 6d0733c6 20369->20370 20371 6d0733d6 20370->20371 20372 6d0792ab std::exception::exception 19 API calls 20370->20372 20373 6d077a0f ___vcrt_freefls@4 19 API calls 20371->20373 20372->20371 20373->20367 20375 6d051f9c 20374->20375 20376 6d051faa 20374->20376 20380 6d052440 20375->20380 20379 6d051fa5 20376->20379 20386 6d051030 20376->20386 20379->20331 20381 6d052457 20380->20381 20382 6d051030 _Allocate 21 API calls 20381->20382 20384 6d052467 20382->20384 20385 6d052482 20384->20385 20389 6d075a49 20384->20389 20385->20379 20387 6d072114 _Allocate 21 API calls 20386->20387 20388 6d05103c 20387->20388 20388->20379 20390 6d075a58 20389->20390 20393 6d075a66 IsProcessorFeaturePresent 20390->20393 20392 6d075a65 20394 6d075a72 20393->20394 20395 6d075874 __purecall 8 API calls 20394->20395 20396 6d075a87 GetCurrentProcess TerminateProcess 20395->20396 20396->20392 20398 6d051fdc 20397->20398 20400 6d051fe9 error_info_injector 20397->20400 20401 6d051050 20398->20401 20400->20354 20402 6d05108e 20401->20402 20403 6d075a49 _Allocate 11 API calls 20402->20403 20404 6d0510a9 20402->20404 20403->20402 20404->20400 20460 6d0593c0 20405->20460 20409 6d072114 _Allocate 21 API calls 20408->20409 20410 6d0585b6 _Debug_range 20409->20410 20411 6d0585e6 20410->20411 20477 6d0578a0 lstrcpyA lstrcatA lstrcpyA lstrcatA 20410->20477 20411->19766 20481 6d057a40 20413->20481 20416 6d0586a0 CreateEventA 20417 6d05869c 20416->20417 20418 6d0586c1 CreateThread 20416->20418 20417->19766 20418->20417 20419 6d0586e7 CloseHandle 20418->20419 20579 6d058760 20418->20579 20419->20417 20615 6d058910 20420->20615 20422 6d064793 20423 6d058910 28 API calls 20422->20423 20424 6d0647a5 20423->20424 20622 6d065860 20424->20622 20427 6d065860 27 API calls 20428 6d0647c9 20427->20428 20429 6d064828 InitializeCriticalSection InitializeCriticalSection 20428->20429 20430 6d072114 _Allocate 21 API calls 20428->20430 20431 6d064858 20429->20431 20435 6d0647e0 _Debug_range 20430->20435 20432 6d072114 _Allocate 21 API calls 20431->20432 20437 6d06486b _Debug_range 20432->20437 20433 6d064809 20433->20429 20434 6d06488d 20438 6d072114 _Allocate 21 API calls 20434->20438 20435->20433 20626 6d068cc0 20435->20626 20437->20434 20630 6d0510c0 20437->20630 20442 6d0648b6 _Debug_range 20438->20442 20440 6d0648dc 20441 6d072114 _Allocate 21 API calls 20440->20441 20445 6d064908 _Debug_range 20441->20445 20442->20440 20633 6d05e460 20442->20633 20444 6d064931 20639 6d058a40 20444->20639 20445->20444 20636 6d05e8b0 20445->20636 20449 6d058a40 5 API calls 20450 6d06497d 20449->20450 20450->19771 20452 6d05db18 20451->20452 20453 6d06996e 20451->20453 20457 6d0568e0 20452->20457 20454 6d072114 _Allocate 21 API calls 20453->20454 20455 6d069978 _Debug_range 20454->20455 20455->20452 20864 6d0695f0 20455->20864 20876 6d056a70 20457->20876 20459 6d05690e 20459->19778 20463 6d059500 20460->20463 20464 6d059516 20463->20464 20467 6d0599a0 20464->20467 20468 6d0599bc std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 20467->20468 20473 6d059b00 20468->20473 20470 6d0599cf construct std::_Iterator_base::_Iterator_base std::_Mutex_base::~_Mutex_base shared_ptr 20471 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20470->20471 20472 6d058f5f 20471->20472 20472->19764 20474 6d059b10 _Get_size_of_n 20473->20474 20475 6d051f90 _Allocate 27 API calls 20474->20475 20476 6d059b19 20475->20476 20476->20470 20478 6d0579c5 _memcpy_s 20477->20478 20479 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20478->20479 20480 6d057a32 20479->20480 20480->20411 20492 6d057e20 20481->20492 20488 6d057a7e 20488->20416 20488->20417 20489 6d057fa0 12 API calls 20490 6d057a9a 20489->20490 20490->20488 20524 6d057f60 20490->20524 20528 6d058230 20492->20528 20495 6d057f60 CloseHandle 20496 6d057e40 20495->20496 20497 6d057f60 CloseHandle 20496->20497 20498 6d057a4f 20497->20498 20499 6d0580e0 8 API calls 20498->20499 20500 6d0581bd 20499->20500 20557 6d058460 20499->20557 20560 6d058450 20499->20560 20501 6d058230 16 API calls 20500->20501 20502 6d057a57 20500->20502 20501->20502 20503 6d057fa0 20502->20503 20504 6d057fc9 CreateNamedPipeA 20503->20504 20506 6d058006 20504->20506 20507 6d05800e CreateEventA 20504->20507 20511 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20506->20511 20508 6d058025 20507->20508 20509 6d058039 ConnectNamedPipe 20507->20509 20510 6d057f60 CloseHandle 20508->20510 20512 6d058062 GetLastError 20509->20512 20513 6d05808c WaitForSingleObject 20509->20513 20510->20506 20514 6d057a69 20511->20514 20512->20513 20515 6d05806f 20512->20515 20516 6d0580bc CloseHandle 20513->20516 20517 6d05809f 20513->20517 20514->20488 20514->20489 20519 6d057f60 CloseHandle 20515->20519 20516->20506 20518 6d057f60 CloseHandle 20517->20518 20520 6d0580ab 20518->20520 20521 6d05807b 20519->20521 20522 6d057f60 CloseHandle 20520->20522 20523 6d057f60 CloseHandle 20521->20523 20522->20506 20523->20506 20525 6d057f8c 20524->20525 20526 6d057f6f 20524->20526 20525->20488 20526->20525 20527 6d057f77 CloseHandle 20526->20527 20527->20525 20529 6d058253 20528->20529 20530 6d058243 SetEvent 20528->20530 20531 6d05826f 20529->20531 20532 6d05825f SetEvent 20529->20532 20530->20529 20533 6d05828b 20531->20533 20534 6d05827b SetEvent 20531->20534 20532->20531 20535 6d0582a7 20533->20535 20536 6d058297 SetEvent 20533->20536 20534->20533 20537 6d0582f1 20535->20537 20538 6d0582b3 WaitForSingleObject 20535->20538 20536->20535 20541 6d0582fd WaitForSingleObject 20537->20541 20542 6d05833b 20537->20542 20539 6d0582e1 CloseHandle 20538->20539 20540 6d0582cf TerminateThread 20538->20540 20539->20537 20540->20539 20545 6d058319 TerminateThread 20541->20545 20546 6d05832b CloseHandle 20541->20546 20543 6d058357 20542->20543 20544 6d058347 CloseHandle 20542->20544 20547 6d058373 20543->20547 20548 6d058363 CloseHandle 20543->20548 20544->20543 20545->20546 20546->20542 20549 6d05838f 20547->20549 20550 6d05837f CloseHandle 20547->20550 20548->20547 20551 6d0583ab 20549->20551 20552 6d05839b CloseHandle 20549->20552 20550->20549 20553 6d0583c7 20551->20553 20554 6d0583b7 CloseHandle 20551->20554 20552->20551 20555 6d057e2f 20553->20555 20556 6d0583d3 CloseHandle 20553->20556 20554->20553 20555->20495 20556->20555 20563 6d0584f0 20557->20563 20571 6d058470 20560->20571 20564 6d0584f7 20563->20564 20565 6d058500 WaitForSingleObject 20564->20565 20566 6d05846b 20564->20566 20565->20566 20567 6d058518 WaitForSingleObject 20565->20567 20567->20564 20568 6d05852e WaitForSingleObject 20567->20568 20568->20564 20569 6d05854f 20568->20569 20570 6d057e20 17 API calls 20569->20570 20570->20566 20572 6d058477 20571->20572 20573 6d058480 WaitForSingleObject 20572->20573 20574 6d05845b 20572->20574 20573->20574 20575 6d058498 WaitForSingleObject 20573->20575 20575->20572 20576 6d0584ae WaitForSingleObject 20575->20576 20576->20572 20577 6d0584cf 20576->20577 20578 6d057e20 17 API calls 20577->20578 20578->20574 20582 6d058770 20579->20582 20583 6d058799 20582->20583 20584 6d0587d2 std::_Container_base12::~_Container_base12 20583->20584 20585 6d0587bf WaitForSingleObject 20583->20585 20591 6d057c10 20583->20591 20587 6d057e20 17 API calls 20584->20587 20585->20583 20585->20584 20588 6d058835 20587->20588 20589 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20588->20589 20590 6d05876b 20589->20590 20607 6d084430 20591->20607 20594 6d057d25 SetEvent 20597 6d057d51 _memcpy_s 20594->20597 20595 6d057c9f PeekNamedPipe 20602 6d057c89 20595->20602 20606 6d057cd9 _wmemmove 20595->20606 20596 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20598 6d057e0f 20596->20598 20609 6d057ee0 20597->20609 20598->20583 20599 6d057cf8 Sleep 20599->20602 20602->20594 20602->20595 20602->20599 20603 6d057d1e 20602->20603 20602->20606 20603->20594 20604 6d057d8f SetEvent 20604->20606 20605 6d057d78 SetEvent 20605->20606 20606->20596 20608 6d057c1d GetTickCount 20607->20608 20608->20602 20612 6d057f01 20609->20612 20610 6d057f09 ReadFile 20611 6d057f31 20610->20611 20610->20612 20613 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20611->20613 20612->20610 20612->20611 20614 6d057d71 20613->20614 20614->20604 20614->20605 20616 6d058f50 27 API calls 20615->20616 20617 6d05894a 20616->20617 20618 6d058f50 27 API calls 20617->20618 20619 6d05895c 20618->20619 20620 6d058f50 27 API calls 20619->20620 20621 6d05896b InitializeCriticalSection 20620->20621 20621->20422 20623 6d065871 Concurrency::details::ContextBase::GetWorkQueueIdentity 20622->20623 20645 6d065c50 20623->20645 20739 6d05a840 20626->20739 20629 6d068d59 _memcpy_s 20629->20433 20778 6d0517a0 20630->20778 20799 6d052990 20633->20799 20811 6d054fa0 20636->20811 20640 6d058a56 CreateSemaphoreA 20639->20640 20641 6d058a4f 20639->20641 20642 6d058a87 20640->20642 20644 6d058a80 20640->20644 20641->20640 20643 6d058ad5 CreateThread 20642->20643 20642->20644 20643->20642 20643->20644 20859 6d058d80 20643->20859 20644->20449 20646 6d065c84 _Subatomic 20645->20646 20651 6d066010 20646->20651 20648 6d065c93 _DebugHeapAllocator std::_Container_base12::~_Container_base12 20654 6d066050 20648->20654 20659 6d066fa0 20651->20659 20674 6d066370 20654->20674 20656 6d06606a _DebugHeapAllocator 20680 6d0663b0 20656->20680 20658 6d0647b7 20658->20427 20660 6d066fb0 shared_ptr 20659->20660 20663 6d0679b0 20660->20663 20662 6d066023 20662->20648 20664 6d0679c3 shared_ptr 20663->20664 20667 6d0669f0 20664->20667 20666 6d0679dc shared_ptr 20666->20662 20670 6d066ae0 20667->20670 20669 6d066a03 20669->20666 20671 6d066b19 std::_Mutex_base::~_Mutex_base 20670->20671 20672 6d066c00 allocator 27 API calls 20671->20672 20673 6d066b20 construct std::_Mutex_base::~_Mutex_base shared_ptr 20672->20673 20673->20669 20676 6d06637f _DebugHeapAllocator std::_Container_base12::~_Container_base12 20674->20676 20675 6d0663a2 20675->20656 20676->20675 20677 6d066396 20676->20677 20693 6d066770 20676->20693 20696 6d066910 20677->20696 20681 6d0663c2 Concurrency::details::ContextBase::GetWorkQueueIdentity _DebugHeapAllocator std::_Container_base12::~_Container_base12 20680->20681 20682 6d0663e4 _DebugHeapAllocator 20681->20682 20686 6d066486 _DebugHeapAllocator std::_Container_base12::~_Container_base12 shared_ptr 20681->20686 20683 6d066770 _DebugHeapAllocator 21 API calls 20682->20683 20691 6d0663f6 _DebugHeapAllocator std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 shared_ptr 20682->20691 20683->20691 20684 6d06644e 20722 6d066780 20684->20722 20688 6d066880 _DebugHeapAllocator 5 API calls 20686->20688 20690 6d066475 _DebugHeapAllocator std::_Container_base12::~_Container_base12 shared_ptr 20686->20690 20687 6d06645a shared_ptr 20728 6d066880 20687->20728 20688->20690 20690->20658 20691->20684 20692 6d059400 std::_Container_base12::~_Container_base12 11 API calls 20691->20692 20692->20684 20694 6d0720d6 std::_Xinvalid_argument 21 API calls 20693->20694 20695 6d06677d 20694->20695 20695->20677 20697 6d066947 _DebugHeapAllocator std::_Mutex_base::~_Mutex_base 20696->20697 20704 6d0598e0 20697->20704 20699 6d06695d std::_Container_base12::~_Container_base12 shared_ptr 20708 6d066ab0 20699->20708 20703 6d0669d5 20703->20675 20705 6d0598f0 allocator 20704->20705 20706 6d051f90 _Allocate 27 API calls 20705->20706 20707 6d0598f9 20706->20707 20707->20699 20715 6d066bd0 20708->20715 20711 6d066a10 20712 6d066a20 Concurrency::details::ContextBase::GetWorkQueueIdentity std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 shared_ptr 20711->20712 20713 6d066a6e std::_Container_base12::~_Container_base12 shared_ptr 20712->20713 20719 6d059400 20712->20719 20713->20703 20716 6d066bdf std::_Mutex_base::~_Mutex_base 20715->20716 20717 6d067100 _DebugHeapAllocator 5 API calls 20716->20717 20718 6d066989 20717->20718 20718->20711 20720 6d051fd0 _Deallocate 11 API calls 20719->20720 20721 6d059417 20720->20721 20721->20713 20725 6d066790 _DebugHeapAllocator std::_Container_base12::~_Container_base12 shared_ptr 20722->20725 20723 6d0667b8 std::_Container_base12::~_Container_base12 shared_ptr 20723->20687 20724 6d0667ce std::_Mutex_base::~_Mutex_base 20727 6d0598e0 allocator 27 API calls 20724->20727 20725->20723 20725->20724 20726 6d066770 _DebugHeapAllocator 21 API calls 20725->20726 20726->20724 20727->20723 20729 6d06688f std::_Mutex_base::~_Mutex_base 20728->20729 20732 6d0670d0 20729->20732 20735 6d067ae0 20732->20735 20736 6d067b12 _Debug_range 20735->20736 20737 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20736->20737 20738 6d0668a1 20737->20738 20738->20690 20742 6d05cf60 20739->20742 20743 6d05cf8b _memcpy_s 20742->20743 20744 6d05d013 20743->20744 20770 6d072278 20743->20770 20745 6d05d01a LoadLibraryA 20744->20745 20747 6d05d4e5 20745->20747 20748 6d05d039 20745->20748 20749 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20747->20749 20750 6d05d0ca 20748->20750 20753 6d072278 5 API calls 20748->20753 20751 6d05a8f2 InitializeCriticalSection InitializeCriticalSection 20749->20751 20752 6d05d0d1 GetProcAddress 20750->20752 20751->20629 20754 6d05d170 20752->20754 20755 6d05d172 20752->20755 20753->20752 20756 6d05d177 GetProcAddress 20754->20756 20757 6d072278 5 API calls 20755->20757 20758 6d05d2a1 20756->20758 20759 6d05d2a3 20756->20759 20757->20756 20760 6d05d2a8 GetProcAddress 20758->20760 20761 6d072278 5 API calls 20759->20761 20762 6d05d355 20760->20762 20763 6d05d357 20760->20763 20761->20760 20764 6d05d35c GetProcAddress 20762->20764 20765 6d072278 5 API calls 20763->20765 20766 6d05d4c0 20764->20766 20767 6d05d4be 20764->20767 20765->20764 20769 6d072278 5 API calls 20766->20769 20768 6d05d4c5 GetProcAddress 20767->20768 20768->20747 20769->20768 20773 6d072284 IsProcessorFeaturePresent 20770->20773 20774 6d072298 20773->20774 20777 6d072157 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20774->20777 20776 6d072282 20776->20745 20777->20776 20781 6d051980 20778->20781 20784 6d051b40 20781->20784 20783 6d0510cf 20783->20434 20785 6d051b57 20784->20785 20788 6d051bb0 20785->20788 20787 6d051b5f shared_ptr 20787->20783 20791 6d051bd0 20788->20791 20790 6d051bc3 20790->20787 20792 6d051c09 std::_Mutex_base::~_Mutex_base 20791->20792 20795 6d051cc0 20792->20795 20794 6d051c10 construct std::_Mutex_base::~_Mutex_base shared_ptr 20794->20790 20796 6d051cd0 allocator 20795->20796 20797 6d051f90 _Allocate 27 API calls 20796->20797 20798 6d051cd9 20797->20798 20798->20794 20800 6d0529ad std::_Iterator_base::_Iterator_base 20799->20800 20803 6d056460 20800->20803 20810 6d052050 20803->20810 20805 6d056478 LoadLibraryA 20806 6d0564c3 GetProcAddress GetProcAddress 20805->20806 20807 6d0565da 20805->20807 20806->20807 20808 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20807->20808 20809 6d0529c0 InitializeCriticalSection InitializeCriticalSection 20808->20809 20809->20440 20810->20805 20812 6d054fdc std::_Iterator_base::_Iterator_base 20811->20812 20813 6d056460 8 API calls 20812->20813 20814 6d055059 20813->20814 20819 6d055b20 20814->20819 20817 6d055b20 27 API calls 20818 6d05509f InitializeCriticalSection 20817->20818 20818->20444 20822 6d054430 20819->20822 20823 6d054440 _WChar_traits shared_ptr 20822->20823 20826 6d054460 20823->20826 20825 6d054459 20825->20817 20827 6d054471 std::_Mutex_base::~_Mutex_base 20826->20827 20829 6d05447f 20827->20829 20830 6d054b90 20827->20830 20829->20825 20843 6d054740 20830->20843 20833 6d054d90 21 API calls 20834 6d054bb5 std::_Mutex_base::~_Mutex_base 20833->20834 20847 6d054da0 20834->20847 20836 6d054bd5 std::_Mutex_base::~_Mutex_base 20852 6d0547c0 20836->20852 20838 6d054bfb Concurrency::details::ContextBase::GetWorkQueueIdentity shared_ptr 20840 6d054c50 construct shared_ptr 20838->20840 20856 6d0547f0 20838->20856 20841 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20840->20841 20842 6d054c84 20841->20842 20842->20829 20844 6d05475b _DebugHeapAllocator _Min_value _Max_value std::_Mutex_base::~_Mutex_base 20843->20844 20845 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20844->20845 20846 6d0547b0 20845->20846 20846->20833 20846->20834 20848 6d054740 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20847->20848 20851 6d054dbb _Max_value std::_Mutex_base::~_Mutex_base 20848->20851 20849 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20850 6d054e23 20849->20850 20850->20836 20851->20849 20853 6d0547d0 _Get_size_of_n 20852->20853 20854 6d051f90 _Allocate 27 API calls 20853->20854 20855 6d0547d9 20854->20855 20855->20838 20857 6d051fd0 _Deallocate 11 API calls 20856->20857 20858 6d054806 20857->20858 20858->20840 20863 6d058d93 20859->20863 20860 6d058ea5 20861 6d058da0 WaitForSingleObject EnterCriticalSection 20861->20863 20862 6d058e47 LeaveCriticalSection 20862->20863 20863->20860 20863->20861 20863->20862 20865 6d058f50 27 API calls 20864->20865 20866 6d06961e 20865->20866 20867 6d058f50 27 API calls 20866->20867 20868 6d069630 20867->20868 20869 6d058f50 27 API calls 20868->20869 20870 6d06963f 6 API calls 20869->20870 20871 6d0696c2 20870->20871 20872 6d0696d8 CreateEventA CreateEventA 20871->20872 20875 6d069cd0 EnterCriticalSection LeaveCriticalSection 20872->20875 20874 6d069720 20874->20452 20875->20874 20878 6d056a81 Concurrency::details::ContextBase::GetWorkQueueIdentity collate std::_Mutex_base::~_Mutex_base shared_ptr 20876->20878 20877 6d056add 20877->20459 20878->20877 20879 6d056dc0 allocator 11 API calls 20878->20879 20879->20877 20905 6d069d00 CreateThread 20880->20905 20882 6d05dcb8 20883 6d069d00 CreateThread 20882->20883 20883->19786 20884->19788 20906 6d069d30 EnterCriticalSection LeaveCriticalSection 20885->20906 20887 6d069b89 20888 6d069b90 20887->20888 20890 6d069ba9 EnterCriticalSection 20887->20890 20889 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20888->20889 20891 6d05dd1a 20889->20891 20892 6d069bce 20890->20892 20893 6d069c6d EnterCriticalSection 20890->20893 20891->19791 20895 6d069c26 EnterCriticalSection SetEvent 20892->20895 20896 6d069bd4 20892->20896 20894 6d058ed0 27 API calls 20893->20894 20898 6d069c90 LeaveCriticalSection 20894->20898 20897 6d058ed0 27 API calls 20895->20897 20899 6d069bdf EnterCriticalSection SetEvent 20896->20899 20900 6d069bda 20896->20900 20902 6d069c58 LeaveCriticalSection 20897->20902 20903 6d069ca3 LeaveCriticalSection 20898->20903 20907 6d058ed0 20899->20907 20900->20903 20902->20903 20903->20888 20905->20882 20906->20887 20910 6d059110 20907->20910 20909 6d058ee3 LeaveCriticalSection 20909->20903 20911 6d059122 Concurrency::details::ContextBase::GetWorkQueueIdentity _SyncOriginator std::_Container_base12::~_Container_base12 20910->20911 20913 6d05916f std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 _SyncOriginator 20911->20913 20916 6d059550 20911->20916 20914 6d0598e0 allocator 27 API calls 20913->20914 20915 6d0591e1 construct std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 _SyncOriginator shared_ptr 20913->20915 20914->20915 20915->20909 20917 6d05956c std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 20916->20917 20919 6d0595db _SyncOriginator std::_Container_base12::~_Container_base12 20917->20919 20935 6d059a40 20917->20935 20920 6d0598e0 allocator 27 API calls 20919->20920 20921 6d059611 std::_Container_base12::~_Container_base12 20920->20921 20938 6d059ba0 20921->20938 20924 6d0596c2 std::_Container_base12::~_Container_base12 20926 6d059ba0 5 API calls 20924->20926 20925 6d059666 std::_Container_base12::~_Container_base12 20927 6d059ba0 5 API calls 20925->20927 20928 6d0596eb std::_Container_base12::~_Container_base12 20926->20928 20930 6d05968f _Find_unchecked std::_Container_base12::~_Container_base12 20927->20930 20929 6d059ba0 5 API calls 20928->20929 20929->20930 20931 6d059799 std::_Container_base12::~_Container_base12 20930->20931 20933 6d059400 std::_Container_base12::~_Container_base12 11 API calls 20930->20933 20932 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20931->20932 20934 6d0597c9 20932->20934 20933->20931 20934->20913 20936 6d0720d6 std::_Xinvalid_argument 21 API calls 20935->20936 20937 6d059a51 20936->20937 20937->20917 20939 6d059bb9 _DebugHeapAllocator shared_ptr 20938->20939 20940 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 20939->20940 20941 6d059658 20940->20941 20941->20924 20941->20925 20943 6d05dd92 20942->20943 20944 6d069a1c 20942->20944 20943->19700 20943->19800 20944->20943 20945 6d069a2a WaitForSingleObject 20944->20945 20945->20943 20947 6d05db95 20946->20947 20951 6d05dbb7 20946->20951 20947->20951 20953 6d05dc60 20947->20953 20948 6d05dc17 DeleteCriticalSection DeleteCriticalSection DeleteCriticalSection 20956 6d0589d0 20948->20956 20951->20948 20959 6d0649f0 20953->20959 20955 6d05dc6f error_info_injector 20955->20951 21119 6d058f70 20956->21119 20979 6d058b20 20959->20979 20961 6d064a23 20962 6d058b20 31 API calls 20961->20962 20963 6d064a2e 20962->20963 20964 6d064a5c 20963->20964 20984 6d064bd0 20963->20984 20965 6d064aa3 20964->20965 20987 6d064c00 20964->20987 20972 6d064aea DeleteCriticalSection DeleteCriticalSection 20965->20972 20990 6d064c30 20965->20990 20993 6d0649a0 20972->20993 20973 6d0649a0 error_info_injector 11 API calls 20974 6d064bab 20973->20974 20996 6d0589f0 DeleteCriticalSection 20974->20996 20977 6d0589f0 _SyncOriginator 12 API calls 20978 6d064bc1 20977->20978 20978->20955 20980 6d058b42 20979->20980 20981 6d058b64 WaitForMultipleObjects 20980->20981 21003 6d058cf0 EnterCriticalSection 20980->21003 20983 6d058b7c _MallocaArrayHolder 20981->20983 20983->20961 21013 6d0510e0 20984->21013 20986 6d064bdf error_info_injector 20986->20964 21053 6d05e4b0 DeleteCriticalSection DeleteCriticalSection 20987->21053 20989 6d064c0f error_info_injector 20989->20965 21055 6d05e8f0 DeleteCriticalSection 20990->21055 20992 6d064c3f error_info_injector 20992->20972 21088 6d0649c0 20993->21088 20997 6d0589d0 _SyncOriginator 11 API calls 20996->20997 20998 6d058a18 20997->20998 20999 6d0589d0 _SyncOriginator 11 API calls 20998->20999 21000 6d058a23 20999->21000 21001 6d0589d0 _SyncOriginator 11 API calls 21000->21001 21002 6d058a2e 21001->21002 21002->20977 21004 6d058d20 21003->21004 21005 6d058d12 21003->21005 21007 6d058ed0 27 API calls 21004->21007 21006 6d058d31 21005->21006 21008 6d058d18 21005->21008 21010 6d058ed0 27 API calls 21006->21010 21009 6d058d1e 21007->21009 21008->21009 21012 6d058ed0 27 API calls 21008->21012 21011 6d058d51 LeaveCriticalSection ReleaseSemaphore 21009->21011 21010->21009 21011->20980 21012->21011 21018 6d051130 21013->21018 21025 6d05114d 6 library calls 21018->21025 21019 6d0511c1 21035 6d0514b0 21019->21035 21023 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21024 6d05110e 21023->21024 21026 6d051670 21024->21026 21025->21019 21031 6d051440 21025->21031 21043 6d0519a0 21026->21043 21032 6d05145d Concurrency::task_options::get_scheduler _Debug_range 21031->21032 21033 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21032->21033 21034 6d051482 21033->21034 21034->21025 21038 6d0514e1 std::_Container_base12::~_Container_base12 shared_ptr 21035->21038 21036 6d0511c9 21036->21023 21038->21036 21039 6d051930 21038->21039 21040 6d051941 collate std::_Mutex_base::~_Mutex_base shared_ptr 21039->21040 21041 6d051e80 shared_ptr 11 API calls 21040->21041 21042 6d05196d 21041->21042 21042->21038 21044 6d0514b0 shared_ptr 11 API calls 21043->21044 21045 6d05169e 21044->21045 21046 6d0517c0 21045->21046 21049 6d0518e0 21046->21049 21050 6d05190e shared_ptr 21049->21050 21051 6d051b10 shared_ptr 11 API calls 21050->21051 21052 6d051116 21051->21052 21052->20986 21054 6d05e4e2 21053->21054 21054->20989 21058 6d0550c0 21055->21058 21059 6d0550ff 21058->21059 21060 6d05510b 21058->21060 21076 6d055660 21059->21076 21062 6d055114 CloseHandle 21060->21062 21063 6d05512b 21060->21063 21062->21063 21064 6d055134 CloseHandle 21063->21064 21065 6d05514b 21063->21065 21064->21065 21066 6d055b20 27 API calls 21065->21066 21067 6d05515b 21066->21067 21068 6d055b20 27 API calls 21067->21068 21069 6d05516b 21068->21069 21081 6d054030 21069->21081 21071 6d055176 21072 6d054030 11 API calls 21071->21072 21073 6d055181 21072->21073 21074 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21073->21074 21075 6d055196 21074->21075 21075->20992 21077 6d05569b 21076->21077 21079 6d055690 21076->21079 21077->21060 21078 6d0556ad WaitForSingleObject 21078->21079 21080 6d0556c8 CloseHandle 21078->21080 21079->21077 21079->21078 21080->21077 21084 6d054330 21081->21084 21083 6d05405e 21083->21071 21086 6d054341 Concurrency::details::ContextBase::GetWorkQueueIdentity collate std::_Mutex_base::~_Mutex_base shared_ptr 21084->21086 21085 6d05439d 21085->21083 21086->21085 21087 6d0547f0 allocator 11 API calls 21086->21087 21087->21085 21093 6d0656e0 21088->21093 21101 6d065900 21093->21101 21095 6d0649d2 21096 6d065740 21095->21096 21105 6d0659e0 21096->21105 21102 6d06590f Concurrency::details::ContextBase::GetWorkQueueIdentity std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 shared_ptr 21101->21102 21103 6d059400 std::_Container_base12::~_Container_base12 11 API calls 21102->21103 21104 6d06595d std::_Container_base12::~_Container_base12 shared_ptr 21102->21104 21103->21104 21104->21095 21111 6d065eb0 21105->21111 21108 6d0658c0 21115 6d065990 21108->21115 21112 6d065ee1 std::_Container_base12::~_Container_base12 shared_ptr 21111->21112 21113 6d06576e 21112->21113 21114 6d0665b0 _DebugHeapAllocator 11 API calls 21112->21114 21113->21108 21114->21112 21116 6d0659be shared_ptr 21115->21116 21117 6d065e80 _DebugHeapAllocator 11 API calls 21116->21117 21118 6d0649af 21117->21118 21118->20973 21124 6d059000 21119->21124 21125 6d05901b collate std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 _SyncOriginator shared_ptr 21124->21125 21126 6d0590b6 std::_Container_base12::~_Container_base12 21125->21126 21129 6d059400 std::_Container_base12::~_Container_base12 11 API calls 21125->21129 21127 6d0590e1 std::_Container_base12::~_Container_base12 21126->21127 21130 6d059400 std::_Container_base12::~_Container_base12 11 API calls 21126->21130 21128 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21127->21128 21131 6d058f9e 21128->21131 21129->21125 21130->21127 21132 6d058fc0 21131->21132 21135 6d059480 21132->21135 21136 6d05949b Concurrency::details::ContextBase::GetWorkQueueIdentity collate std::_Mutex_base::~_Mutex_base std::_Container_base12::~_Container_base12 shared_ptr 21135->21136 21141 6d059b60 21136->21141 21138 6d0594d7 shared_ptr 21139 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21138->21139 21140 6d0589df 21139->21140 21140->19802 21144 6d059d70 21141->21144 21145 6d051fd0 _Deallocate 11 API calls 21144->21145 21146 6d059b72 21145->21146 21146->21138 21491 6d07256d 21492 6d072579 ___scrt_is_nonwritable_in_current_image 21491->21492 21493 6d0725a2 dllmain_raw 21492->21493 21497 6d07259d 21492->21497 21500 6d072588 21492->21500 21494 6d0725bc dllmain_crt_dispatch 21493->21494 21493->21500 21494->21497 21494->21500 21495 6d072609 21496 6d072612 dllmain_crt_dispatch 21495->21496 21495->21500 21498 6d072625 dllmain_raw 21496->21498 21496->21500 21497->21495 21499 6d0725f5 dllmain_crt_dispatch dllmain_raw 21497->21499 21498->21500 21499->21495 21501 6d06a76a 21502 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21501->21502 21503 6d06a774 21502->21503 26199 6d075b72 26200 6d07a1b4 ___scrt_uninitialize_crt 63 API calls 26199->26200 26201 6d075b7a 26200->26201 26209 6d079ea3 26201->26209 26203 6d075b7f 26219 6d07a1bd 26203->26219 26206 6d075ba9 26207 6d0799a9 _free 19 API calls 26206->26207 26208 6d075bb4 26207->26208 26210 6d079eaf ___scrt_is_nonwritable_in_current_image 26209->26210 26223 6d07bcb1 EnterCriticalSection 26210->26223 26212 6d079f25 26235 6d079f3a 26212->26235 26213 6d079eba 26213->26212 26215 6d079ef9 DeleteCriticalSection 26213->26215 26224 6d07d663 26213->26224 26218 6d0799a9 _free 19 API calls 26215->26218 26216 6d079f31 __vfwprintf_l 26216->26203 26218->26213 26220 6d075b8e DeleteCriticalSection 26219->26220 26221 6d07a1d3 26219->26221 26220->26203 26220->26206 26221->26220 26222 6d0799a9 _free 19 API calls 26221->26222 26222->26220 26223->26213 26225 6d07d66f ___scrt_is_nonwritable_in_current_image 26224->26225 26226 6d07d68e 26225->26226 26227 6d07d679 26225->26227 26234 6d07d67e _memcpy_s __vfwprintf_l 26226->26234 26238 6d075bbe EnterCriticalSection 26226->26238 26228 6d077993 _free 19 API calls 26227->26228 26228->26234 26230 6d07d6aa 26239 6d07d5ed 26230->26239 26232 6d07d6b5 26253 6d07d6d2 26232->26253 26234->26213 26310 6d07bcf9 LeaveCriticalSection 26235->26310 26237 6d079f41 26237->26216 26238->26230 26240 6d07d60f 26239->26240 26241 6d07d5fa 26239->26241 26243 6d07a10a __vfwprintf_l 59 API calls 26240->26243 26245 6d07d5ff _memcpy_s 26240->26245 26242 6d077993 _free 19 API calls 26241->26242 26242->26245 26244 6d07d623 26243->26244 26246 6d07a1bd 19 API calls 26244->26246 26245->26232 26247 6d07d62b 26246->26247 26248 6d07b651 __vfwprintf_l 19 API calls 26247->26248 26249 6d07d631 26248->26249 26256 6d081242 26249->26256 26251 6d07d637 26251->26245 26252 6d0799a9 _free 19 API calls 26251->26252 26252->26245 26309 6d075bd2 LeaveCriticalSection 26253->26309 26255 6d07d6da 26255->26234 26257 6d081268 26256->26257 26258 6d081253 26256->26258 26259 6d0812b1 26257->26259 26263 6d08128f 26257->26263 26260 6d077980 __dosmaperr 19 API calls 26258->26260 26261 6d077980 __dosmaperr 19 API calls 26259->26261 26262 6d081258 26260->26262 26264 6d0812b6 26261->26264 26265 6d077993 _free 19 API calls 26262->26265 26269 6d0811c0 26263->26269 26267 6d077993 _free 19 API calls 26264->26267 26268 6d081260 _memcpy_s 26265->26268 26267->26268 26268->26251 26270 6d0811cc ___scrt_is_nonwritable_in_current_image 26269->26270 26280 6d07e1db EnterCriticalSection 26270->26280 26272 6d0811da 26273 6d08120c 26272->26273 26274 6d081201 26272->26274 26275 6d077993 _free 19 API calls 26273->26275 26281 6d0812d1 26274->26281 26277 6d081207 26275->26277 26296 6d081236 26277->26296 26279 6d081229 __vfwprintf_l 26279->26268 26280->26272 26282 6d07e2b2 ___scrt_uninitialize_crt 19 API calls 26281->26282 26284 6d0812e1 26282->26284 26283 6d0812e7 26299 6d07e221 26283->26299 26284->26283 26286 6d07e2b2 ___scrt_uninitialize_crt 19 API calls 26284->26286 26295 6d081319 26284->26295 26289 6d081310 26286->26289 26287 6d07e2b2 ___scrt_uninitialize_crt 19 API calls 26290 6d081325 CloseHandle 26287->26290 26292 6d07e2b2 ___scrt_uninitialize_crt 19 API calls 26289->26292 26290->26283 26293 6d081331 GetLastError 26290->26293 26291 6d081361 26291->26277 26292->26295 26293->26283 26294 6d07795d __dosmaperr 19 API calls 26294->26291 26295->26283 26295->26287 26308 6d07e1fe LeaveCriticalSection 26296->26308 26298 6d081240 26298->26279 26300 6d07e297 26299->26300 26301 6d07e230 26299->26301 26302 6d077993 _free 19 API calls 26300->26302 26301->26300 26307 6d07e25a 26301->26307 26303 6d07e29c 26302->26303 26304 6d077980 __dosmaperr 19 API calls 26303->26304 26305 6d07e287 26304->26305 26305->26291 26305->26294 26306 6d07e281 SetStdHandle 26306->26305 26307->26305 26307->26306 26308->26298 26309->26255 26310->26237 21347 6d07237e 21348 6d0723bc dllmain_crt_process_detach 21347->21348 21349 6d072389 21347->21349 21356 6d072398 21348->21356 21350 6d0723ae dllmain_crt_process_attach 21349->21350 21351 6d07238e 21349->21351 21350->21356 21352 6d0723a4 21351->21352 21353 6d072393 21351->21353 21362 6d0728b5 21352->21362 21353->21356 21357 6d0728d4 21353->21357 21370 6d0791e1 21357->21370 21462 6d0736af 21362->21462 21367 6d0728d1 21367->21356 21368 6d0736ba 26 API calls 21369 6d0728be 21368->21369 21369->21356 21376 6d0796dc 21370->21376 21373 6d0736ba 21442 6d073866 21373->21442 21377 6d0796e6 21376->21377 21380 6d0728d9 21376->21380 21378 6d079c64 FindHandlerForForeignException 11 API calls 21377->21378 21379 6d0796ed 21378->21379 21379->21380 21381 6d079cba FindHandlerForForeignException 11 API calls 21379->21381 21380->21373 21382 6d079700 21381->21382 21384 6d0795a1 21382->21384 21385 6d0795bc 21384->21385 21386 6d0795ac 21384->21386 21385->21380 21390 6d0795c2 21386->21390 21389 6d0799a9 _free 19 API calls 21389->21385 21391 6d0795d7 21390->21391 21392 6d0795dd 21390->21392 21394 6d0799a9 _free 19 API calls 21391->21394 21393 6d0799a9 _free 19 API calls 21392->21393 21395 6d0795e9 21393->21395 21394->21392 21396 6d0799a9 _free 19 API calls 21395->21396 21397 6d0795f4 21396->21397 21398 6d0799a9 _free 19 API calls 21397->21398 21399 6d0795ff 21398->21399 21400 6d0799a9 _free 19 API calls 21399->21400 21401 6d07960a 21400->21401 21402 6d0799a9 _free 19 API calls 21401->21402 21403 6d079615 21402->21403 21404 6d0799a9 _free 19 API calls 21403->21404 21405 6d079620 21404->21405 21406 6d0799a9 _free 19 API calls 21405->21406 21407 6d07962b 21406->21407 21408 6d0799a9 _free 19 API calls 21407->21408 21409 6d079636 21408->21409 21410 6d0799a9 _free 19 API calls 21409->21410 21411 6d079644 21410->21411 21416 6d07940a 21411->21416 21413 6d07966a 21424 6d07946b 21413->21424 21415 6d0795b4 21415->21389 21417 6d079416 ___scrt_is_nonwritable_in_current_image 21416->21417 21432 6d07bcb1 EnterCriticalSection 21417->21432 21419 6d07944a 21433 6d07945f 21419->21433 21421 6d079420 21421->21419 21423 6d0799a9 _free 19 API calls 21421->21423 21422 6d079457 __vfwprintf_l 21422->21413 21423->21419 21425 6d079477 ___scrt_is_nonwritable_in_current_image 21424->21425 21437 6d07bcb1 EnterCriticalSection 21425->21437 21427 6d079481 21428 6d079691 FindHandlerForForeignException 19 API calls 21427->21428 21429 6d079494 21428->21429 21438 6d0794aa 21429->21438 21431 6d0794a2 __vfwprintf_l 21431->21415 21432->21421 21436 6d07bcf9 LeaveCriticalSection 21433->21436 21435 6d079469 21435->21422 21436->21435 21437->21427 21441 6d07bcf9 LeaveCriticalSection 21438->21441 21440 6d0794b4 21440->21431 21441->21440 21443 6d073873 21442->21443 21449 6d0728de 21442->21449 21444 6d073881 21443->21444 21450 6d074ad8 21443->21450 21445 6d074b13 ___vcrt_FlsSetValue 6 API calls 21444->21445 21447 6d073891 21445->21447 21455 6d07384a 21447->21455 21449->21356 21451 6d0749f3 try_get_function 5 API calls 21450->21451 21452 6d074af2 21451->21452 21453 6d074b0a TlsGetValue 21452->21453 21454 6d074afe 21452->21454 21453->21454 21454->21444 21456 6d073854 21455->21456 21457 6d073861 21455->21457 21456->21457 21459 6d077a0f 21456->21459 21457->21449 21460 6d0799a9 _free 19 API calls 21459->21460 21461 6d077a27 21460->21461 21461->21457 21468 6d0738aa 21462->21468 21464 6d0728ba 21464->21369 21465 6d0791d6 21464->21465 21466 6d079859 __dosmaperr 19 API calls 21465->21466 21467 6d0728c6 21466->21467 21467->21367 21467->21368 21469 6d0738b6 GetLastError 21468->21469 21470 6d0738b3 21468->21470 21471 6d074ad8 ___vcrt_FlsGetValue 6 API calls 21469->21471 21470->21464 21472 6d0738cb 21471->21472 21473 6d0738ea 21472->21473 21474 6d073930 SetLastError 21472->21474 21475 6d074b13 ___vcrt_FlsSetValue 6 API calls 21472->21475 21473->21474 21474->21464 21476 6d0738e4 FindHandlerForForeignException 21475->21476 21476->21473 21477 6d07390c 21476->21477 21478 6d074b13 ___vcrt_FlsSetValue 6 API calls 21476->21478 21479 6d074b13 ___vcrt_FlsSetValue 6 API calls 21477->21479 21480 6d073920 21477->21480 21478->21477 21479->21480 21481 6d077a0f ___vcrt_freefls@4 19 API calls 21480->21481 21481->21473 21147 6d0723d1 21148 6d0723dd ___scrt_is_nonwritable_in_current_image 21147->21148 21165 6d072945 21148->21165 21150 6d0723e4 21151 6d0724d3 21150->21151 21152 6d07240e 21150->21152 21159 6d0723e9 ___scrt_is_nonwritable_in_current_image 21150->21159 21192 6d072b02 IsProcessorFeaturePresent 21151->21192 21176 6d0728a7 21152->21176 21155 6d0724da 21156 6d07241d __RTC_Initialize 21156->21159 21179 6d0727cb InitializeSListHead 21156->21179 21158 6d07242b ___scrt_initialize_default_local_stdio_options 21180 6d078536 21158->21180 21163 6d07244a 21163->21159 21188 6d0784da 21163->21188 21166 6d07294e 21165->21166 21196 6d072cdc IsProcessorFeaturePresent 21166->21196 21170 6d07295f 21171 6d072963 21170->21171 21207 6d0791c4 21170->21207 21171->21150 21174 6d07297a 21174->21150 21341 6d07297e 21176->21341 21178 6d0728ae 21178->21156 21179->21158 21183 6d07854d 21180->21183 21181 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21182 6d07243f 21181->21182 21182->21159 21184 6d07287c 21182->21184 21183->21181 21185 6d072881 ___scrt_release_startup_lock 21184->21185 21186 6d072cdc ___isa_available_init IsProcessorFeaturePresent 21185->21186 21187 6d07288a 21185->21187 21186->21187 21187->21163 21189 6d078509 21188->21189 21190 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21189->21190 21191 6d078532 21190->21191 21191->21159 21193 6d072b17 _memcpy_s ___scrt_fastfail 21192->21193 21194 6d072bc2 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 21193->21194 21195 6d072c0d ___scrt_fastfail 21194->21195 21195->21155 21197 6d07295a 21196->21197 21198 6d073686 21197->21198 21199 6d07368b ___vcrt_initialize_winapi_thunks 21198->21199 21218 6d0748a7 21199->21218 21203 6d0736a1 21204 6d0736ac 21203->21204 21232 6d0748e3 21203->21232 21204->21170 21206 6d073699 21206->21170 21273 6d07cd25 21207->21273 21210 6d0736c5 21211 6d0736ce 21210->21211 21217 6d0736df 21210->21217 21212 6d07396f ___vcrt_uninitialize_ptd 6 API calls 21211->21212 21213 6d0736d3 21212->21213 21214 6d0748e3 ___vcrt_uninitialize_locks DeleteCriticalSection 21213->21214 21215 6d0736d8 21214->21215 21337 6d074bc1 21215->21337 21217->21171 21219 6d0748b0 21218->21219 21221 6d0748d9 21219->21221 21223 6d073695 21219->21223 21236 6d074b51 21219->21236 21222 6d0748e3 ___vcrt_uninitialize_locks DeleteCriticalSection 21221->21222 21222->21223 21223->21206 21224 6d07393c 21223->21224 21254 6d074a62 21224->21254 21227 6d073951 21227->21203 21230 6d07396c 21230->21203 21233 6d07490d 21232->21233 21234 6d0748ee 21232->21234 21233->21206 21235 6d0748f8 DeleteCriticalSection 21234->21235 21235->21233 21235->21235 21241 6d0749f3 21236->21241 21238 6d074b6b 21239 6d074b89 InitializeCriticalSectionAndSpinCount 21238->21239 21240 6d074b74 21238->21240 21239->21240 21240->21219 21242 6d074a17 __crt_fast_encode_pointer 21241->21242 21243 6d074a1b 21241->21243 21242->21238 21243->21242 21247 6d07492f 21243->21247 21246 6d074a35 GetProcAddress 21246->21242 21250 6d07493e try_get_first_available_module 21247->21250 21248 6d07495b LoadLibraryExW 21249 6d074976 GetLastError 21248->21249 21248->21250 21249->21250 21250->21248 21251 6d0749d1 FreeLibrary 21250->21251 21252 6d0749e8 21250->21252 21253 6d0749a9 LoadLibraryExW 21250->21253 21251->21250 21252->21242 21252->21246 21253->21250 21255 6d0749f3 try_get_function 5 API calls 21254->21255 21256 6d074a7c 21255->21256 21257 6d074a95 TlsAlloc 21256->21257 21258 6d073946 21256->21258 21258->21227 21259 6d074b13 21258->21259 21260 6d0749f3 try_get_function 5 API calls 21259->21260 21261 6d074b2d 21260->21261 21262 6d074b48 TlsSetValue 21261->21262 21263 6d07395f 21261->21263 21262->21263 21263->21230 21264 6d07396f 21263->21264 21265 6d07397f 21264->21265 21266 6d073979 21264->21266 21265->21227 21268 6d074a9d 21266->21268 21269 6d0749f3 try_get_function 5 API calls 21268->21269 21270 6d074ab7 21269->21270 21271 6d074acf TlsFree 21270->21271 21272 6d074ac3 21270->21272 21271->21272 21272->21265 21276 6d07cd42 21273->21276 21277 6d07cd3e 21273->21277 21274 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21275 6d07296c 21274->21275 21275->21174 21275->21210 21276->21277 21279 6d07a367 21276->21279 21277->21274 21280 6d07a373 ___scrt_is_nonwritable_in_current_image 21279->21280 21291 6d07bcb1 EnterCriticalSection 21280->21291 21282 6d07a37a 21292 6d07e147 21282->21292 21284 6d07a389 21290 6d07a398 21284->21290 21303 6d07a1fb GetStartupInfoW 21284->21303 21288 6d07a3a9 __vfwprintf_l 21288->21276 21314 6d07a3b4 21290->21314 21291->21282 21293 6d07e153 ___scrt_is_nonwritable_in_current_image 21292->21293 21294 6d07e173 21293->21294 21295 6d07e15c 21293->21295 21317 6d07bcb1 EnterCriticalSection 21294->21317 21296 6d077993 _free 19 API calls 21295->21296 21300 6d07e161 _memcpy_s __vfwprintf_l 21296->21300 21298 6d07e1ab 21325 6d07e1d2 21298->21325 21300->21284 21301 6d07e17f 21301->21298 21318 6d07e098 21301->21318 21304 6d07a2ac 21303->21304 21305 6d07a218 21303->21305 21309 6d07a2b3 21304->21309 21305->21304 21306 6d07e147 20 API calls 21305->21306 21307 6d07a240 21306->21307 21307->21304 21308 6d07a270 GetFileType 21307->21308 21308->21307 21311 6d07a2ba 21309->21311 21310 6d07a2fd GetStdHandle 21310->21311 21311->21310 21312 6d07a363 21311->21312 21313 6d07a310 GetFileType 21311->21313 21312->21290 21313->21311 21336 6d07bcf9 LeaveCriticalSection 21314->21336 21316 6d07a3bb 21316->21288 21317->21301 21319 6d07994c FindHandlerForForeignException 19 API calls 21318->21319 21321 6d07e0aa 21319->21321 21320 6d07e0b7 21322 6d0799a9 _free 19 API calls 21320->21322 21321->21320 21328 6d079d13 21321->21328 21324 6d07e109 21322->21324 21324->21301 21335 6d07bcf9 LeaveCriticalSection 21325->21335 21327 6d07e1d9 21327->21300 21329 6d079adf FindHandlerForForeignException 5 API calls 21328->21329 21330 6d079d3a 21329->21330 21331 6d079d58 InitializeCriticalSectionAndSpinCount 21330->21331 21333 6d079d43 21330->21333 21331->21333 21332 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 21334 6d079d6f 21332->21334 21333->21332 21334->21321 21335->21327 21336->21316 21338 6d074bca 21337->21338 21340 6d074bf0 21337->21340 21339 6d074bda FreeLibrary 21338->21339 21338->21340 21339->21338 21340->21217 21342 6d072991 21341->21342 21343 6d07298d 21341->21343 21344 6d07299e ___scrt_release_startup_lock 21342->21344 21345 6d072b02 ___scrt_fastfail 4 API calls 21342->21345 21343->21178 21344->21178 21346 6d072a22 21345->21346 23433 6d07b812 23436 6d07b7a3 23433->23436 23435 6d07b837 23437 6d07b7af ___scrt_is_nonwritable_in_current_image 23436->23437 23444 6d07bcb1 EnterCriticalSection 23437->23444 23439 6d07b7b9 23440 6d07b7e7 23439->23440 23443 6d07d4b7 __fassign 19 API calls 23439->23443 23445 6d07b7fb 23440->23445 23442 6d07b7f3 __vfwprintf_l 23442->23435 23443->23439 23444->23439 23448 6d07bcf9 LeaveCriticalSection 23445->23448 23447 6d07b805 23447->23442 23448->23447 21482 6d07269e 21483 6d0726a7 21482->21483 21484 6d0726ac dllmain_dispatch 21482->21484 21486 6d072780 21483->21486 21487 6d072796 21486->21487 21488 6d07279f 21487->21488 21490 6d072733 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 21487->21490 21488->21484 21490->21488 25683 6d0724db 25685 6d0724e7 ___scrt_is_nonwritable_in_current_image 25683->25685 25684 6d0724f0 25685->25684 25686 6d072565 25685->25686 25687 6d07250f 25685->25687 25688 6d072b02 ___scrt_fastfail 4 API calls 25686->25688 25705 6d072915 25687->25705 25693 6d07256c ___scrt_is_nonwritable_in_current_image 25688->25693 25690 6d072514 25714 6d0727d7 25690->25714 25692 6d072519 __RTC_Initialize 25717 6d072556 25692->25717 25694 6d0725a2 dllmain_raw 25693->25694 25701 6d07259d 25693->25701 25704 6d072588 25693->25704 25697 6d0725bc dllmain_crt_dispatch 25694->25697 25694->25704 25696 6d072531 25720 6d072ad4 25696->25720 25697->25701 25697->25704 25699 6d072609 25700 6d072612 dllmain_crt_dispatch 25699->25700 25699->25704 25702 6d072625 dllmain_raw 25700->25702 25700->25704 25701->25699 25703 6d0725f5 dllmain_crt_dispatch dllmain_raw 25701->25703 25702->25704 25703->25699 25706 6d07291a ___scrt_release_startup_lock 25705->25706 25707 6d07291e 25706->25707 25711 6d07292a 25706->25711 25726 6d079049 25707->25726 25710 6d072937 25710->25690 25711->25710 25712 6d078833 __purecall 28 API calls 25711->25712 25713 6d0789a3 25712->25713 25713->25690 25748 6d073663 InterlockedFlushSList 25714->25748 25752 6d072938 25717->25752 25719 6d07255b ___scrt_release_startup_lock 25719->25696 25721 6d072ae0 25720->25721 25722 6d072af6 25721->25722 25760 6d0791e9 25721->25760 25722->25684 25724 6d072aee 25725 6d0736c5 ___vcrt_uninitialize 8 API calls 25724->25725 25725->25722 25729 6d078ed4 25726->25729 25728 6d072928 25728->25690 25730 6d078ee0 ___scrt_is_nonwritable_in_current_image 25729->25730 25737 6d07bcb1 EnterCriticalSection 25730->25737 25732 6d078eee 25738 6d078f25 25732->25738 25736 6d078f0c __vfwprintf_l 25736->25728 25737->25732 25741 6d078f45 25738->25741 25743 6d078f4d 25738->25743 25739 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 25740 6d078efb 25739->25740 25744 6d078f19 25740->25744 25741->25739 25742 6d0799a9 _free 19 API calls 25742->25741 25743->25741 25743->25742 25747 6d07bcf9 LeaveCriticalSection 25744->25747 25746 6d078f23 25746->25736 25747->25746 25750 6d073673 25748->25750 25751 6d0727e1 25748->25751 25749 6d077a0f ___vcrt_freefls@4 19 API calls 25749->25750 25750->25749 25750->25751 25751->25692 25757 6d079219 25752->25757 25755 6d07396f ___vcrt_uninitialize_ptd 6 API calls 25756 6d0736e9 25755->25756 25756->25719 25758 6d079932 11 API calls 25757->25758 25759 6d07293f 25758->25759 25759->25755 25761 6d079206 25760->25761 25763 6d0791f4 25760->25763 25770 6d07cda8 25761->25770 25762 6d079202 25762->25724 25763->25762 25767 6d07a1b4 25763->25767 25774 6d07a066 25767->25774 25771 6d07cdc1 25770->25771 25772 6d072103 __ehhandler$___std_fs_get_file_attributes_by_handle@8 5 API calls 25771->25772 25773 6d079215 25772->25773 25773->25724 25777 6d079fc4 25774->25777 25776 6d07a0a5 25776->25762 25778 6d079fd0 ___scrt_is_nonwritable_in_current_image 25777->25778 25785 6d07bcb1 EnterCriticalSection 25778->25785 25780 6d07a046 25794 6d07a05a 25780->25794 25782 6d079fda ___scrt_uninitialize_crt 25782->25780 25786 6d079f43 25782->25786 25783 6d07a052 __vfwprintf_l 25783->25776 25785->25782 25787 6d079f4f ___scrt_is_nonwritable_in_current_image 25786->25787 25797 6d075bbe EnterCriticalSection 25787->25797 25789 6d079f91 25808 6d079fb8 25789->25808 25790 6d079f59 ___scrt_uninitialize_crt 25790->25789 25798 6d07a16d 25790->25798 25792 6d079fb0 __vfwprintf_l 25792->25782 25850 6d07bcf9 LeaveCriticalSection 25794->25850 25796 6d07a064 25796->25783 25797->25790 25799 6d07a183 25798->25799 25800 6d07a17a 25798->25800 25802 6d07a10a __vfwprintf_l 59 API calls 25799->25802 25801 6d07a066 ___scrt_uninitialize_crt 63 API calls 25800->25801 25803 6d07a180 25801->25803 25804 6d07a189 25802->25804 25803->25789 25804->25803 25805 6d07b651 __vfwprintf_l 19 API calls 25804->25805 25806 6d07a1a3 25805->25806 25811 6d07d774 25806->25811 25849 6d075bd2 LeaveCriticalSection 25808->25849 25810 6d079fc2 25810->25792 25812 6d07d785 25811->25812 25814 6d07d792 25811->25814 25813 6d077993 _free 19 API calls 25812->25813 25817 6d07d78a _memcpy_s 25813->25817 25815 6d07d7db 25814->25815 25818 6d07d7b9 25814->25818 25816 6d077993 _free 19 API calls 25815->25816 25816->25817 25817->25803 25820 6d07d6dc 25818->25820 25821 6d07d6e8 ___scrt_is_nonwritable_in_current_image 25820->25821 25834 6d07e1db EnterCriticalSection 25821->25834 25823 6d07d6f7 25824 6d07d73e 25823->25824 25835 6d07e2b2 25823->25835 25826 6d077993 _free 19 API calls 25824->25826 25828 6d07d743 25826->25828 25827 6d07d723 FlushFileBuffers 25827->25828 25829 6d07d72f 25827->25829 25846 6d07d768 25828->25846 25830 6d077980 __dosmaperr 19 API calls 25829->25830 25832 6d07d734 GetLastError 25830->25832 25832->25824 25833 6d07d75b __vfwprintf_l 25833->25817 25834->25823 25836 6d07e2d4 25835->25836 25837 6d07e2bf 25835->25837 25840 6d077980 __dosmaperr 19 API calls 25836->25840 25842 6d07e2f9 25836->25842 25838 6d077980 __dosmaperr 19 API calls 25837->25838 25839 6d07e2c4 25838->25839 25841 6d077993 _free 19 API calls 25839->25841 25843 6d07e304 25840->25843 25845 6d07e2cc _memcpy_s 25841->25845 25842->25827 25844 6d077993 _free 19 API calls 25843->25844 25844->25845 25845->25827 25847 6d07e1fe __vfwprintf_l LeaveCriticalSection 25846->25847 25848 6d07d772 25847->25848 25848->25833 25849->25810 25850->25796

    Control-flow Graph

    APIs
    • GetCommandLineW.KERNEL32(00000000), ref: 6D06A742
    • CommandLineToArgvW.SHELL32(00000000), ref: 6D06A749
      • Part of subcall function 6D06A450: SetUnhandledExceptionFilter.KERNEL32(6D06A940,D4C6F04B), ref: 6D06A480
    • ExitProcess.KERNEL32 ref: 6D06A764
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CommandLine$ArgvExceptionExitFilterProcessUnhandled
    • String ID:
    • API String ID: 3999336801-0
    • Opcode ID: a488f8b6ce3b642c63b7118de6b3fbcc072e61690133a63997eeda98bd071c87
    • Instruction ID: 7accf355fd8292ed6be55c8975d074b821e0a3579e102cf887f1216b9f975390
    • Opcode Fuzzy Hash: a488f8b6ce3b642c63b7118de6b3fbcc072e61690133a63997eeda98bd071c87
    • Instruction Fuzzy Hash: E8E0EDB5D10208AFCF00DFE4D859B8EBBF8AB4A306F418054E604D7241D7345604CFA5

    Control-flow Graph

    APIs
      • Part of subcall function 6D07994C: RtlAllocateHeap.NTDLL(00000008,?,6D06A587,?,6D0798A2,00000001,00000364,FFFFFFFF,000000FF,?,6D06A587,?,6D077998,6D07A642), ref: 6D07998D
    • _free.LIBCMT ref: 6D07E104
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: AllocateHeap_free
    • String ID:
    • API String ID: 614378929-0
    • Opcode ID: a7018ca1b7dab01fa89ae2cc2327009ac45932cccc635d3d6545fe49a90cdd94
    • Instruction ID: 7a76a331f0b598d74f54e04f0706ab0bc60b20e328b7ff0fc5f090b54a1a5f8d
    • Opcode Fuzzy Hash: a7018ca1b7dab01fa89ae2cc2327009ac45932cccc635d3d6545fe49a90cdd94
    • Instruction Fuzzy Hash: F101D672204306ABF3318E69D885A9AFBE9FB85370F25061DE59487280EB70A945C678

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 16 6d07994c-6d079957 17 6d079965-6d07996b 16->17 18 6d079959-6d079963 16->18 20 6d079984-6d079995 RtlAllocateHeap 17->20 21 6d07996d-6d07996e 17->21 18->17 19 6d079999-6d0799a4 call 6d077993 18->19 25 6d0799a6-6d0799a8 19->25 22 6d079997 20->22 23 6d079970-6d079977 call 6d07d507 20->23 21->20 22->25 23->19 29 6d079979-6d079982 call 6d078444 23->29 29->19 29->20
    APIs
    • RtlAllocateHeap.NTDLL(00000008,?,6D06A587,?,6D0798A2,00000001,00000364,FFFFFFFF,000000FF,?,6D06A587,?,6D077998,6D07A642), ref: 6D07998D
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: AllocateHeap
    • String ID:
    • API String ID: 1279760036-0
    • Opcode ID: 0f7447ea4e9ec89a1f3ab5b92c363c7675303de3662307604fced5083582f047
    • Instruction ID: bce5a83c4b55708510a3c5cfd888308a20305b77872425517ba2750387f882fd
    • Opcode Fuzzy Hash: 0f7447ea4e9ec89a1f3ab5b92c363c7675303de3662307604fced5083582f047
    • Instruction Fuzzy Hash: 7DF0B4316556266AFB320B6AE804B6E379CEFC2770B058115E8189F180CBE0E400C6E9
    APIs
    • lstrlenW.KERNEL32(?), ref: 6D053120
    • lstrcatW.KERNEL32(?,?), ref: 6D053157
    • lstrlenW.KERNEL32(?), ref: 6D053164
    • lstrcpyW.KERNEL32(?,*.*), ref: 6D0531D4
    • FindFirstFileW.KERNEL32(?,?), ref: 6D0531E8
    • lstrcmpW.KERNEL32(?,6D08BA58), ref: 6D053220
    • lstrcmpW.KERNEL32(?,6D08BA5C), ref: 6D05323D
    • lstrcatW.KERNEL32(?,?), ref: 6D05326C
    • lstrcatW.KERNEL32(?,?), ref: 6D0532C3
    • FindNextFileW.KERNEL32(000000FF,?), ref: 6D053376
    • FindClose.KERNEL32(000000FF), ref: 6D05338B
    • GetFileAttributesW.KERNEL32(?), ref: 6D0533AA
    • SetFileAttributesW.KERNEL32(?,00000090), ref: 6D0533BF
    • RemoveDirectoryW.KERNEL32(?), ref: 6D0533C9
    • GetLastError.KERNEL32 ref: 6D0533D3
    • SetFileAttributesW.KERNEL32(?,00000000), ref: 6D0533E9
    • GetLastError.KERNEL32 ref: 6D0533F8
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: File$AttributesFindlstrcat$ErrorLastlstrcmplstrlen$CloseDirectoryFirstNextRemovelstrcpy
    • String ID: *.*
    • API String ID: 270640561-438819550
    • Opcode ID: 171d1675a64b1c950ec980c7b80789df2af28158989d37afc608c10d02088afd
    • Instruction ID: 363125560c53aaea8224e7ce5305745bf323156160f178003cb0500af77510f7
    • Opcode Fuzzy Hash: 171d1675a64b1c950ec980c7b80789df2af28158989d37afc608c10d02088afd
    • Instruction Fuzzy Hash: 849161749042199BEF20CF64C948BEE77B6BF8A305F4081D8E91D9B241DB369EA4CF54
    APIs
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 6D055F68
    • GetStartupInfoA.KERNEL32(00000044), ref: 6D055F9D
    • lstrcatA.KERNEL32(?,cmd.exe /c ), ref: 6D055FF0
    • lstrcatA.KERNEL32(?,?), ref: 6D056001
    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,?), ref: 6D05602A
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: Createlstrcat$InfoPipeProcessStartup
    • String ID: D$cmd.exe /c
    • API String ID: 2132647166-3768262801
    • Opcode ID: d7901200be3566152df50cfa488c8fcb15f608a9987a454ec2525e707a2688e5
    • Instruction ID: 5bd5fec9146946a86755f8942181c3d097ed7be7ba6ae305d229a382f14e5ee4
    • Opcode Fuzzy Hash: d7901200be3566152df50cfa488c8fcb15f608a9987a454ec2525e707a2688e5
    • Instruction Fuzzy Hash: 26D13B74A042189FEB24CF24CD54BEABBB5BB49304F4082D8E94D9B381D7B59AD4CF94
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: Findlstrlen$CloseErrorFileFirstLastlstrcat
    • String ID:
    • API String ID: 2856486079-0
    • Opcode ID: 7c88eb2f2948738f5345ac701d191bb2f4c0e9b6c177ef7ca035e106af151906
    • Instruction ID: 5995c9e7c531bf2f4e9824842d60564ef7e7d39bef1f54aa39f0cc76ddc09b9a
    • Opcode Fuzzy Hash: 7c88eb2f2948738f5345ac701d191bb2f4c0e9b6c177ef7ca035e106af151906
    • Instruction Fuzzy Hash: 09418FB49043689FEF30CF34C998BAD77B0AF46301F5081D9EA595B282DB359A90CF95

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 235 6d069d70-6d069d76 236 6d069d7a-6d069d81 235->236 237 6d069d87-6d069d8e 236->237 238 6d06a0fd 236->238 239 6d069d95-6d069da5 call 6d058f10 237->239 240 6d06a0ff-6d06a102 238->240 243 6d069e71-6d069e7e call 6d058f10 239->243 244 6d069dab-6d069e07 EnterCriticalSection call 6d058ef0 call 6d058eb0 GetTickCount call 6d058700 239->244 249 6d069f87-6d069f8d 243->249 250 6d069e84-6d069e9f EnterCriticalSection 243->250 264 6d069e3c-6d069e6c LeaveCriticalSection call 6d052860 GetTickCount 244->264 265 6d069e09-6d069e37 LeaveCriticalSection call 6d052860 call 6d069b30 244->265 255 6d069f94-6d069fa4 call 6d058f10 249->255 256 6d069f8f 249->256 252 6d069ee1-6d069f25 call 6d058ef0 call 6d058eb0 GetTickCount call 6d058700 250->252 253 6d069ea1-6d069eb5 WaitForSingleObject 250->253 285 6d069f27-6d069f55 LeaveCriticalSection call 6d052860 call 6d069b30 252->285 286 6d069f5a-6d069f82 LeaveCriticalSection call 6d052860 252->286 253->252 259 6d069eb7-6d069edc ResetEvent LeaveCriticalSection 253->259 267 6d06a0f0-6d06a0f8 Sleep 255->267 268 6d069faa-6d069fc5 EnterCriticalSection 255->268 256->236 259->249 264->239 265->240 267->236 271 6d069fc7-6d069fdb WaitForSingleObject 268->271 272 6d06a003-6d06a00d 268->272 271->272 276 6d069fdd-6d069ffe ResetEvent LeaveCriticalSection 271->276 277 6d06a00f-6d06a023 WaitForSingleObject 272->277 278 6d06a04b-6d06a095 call 6d058ef0 call 6d058eb0 GetTickCount call 6d058700 272->278 276->267 277->278 282 6d06a025-6d06a046 ResetEvent LeaveCriticalSection 277->282 298 6d06a0c7-6d06a0eb LeaveCriticalSection call 6d052860 278->298 299 6d06a097-6d06a0c5 LeaveCriticalSection call 6d052860 call 6d069b30 278->299 282->267 285->240 286->243 298->255 299->240
    APIs
    • EnterCriticalSection.KERNEL32(-00000090), ref: 6D069DB8
    • GetTickCount.KERNEL32 ref: 6D069DDF
    • LeaveCriticalSection.KERNEL32(-00000090,-00000004), ref: 6D069E16
    • LeaveCriticalSection.KERNEL32(-00000090,-00000004), ref: 6D069E49
    • GetTickCount.KERNEL32 ref: 6D069E66
    • EnterCriticalSection.KERNEL32(-000000A8), ref: 6D069E8F
    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 6D069EAD
    • ResetEvent.KERNEL32(?), ref: 6D069EC5
    • LeaveCriticalSection.KERNEL32(-000000A8), ref: 6D069ED6
    • GetTickCount.KERNEL32 ref: 6D069EFC
    • LeaveCriticalSection.KERNEL32(-000000A8,-00000004,00000000), ref: 6D069F34
    • LeaveCriticalSection.KERNEL32(-000000A8,-00000004,00000000), ref: 6D069F65
    • EnterCriticalSection.KERNEL32(-000000C0), ref: 6D069FB5
    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 6D069FD3
    • ResetEvent.KERNEL32(?), ref: 6D069FE7
    • LeaveCriticalSection.KERNEL32(-000000C0), ref: 6D069FF8
    • WaitForSingleObject.KERNEL32(?,0000000A), ref: 6D06A01B
    • ResetEvent.KERNEL32(?), ref: 6D06A02F
    • LeaveCriticalSection.KERNEL32(-000000C0), ref: 6D06A040
    • GetTickCount.KERNEL32 ref: 6D06A06C
    • LeaveCriticalSection.KERNEL32(-000000C0,-00000004,00000000), ref: 6D06A0A4
    • LeaveCriticalSection.KERNEL32(-000000C0,-00000004,00000000), ref: 6D06A0D2
    • Sleep.KERNEL32(0000000A), ref: 6D06A0F2
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Leave$CountTick$EnterEventObjectResetSingleWait$Sleep
    • String ID:
    • API String ID: 22041548-0
    • Opcode ID: 8f4ad04d462e69cb6820475e7536c84de734fe606f7b87056ef7f62da737f643
    • Instruction ID: cbf87ec476ffba49983adf62633f175d1032f249b69acf0e6a41c6ea53295bb6
    • Opcode Fuzzy Hash: 8f4ad04d462e69cb6820475e7536c84de734fe606f7b87056ef7f62da737f643
    • Instruction Fuzzy Hash: 88A1A074654240EFEF14DBA4C994B2E7BB5BF4B319F008158E9129F392C735E890CB69

    Control-flow Graph

    APIs
    • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 6D05C328
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 6D05C337
    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 6D05C345
    • DeleteDC.GDI32(00000000), ref: 6D05C355
    • GetObjectA.GDI32(?,00000018,?), ref: 6D05C3A1
    • GlobalAlloc.KERNEL32(00000042,00000028), ref: 6D05C42D
    • GlobalLock.KERNEL32(00000000), ref: 6D05C43A
    • GetStockObject.GDI32(0000000F), ref: 6D05C452
    • GetDC.USER32(00000000), ref: 6D05C463
    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 6D05C476
    • RealizePalette.GDI32(00000000), ref: 6D05C483
    • GetDIBits.GDI32(00000000,?,00000000,?,00000028,00000000,00000000), ref: 6D05C4A8
    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 6D05C4BE
    • RealizePalette.GDI32(00000000), ref: 6D05C4C8
    • ReleaseDC.USER32(00000000,00000000), ref: 6D05C4D4
    • GlobalUnlock.KERNEL32(00000000), ref: 6D05C560
    • GlobalFree.KERNEL32(00000000), ref: 6D05C56A
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: GlobalPalette$CapsDeviceObjectRealizeSelect$AllocBitsCreateDeleteFreeLockReleaseStockUnlock
    • String ID: ($DISPLAY
    • API String ID: 2569495461-216271742
    • Opcode ID: b60a7ff8149002c5b14c23b6892e49cf99dfabe7a532f2e318f1ec96b87d4042
    • Instruction ID: a032a1f9b455c561792a8b48011e169fab622497e26e8b5659e5076408408224
    • Opcode Fuzzy Hash: b60a7ff8149002c5b14c23b6892e49cf99dfabe7a532f2e318f1ec96b87d4042
    • Instruction Fuzzy Hash: 49A1F4B5D102089BDF14CFE8C844BAEBBB5FF8A300F108129E919AB390D7759945CF94
    APIs
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 6D0570A7
    • GetLastError.KERNEL32 ref: 6D0570BC
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 6D057109
    • GetLastError.KERNEL32 ref: 6D05711E
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CreateErrorLastPipe
    • String ID: $
    • API String ID: 269057482-227171996
    • Opcode ID: ba994e167ff2a1ff2bdcb17086ae8152fb6896158f527bc85cbb070486cf5cef
    • Instruction ID: 034c253bda9b1bf25535dea54a21082e0cfcf25e768e4095955b85d8cbd5fc5a
    • Opcode Fuzzy Hash: ba994e167ff2a1ff2bdcb17086ae8152fb6896158f527bc85cbb070486cf5cef
    • Instruction Fuzzy Hash: 4FB19EB0A102189BEB24CF64C95579EBBB5EF8A304F1080BCD60D9B381DB755A84CF6D
    APIs
    • GetObjectA.GDI32(?,00000018,?), ref: 6D05CD7B
    • GlobalAlloc.KERNEL32(00000042,00000028), ref: 6D05CDF9
    • GlobalLock.KERNEL32(00000000), ref: 6D05CE06
    • GetStockObject.GDI32(0000000F), ref: 6D05CE1E
    • GetDC.USER32(00000000), ref: 6D05CE2F
    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 6D05CE42
    • RealizePalette.GDI32(00000000), ref: 6D05CE4F
    • GetDIBits.GDI32(00000000,?,00000000,?,00000028,00000000,00000000), ref: 6D05CE74
    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 6D05CE8A
    • RealizePalette.GDI32(00000000), ref: 6D05CE94
    • ReleaseDC.USER32(00000000,00000000), ref: 6D05CEA0
    • GlobalUnlock.KERNEL32(00000000), ref: 6D05CF35
    • GlobalFree.KERNEL32(00000000), ref: 6D05CF3F
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: GlobalPalette$ObjectRealizeSelect$AllocBitsFreeLockReleaseStockUnlock
    • String ID: ($DISPLAY
    • API String ID: 4021622762-216271742
    • Opcode ID: 7d60e3368b3c297c0b78aa1b3a8db3d3993e9898bf5bfa8c970a50800537b1d3
    • Instruction ID: fb884f4072e0312b4b66149b8c1975134a48f91ef5205154651b118fb294e072
    • Opcode Fuzzy Hash: 7d60e3368b3c297c0b78aa1b3a8db3d3993e9898bf5bfa8c970a50800537b1d3
    • Instruction Fuzzy Hash: 94A1BFB4D002089FEF14CFA9C984B9EBBB5FF89304F208129E919AB390D7759945CF94
    APIs
    • ___free_lconv_mon.LIBCMT ref: 6D07D237
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D080236
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D080248
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D08025A
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D08026C
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D08027E
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D080290
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D0802A2
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D0802B4
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D0802C6
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D0802D8
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D0802EA
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D0802FC
      • Part of subcall function 6D080219: _free.LIBCMT ref: 6D08030E
    • _free.LIBCMT ref: 6D07D22C
      • Part of subcall function 6D0799A9: HeapFree.KERNEL32(00000000,00000000,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587), ref: 6D0799BF
      • Part of subcall function 6D0799A9: GetLastError.KERNEL32(6D06A587,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587,6D06A587), ref: 6D0799D1
    • _free.LIBCMT ref: 6D07D24E
    • _free.LIBCMT ref: 6D07D263
    • _free.LIBCMT ref: 6D07D26E
    • _free.LIBCMT ref: 6D07D290
    • _free.LIBCMT ref: 6D07D2A3
    • _free.LIBCMT ref: 6D07D2B1
    • _free.LIBCMT ref: 6D07D2BC
    • _free.LIBCMT ref: 6D07D2F4
    • _free.LIBCMT ref: 6D07D2FB
    • _free.LIBCMT ref: 6D07D318
    • _free.LIBCMT ref: 6D07D330
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
    • String ID: (7m
    • API String ID: 161543041-2267483508
    • Opcode ID: 908c44313ffa7d82fb497ef24bff1d127403afc394c0298d7f4d8f69bb42304e
    • Instruction ID: 7bbb9ad324f8663b261e61ed53ea414277651bd41b672142056cefdcbbe83666
    • Opcode Fuzzy Hash: 908c44313ffa7d82fb497ef24bff1d127403afc394c0298d7f4d8f69bb42304e
    • Instruction Fuzzy Hash: DA313971608606EFFB309A79EC40BAAB3E9FB80354F118419E568DF150DB72E841CB29
    APIs
    • SetEvent.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D05824D
    • SetEvent.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D058269
    • SetEvent.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D058285
    • SetEvent.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D0582A1
    • WaitForSingleObject.KERNEL32(?,000003E8,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D0582C2
    • TerminateThread.KERNEL32(?,00000000,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D0582DB
    • CloseHandle.KERNEL32(?,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D0582EB
    • WaitForSingleObject.KERNEL32(?,000003E8,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D05830C
    • TerminateThread.KERNEL32(?,00000000,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D058325
    • CloseHandle.KERNEL32(?,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D058335
    • CloseHandle.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D058351
    • CloseHandle.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D05836D
    • CloseHandle.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D058389
    • CloseHandle.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D0583A5
    • CloseHandle.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D0583C1
    • CloseHandle.KERNEL32(?,00002710,?,6D057E2F,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D0583DD
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CloseHandle$Event$ObjectSingleTerminateThreadWait
    • String ID:
    • API String ID: 1594280071-0
    • Opcode ID: 0598d5f2eae371d8e7b13f462520d5cffa13a7f4b7dad9b94c06f114da042eca
    • Instruction ID: 2ea68d677b5f5a9235f003a6ff92455b224f85863b70d65ec4cca0f2366705e9
    • Opcode Fuzzy Hash: 0598d5f2eae371d8e7b13f462520d5cffa13a7f4b7dad9b94c06f114da042eca
    • Instruction Fuzzy Hash: 6761A534650109EFDB04DB90C29CBEDB7F2BB49306F6546A8E8095B392C775AE81DF90
    APIs
    • LoadLibraryA.KERNEL32(00000000), ref: 6D05D026
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6D05D0E1
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6D05D187
      • Part of subcall function 6D072278: ___report_securityfailure.LIBCMT ref: 6D07227D
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6D05D2B8
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6D05D36C
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 6D05D4D5
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: AddressProc$LibraryLoad___report_securityfailure
    • String ID: @$@$@@@$@@@@$@@@@@$@@@@@@$p
    • API String ID: 1632341849-4092788838
    • Opcode ID: 4c2388e9db182e0eb1c9f07c6cee47565a8a48c78933a0b9cf5aa1b6f5efcd60
    • Instruction ID: 5ab94d4d11b0d2c1a2c6a491d2c510dbd3280a5aca0e9d28065040f50b22e8e8
    • Opcode Fuzzy Hash: 4c2388e9db182e0eb1c9f07c6cee47565a8a48c78933a0b9cf5aa1b6f5efcd60
    • Instruction Fuzzy Hash: FC02A430A092C98AFB28CEACD2183DD7EA6DB91304F18407DC5498F7D5D7FAAA45C761
    APIs
    • EnumDisplaySettingsA.USER32(00000000,000000FF,?), ref: 6D05AC51
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: DisplayEnumSettings
    • String ID: ($6$DISPLAY
    • API String ID: 3434046153-2676095719
    • Opcode ID: 13115d74ad9b238d7f335f53ff5fbf6d4dadc6d14a4e8cc4f5b74b1031449c4a
    • Instruction ID: f04efabfd605850ed9ecd365400840cf61d5c3768710e5dad50dffc0b916fa10
    • Opcode Fuzzy Hash: 13115d74ad9b238d7f335f53ff5fbf6d4dadc6d14a4e8cc4f5b74b1031449c4a
    • Instruction Fuzzy Hash: AFE106B4D042199BEB24CF65CD85BEEB7B4AF59300F1081E8D64DA7241E771AE90CFA1
    APIs
    • EnterCriticalSection.KERNEL32(-00000048,D4C6F04B,00000000,?,6D069ACD,00000001), ref: 6D06976F
    • LeaveCriticalSection.KERNEL32(?), ref: 6D069786
    • EnterCriticalSection.KERNEL32(?), ref: 6D069793
    • LeaveCriticalSection.KERNEL32(?), ref: 6D069866
    • DeleteCriticalSection.KERNEL32(?), ref: 6D06988A
    • DeleteCriticalSection.KERNEL32(?), ref: 6D069897
    • DeleteCriticalSection.KERNEL32(?), ref: 6D0698A4
    • DeleteCriticalSection.KERNEL32(?), ref: 6D0698B4
    • DeleteCriticalSection.KERNEL32(?), ref: 6D0698C4
    • DeleteCriticalSection.KERNEL32(?), ref: 6D0698D3
    • CloseHandle.KERNEL32(?), ref: 6D0698E0
    • CloseHandle.KERNEL32(?), ref: 6D0698ED
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Delete$CloseEnterHandleLeave
    • String ID:
    • API String ID: 547864322-0
    • Opcode ID: cfb7fc2dd1cb29cdbf177e33d58ccbb0b403ebe34b0033b488ee59e52ab453a3
    • Instruction ID: 21b5e243bd508ae1f9d71232d5759c5d6bbb1d339c3d2c4fe6337cf457b3f05b
    • Opcode Fuzzy Hash: cfb7fc2dd1cb29cdbf177e33d58ccbb0b403ebe34b0033b488ee59e52ab453a3
    • Instruction Fuzzy Hash: B1512EB491025A8FDF08DFA8C994B7FB775FF46209F554518E922AB381CB34A410CB94
    APIs
      • Part of subcall function 6D069D30: EnterCriticalSection.KERNEL32(-00000048,?,?,6D069B89,6D05DD1A,?,00000010,00000002), ref: 6D069D41
      • Part of subcall function 6D069D30: LeaveCriticalSection.KERNEL32(-00000048,?,6D069B89,6D05DD1A,?,00000010,00000002), ref: 6D069D5F
    • EnterCriticalSection.KERNEL32(-00000078,?,?,6D05DD1A,?,00000010,00000002), ref: 6D069BB8
    • LeaveCriticalSection.KERNEL32(-00000078), ref: 6D069CAC
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: 4e83373a47d69b6d1c546ecb9dc272437eaccbbd616bba9a3433ad7734c1f4bf
    • Instruction ID: cefb301cbe4c788dc39a0bd024f5ed4a90c53a9ebbf0bcefd8ff632928b27ec0
    • Opcode Fuzzy Hash: 4e83373a47d69b6d1c546ecb9dc272437eaccbbd616bba9a3433ad7734c1f4bf
    • Instruction Fuzzy Hash: ED31AB70914244EFEF14DBB8D944BAE7BB5BB4B31AF404518E4159F242CB35E844CFA8
    APIs
    • _free.LIBCMT ref: 6D0795D8
      • Part of subcall function 6D0799A9: HeapFree.KERNEL32(00000000,00000000,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587), ref: 6D0799BF
      • Part of subcall function 6D0799A9: GetLastError.KERNEL32(6D06A587,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587,6D06A587), ref: 6D0799D1
    • _free.LIBCMT ref: 6D0795E4
    • _free.LIBCMT ref: 6D0795EF
    • _free.LIBCMT ref: 6D0795FA
    • _free.LIBCMT ref: 6D079605
    • _free.LIBCMT ref: 6D079610
    • _free.LIBCMT ref: 6D07961B
    • _free.LIBCMT ref: 6D079626
    • _free.LIBCMT ref: 6D079631
    • _free.LIBCMT ref: 6D07963F
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: 87ebc9382e82b0bba1597af8ed91996ad38b12e4743dd00436c867407ec71bea
    • Instruction ID: c8d71f21cf934ef66a64191bd32183452133256bf684b8cd10fc6391c7effdff
    • Opcode Fuzzy Hash: 87ebc9382e82b0bba1597af8ed91996ad38b12e4743dd00436c867407ec71bea
    • Instruction Fuzzy Hash: 6121C776914108EFEB11DF99E880EDE7BB8FF88200F0181A6E6159F121DB72DA44CB85
    APIs
    • _swprintf.LIBCMTD ref: 6D061529
    • _memcpy_s.LIBCPMTD ref: 6D0615AB
      • Part of subcall function 6D069B70: EnterCriticalSection.KERNEL32(-00000090), ref: 6D069BEC
      • Part of subcall function 6D069B70: SetEvent.KERNEL32(?), ref: 6D069BFB
      • Part of subcall function 6D069B70: LeaveCriticalSection.KERNEL32(-00000090,00000010), ref: 6D069C1E
    • _memcpy_s.LIBCPMTD ref: 6D0612F9
      • Part of subcall function 6D069B70: EnterCriticalSection.KERNEL32(-00000078,?,?,6D05DD1A,?,00000010,00000002), ref: 6D069BB8
      • Part of subcall function 6D069B70: LeaveCriticalSection.KERNEL32(-00000078), ref: 6D069CAC
      • Part of subcall function 6D065400: EnterCriticalSection.KERNEL32(?), ref: 6D065418
      • Part of subcall function 6D065400: LeaveCriticalSection.KERNEL32(?,0000001E), ref: 6D065445
    • _swprintf.LIBCMTD ref: 6D061277
      • Part of subcall function 6D055C90: __vswprintf_s_l.LIBCONCRTD ref: 6D055CAE
      • Part of subcall function 6D05EFD0: lstrcatA.KERNEL32(00000000,00000000,?,6D05F449), ref: 6D05EFEC
    • _memcpy_s.LIBCPMTD ref: 6D0614A6
    Strings
    • TwoPipeShell [%d] Create Error! It's Already Exists!, xrefs: 6D061266
    • TwoPipeShell [%d] Create Error!, xrefs: 6D061518
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave_memcpy_s$_swprintf$Event__vswprintf_s_llstrcat
    • String ID: TwoPipeShell [%d] Create Error!$TwoPipeShell [%d] Create Error! It's Already Exists!
    • API String ID: 3699697941-232176239
    • Opcode ID: 63de94be7b5c343690fc8c333ea3c0a3ad0a3bc671130f06caef8d1717221791
    • Instruction ID: 0b77e336f479a138cdd4dfc480e161191c6c36d60c97dd1413aed6bcde096c0e
    • Opcode Fuzzy Hash: 63de94be7b5c343690fc8c333ea3c0a3ad0a3bc671130f06caef8d1717221791
    • Instruction Fuzzy Hash: 52D12275A042589FEB14DF54CC91BAAB376FF89704F1045D8E9099B391DB32AEA0CF90
    APIs
    • lstrlenW.KERNEL32(?,?,?,00000000,00000021,?,?,D4C6F04B), ref: 6D0606D3
    • _memcpy_s.LIBCPMTD ref: 6D06079E
    • _memcpy_s.LIBCPMTD ref: 6D060810
    • _memcpy_s.LIBCPMTD ref: 6D060842
      • Part of subcall function 6D056800: FormatMessageA.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 6D05685D
      • Part of subcall function 6D05EFD0: lstrcatA.KERNEL32(00000000,00000000,?,6D05F449), ref: 6D05EFEC
    • _swprintf.LIBCMTD ref: 6D0608BF
    • _memcpy_s.LIBCPMTD ref: 6D060941
    Strings
    • Download [%S] error! Is running Download, xrefs: 6D0608AE
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _memcpy_s$FormatMessage_swprintflstrcatlstrlen
    • String ID: Download [%S] error! Is running Download
    • API String ID: 1768301414-4225480886
    • Opcode ID: 1bed5ebee9ac1a1a064618ec1d3e18943476defa8fb44f79328283a0d7219afc
    • Instruction ID: dbbba1a13b0bdc11b5087f788930b72a1879b9cb5f1b9435076bea372285f755
    • Opcode Fuzzy Hash: 1bed5ebee9ac1a1a064618ec1d3e18943476defa8fb44f79328283a0d7219afc
    • Instruction Fuzzy Hash: 12B131B56042089FEB04DF64CC91FAAB376FF89704F148598E9199B391DB31AD60CFA0
    APIs
    • ReadFile.KERNEL32(0000FFEF,?,00000008,0000FFEF,00000000), ref: 6D06203B
    • SetFilePointerEx.KERNEL32(00000008,?,?,6D062382,00000001), ref: 6D062077
    • SetFilePointerEx.KERNEL32(00000008,?,?,6D062382,00000001), ref: 6D0620A9
    • ReadFile.KERNEL32(00000000,6D094548,?,00000000,00000000), ref: 6D06212A
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: File$PointerRead
    • String ID: $8m$$8m$fkpioefpoea$@^Tf0-0-gepwf09IJGEJ0IFAPKO456SG894E
    • API String ID: 3154509469-1104052929
    • Opcode ID: 59a3a9f7cbbd2055f77ca7f177ca34516a8d505c6f682d8d9dbc442f9a28d61c
    • Instruction ID: 963023ef0f252aaa6b0d103d0d3706ab244bb9bfb2718741511834b882f8214d
    • Opcode Fuzzy Hash: 59a3a9f7cbbd2055f77ca7f177ca34516a8d505c6f682d8d9dbc442f9a28d61c
    • Instruction Fuzzy Hash: 0881F8B5D04249AFEB14CFE8D984BEEBBB5BF89304F108219E515BB244D734A941CFA4
    APIs
    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 6D062283
    • GetLastError.KERNEL32 ref: 6D062292
      • Part of subcall function 6D056800: FormatMessageA.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 6D05685D
    • SetFilePointerEx.KERNEL32(000000FF,?,?,?,00000002), ref: 6D0622D6
    • SetFilePointerEx.KERNEL32(000000FF,?,?,00000000,00000000), ref: 6D0622EC
    • CloseHandle.KERNEL32(000000FF), ref: 6D06247B
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: File$Pointer$CloseCreateErrorFormatHandleLastMessage
    • String ID: GetDecodeLog Error !
    • API String ID: 2400116906-3583251517
    • Opcode ID: fd313ba1f185c375217ef9e75255bf6e2874853d7db787b0a861a65be8f7c027
    • Instruction ID: 239431a06efb2f430203fd2c90c05ef3c705cfb729b580dbd43869565fc6b6d0
    • Opcode Fuzzy Hash: fd313ba1f185c375217ef9e75255bf6e2874853d7db787b0a861a65be8f7c027
    • Instruction Fuzzy Hash: 5F8155B0D002099BDF14CFA8D884BAEBBB5FF49304F148219E914BB381D775A945CFA1
    APIs
    • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 6D056473
    • LoadLibraryA.KERNEL32(Kernel32.dll), ref: 6D0564B0
    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 6D0565C0
    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 6D0565D1
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: AddressProc$Iterator_baseIterator_base::_LibraryLoadstd::_
    • String ID: Kernel32.dll$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection
    • API String ID: 4189866332-1575494070
    • Opcode ID: 9a944d79aceb9cfda87c0a8666b2b43848822be5950b889eb4b0f5fbc46ed102
    • Instruction ID: 1e69632b34f6503d8fb7c37a02f16a3710cf8f241bdb81373efc7e682e3c28c4
    • Opcode Fuzzy Hash: 9a944d79aceb9cfda87c0a8666b2b43848822be5950b889eb4b0f5fbc46ed102
    • Instruction Fuzzy Hash: D5617120D0C2C8D9EF12C7E8D5487DEBFB65F26748F084099D5882B282C7BB1659C776
    APIs
      • Part of subcall function 6D05B0C0: DeleteObject.GDI32(00000000), ref: 6D05B129
    • WaitForSingleObject.KERNEL32(?,00000001), ref: 6D05B4DD
    Strings
    • ./img_src/QScreen_%d.bmp, xrefs: 6D05B5B2
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: Object$DeleteSingleWait
    • String ID: ./img_src/QScreen_%d.bmp
    • API String ID: 1609116822-2525806235
    • Opcode ID: 730569ca241d1d2f6af0152a286fb6b525d9c79dea85420ca256e0579535eaff
    • Instruction ID: 1ca1700ec08f386df07cb0aa0735434a89cb3c059b72c2ec73f724df0653b17d
    • Opcode Fuzzy Hash: 730569ca241d1d2f6af0152a286fb6b525d9c79dea85420ca256e0579535eaff
    • Instruction Fuzzy Hash: CF314870608208DBEB54DB65CD94BAEB3B5BB5A304F504198E98A9B381DBB1FDD1CF40
    APIs
    • GetStartupInfoW.KERNEL32(00000044), ref: 6D052D44
    • lstrcatW.KERNEL32(?,cmd.exe /c ), ref: 6D052D9F
    • lstrcatW.KERNEL32(?,?), ref: 6D052DB0
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,00000000,00000000,00000000,00000044,?), ref: 6D052DD9
    • GetLastError.KERNEL32 ref: 6D052DF5
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: lstrcat$CreateErrorInfoLastProcessStartup
    • String ID: D$cmd.exe /c
    • API String ID: 3475696678-3768262801
    • Opcode ID: 7bfc9af42f1ba9c7591785a654bce65f9a6523677a5314375b9ee23ef04cb6a0
    • Instruction ID: 4b461b293f137fd1fbcb3d9ac559252da681c43f313c00b4c7a020ce888b01b7
    • Opcode Fuzzy Hash: 7bfc9af42f1ba9c7591785a654bce65f9a6523677a5314375b9ee23ef04cb6a0
    • Instruction Fuzzy Hash: 6C3165B0A142589BEF60CF60CC45BDD7779AF4A705F4040D8E709AB281DBB56A84CF6D
    APIs
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00002710,?,6D057A57,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D0580EF
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6D057A57,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D058106
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6D057A57,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D05811D
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6D057A57,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D058134
    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,6D057A57,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D05814B
    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,6D057A57,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D058162
    • CreateThread.KERNEL32(00000000,00000000,6D058460,00002710,00000000,00000000), ref: 6D058182
    • CreateThread.KERNEL32(00000000,00000000,6D058450,00002710,00000000,00000000), ref: 6D0581A2
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: Create$Event$Thread
    • String ID:
    • API String ID: 2525963256-0
    • Opcode ID: da5d73bab80d9ddb3a68afb7d770329c7c4b546aac0feb7ba62dc88c4ba08168
    • Instruction ID: 0874fafe0799583b6e6b5135f5e13ff37266788c623543643a3f098e9726c048
    • Opcode Fuzzy Hash: da5d73bab80d9ddb3a68afb7d770329c7c4b546aac0feb7ba62dc88c4ba08168
    • Instruction Fuzzy Hash: CE419A34690205FFEB10DB90DD49BA977B1AB45706F7041A4EE096E2C1D7B12E81DE58
    APIs
    • InitializeCriticalSection.KERNEL32(?,D4C6F04B,00000000,6D05DB18,6D085A9E,000000FF,?,6D0699A4,6D05DB18), ref: 6D069661
    • InitializeCriticalSection.KERNEL32(?,?,6D0699A4,6D05DB18), ref: 6D06966E
    • InitializeCriticalSection.KERNEL32(?,?,6D0699A4,6D05DB18), ref: 6D06967B
    • InitializeCriticalSection.KERNEL32(?,?,6D0699A4,6D05DB18), ref: 6D06968B
    • InitializeCriticalSection.KERNEL32(?,?,6D0699A4,6D05DB18), ref: 6D06969A
    • InitializeCriticalSection.KERNEL32(?,?,6D0699A4,6D05DB18), ref: 6D0696AA
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6D0699A4,6D05DB18), ref: 6D0696F4
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,6D0699A4,6D05DB18), ref: 6D069708
      • Part of subcall function 6D069CD0: EnterCriticalSection.KERNEL32(-0000005E,?,?,6D069720,6D05DB18,?,6D0699A4,6D05DB18), ref: 6D069CDE
      • Part of subcall function 6D069CD0: LeaveCriticalSection.KERNEL32(-0000005E,?,6D069720,6D05DB18,?,6D0699A4,6D05DB18), ref: 6D069CF4
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Initialize$CreateEvent$EnterLeave
    • String ID:
    • API String ID: 465080375-0
    • Opcode ID: 38b491f72df9c4f1cbe7be3128501c12eaf513593f40b5654144606039fa7e90
    • Instruction ID: 7e3b0730d0ad3e31a014eef65f66ec737a4f8b9a423babb657f468a12d364182
    • Opcode Fuzzy Hash: 38b491f72df9c4f1cbe7be3128501c12eaf513593f40b5654144606039fa7e90
    • Instruction Fuzzy Hash: CA4129B4A1425A9FDF14CF98CC94BAEB771FF4A315F114A18E926AB3C1CB756800CB54
    APIs
    • _memcpy_s.LIBCPMTD ref: 6D0628EA
    • _memcpy_s.LIBCPMTD ref: 6D062849
      • Part of subcall function 6D05EFD0: lstrcatA.KERNEL32(00000000,00000000,?,6D05F449), ref: 6D05EFEC
    • _memcpy_s.LIBCPMTD ref: 6D06298B
    Strings
    • Screen Start With XOR error!, xrefs: 6D062884
    • Screen Start error, Class is NULL!, xrefs: 6D062925
    • Screen Start error!, xrefs: 6D0627E3
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _memcpy_s$lstrcat
    • String ID: Screen Start With XOR error!$Screen Start error!$Screen Start error, Class is NULL!
    • API String ID: 3156544786-2901572510
    • Opcode ID: c2cc29aebec96aad951b13117b958cd2ea259eb8f6a52c7939611e60caabb7d0
    • Instruction ID: 9bd6b27a1ce68d1f76215868f51b9cb8a0690c7298d9a8fc6c55e66f592b27a4
    • Opcode Fuzzy Hash: c2cc29aebec96aad951b13117b958cd2ea259eb8f6a52c7939611e60caabb7d0
    • Instruction Fuzzy Hash: 52B17CB4A04249DFDB04CFA8D890BAEB7B5FF89304F148658E9159F391DB31E951CBA0
    APIs
    • _ValidateLocalCookies.LIBCMT ref: 6D0734FB
    • ___except_validate_context_record.LIBVCRUNTIME ref: 6D073503
    • _ValidateLocalCookies.LIBCMT ref: 6D073591
    • __IsNonwritableInCurrentImage.LIBCMT ref: 6D0735BC
    • _ValidateLocalCookies.LIBCMT ref: 6D073611
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
    • String ID: csm
    • API String ID: 1170836740-1018135373
    • Opcode ID: 21df24c02a4191ca0245b1509e2fc22f2c19e7a4f0335bcb38410e35ded522a5
    • Instruction ID: f684e1c0fe03c5c82fc46e0a6dfe86caa88387565559eabcb751ed0d7a8b4887
    • Opcode Fuzzy Hash: 21df24c02a4191ca0245b1509e2fc22f2c19e7a4f0335bcb38410e35ded522a5
    • Instruction Fuzzy Hash: 8441A434E04209EBEF10CF68C844BAEBBF5AF49328F518155E9299F251D731FA11CB95
    APIs
    • lstrcpyA.KERNEL32(?,\\.\pipe\), ref: 6D0578E3
    • lstrcatA.KERNEL32(?,0000005C), ref: 6D0578F1
    • lstrcpyA.KERNEL32(?,\\.\pipe\), ref: 6D057905
    • lstrcatA.KERNEL32(?,pipe\), ref: 6D057919
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: lstrcatlstrcpy
    • String ID: \\.\pipe\$pipe\
    • API String ID: 3905823039-868360898
    • Opcode ID: bb637833572eb652b4abb77a448731b85813111016884efff794deca9154b5ff
    • Instruction ID: dae8bb43699e1bc592154d49b48def6c0867c25f9bac261a3362706d0c43f608
    • Opcode Fuzzy Hash: bb637833572eb652b4abb77a448731b85813111016884efff794deca9154b5ff
    • Instruction Fuzzy Hash: 31410CB4904249DFDB04CF94C598BEFBBF1AF58304F2441A8E5086B381C77A6A45CFA6
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: api-ms-$ext-ms-
    • API String ID: 0-537541572
    • Opcode ID: 2354147dcd2c053b92734085455a979f88058b8c9c8c62ac87e973ec791e92c7
    • Instruction ID: 674599290917632986e7dcbd32d899925082a3120174d774e2b8fc9bb8d60606
    • Opcode Fuzzy Hash: 2354147dcd2c053b92734085455a979f88058b8c9c8c62ac87e973ec791e92c7
    • Instruction Fuzzy Hash: 18219C71E16222BBFF318B65AC40B9E37B4AB47761F554510ED15AF185E730E900C6E8
    APIs
      • Part of subcall function 6D080380: _free.LIBCMT ref: 6D0803A5
    • _free.LIBCMT ref: 6D080406
      • Part of subcall function 6D0799A9: HeapFree.KERNEL32(00000000,00000000,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587), ref: 6D0799BF
      • Part of subcall function 6D0799A9: GetLastError.KERNEL32(6D06A587,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587,6D06A587), ref: 6D0799D1
    • _free.LIBCMT ref: 6D080411
    • _free.LIBCMT ref: 6D08041C
    • _free.LIBCMT ref: 6D080470
    • _free.LIBCMT ref: 6D08047B
    • _free.LIBCMT ref: 6D080486
    • _free.LIBCMT ref: 6D080491
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: a27d45a320cfdaef14d7d4f740b74aae9e16b72bb56c33c5b9f1cb88268fc740
    • Instruction ID: dc8104ff1542174f6651f072894b077d36d7a899ebd6181d995bc401f7faf082
    • Opcode Fuzzy Hash: a27d45a320cfdaef14d7d4f740b74aae9e16b72bb56c33c5b9f1cb88268fc740
    • Instruction Fuzzy Hash: 0A114C7154AB04ABFB70EBB1CC05FCB779CEF00708F418825B799AB052DBA5B50486A5
    APIs
    • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 6D061F54
    • MapViewOfFile.KERNEL32(000000FF,00000006,00000000,00000000,00000000,?,6D062474,000000FF,00000000), ref: 6D061F69
    • GetFileSize.KERNEL32(000000FF,00000000,?,6D062474,000000FF,00000000), ref: 6D061F78
    • UnmapViewOfFile.KERNEL32(00000000,?,?,?,?,6D062474,000000FF,00000000), ref: 6D061FAB
    • CloseHandle.KERNEL32(000000FF,?,?,?,?,6D062474,000000FF,00000000), ref: 6D061FB5
    • SetFilePointer.KERNEL32(000000FF,6D062474,00000000,00000000,?,?,?,?,6D062474,000000FF,00000000), ref: 6D061FC7
    • SetEndOfFile.KERNEL32(000000FF,?,?,?,?,6D062474,000000FF,00000000), ref: 6D061FD1
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: File$View$CloseCreateHandleMappingPointerSizeUnmap
    • String ID:
    • API String ID: 2211241848-0
    • Opcode ID: 0a3e2cd6db968bd17668bd2b531c12f41d59edb6cc0ea091409cca6ef41c3b40
    • Instruction ID: 1f391b66405ca40a509bd7a6eb3e750e3b4018903f2213a67e9af6f6d5df3595
    • Opcode Fuzzy Hash: 0a3e2cd6db968bd17668bd2b531c12f41d59edb6cc0ea091409cca6ef41c3b40
    • Instruction Fuzzy Hash: BB11FE79A40208BFDF10DFA4CC89F9E7BB4EB49702F508544FA15AB281D771AA408F94
    APIs
    • Sleep.KERNEL32(00000005), ref: 6D055818
    • SetFilePointerEx.KERNEL32(000000FF,?,?,00000000,00000000), ref: 6D0558B2
    • ReadFile.KERNEL32(000000FF,000000FF,00000000,00000000,00000000), ref: 6D055934
    • GetLastError.KERNEL32 ref: 6D05593E
    • CloseHandle.KERNEL32(000000FF), ref: 6D05595F
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: File$CloseErrorHandleLastPointerReadSleep
    • String ID:
    • API String ID: 4017491889-0
    • Opcode ID: 701a9eb26b0e36e482f30e9908bffab18c9016161f8846582a67e5dc4b32cb73
    • Instruction ID: af76752fe74bf6ca25093bdc08155a849a066013e020c809ba303d7f1e411845
    • Opcode Fuzzy Hash: 701a9eb26b0e36e482f30e9908bffab18c9016161f8846582a67e5dc4b32cb73
    • Instruction Fuzzy Hash: CDC1D9B4E04219DFDB04CFA8C994BAEBBB5BF49314F208659D815AB380D774A941CFA1
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6D0595B9
    • allocator.LIBCONCRTD ref: 6D05960C
    • _Find_unchecked.LIBCPMTD ref: 6D0596A4
    • _Find_unchecked.LIBCPMTD ref: 6D0596B8
    • _Find_unchecked.LIBCPMTD ref: 6D059766
      • Part of subcall function 6D059400: _Deallocate.LIBCONCRTD ref: 6D059412
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: Find_unchecked$DeallocateMutex_baseMutex_base::~_allocatorstd::_
    • String ID:
    • API String ID: 565782535-0
    • Opcode ID: 1effb61846f9b381852d3322373296e42bfe70816a8b8c945e028c6c00840303
    • Instruction ID: 5f702f3fc12af3f4fff0e5f0a5676d66b76c5e6fbb6603deb1a6fd408d79b4d3
    • Opcode Fuzzy Hash: 1effb61846f9b381852d3322373296e42bfe70816a8b8c945e028c6c00840303
    • Instruction Fuzzy Hash: 1C910DB1D0410DAFDB04DF94E990EAEB3B6FF89348F118598DA16AB254DB306E14CF90
    APIs
    • GetConsoleCP.KERNEL32(00000000,00000001,00000020,?,?,?,?,?,?,?,?,6D07DF89,00000008,00000001,00000020,0000002C), ref: 6D07D835
    • __fassign.LIBCMT ref: 6D07D8BF
    • __fassign.LIBCMT ref: 6D07D8DE
    • WriteFile.KERNEL32(?,00000020,00000000,?,00000000), ref: 6D07D92D
    • WriteFile.KERNEL32(?,6D07DF89,00000001,?,00000000), ref: 6D07D967
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: FileWrite__fassign$Console
    • String ID:
    • API String ID: 3692784241-0
    • Opcode ID: 64e658a336ccf99febb5ea80991b74d0a667f94f446449cea3628dd66e9de4ec
    • Instruction ID: 869d2b5747806fb041bdc8626f588b3f7fd9553a1b3b652b2f5b2b79caa1eb37
    • Opcode Fuzzy Hash: 64e658a336ccf99febb5ea80991b74d0a667f94f446449cea3628dd66e9de4ec
    • Instruction Fuzzy Hash: 8A519071A14249EFEF10CFA8D881BEEBBF8EF8A310F14411AE555EB241E7709940CB65
    APIs
    • GetTickCount.KERNEL32 ref: 6D057C4B
    • PeekNamedPipe.KERNEL32(?,?,?,?,?,?,?,6D0587F7,?,00000000,0002BF20), ref: 6D057CCF
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CountNamedPeekPipeTick
    • String ID:
    • API String ID: 741616749-0
    • Opcode ID: 671600fa9beb8dd0a07900016c2d9b7c7189edac59947be56a97c6aca9201f5d
    • Instruction ID: 3bf108e48c3ade35652bfd37c8848133db36f953ea02c2a167854c9ceaf263a8
    • Opcode Fuzzy Hash: 671600fa9beb8dd0a07900016c2d9b7c7189edac59947be56a97c6aca9201f5d
    • Instruction Fuzzy Hash: 51516B74D00218DBDB22CF24C948FDAB7B5BB8D300F5180D8E9895B241CBB1A6C5EFA0
    APIs
    • CreateNamedPipeA.KERNEL32(00000000,40000000,00000000,00000001,00000400,00000400,00000000,00000000), ref: 6D057FF7
    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 6D058016
    • ConnectNamedPipe.KERNEL32(000000FF,?), ref: 6D058058
    • GetLastError.KERNEL32 ref: 6D058062
      • Part of subcall function 6D057F60: CloseHandle.KERNEL32(6D05DA21,00002710,?,6D057E40,00002508,00002710,?,6D057A4F,?,?,6D058695,6D05DA21,?,?,6D05DA21,00002710), ref: 6D057F7D
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CreateNamedPipe$CloseConnectErrorEventHandleLast
    • String ID:
    • API String ID: 2388497103-0
    • Opcode ID: a112c8460864e0e51a8706aaa6cb761ae38e4e711d4c2fb25d28bbc897fcbe59
    • Instruction ID: a81f8ff68330e05a2967914a7cd60068cf321dbd64edddd17f29f87dd1c4059e
    • Opcode Fuzzy Hash: a112c8460864e0e51a8706aaa6cb761ae38e4e711d4c2fb25d28bbc897fcbe59
    • Instruction Fuzzy Hash: 81412A74D14208EBEF54CFA5C940BEDBBB4BF49320F608659EA25B72C0D7705A50CBA4
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000), ref: 6D0566EE
    • Process32First.KERNEL32(?,00000128), ref: 6D056708
    • CloseHandle.KERNEL32(?), ref: 6D05676C
      • Part of subcall function 6D0567B0: OpenProcess.KERNEL32(001FFFFF,00000000,FFFFFFFF), ref: 6D0567CC
      • Part of subcall function 6D0567B0: TerminateProcess.KERNEL32(00000000,00000000), ref: 6D0567E1
    • CloseHandle.KERNEL32(?), ref: 6D05673A
    • Process32Next.KERNEL32(?,00000128), ref: 6D056784
    • CloseHandle.KERNEL32(?), ref: 6D056795
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CloseHandle$ProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
    • String ID:
    • API String ID: 3051378104-0
    • Opcode ID: 98c46b8686abbeccf0212a0b381e5e18776b88d511bc1b6ddbf7aa9e5608ee3d
    • Instruction ID: e107cd4e4ecbb3d1b3f2c6144f23ab7c0d54ef157ddfccef19ed4dc343f24864
    • Opcode Fuzzy Hash: 98c46b8686abbeccf0212a0b381e5e18776b88d511bc1b6ddbf7aa9e5608ee3d
    • Instruction Fuzzy Hash: AE2162759042199BEF24DF70CE44BEE77B5AF4A301F8041D8E9499B245EB34EAA4CF90
    APIs
    • GetLastError.KERNEL32(00000001,?,6D0736B4,6D0728BA,6D0723A9,?,6D0725C6,?,00000001,?,?,00000001,?,6D091620,0000000C,6D0726BA), ref: 6D0738B8
    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6D0738C6
    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6D0738DF
    • SetLastError.KERNEL32(00000000,6D0725C6,?,00000001,?,?,00000001,?,6D091620,0000000C,6D0726BA,?,00000001,?), ref: 6D073931
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: ErrorLastValue___vcrt_
    • String ID:
    • API String ID: 3852720340-0
    • Opcode ID: b09b2980d7ef90fc940c84edfb47ecb8e657e67b0eac58bcecdc4437cf0204ae
    • Instruction ID: 2b2f9821f071e28fb50e574cc00fb47698a45efbccc236826e40808a448aa5cf
    • Opcode Fuzzy Hash: b09b2980d7ef90fc940c84edfb47ecb8e657e67b0eac58bcecdc4437cf0204ae
    • Instruction Fuzzy Hash: 2E01D83261D7177EBB3117B4AC94B6F26B4FB4F7797211229E2345E1D0EF618810564C
    APIs
    • CreateFileA.KERNEL32(?,C0000000,00000002,00000000,00000002,00000080,00000000), ref: 6D06A8B6
    • GetCurrentThreadId.KERNEL32 ref: 6D06A8CB
    • GetCurrentProcessId.KERNEL32(000000FF,00000000,00000000,00000000,6D06A820), ref: 6D06A914
    • GetCurrentProcess.KERNEL32(00000000), ref: 6D06A91B
    • MiniDumpWriteDump.DBGHELP(00000000), ref: 6D06A922
    • CloseHandle.KERNEL32(000000FF), ref: 6D06A92C
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: Current$DumpProcess$CloseCreateFileHandleMiniThreadWrite
    • String ID:
    • API String ID: 1764008985-0
    • Opcode ID: 653fb980cee937d166e1fa9192481f3a8ca37c787ac6e7a15c3258e16753d369
    • Instruction ID: 604523fda68f649ad1119e3d9650283186d87bb39e26aac124727897054a54bd
    • Opcode Fuzzy Hash: 653fb980cee937d166e1fa9192481f3a8ca37c787ac6e7a15c3258e16753d369
    • Instruction Fuzzy Hash: 36110A70D10209EFEF10DFA0C859BAEBBB4FB09302F518119E615AB281D7785545CFE4
    APIs
    • GetFileAttributesW.KERNEL32(00000000), ref: 6D052F61
    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 6D052F73
    • CopyFileW.KERNEL32(00000000,?,?), ref: 6D052F86
    • GetLastError.KERNEL32 ref: 6D052F90
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6D052FA3
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6D052FB5
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: File$Attributes$CopyErrorLast
    • String ID:
    • API String ID: 2106489313-0
    • Opcode ID: 5d01bb8cb7676249e7124613bd7819e16fb68b11d6c36c63fd4304035f1d0f27
    • Instruction ID: 39f12ec008cdd3ae844644db0bbfcbbfa61d44738f13ed9ded19688f7c65a103
    • Opcode Fuzzy Hash: 5d01bb8cb7676249e7124613bd7819e16fb68b11d6c36c63fd4304035f1d0f27
    • Instruction Fuzzy Hash: 0811C5B9514288AFCF00DFA4C858B9F7FB8AB4A342F108188FD499B340C7369555CFA5
    APIs
    • GetFileAttributesW.KERNEL32(00000000), ref: 6D052EE1
    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 6D052EF3
    • MoveFileW.KERNEL32(00000000,?), ref: 6D052F01
    • GetLastError.KERNEL32 ref: 6D052F0B
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6D052F1E
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6D052F30
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: File$Attributes$ErrorLastMove
    • String ID:
    • API String ID: 4019241439-0
    • Opcode ID: bdd7ece2c50cdb4a433b633e252bcbd67787c4094c985dab3626a8ed66db30eb
    • Instruction ID: 5e6929e4cdc90f91ac14bec1e3674741758cf01dc4dd4dd0f6ae038ca26bba5f
    • Opcode Fuzzy Hash: bdd7ece2c50cdb4a433b633e252bcbd67787c4094c985dab3626a8ed66db30eb
    • Instruction Fuzzy Hash: A20193B9914248EFDF00DFA4C858B9FBBB8AB4A342F008198FD059B340D7369555CFA5
    APIs
    • GetFileAttributesW.KERNEL32(00000000), ref: 6D053088
    • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 6D05309A
    • DeleteFileW.KERNEL32(00000000), ref: 6D0530A4
    • GetLastError.KERNEL32 ref: 6D0530AE
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6D0530C1
    • SetFileAttributesW.KERNEL32(00000000,00000000), ref: 6D0530D3
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: File$Attributes$DeleteErrorLast
    • String ID:
    • API String ID: 2267219331-0
    • Opcode ID: 4a48131ee9602e3a575f500d83024d71ebd4569f8a26c8474eff2e2f69cb2595
    • Instruction ID: 169bdbe0e5a458fa0f06a7a6abcd0a2e391f35c1e65af2106f137b6fd77b257f
    • Opcode Fuzzy Hash: 4a48131ee9602e3a575f500d83024d71ebd4569f8a26c8474eff2e2f69cb2595
    • Instruction Fuzzy Hash: C601D679914248ABCF00DFA4C458B9FBFB8AB4A346F008199FD459B340DB369645CFA5
    APIs
      • Part of subcall function 6D051200: GetLogicalDriveStringsW.KERNEL32(00000100,?), ref: 6D051246
      • Part of subcall function 6D051200: GetDriveTypeW.KERNEL32(?), ref: 6D0512BB
      • Part of subcall function 6D051200: GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 6D051307
    • Concurrency::task_options::get_scheduler.LIBCPMTD ref: 6D05F078
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6D05F0BA
    • _swprintf.LIBCMTD ref: 6D05F119
      • Part of subcall function 6D055C90: __vswprintf_s_l.LIBCONCRTD ref: 6D055CAE
    • _memcpy_s.LIBCPMTD ref: 6D05F17B
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: Drive$Affinity::operator!=Concurrency::details::Concurrency::task_options::get_schedulerDiskFreeHardwareLogicalSpaceStringsType__vswprintf_s_l_memcpy_s_swprintf
    • String ID: %c:\
    • API String ID: 2504515757-3142399695
    • Opcode ID: ab19866ed3f5198e0b9e0704da6545bf3b6b36d67cf93e61a1788470b0bead35
    • Instruction ID: 34c400a63a46de5b19d91504a383af54642cf08f31cf290f7821536cb7397713
    • Opcode Fuzzy Hash: ab19866ed3f5198e0b9e0704da6545bf3b6b36d67cf93e61a1788470b0bead35
    • Instruction Fuzzy Hash: DC613B74A04209DFDB04DFA4C990BEEB7B5FF48304F108558E916AB391DB30AE15CBA1
    APIs
    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,6D0788D0,?,?,6D078898,?,?), ref: 6D07893F
    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6D078952
    • FreeLibrary.KERNEL32(00000000,?,?,?,6D0788D0,?,?,6D078898,?,?), ref: 6D078975
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: AddressFreeHandleLibraryModuleProc
    • String ID: CorExitProcess$mscoree.dll
    • API String ID: 4061214504-1276376045
    • Opcode ID: b436b43006dddb45a536de9141fb3e1957a1a06794bcda5eec66fa441ffa388a
    • Instruction ID: 2b8ccf0a8f4eea605419dcdfa8825dc17a61c8cfa389f1782bb06860f8945fc6
    • Opcode Fuzzy Hash: b436b43006dddb45a536de9141fb3e1957a1a06794bcda5eec66fa441ffa388a
    • Instruction Fuzzy Hash: FAF04F30A14119BBEF119BA1CC48BAEBFB4EB06612F4100A4F905A6182DB719940CBD5
    APIs
    • __alloca_probe_16.LIBCMT ref: 6D07E3D9
    • __alloca_probe_16.LIBCMT ref: 6D07E49F
    • __freea.LIBCMT ref: 6D07E50B
      • Part of subcall function 6D07A5FF: HeapAlloc.KERNEL32(00000000,6D06A587,?,?,6D07212E,6D06A587,?,6D06A587,0001507C), ref: 6D07A631
    • __freea.LIBCMT ref: 6D07E514
    • __freea.LIBCMT ref: 6D07E539
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: __freea$__alloca_probe_16$AllocHeap
    • String ID:
    • API String ID: 1096550386-0
    • Opcode ID: be46e0bfd39b147d984da23014a0ee306fca41b1dd799c758d432beda35635d1
    • Instruction ID: 186a2b9b50ade280f4294e7a34796f4cf29cd2489df10d22a6ae7d2f7e857e2d
    • Opcode Fuzzy Hash: be46e0bfd39b147d984da23014a0ee306fca41b1dd799c758d432beda35635d1
    • Instruction Fuzzy Hash: 3751AE7260621BABFB318E649C44FFB37A9EB85754F124168FE18DF150EB31DC1086A9
    APIs
    • EnterCriticalSection.KERNEL32(?,D4C6F04B), ref: 6D064ED0
    • _DebugHeapAllocator.LIBCPMTD ref: 6D064EE2
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6D064F2A
    • error_info_injector.LIBCPMTD ref: 6D064F96
    • LeaveCriticalSection.KERNEL32(?,?,?,00000004), ref: 6D064FB1
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Affinity::operator!=AllocatorConcurrency::details::DebugEnterHardwareHeapLeaveerror_info_injector
    • String ID:
    • API String ID: 176887040-0
    • Opcode ID: 6eac9e0cb0ec30d6d3da861a0caa1fa637e9b0d89aea86f4cf11adf89574eed9
    • Instruction ID: 823b3aa2db4235571a02a9c3dc8a4576a1541c58d16ac64542f457f590dcaffb
    • Opcode Fuzzy Hash: 6eac9e0cb0ec30d6d3da861a0caa1fa637e9b0d89aea86f4cf11adf89574eed9
    • Instruction Fuzzy Hash: 2951E370D08248EFEB04DFA4D990BEEBBB5FF48304F508129E5167B290DB746945CB65
    APIs
    • EnterCriticalSection.KERNEL32(?,D4C6F04B), ref: 6D064CF0
    • _DebugHeapAllocator.LIBCPMTD ref: 6D064D02
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6D064D4A
    • error_info_injector.LIBCPMTD ref: 6D064DB2
    • LeaveCriticalSection.KERNEL32(?,?,?,00000004), ref: 6D064DCD
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Affinity::operator!=AllocatorConcurrency::details::DebugEnterHardwareHeapLeaveerror_info_injector
    • String ID:
    • API String ID: 176887040-0
    • Opcode ID: 887326dbc5b0e7005f55541151fc6de5f24232bb90fc98f6750d32d6be9e36bd
    • Instruction ID: d680d5759247e24ea989b485718df4448ac0f60f94f33677dd2679038a16657e
    • Opcode Fuzzy Hash: 887326dbc5b0e7005f55541151fc6de5f24232bb90fc98f6750d32d6be9e36bd
    • Instruction Fuzzy Hash: 6241F670D08249EFEB08DFA4D995BEEBBB5FF48304F508129E61277291DB706904CB64
    APIs
    • EnterCriticalSection.KERNEL32(D4C6EF0F,?,?,?,?,?,6D061E39,D4C6F04B,D4C6F04B,D4C6F04B), ref: 6D0655CC
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6D065608
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6D065617
    • LeaveCriticalSection.KERNEL32(D4C6EF0F,?,D4C6F04B,00000000,?,D4C6F04B,D4C6F04B,00000004), ref: 6D065671
    • LeaveCriticalSection.KERNEL32(D4C6EF0F,00000000,?,D4C6F04B,D4C6F04B,00000004,?,?,?,?,?,6D061E39,D4C6F04B,D4C6F04B,D4C6F04B), ref: 6D065683
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Leave$Affinity::operator!=Concurrency::details::EnterHardwareMutex_baseMutex_base::~_std::_
    • String ID:
    • API String ID: 3020211749-0
    • Opcode ID: 9574b5853ca28009ea6325c34d4400fa54260bf4d7e8e6aac04713fbfea39898
    • Instruction ID: b00ca8a7ee0742003a64a1505156b2d9b5f2f934cbb75bca9e2f4d1d9bb036a1
    • Opcode Fuzzy Hash: 9574b5853ca28009ea6325c34d4400fa54260bf4d7e8e6aac04713fbfea39898
    • Instruction Fuzzy Hash: DC21F874D04109ABEB08DFA4D854BFEBBB4AF49304F418169E612A7281DB34AA44CBA5
    APIs
    • EnterCriticalSection.KERNEL32(?,?,?,?,?,6D0618F1,?,?,?,D4C6F04B), ref: 6D0654DC
    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 6D065518
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6D065527
    • LeaveCriticalSection.KERNEL32(?,?,?,00000000,?,?,?,00000004), ref: 6D065581
    • LeaveCriticalSection.KERNEL32(?,00000000,?,?,?,00000004,?,?,?,?,6D0618F1,?,?,?,D4C6F04B), ref: 6D065593
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Leave$Affinity::operator!=Concurrency::details::EnterHardwareMutex_baseMutex_base::~_std::_
    • String ID:
    • API String ID: 3020211749-0
    • Opcode ID: 2959f4d02bee21e7a26c62f7dcfae1931b746c9e6642c12aa473b5ebc9579a1b
    • Instruction ID: e56f2696919f87245d09b96d80da45b62f011284984f4b5e5f8c379e3f4c9c3a
    • Opcode Fuzzy Hash: 2959f4d02bee21e7a26c62f7dcfae1931b746c9e6642c12aa473b5ebc9579a1b
    • Instruction Fuzzy Hash: 28213074D04149EFEB08DFA4C854BFEB7B5EF48309F408169D612A7281DB34AA44CFA4
    APIs
    • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 6D052BB0
    • SetFileTime.KERNEL32(000000FF,?,?,?), ref: 6D052BCF
    • GetLastError.KERNEL32 ref: 6D052BF1
    • CloseHandle.KERNEL32(000000FF), ref: 6D052C00
    • GetLastError.KERNEL32 ref: 6D052C08
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: ErrorFileLast$CloseCreateHandleTime
    • String ID:
    • API String ID: 1269242970-0
    • Opcode ID: 16879281524b39c0b16624a40137aae755011759d4cd34d5a05662331b455cf6
    • Instruction ID: 1bc5d2652ea86148cf4ca17ec09839b88f686d7d0c5b7e9525e074517f8609c8
    • Opcode Fuzzy Hash: 16879281524b39c0b16624a40137aae755011759d4cd34d5a05662331b455cf6
    • Instruction Fuzzy Hash: BF118234908348BFEF11CFB4C945BDE7FB4AF0A305F108298E951A7281D7759659CB54
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000), ref: 6D056637
    • Process32First.KERNEL32(?,00000128), ref: 6D056651
    • CloseHandle.KERNEL32(?), ref: 6D05666D
    • Process32Next.KERNEL32(?,00000128), ref: 6D056685
    • CloseHandle.KERNEL32(?), ref: 6D056696
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
    • String ID:
    • API String ID: 1789362936-0
    • Opcode ID: 668cc4563b04536cf0e232367ddf94d3faa7fd6e89ade19d055fbda57b7ebb93
    • Instruction ID: abb1acccc8f57b3ef7eb34fe07bae459abaa094ca24ee1178355fd7592628e71
    • Opcode Fuzzy Hash: 668cc4563b04536cf0e232367ddf94d3faa7fd6e89ade19d055fbda57b7ebb93
    • Instruction Fuzzy Hash: D3113071A102189BDF20DF70CE55BEE77F4BB0E701F814198E60997241DB309A54CF91
    APIs
    • _free.LIBCMT ref: 6D08032F
      • Part of subcall function 6D0799A9: HeapFree.KERNEL32(00000000,00000000,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587), ref: 6D0799BF
      • Part of subcall function 6D0799A9: GetLastError.KERNEL32(6D06A587,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587,6D06A587), ref: 6D0799D1
    • _free.LIBCMT ref: 6D080341
    • _free.LIBCMT ref: 6D080353
    • _free.LIBCMT ref: 6D080365
    • _free.LIBCMT ref: 6D080377
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: 95fb4800e770465de332450e0d8985d03157737a0eddb1c83220957bd1726558
    • Instruction ID: 356ba8f9bb9135d549e96d768821cf7967c97261eb9dc8bf0f84fbe233e9f044
    • Opcode Fuzzy Hash: 95fb4800e770465de332450e0d8985d03157737a0eddb1c83220957bd1726558
    • Instruction Fuzzy Hash: 2CF049B1519605ABEF30CB69F884F2BB3EDFA593107615805F168DF500CB31F8808AA8
    APIs
    • _swprintf.LIBCMTD ref: 6D061A35
      • Part of subcall function 6D055C90: __vswprintf_s_l.LIBCONCRTD ref: 6D055CAE
      • Part of subcall function 6D05EFD0: lstrcatA.KERNEL32(00000000,00000000,?,6D05F449), ref: 6D05EFEC
    • _memcpy_s.LIBCPMTD ref: 6D061AB7
    • _memcpy_s.LIBCPMTD ref: 6D061C74
      • Part of subcall function 6D069B70: EnterCriticalSection.KERNEL32(-00000078,?,?,6D05DD1A,?,00000010,00000002), ref: 6D069BB8
      • Part of subcall function 6D069B70: LeaveCriticalSection.KERNEL32(-00000078), ref: 6D069CAC
      • Part of subcall function 6D065460: EnterCriticalSection.KERNEL32(?), ref: 6D065478
      • Part of subcall function 6D065460: LeaveCriticalSection.KERNEL32(?,0000001E), ref: 6D0654A5
    Strings
    • TOnePipeShell [%d] Create Error! It's Already Exists!, xrefs: 6D061A24
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave_memcpy_s$__vswprintf_s_l_swprintflstrcat
    • String ID: TOnePipeShell [%d] Create Error! It's Already Exists!
    • API String ID: 1204231629-2958404492
    • Opcode ID: 169558251bdde2025763452b79339a36edeb2bd98f0886f86ddc19849d114878
    • Instruction ID: 72c4af83739420952c5bbef1b36c982c2c2546636ce0346b8a5a5e1da88a6960
    • Opcode Fuzzy Hash: 169558251bdde2025763452b79339a36edeb2bd98f0886f86ddc19849d114878
    • Instruction Fuzzy Hash: 8BB109B5A042589FDB15DF54CC90BAAB3B9FF49704F508598E9099B390DB31AF90CFA0
    APIs
    • _memcpy_s.LIBCPMTD ref: 6D05F392
    • _swprintf.LIBCMTD ref: 6D05F3FE
    • _memcpy_s.LIBCPMTD ref: 6D05F480
      • Part of subcall function 6D05E880: EnterCriticalSection.KERNEL32(D4C6F033,00000000,?,6D05F2A9,?,00000000,00000000,?,D4C6F04B), ref: 6D05E88E
      • Part of subcall function 6D05E880: LeaveCriticalSection.KERNEL32(D4C6F033,?,6D05F2A9,?,00000000,00000000,?,D4C6F04B), ref: 6D05E8A4
      • Part of subcall function 6D056800: FormatMessageA.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 6D05685D
      • Part of subcall function 6D05EFD0: lstrcatA.KERNEL32(00000000,00000000,?,6D05F449), ref: 6D05EFEC
    Strings
    • Query [%S] error! Query is running, xrefs: 6D05F3ED
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection_memcpy_s$EnterFormatLeaveMessage_swprintflstrcat
    • String ID: Query [%S] error! Query is running
    • API String ID: 1163548326-1242599298
    • Opcode ID: 515825f822d4d2e2a7e4fe7621ae7e6ed584c293e9207629e52a793011283909
    • Instruction ID: ee0e1675cfbd8e7cf4278a3fd289cbd3956488b82e9489770866828636ed68c3
    • Opcode Fuzzy Hash: 515825f822d4d2e2a7e4fe7621ae7e6ed584c293e9207629e52a793011283909
    • Instruction Fuzzy Hash: B1913F75A042059FEB04DF64CC90BAEB776FF89314F404598E9199B381DB31AE64CF90
    APIs
      • Part of subcall function 6D061ED0: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000), ref: 6D061EFD
      • Part of subcall function 6D061ED0: CloseHandle.KERNEL32(000000FF), ref: 6D061F10
    • _memcpy_s.LIBCPMTD ref: 6D062683
      • Part of subcall function 6D062230: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 6D062283
      • Part of subcall function 6D062230: GetLastError.KERNEL32 ref: 6D062292
      • Part of subcall function 6D05EFD0: lstrcatA.KERNEL32(00000000,00000000,?,6D05F449), ref: 6D05EFEC
    • _memcpy_s.LIBCPMTD ref: 6D0625AD
    Strings
    • Send keyboardData error, file is not exit! , xrefs: 6D0625E8
    • Send keyboardData error, file is not exit!, xrefs: 6D062547
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CreateFile_memcpy_s$CloseErrorHandleLastlstrcat
    • String ID: Send keyboardData error, file is not exit!$Send keyboardData error, file is not exit!
    • API String ID: 1386899110-2965487200
    • Opcode ID: 86110213cfebf326da675316874645de7464175216ee7cdb684a4458c4d6bb5b
    • Instruction ID: 215b1b54145736f742f13a6d34ff85492a051ca3285c5e1dc19b15438ee58d75
    • Opcode Fuzzy Hash: 86110213cfebf326da675316874645de7464175216ee7cdb684a4458c4d6bb5b
    • Instruction Fuzzy Hash: CE817AB5A04209DFDB04DFA8D890BAEB7B5FF48304F14865DE9159B391EB31E950CBA0
    APIs
      • Part of subcall function 6D055E10: EnterCriticalSection.KERNEL32(D4C6F043,D4C6F04B,00000004,?), ref: 6D055E3A
      • Part of subcall function 6D055E10: WaitForSingleObject.KERNEL32(000000FF,000000FF), ref: 6D055E60
      • Part of subcall function 6D055E10: LeaveCriticalSection.KERNEL32(?), ref: 6D055E77
    • _swprintf.LIBCMTD ref: 6D061D86
      • Part of subcall function 6D055C90: __vswprintf_s_l.LIBCONCRTD ref: 6D055CAE
      • Part of subcall function 6D05EFD0: lstrcatA.KERNEL32(00000000,00000000,?,6D05F449), ref: 6D05EFEC
    • _memcpy_s.LIBCPMTD ref: 6D061DF3
    • _memcpy_s.LIBCPMTD ref: 6D061E63
    Strings
    • OnePipeShell [%d] Close error!, xrefs: 6D061D7B
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection_memcpy_s$EnterLeaveObjectSingleWait__vswprintf_s_l_swprintflstrcat
    • String ID: OnePipeShell [%d] Close error!
    • API String ID: 3217904910-2944261958
    • Opcode ID: 2068383d0a4bd0640fbf3c450fda99fcf8f0613901efb353727efa0dc971a59c
    • Instruction ID: 2a9152637ad100b939ec641a562137685f1fbbc7bb19341a6f61a7d9ccbb2fac
    • Opcode Fuzzy Hash: 2068383d0a4bd0640fbf3c450fda99fcf8f0613901efb353727efa0dc971a59c
    • Instruction Fuzzy Hash: 2E5139B4A04249DFEB04DF94C890BAEB3B6FF89308F108559E9159F395DB31AD51CBA0
    APIs
    • _memcpy_s.LIBCPMTD ref: 6D062AC2
    • _memcpy_s.LIBCPMTD ref: 6D062B63
      • Part of subcall function 6D05EFD0: lstrcatA.KERNEL32(00000000,00000000,?,6D05F449), ref: 6D05EFEC
    Strings
    • Screen Stop error, Class is NULL!, xrefs: 6D062AFD
    • Screen Stop error!, xrefs: 6D062A5C
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _memcpy_s$lstrcat
    • String ID: Screen Stop error!$Screen Stop error, Class is NULL!
    • API String ID: 3156544786-797384994
    • Opcode ID: 0222aded799ae4a8db61a4bb2b406c02f8aa9164379346db936f014e87225d70
    • Instruction ID: a69c54ffed0d771dd9b32d8d5501716f93da37cb556523be822c83e7a0a10066
    • Opcode Fuzzy Hash: 0222aded799ae4a8db61a4bb2b406c02f8aa9164379346db936f014e87225d70
    • Instruction Fuzzy Hash: BC515A78A00209DFEB04CF68C891BAEB7B1FF49314F108658E9159F391DB31E951CBA0
    APIs
    • EnterCriticalSection.KERNEL32(?,D4C6F04B), ref: 6D068ED4
    • _memcpy_s.LIBCPMTD ref: 6D068F79
    • LeaveCriticalSection.KERNEL32(?,?,?), ref: 6D068FB8
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave_memcpy_s
    • String ID: Deal output img error!
    • API String ID: 2615672426-2701914271
    • Opcode ID: 32038c783383dd65f4e62a96076fe80fe4b8f4c886b4190ff30e12a1d5a0ea0f
    • Instruction ID: ab4eb260f48adb918ad51f63f557e293a8de987a070f9d8e73f6c6de07d55c7b
    • Opcode Fuzzy Hash: 32038c783383dd65f4e62a96076fe80fe4b8f4c886b4190ff30e12a1d5a0ea0f
    • Instruction Fuzzy Hash: C0416075A14148AFDB08CFA4DC50FEEB7B9FF49214F044218F505A7381DB31A950CBA4
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _free
    • String ID: @0m$0m
    • API String ID: 269201875-1437914988
    • Opcode ID: a0db390ca6d885732db758fe6b858c359eaec7737827a6e84298a7aa7256284c
    • Instruction ID: 0732263d5a5fa92d1e2d9acb3a33661c94c33d33d8c020406a920275d423bba3
    • Opcode Fuzzy Hash: a0db390ca6d885732db758fe6b858c359eaec7737827a6e84298a7aa7256284c
    • Instruction Fuzzy Hash: 9611CB75E142015BFB305B3DAC54BBB37B4B749734F111616E629CF1D4E7B0C4428A89
    APIs
    • Sleep.KERNEL32(00000001), ref: 6D05D605
      • Part of subcall function 6D05DE10: EnterCriticalSection.KERNEL32(?,?,6D05D7F9), ref: 6D05DE26
      • Part of subcall function 6D05DE10: LeaveCriticalSection.KERNEL32(?,?,6D05D7F9), ref: 6D05DE3E
    • EnterCriticalSection.KERNEL32(?), ref: 6D05D6AF
    • LeaveCriticalSection.KERNEL32(?,00000000), ref: 6D05D6D0
    • EnterCriticalSection.KERNEL32(?), ref: 6D05D6E0
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$Enter$Leave$Sleep
    • String ID:
    • API String ID: 2452663664-0
    • Opcode ID: ee3322c67635f362e432fb99faf1ce225350a7476679380241f39233b81c51f4
    • Instruction ID: d5e253b29e11df7e418e6a1b976feeb7923c508469d6a1f0936f72de1c80993c
    • Opcode Fuzzy Hash: ee3322c67635f362e432fb99faf1ce225350a7476679380241f39233b81c51f4
    • Instruction Fuzzy Hash: 9F514BB4E00209DBDB04CFE8C884BAEB7B5BF88304F148569E915AB341D735AA55CBA5
    APIs
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _strrchr
    • String ID:
    • API String ID: 3213747228-0
    • Opcode ID: 5e6ba0af27dc66adfa9354b1179fd89244a3ffa8c59286eda5a176f6145826b5
    • Instruction ID: fca4d40ab87315c6c650618f07c26a2cf0b6cdb8730d942a5bd622cc0e75115c
    • Opcode Fuzzy Hash: 5e6ba0af27dc66adfa9354b1179fd89244a3ffa8c59286eda5a176f6145826b5
    • Instruction Fuzzy Hash: 9AB124719082469FFB21CF69C850BAEBBF5EF49310F2581AAE9499F241D634C901CB68
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?), ref: 6D055518
    • GetLastError.KERNEL32 ref: 6D055524
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CreateErrorFileLast
    • String ID:
    • API String ID: 1214770103-0
    • Opcode ID: ed8a3b229d9e669c9fc1526b8db8b6831ad0ad7d6c28a4742cbd6ffbfa1f4084
    • Instruction ID: 6c3a157136987b5424e65590a00cc0d5c1ec96f3e17b93608d4f7ff7cc29c56a
    • Opcode Fuzzy Hash: ed8a3b229d9e669c9fc1526b8db8b6831ad0ad7d6c28a4742cbd6ffbfa1f4084
    • Instruction Fuzzy Hash: A251C874A0024ADFDB04CF98C994BAEB7B2BF49304F108658E916AB381D734A951CFA4
    APIs
    • SetFilePointerEx.KERNEL32(000000FF,?,000000FF,00000000,00000000), ref: 6D055310
    • WriteFile.KERNEL32(?,00000000,00000000,00000000,00000000), ref: 6D05533B
    • GetLastError.KERNEL32 ref: 6D055345
    • CloseHandle.KERNEL32(?), ref: 6D055357
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: File$CloseErrorHandleLastPointerWrite
    • String ID:
    • API String ID: 2796458406-0
    • Opcode ID: 87a5674f47b2ea3d4f0371d48076cfe930bebc2361f86c6c03de369a7fb48cc7
    • Instruction ID: 5f64a38b49d2cf6ba7ee7881a5e02524f7d73122ff57fd597306aa0511f32d1e
    • Opcode Fuzzy Hash: 87a5674f47b2ea3d4f0371d48076cfe930bebc2361f86c6c03de369a7fb48cc7
    • Instruction Fuzzy Hash: 0541B7B4A00209DFDB04CF98C594BAEBBB1FF49304F508699E919AB381D770AA51CF94
    APIs
    • GetLastError.KERNEL32(?,?,?,6D076141,?,?,?,?,6D077D32,?), ref: 6D07970D
    • _free.LIBCMT ref: 6D079768
    • _free.LIBCMT ref: 6D07979E
    • SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,?,6D076141,?,?,?,?,6D077D32,?), ref: 6D0797A9
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: ErrorLast_free
    • String ID:
    • API String ID: 2283115069-0
    • Opcode ID: f6d382ee5a4e43a35dd2107b488af9dbcc906d5b231718b9b5830f6efa789d54
    • Instruction ID: 76d1b8e450e68cebf9b1ee326b35b14d227b00bf15801aea5c3e7c4898b4d266
    • Opcode Fuzzy Hash: f6d382ee5a4e43a35dd2107b488af9dbcc906d5b231718b9b5830f6efa789d54
    • Instruction Fuzzy Hash: 501152712196126EFB321BB87CC5B6F35ECFB57279B114224F6289F1A0DB518800D55C
    APIs
    • GetLastError.KERNEL32(?,6D06A587,?,6D077998,6D07A642,?,?,6D07212E,6D06A587,?,6D06A587,0001507C), ref: 6D07985E
    • _free.LIBCMT ref: 6D0798B9
    • _free.LIBCMT ref: 6D0798EF
    • SetLastError.KERNEL32(00000000,FFFFFFFF,000000FF,?,6D06A587,?,6D077998,6D07A642,?,?,6D07212E,6D06A587,?,6D06A587,0001507C), ref: 6D0798FA
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: ErrorLast_free
    • String ID:
    • API String ID: 2283115069-0
    • Opcode ID: 6107527da413dfca561821c1557edc207296396e02e55c40c7740a4e01c5ae5c
    • Instruction ID: 2747a856594534e4cf40f56d73de01e11049dfdb0be17a15a0105e6cbe98d511
    • Opcode Fuzzy Hash: 6107527da413dfca561821c1557edc207296396e02e55c40c7740a4e01c5ae5c
    • Instruction Fuzzy Hash: BB01C4716182026AFF7257B87CC0FAB39E9FB57378B111234F6299F0E0DB518800856C
    APIs
    • ___BuildCatchObject.LIBVCRUNTIME ref: 6D073B7C
      • Part of subcall function 6D073AC9: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 6D073AF8
      • Part of subcall function 6D073AC9: ___AdjustPointer.LIBCMT ref: 6D073B13
    • _UnwindNestedFrames.LIBCMT ref: 6D073B91
    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 6D073BA2
    • CallCatchBlock.LIBVCRUNTIME ref: 6D073BCA
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
    • String ID:
    • API String ID: 737400349-0
    • Opcode ID: 1d2cbf3fc5d85ee38127e2180f4d2801c9af14cf3da80acdaadcd3532b5d838e
    • Instruction ID: daeffea211908d1417c334f66928e57d810100e1b970f3c34e3a19d60fc6c1f3
    • Opcode Fuzzy Hash: 1d2cbf3fc5d85ee38127e2180f4d2801c9af14cf3da80acdaadcd3532b5d838e
    • Instruction Fuzzy Hash: 7A012932504109BBEF225E95CC41EEF7B69EF8C758F054118FE285A120C372E861DBA4
    APIs
    • GetModuleFileNameW.KERNEL32(?,?,00000105,6D093F48), ref: 6D07C23A
    • GetLastError.KERNEL32 ref: 6D07C244
    • __dosmaperr.LIBCMT ref: 6D07C24B
    • _mbstowcs.LIBCMT ref: 6D07C260
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: ErrorFileLastModuleName__dosmaperr_mbstowcs
    • String ID:
    • API String ID: 2664030482-0
    • Opcode ID: fd6936986480dceb652525ce1941798db78ced82037571cbcd5c22757af38b3d
    • Instruction ID: 5a8d61ba67a5be50e67daad242beb026d4da965a68eb0da08cefa2d58a45ef47
    • Opcode Fuzzy Hash: fd6936986480dceb652525ce1941798db78ced82037571cbcd5c22757af38b3d
    • Instruction Fuzzy Hash: 20F0CD32A0410DABDF20DFA4DD48BAF77B8EB5A304F050498E6199B140EB709A508B98
    APIs
    • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000), ref: 6D061EFD
    • CloseHandle.KERNEL32(000000FF), ref: 6D061F10
    • GetLastError.KERNEL32 ref: 6D061F1F
    • GetLastError.KERNEL32 ref: 6D061F2C
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: ErrorLast$CloseCreateFileHandle
    • String ID:
    • API String ID: 614986841-0
    • Opcode ID: 6d32aefd0dca4fb443590daa8850539c66105fa197dac869e0a9086f60ee966c
    • Instruction ID: 862cb4c3647b3aff763c7bfe5a8f0e49b8a0d1b59b07804cdb51d472872af7e7
    • Opcode Fuzzy Hash: 6d32aefd0dca4fb443590daa8850539c66105fa197dac869e0a9086f60ee966c
    • Instruction Fuzzy Hash: 2D011974550308FBEF20DFA4C849B9D7BB4FB0A326F608258E9256B2C0D7709640CB95
    APIs
    • WriteConsoleW.KERNEL32(?,?,0000002C,00000000,?,?,6D081583,?,00000001,?,00000001,?,6D07D9ED,00000020,00000000,00000001), ref: 6D081DE6
    • GetLastError.KERNEL32(?,6D081583,?,00000001,?,00000001,?,6D07D9ED,00000020,00000000,00000001,00000020,00000001,?,6D07DF6E,00000008), ref: 6D081DF2
      • Part of subcall function 6D081DB8: CloseHandle.KERNEL32(FFFFFFFE,6D081E02,?,6D081583,?,00000001,?,00000001,?,6D07D9ED,00000020,00000000,00000001,00000020,00000001), ref: 6D081DC8
    • ___initconout.LIBCMT ref: 6D081E02
      • Part of subcall function 6D081D7A: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6D081DA9,6D081569,00000001,?,6D07D9ED,00000020,00000000,00000001,00000020), ref: 6D081D8D
    • WriteConsoleW.KERNEL32(?,?,0000002C,00000000,?,6D081583,?,00000001,?,00000001,?,6D07D9ED,00000020,00000000,00000001,00000020), ref: 6D081E17
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
    • String ID:
    • API String ID: 2744216297-0
    • Opcode ID: ad2c100f812faedb29bdd3e94f30e53c29d43f9e784f26f4850e8dbb969ad0c1
    • Instruction ID: 3e210f9a24acea87cc71affe57fb21de05250fed48bd2baba46a88940db2b337
    • Opcode Fuzzy Hash: ad2c100f812faedb29bdd3e94f30e53c29d43f9e784f26f4850e8dbb969ad0c1
    • Instruction Fuzzy Hash: 1DF0C036514255BBDF221F95CC08B9A7F76FF4A7A3F464014FB2997121CB3288209BD5
    APIs
    • _free.LIBCMT ref: 6D07914F
      • Part of subcall function 6D0799A9: HeapFree.KERNEL32(00000000,00000000,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587), ref: 6D0799BF
      • Part of subcall function 6D0799A9: GetLastError.KERNEL32(6D06A587,?,6D0803AA,6D06A587,00000000,6D06A587,?,?,6D0803D1,6D06A587,00000007,6D06A587,?,6D07D38B,6D06A587,6D06A587), ref: 6D0799D1
    • _free.LIBCMT ref: 6D079162
    • _free.LIBCMT ref: 6D079173
    • _free.LIBCMT ref: 6D079184
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _free$ErrorFreeHeapLast
    • String ID:
    • API String ID: 776569668-0
    • Opcode ID: 46a3c0e20ada2e0aa78e323bc3c8416ff84baa1f02d58cb95f52e47af69c0e68
    • Instruction ID: eac649cac2103ae49401c1f22a4432c4fb3923f759e5efea8b388376673947bd
    • Opcode Fuzzy Hash: 46a3c0e20ada2e0aa78e323bc3c8416ff84baa1f02d58cb95f52e47af69c0e68
    • Instruction Fuzzy Hash: C4E0BF79814125BEBE219F28F8017453A31F79E618303A006F5301F210C7728511DBCE
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: __aulldvrm
    • String ID: +$-
    • API String ID: 1302938615-2137968064
    • Opcode ID: 10c0253171a2ec4e6f472f94dc16206b29dc5e93729e83d4680e20ea9da39f78
    • Instruction ID: 7938f9fd05cc20bb82ad61b1e92579c134b031f169a5b535175affedb9568f6c
    • Opcode Fuzzy Hash: 10c0253171a2ec4e6f472f94dc16206b29dc5e93729e83d4680e20ea9da39f78
    • Instruction Fuzzy Hash: A891D530D0424A9EFF25CE69C8507FDBBB5FF8A3A4F148256E8749F290D37099058B99
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: H?m
    • API String ID: 0-2987568079
    • Opcode ID: 0eed2c5cbf2ecea1463b50ed4bff91e371f3ed177e34f120ec919607e09c129d
    • Instruction ID: 60e7080e85d68c2a90f5f00116bc916c9b77f6d8338fcd00a84a7574fcbd0c00
    • Opcode Fuzzy Hash: 0eed2c5cbf2ecea1463b50ed4bff91e371f3ed177e34f120ec919607e09c129d
    • Instruction Fuzzy Hash: FF415171E44215BFFB21CF99D880BEEBBF8FB89310B154066E6149F240D7B19A41CB69
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: _free
    • String ID: `Cm$dCm
    • API String ID: 269201875-747795958
    • Opcode ID: edc1fbef9deabc65a92137f4aa2efe2e4dc221c01a8ea03355d71bdfb641532c
    • Instruction ID: 3b14cfc7fb605df61ad471acf7a05a35a77973f8f2abdb99cccb9067d017d46e
    • Opcode Fuzzy Hash: edc1fbef9deabc65a92137f4aa2efe2e4dc221c01a8ea03355d71bdfb641532c
    • Instruction Fuzzy Hash: 5E11D3755097029FF7308F29D481B56B7F4FB45768F21801EE6888F240EB71D480C799
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID:
    • String ID: \>m$h>m
    • API String ID: 0-3309143754
    • Opcode ID: a9d52955ee7b7f737d2b5d74e0b200a7ec63af4acad38daf9b293e7ecde51752
    • Instruction ID: 8239de163e8a46d4cccb9f18249de9e5c1763a078378005dbc87967fef1ecc0c
    • Opcode Fuzzy Hash: a9d52955ee7b7f737d2b5d74e0b200a7ec63af4acad38daf9b293e7ecde51752
    • Instruction Fuzzy Hash: 69119E36D046196BEF31DF7884003EE77F55B0A728F05506AED24EF280D7B096419BA9
    APIs
    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 6D07218A
    • ___raise_securityfailure.LIBCMT ref: 6D072271
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: FeaturePresentProcessor___raise_securityfailure
    • String ID: ;mp;m
    • API String ID: 3761405300-3512574690
    • Opcode ID: 8ccffeb438eca89b2baa2f966f5123e38018c9c2cdd925a054f77a8ee5a9e018
    • Instruction ID: 164095473e0f16aaa7cb79a1f911821a3b0fda2bb4da57537fc5300e6689d1d7
    • Opcode Fuzzy Hash: 8ccffeb438eca89b2baa2f966f5123e38018c9c2cdd925a054f77a8ee5a9e018
    • Instruction Fuzzy Hash: 6F21EEF8515704AAEF14CF29D1917567BF4BB5E314F10A42AE60D9F381EBB09982CF48
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6D054D1D
    • std::_Xinvalid_argument.LIBCPMT ref: 6D054D3B
      • Part of subcall function 6D0720D6: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6D0720E2
      • Part of subcall function 6D0720D6: __CxxThrowException@8.LIBVCRUNTIME ref: 6D0720F0
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: std::_$Exception@8Mutex_baseMutex_base::~_ThrowXinvalid_argumentstd::invalid_argument::invalid_argument
    • String ID: list<T> too long
    • API String ID: 2057655285-4027344264
    • Opcode ID: d5b35a84bcb92276f900cc87a6b9a2ffcd6c700d4e52ff146b363c11fd10d091
    • Instruction ID: 2189435b10cf8d076fff2054b9d542116c170a1af57c9db3c101e4c73d317979
    • Opcode Fuzzy Hash: d5b35a84bcb92276f900cc87a6b9a2ffcd6c700d4e52ff146b363c11fd10d091
    • Instruction Fuzzy Hash: 38F03431D08118AF9B18DFA8DA41AACBBB8EF08210B0141A9DD056B300DB30BE60CBD1
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6D067D1D
    • std::_Xinvalid_argument.LIBCPMT ref: 6D067D3B
      • Part of subcall function 6D0720D6: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6D0720E2
      • Part of subcall function 6D0720D6: __CxxThrowException@8.LIBVCRUNTIME ref: 6D0720F0
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: std::_$Exception@8Mutex_baseMutex_base::~_ThrowXinvalid_argumentstd::invalid_argument::invalid_argument
    • String ID: list<T> too long
    • API String ID: 2057655285-4027344264
    • Opcode ID: 48cb02b1dd90c81a8a553dfec2bf19abd5429a49083ecd7c7d7895df48e90294
    • Instruction ID: 078e0aaaf13ff7d94967de1272abdf1290b1fd94cf01948cf5ecfbc0308a7984
    • Opcode Fuzzy Hash: 48cb02b1dd90c81a8a553dfec2bf19abd5429a49083ecd7c7d7895df48e90294
    • Instruction Fuzzy Hash: D3F05831D09118AF9B18EFA8CA41AACBBB8EF48350B0145A9DD057B300DB307E50CBD1
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6D063FDD
    • std::_Xinvalid_argument.LIBCPMT ref: 6D063FFB
      • Part of subcall function 6D0720D6: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6D0720E2
      • Part of subcall function 6D0720D6: __CxxThrowException@8.LIBVCRUNTIME ref: 6D0720F0
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: std::_$Exception@8Mutex_baseMutex_base::~_ThrowXinvalid_argumentstd::invalid_argument::invalid_argument
    • String ID: list<T> too long
    • API String ID: 2057655285-4027344264
    • Opcode ID: 733a8d4ee78963ce495aa2245d6b66a72b3847e8665fbce1b691fcd08a77dd1f
    • Instruction ID: 8dccc51d5fcefa29fb9799001bbda9e1bb9e7eb1a18c6e921a2e64996f101ca9
    • Opcode Fuzzy Hash: 733a8d4ee78963ce495aa2245d6b66a72b3847e8665fbce1b691fcd08a77dd1f
    • Instruction Fuzzy Hash: 94F05831D08128AFAB18DFA8DA51AACBBB8EF09350B1141A9DD0577300DB307E50CBD1
    APIs
    • std::_Mutex_base::~_Mutex_base.LIBCONCRTD ref: 6D0520AD
    • std::_Xinvalid_argument.LIBCPMT ref: 6D0520CB
      • Part of subcall function 6D0720D6: std::invalid_argument::invalid_argument.LIBCONCRT ref: 6D0720E2
      • Part of subcall function 6D0720D6: __CxxThrowException@8.LIBVCRUNTIME ref: 6D0720F0
    Strings
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: std::_$Exception@8Mutex_baseMutex_base::~_ThrowXinvalid_argumentstd::invalid_argument::invalid_argument
    • String ID: list<T> too long
    • API String ID: 2057655285-4027344264
    • Opcode ID: 7e649828eb05f79af3807a0d915250075ac8efd64bdcc951fa4b7e9d199dd1e5
    • Instruction ID: bb4aff41ea96696ced175330a500b6cbf083bdc3d2fdf250e5503d8e66afed85
    • Opcode Fuzzy Hash: 7e649828eb05f79af3807a0d915250075ac8efd64bdcc951fa4b7e9d199dd1e5
    • Instruction Fuzzy Hash: E6F05831D09118AF9B28DFB8CA81AADBBB8EF08310B0141A9DD0577300DB307E50DBC5
    APIs
    • InitializeCriticalSection.KERNEL32(-00014F25,?,?,?,?,D4C6F04B,?,?,?,?,?,00000000,6D08525F,000000FF,?,6D06A61B), ref: 6D05D963
    • InitializeCriticalSection.KERNEL32(-00014F3D,?,?,D4C6F04B,?,?,?,?,?,00000000,6D08525F,000000FF,?,6D06A61B), ref: 6D05D973
    • InitializeCriticalSection.KERNEL32(-00014F55,?,?,D4C6F04B,?,?,?,?,?,00000000,6D08525F,000000FF,?,6D06A61B), ref: 6D05D982
    • Sleep.KERNEL32(00000064,00002710,?,?,?,D4C6F04B), ref: 6D05DA3A
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalInitializeSection$Sleep
    • String ID:
    • API String ID: 1960909292-0
    • Opcode ID: a3ed17556539a20cc85c1a21f4a70d031b89073a17e9a41199ba3c092b4c3374
    • Instruction ID: d60859e8af8b264285c379bc40bd923d6a8bbe368e1a0bdd9e497c3b9a5a7b1a
    • Opcode Fuzzy Hash: a3ed17556539a20cc85c1a21f4a70d031b89073a17e9a41199ba3c092b4c3374
    • Instruction Fuzzy Hash: C1816AB090420ADBEB05DFA4CD54BEEBBB1FF89308F104269E9156B381DB756950CFA4
    APIs
    • EnterCriticalSection.KERNEL32(?), ref: 6D05E5B8
    • LeaveCriticalSection.KERNEL32(?), ref: 6D05E5CE
    • EnterCriticalSection.KERNEL32(?), ref: 6D05E600
    • LeaveCriticalSection.KERNEL32(?), ref: 6D05E614
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: ecc8f4f2d794bdba7adfd80db6362c4a9efdbd3b30b96f4fc870874a7da24448
    • Instruction ID: 0e4ba0cc0f0bcddc0a35ba6c1ce465179de6a9dabba58b43f45b33229d1e86fb
    • Opcode Fuzzy Hash: ecc8f4f2d794bdba7adfd80db6362c4a9efdbd3b30b96f4fc870874a7da24448
    • Instruction Fuzzy Hash: 32115574E10209DFCF04DFB8C851BAFBBB0AF4A205F404159EA05AB341D735AA44CBE9
    APIs
    • EnterCriticalSection.KERNEL32(?,00000000,?,6D05D534), ref: 6D05DE68
    • LeaveCriticalSection.KERNEL32(?,?,6D05D534), ref: 6D05DE86
    • EnterCriticalSection.KERNEL32(?,?,6D05D534), ref: 6D05DE96
    • LeaveCriticalSection.KERNEL32(?), ref: 6D05DEC9
    Memory Dump Source
    • Source File: 00000005.00000002.1685988233.000000006D051000.00000020.00000001.01000000.00000003.sdmp, Offset: 6D050000, based on PE: true
    • Associated: 00000005.00000002.1685976549.000000006D050000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686011329.000000006D086000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686025807.000000006D093000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000005.00000002.1686038836.000000006D096000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_5_2_6d050000_rundll32.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave
    • String ID:
    • API String ID: 3168844106-0
    • Opcode ID: d2ae1aca3e7c4ea65074e9b1413649b705c4dc2a24290f7812cf94cd63881294
    • Instruction ID: 5707be7b9324ea395919ae24c07d50e301374596e3f8f56b794a2481d9c98d86
    • Opcode Fuzzy Hash: d2ae1aca3e7c4ea65074e9b1413649b705c4dc2a24290f7812cf94cd63881294
    • Instruction Fuzzy Hash: C901D134A10204EBDF14DBA4DD54B9EB334FFCA30AF1141A8E9016B341CB35AE10AED8