Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
flupdate.exe

Overview

General Information

Sample name:flupdate.exe
Analysis ID:1562193
MD5:728d903e430115d74f5adbd2f725f2eb
SHA1:7786bd4ce8f25bc023722b4cb6fc17860a5e29bd
SHA256:c1d322835ee594b660a39b105516d944a92bba93af7c8b3f5e7bd0828aa6afe1
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Found evasive API chain (may stop execution after checking mutex)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found evaded block containing many API calls
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • flupdate.exe (PID: 7512 cmdline: "C:\Users\user\Desktop\flupdate.exe" MD5: 728D903E430115D74F5ADBD2F725F2EB)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.4% probability
Source: flupdate.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00402870 _sprintf,FindFirstFileA,FindFirstFileA,_sprintf,FindFirstFileA,FindClose,0_2_00402870
Source: flupdate.exeString found in binary or memory: http://crl.g
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00401834 NtdllDefWindowProc_A,BeginPaint,GetClientRect,_strlen,DrawTextA,EndPaint,PostQuitMessage,0_2_00401834
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00412CCC0_2_00412CCC
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004078EF0_2_004078EF
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004120900_2_00412090
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00413CB10_2_00413CB1
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00403D700_2_00403D70
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004125D40_2_004125D4
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00411B4C0_2_00411B4C
Source: C:\Users\user\Desktop\flupdate.exeCode function: String function: 00407EB8 appears 38 times
Source: flupdate.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: flupdate.exeBinary string: \Device\KeyboardClass0@p
Source: classification engineClassification label: mal48.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004026F0 GetDiskFreeSpaceExA,0_2_004026F0
Source: C:\Users\user\Desktop\flupdate.exeMutant created: \Sessions\1\BaseNamedObjects\Local\FUMutexName
Source: C:\Users\user\Desktop\flupdate.exeCommand line argument: -coh0_2_00401E45
Source: C:\Users\user\Desktop\flupdate.exeCommand line argument: -coh0_2_00401E45
Source: C:\Users\user\Desktop\flupdate.exeCommand line argument: -coh0_2_00401E45
Source: C:\Users\user\Desktop\flupdate.exeCommand line argument: -coh0_2_00401E45
Source: C:\Users\user\Desktop\flupdate.exeCommand line argument: -cmsg0_2_00401E45
Source: C:\Users\user\Desktop\flupdate.exeCommand line argument: -cmsg0_2_00401E45
Source: C:\Users\user\Desktop\flupdate.exeCommand line argument: -cmsg0_2_00401E45
Source: C:\Users\user\Desktop\flupdate.exeCommand line argument: -cmsg0_2_00401E45
Source: C:\Users\user\Desktop\flupdate.exeCommand line argument: FLU0_2_00401E45
Source: C:\Users\user\Desktop\flupdate.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeFile read: C:\Users\user\Desktop\flupdate.exeJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004376D0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_004376D0
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004050C8 push dword ptr [ecx-75h]; iretd 0_2_004050D0
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00420989 push eax; ret 0_2_004209B9
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00420A08 push eax; ret 0_2_004209B9
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00407EFD push ecx; ret 0_2_00407F10
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\flupdate.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-9535
Source: C:\Users\user\Desktop\flupdate.exeEvaded block: after key decisiongraph_0-9551
Source: C:\Users\user\Desktop\flupdate.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-9547
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00402870 _sprintf,FindFirstFileA,FindFirstFileA,_sprintf,FindFirstFileA,FindClose,0_2_00402870
Source: C:\Users\user\Desktop\flupdate.exeAPI call chain: ExitProcess graph end nodegraph_0-12300
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004086F0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004086F0
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004376D0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_004376D0
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004116D9 CreateFileA,__lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,RtlAllocateHeap,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004116D9
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00410421 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00410421
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_0040D02A SetUnhandledExceptionFilter,0_2_0040D02A
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_004086F0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_004086F0
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_00404FC8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00404FC8
Source: C:\Users\user\Desktop\flupdate.exeCode function: GetLocaleInfoA,0_2_00413A30
Source: C:\Users\user\Desktop\flupdate.exeCode function: 0_2_0040D755 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0040D755
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Software Packing
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts13
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook21
Obfuscated Files or Information
NTDS14
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.g0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.gflupdate.exefalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1562193
Start date and time:2024-11-25 10:29:31 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 43s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:flupdate.exe
Detection:MAL
Classification:mal48.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 13
  • Number of non-executed functions: 44
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • VT rate limit hit for: flupdate.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Entropy (8bit):7.738303090285732
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.39%
  • UPX compressed Win32 Executable (30571/9) 0.30%
  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:flupdate.exe
File size:262'144 bytes
MD5:728d903e430115d74f5adbd2f725f2eb
SHA1:7786bd4ce8f25bc023722b4cb6fc17860a5e29bd
SHA256:c1d322835ee594b660a39b105516d944a92bba93af7c8b3f5e7bd0828aa6afe1
SHA512:d6190757b48f90b19c1a1d11937590f16201c55df93cc700a65a7dafc9dabe580fc39372a749e82aeb48f81047ab35eb52aa359a6011a0b290e6fd938f909b39
SSDEEP:6144:qPKo3zZhCncVIKQOpmYUDuXrdmSHPUUKVVBeaw:V0z/dvwYUDuXT8xBw
TLSH:09441215EF1E5CC4F0C4CB7A0597AE3A07F4F4522505736922F8E6EC2E36E44C6A22A7
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7..ts..'s..'s..'..A'v..'z.B'd..'Tv.'t..'s..'...'z.T'...'z.S'V..'m.C'r..'z.F'r..'Richs..'........................PE..L.....:]...
Icon Hash:4c1617edfa3d0f86
Entrypoint:0x4376d0
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x5D3AB080 [Fri Jul 26 07:49:20 2019 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:26bacf39ecc38d64cdc04c882ade86d1
Instruction
pushad
mov esi, 0042B000h
lea edi, dword ptr [esi-0002A000h]
push edi
jmp 00007FA3D87EF41Dh
nop
mov al, byte ptr [esi]
inc esi
mov byte ptr [edi], al
inc edi
add ebx, ebx
jne 00007FA3D87EF419h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007FA3D87EF3FFh
mov eax, 00000001h
add ebx, ebx
jne 00007FA3D87EF419h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
add ebx, ebx
jnc 00007FA3D87EF401h
jne 00007FA3D87EF41Bh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007FA3D87EF3F6h
xor ecx, ecx
sub eax, 03h
jc 00007FA3D87EF41Fh
shl eax, 08h
mov al, byte ptr [esi]
inc esi
xor eax, FFFFFFFFh
je 00007FA3D87EF486h
mov ebp, eax
add ebx, ebx
jne 00007FA3D87EF419h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jne 00007FA3D87EF419h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
jne 00007FA3D87EF432h
inc ecx
add ebx, ebx
jne 00007FA3D87EF419h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jnc 00007FA3D87EF401h
jne 00007FA3D87EF41Bh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007FA3D87EF3F6h
add ecx, 02h
cmp ebp, FFFFF300h
adc ecx, 01h
lea edx, dword ptr [edi+ebp]
cmp ebp, FFFFFFFCh
jbe 00007FA3D87EF421h
mov al, byte ptr [edx]
inc edx
mov byte ptr [edi], al
inc edi
dec ecx
jne 00007FA3D87EF409h
jmp 00007FA3D87EF378h
nop
mov eax, dword ptr [edx]
add edx, 04h
mov dword ptr [edi], eax
add edi, 04h
sub ecx, 04h
jnbe 00007FA3D87EF403h
add edi, ecx
jmp 00007FA3D87FF361h
Programming Language:
  • [ASM] VS2008 SP1 build 30729
  • [IMP] VS2005 build 50727
  • [ C ] VS2008 SP1 build 30729
  • [C++] VS2008 SP1 build 30729
  • [RES] VS2008 build 21022
  • [LNK] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3a2c80x114.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0x380000x22c8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x378580x48UPX1
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x2a0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX10x2b0000xd0000xca00ce349d1a7ab0f4665ba3f398917290a1False0.9862507735148515data7.900524926940504IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x380000x30000x2400f3048574b480eacd8b4ae85f0b9bc348False0.2849392361111111data4.2827029161518855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x381940x568Device independent bitmap graphic, 16 x 32 x 8, image size 320HebrewIsrael0.5028901734104047
RT_ICON0x387000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152HebrewIsrael0.41335740072202165
RT_ICON0x38fac0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688HebrewIsrael0.3302238805970149
RT_GROUP_ICON0x39e580x30dataHebrewIsrael0.875
RT_VERSION0x39e8c0x2d0dataEnglishUnited States0.44305555555555554
RT_MANIFEST0x3a1600x165ASCII text, with CRLF line terminatorsEnglishUnited States0.5434173669467787
DLLImport
KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
USER32.dllEndPaint
VERSION.dllVerQueryValueA
Language of compilation systemCountry where language is spokenMap
HebrewIsrael
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:04:30:21
Start date:25/11/2024
Path:C:\Users\user\Desktop\flupdate.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\flupdate.exe"
Imagebase:0x400000
File size:262'144 bytes
MD5 hash:728D903E430115D74F5ADBD2F725F2EB
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:7.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:3.5%
    Total number of Nodes:2000
    Total number of Limit Nodes:27
    execution_graph 12596 406f86 12597 406f92 __lseeki64 12596->12597 12598 4049a5 __crtLCMapStringA_stat 67 API calls 12597->12598 12599 406faa 12597->12599 12629 407094 __lseeki64 12597->12629 12598->12599 12600 406fb8 12599->12600 12601 4049a5 __crtLCMapStringA_stat 67 API calls 12599->12601 12602 406fc6 12600->12602 12603 4049a5 __crtLCMapStringA_stat 67 API calls 12600->12603 12601->12600 12604 406fd4 12602->12604 12606 4049a5 __crtLCMapStringA_stat 67 API calls 12602->12606 12603->12602 12605 406fe2 12604->12605 12607 4049a5 __crtLCMapStringA_stat 67 API calls 12604->12607 12608 406ff0 12605->12608 12609 4049a5 __crtLCMapStringA_stat 67 API calls 12605->12609 12606->12604 12607->12605 12610 406ffe 12608->12610 12611 4049a5 __crtLCMapStringA_stat 67 API calls 12608->12611 12609->12608 12612 40700f 12610->12612 12614 4049a5 __crtLCMapStringA_stat 67 API calls 12610->12614 12611->12610 12613 4073be __lock 67 API calls 12612->12613 12615 407017 12613->12615 12614->12612 12616 407023 InterlockedDecrement 12615->12616 12617 40703c 12615->12617 12616->12617 12618 40702e 12616->12618 12632 4070a0 12617->12632 12618->12617 12621 4049a5 __crtLCMapStringA_stat 67 API calls 12618->12621 12621->12617 12622 4073be __lock 67 API calls 12623 407050 12622->12623 12624 407081 12623->12624 12626 40e2c7 ___removelocaleref 8 API calls 12623->12626 12635 4070ac 12624->12635 12630 407065 12626->12630 12628 4049a5 __crtLCMapStringA_stat 67 API calls 12628->12629 12630->12624 12631 40e0ef ___freetlocinfo 67 API calls 12630->12631 12631->12624 12638 4072e4 RtlLeaveCriticalSection 12632->12638 12634 407049 12634->12622 12639 4072e4 RtlLeaveCriticalSection 12635->12639 12637 40708e 12637->12628 12638->12634 12639->12637 12293 4376d0 12294 4376e0 12293->12294 12295 437816 VirtualProtect VirtualProtect 12294->12295 12296 4377da LoadLibraryA 12294->12296 12298 43784a 12295->12298 12297 4377f1 12296->12297 12297->12294 12299 4377f8 GetProcAddress 12297->12299 12298->12298 12299->12297 12300 437810 ExitProcess 12299->12300 9382 405bf2 9383 405c03 9382->9383 9419 4080ac HeapCreate 9383->9419 9386 405c42 9421 4070b5 GetModuleHandleW 9386->9421 9390 405c53 __RTC_Initialize 9455 40d501 9390->9455 9391 405b9a _fast_error_exit 67 API calls 9391->9390 9393 405c61 9394 405c6d GetCommandLineA 9393->9394 9579 405438 9393->9579 9470 40d3ca 9394->9470 9401 405c92 9506 40d097 9401->9506 9402 405438 __amsg_exit 67 API calls 9402->9401 9405 405ca3 9521 4054f7 9405->9521 9406 405438 __amsg_exit 67 API calls 9406->9405 9408 405caa 9409 405cb5 9408->9409 9410 405438 __amsg_exit 67 API calls 9408->9410 9527 40d038 9409->9527 9410->9409 9414 405ce4 9586 4056d4 9414->9586 9418 405ce9 __lseeki64 9420 405c36 9419->9420 9420->9386 9571 405b9a 9420->9571 9422 4070d0 9421->9422 9423 4070c9 9421->9423 9424 407238 9422->9424 9425 4070da GetProcAddress GetProcAddress GetProcAddress GetProcAddress 9422->9425 9589 405408 9423->9589 9648 406dcf 9424->9648 9428 407123 TlsAlloc 9425->9428 9431 405c48 9428->9431 9432 407171 TlsSetValue 9428->9432 9431->9390 9431->9391 9432->9431 9433 407182 9432->9433 9593 4056f2 9433->9593 9438 406ca5 __encode_pointer 6 API calls 9439 4071a2 9438->9439 9440 406ca5 __encode_pointer 6 API calls 9439->9440 9441 4071b2 9440->9441 9442 406ca5 __encode_pointer 6 API calls 9441->9442 9443 4071c2 9442->9443 9610 407242 9443->9610 9450 406d20 __decode_pointer 6 API calls 9451 407216 9450->9451 9451->9424 9452 40721d 9451->9452 9630 406e0c 9452->9630 9454 407225 GetCurrentThreadId 9454->9431 9984 407eb8 9455->9984 9457 40d50d GetStartupInfoA 9458 40e67b __calloc_crt 67 API calls 9457->9458 9465 40d52e 9458->9465 9459 40d74c __lseeki64 9459->9393 9460 40d6c9 GetStdHandle 9464 40d693 9460->9464 9461 40d72e SetHandleCount 9461->9459 9462 40e67b __calloc_crt 67 API calls 9462->9465 9463 40d6db GetFileType 9463->9464 9464->9459 9464->9460 9464->9461 9464->9463 9466 40c276 __ioinit InitializeCriticalSectionAndSpinCount 9464->9466 9465->9459 9465->9462 9465->9464 9467 40d616 9465->9467 9466->9464 9467->9459 9467->9464 9468 40d63f GetFileType 9467->9468 9469 40c276 __ioinit InitializeCriticalSectionAndSpinCount 9467->9469 9468->9467 9469->9467 9471 40d407 9470->9471 9472 40d3e8 GetEnvironmentStringsW 9470->9472 9473 40d4a0 9471->9473 9474 40d3f0 9471->9474 9472->9474 9475 40d3fc GetLastError 9472->9475 9476 40d4a9 GetEnvironmentStrings 9473->9476 9480 405c7d 9473->9480 9477 40d423 GetEnvironmentStringsW 9474->9477 9479 40d432 9474->9479 9475->9471 9476->9480 9481 40d4b9 9476->9481 9477->9479 9477->9480 9478 40d447 WideCharToMultiByte 9482 40d495 FreeEnvironmentStringsW 9478->9482 9483 40d466 9478->9483 9479->9478 9479->9479 9495 40d30f 9480->9495 9484 40e636 __malloc_crt 67 API calls 9481->9484 9482->9480 9485 40e636 __malloc_crt 67 API calls 9483->9485 9486 40d4d3 9484->9486 9487 40d46c 9485->9487 9488 40d4e6 ___crtGetEnvironmentStringsA 9486->9488 9489 40d4da FreeEnvironmentStringsA 9486->9489 9487->9482 9490 40d474 WideCharToMultiByte 9487->9490 9493 40d4f0 FreeEnvironmentStringsA 9488->9493 9489->9480 9491 40d48e 9490->9491 9492 40d486 9490->9492 9491->9482 9494 4049a5 __crtLCMapStringA_stat 67 API calls 9492->9494 9493->9480 9494->9491 9496 40d324 9495->9496 9497 40d329 GetModuleFileNameA 9495->9497 9991 40e0d1 9496->9991 9498 40d350 9497->9498 9985 40d175 9498->9985 9502 405c87 9502->9401 9502->9402 9503 40e636 __malloc_crt 67 API calls 9504 40d392 9503->9504 9504->9502 9505 40d175 _parse_cmdline 77 API calls 9504->9505 9505->9502 9507 40d0a0 9506->9507 9510 40d0a5 _strlen 9506->9510 9508 40e0d1 ___initmbctable 111 API calls 9507->9508 9508->9510 9509 405c98 9509->9405 9509->9406 9510->9509 9511 40e67b __calloc_crt 67 API calls 9510->9511 9512 40d0da _strlen 9511->9512 9512->9509 9513 40d138 9512->9513 9515 40e67b __calloc_crt 67 API calls 9512->9515 9516 40d15e 9512->9516 9518 4051bb _strcpy_s 67 API calls 9512->9518 9519 40d11f 9512->9519 9514 4049a5 __crtLCMapStringA_stat 67 API calls 9513->9514 9514->9509 9515->9512 9517 4049a5 __crtLCMapStringA_stat 67 API calls 9516->9517 9517->9509 9518->9512 9519->9512 9520 4086f0 __invoke_watson 10 API calls 9519->9520 9520->9519 9523 405505 __IsNonwritableInCurrentImage 9521->9523 10402 40bd1f 9523->10402 9524 405523 __initterm_e 9526 405542 __IsNonwritableInCurrentImage __initterm 9524->9526 10406 40bcbc 9524->10406 9526->9408 9528 40d046 9527->9528 9531 40d04b 9527->9531 9529 40e0d1 ___initmbctable 111 API calls 9528->9529 9529->9531 9530 405cbb 9533 401e45 9530->9533 9531->9530 9532 410aee _parse_cmdline 77 API calls 9531->9532 9532->9531 9534 4046ba _malloc 67 API calls 9533->9534 9535 401e7f CreateMutexA GetLastError 9534->9535 9536 401ea2 9535->9536 9541 401eb1 _strlen 9535->9541 9537 4049a5 __crtLCMapStringA_stat 67 API calls 9536->9537 9538 401ea8 9537->9538 10527 4013fe 9538->10527 9540 401f0c _strlen 9546 4013fe 163 API calls 9540->9546 9554 401f5b _strlen 9540->9554 9541->9540 9542 4013fe 163 API calls 9541->9542 9542->9540 9543 401fab 10506 401de7 LoadCursorA RegisterClassExA 9543->10506 9545 401ff0 9547 402005 GetModuleFileNameA 9545->9547 10507 4017ac KiUserCallbackDispatcher GetSystemMetrics 9545->10507 9546->9554 10511 402650 9547->10511 9551 402020 9552 402029 GetTempPathA GetTempFileNameA DeleteFileA 9551->9552 9553 4020da 9551->9553 9558 40206c _strncmp _strlen 9552->9558 9555 404fc8 __except_handler4 5 API calls 9553->9555 9554->9543 9556 4013fe 163 API calls 9554->9556 9557 4020ea 9555->9557 9556->9543 9557->9414 9568 4056a8 9557->9568 9559 402090 CreateDirectoryA 9558->9559 9560 4020a3 9559->9560 9561 4020c8 9559->9561 9560->9561 9563 4020ad 9560->9563 10560 401cdf 9561->10560 9565 4049a5 __crtLCMapStringA_stat 67 API calls 9563->9565 9564 4020c5 9564->9553 9566 4020b3 9565->9566 10543 401b08 9566->10543 12268 40557c 9568->12268 9570 4056b9 9570->9414 9572 405ba8 9571->9572 9573 405bad 9571->9573 9574 408287 __FF_MSGBANNER 67 API calls 9572->9574 9575 4080dc __NMSG_WRITE 67 API calls 9573->9575 9574->9573 9576 405bb5 9575->9576 9577 40548c _malloc 3 API calls 9576->9577 9578 405bbf 9577->9578 9578->9386 9580 408287 __FF_MSGBANNER 67 API calls 9579->9580 9581 405442 9580->9581 9582 4080dc __NMSG_WRITE 67 API calls 9581->9582 9583 40544a 9582->9583 9584 406d20 __decode_pointer 6 API calls 9583->9584 9585 405455 9584->9585 9585->9394 9587 40557c _doexit 67 API calls 9586->9587 9588 4056df 9587->9588 9588->9418 9590 405413 Sleep GetModuleHandleW 9589->9590 9591 405431 9590->9591 9592 405435 9590->9592 9591->9590 9591->9592 9592->9422 9659 406d17 9593->9659 9595 4056fa __init_pointers __initp_misc_winsig 9662 40bec6 9595->9662 9598 406ca5 __encode_pointer 6 API calls 9599 405736 9598->9599 9600 406ca5 TlsGetValue 9599->9600 9601 406cbd 9600->9601 9602 406cde GetModuleHandleW 9600->9602 9601->9602 9603 406cc7 TlsGetValue 9601->9603 9604 406cf9 GetProcAddress 9602->9604 9605 406cee 9602->9605 9608 406cd2 9603->9608 9607 406cd6 9604->9607 9606 405408 __crt_waiting_on_module_handle 2 API calls 9605->9606 9609 406cf4 9606->9609 9607->9438 9608->9602 9608->9607 9609->9604 9609->9607 9611 40724d 9610->9611 9613 4071cf 9611->9613 9665 40c276 9611->9665 9613->9424 9614 406d20 TlsGetValue 9613->9614 9615 406d38 9614->9615 9616 406d59 GetModuleHandleW 9614->9616 9615->9616 9619 406d42 TlsGetValue 9615->9619 9617 406d74 GetProcAddress 9616->9617 9618 406d69 9616->9618 9621 406d51 9617->9621 9620 405408 __crt_waiting_on_module_handle 2 API calls 9618->9620 9623 406d4d 9619->9623 9622 406d6f 9620->9622 9621->9424 9624 40e67b 9621->9624 9622->9617 9622->9621 9623->9616 9623->9621 9625 40e684 9624->9625 9627 4071fc 9625->9627 9628 40e6a2 Sleep 9625->9628 9670 4113a0 9625->9670 9627->9424 9627->9450 9629 40e6b7 9628->9629 9629->9625 9629->9627 9963 407eb8 9630->9963 9632 406e18 GetModuleHandleW 9633 406e28 9632->9633 9634 406e2e 9632->9634 9635 405408 __crt_waiting_on_module_handle 2 API calls 9633->9635 9636 406e46 GetProcAddress GetProcAddress 9634->9636 9637 406e6a 9634->9637 9635->9634 9636->9637 9638 4073be __lock 63 API calls 9637->9638 9639 406e89 InterlockedIncrement 9638->9639 9964 406ee1 9639->9964 9642 4073be __lock 63 API calls 9643 406eaa 9642->9643 9967 40e238 InterlockedIncrement 9643->9967 9645 406ec8 9979 406eea 9645->9979 9647 406ed5 __lseeki64 9647->9454 9649 406dd9 9648->9649 9650 406de5 9648->9650 9652 406d20 __decode_pointer 6 API calls 9649->9652 9651 406df9 TlsFree 9650->9651 9653 406e07 9650->9653 9651->9653 9652->9650 9654 4072a9 RtlDeleteCriticalSection 9653->9654 9656 4072c1 9653->9656 9655 4049a5 __crtLCMapStringA_stat 67 API calls 9654->9655 9655->9653 9657 4072e1 9656->9657 9658 4072d3 RtlDeleteCriticalSection 9656->9658 9657->9431 9658->9656 9660 406ca5 __encode_pointer 6 API calls 9659->9660 9661 406d1e 9660->9661 9661->9595 9663 406ca5 __encode_pointer 6 API calls 9662->9663 9664 40572c 9663->9664 9664->9598 9669 407eb8 9665->9669 9667 40c282 InitializeCriticalSectionAndSpinCount 9668 40c2c6 __lseeki64 9667->9668 9668->9611 9669->9667 9671 4113ac __lseeki64 9670->9671 9672 4113c4 9671->9672 9682 4113e3 _memset 9671->9682 9683 408302 9672->9683 9676 411455 RtlAllocateHeap 9676->9682 9677 4113d9 __lseeki64 9677->9625 9682->9676 9682->9677 9689 4073be 9682->9689 9696 407bd0 9682->9696 9702 41149c 9682->9702 9705 40835a 9682->9705 9708 406ef3 GetLastError 9683->9708 9685 408307 9686 408818 9685->9686 9687 406d20 __decode_pointer 6 API calls 9686->9687 9688 408828 __invoke_watson 9687->9688 9690 4073d3 9689->9690 9691 4073e6 RtlEnterCriticalSection 9689->9691 9755 4072fb 9690->9755 9691->9682 9693 4073d9 9693->9691 9694 405438 __amsg_exit 66 API calls 9693->9694 9695 4073e5 9694->9695 9695->9691 9699 407bfe 9696->9699 9697 407ca0 9697->9682 9699->9697 9701 407c97 9699->9701 9951 407737 9699->9951 9701->9697 9958 4077e7 9701->9958 9962 4072e4 RtlLeaveCriticalSection 9702->9962 9704 4114a3 9704->9682 9706 406d20 __decode_pointer 6 API calls 9705->9706 9707 40836a 9706->9707 9707->9682 9722 406d9b TlsGetValue 9708->9722 9711 406f60 SetLastError 9711->9685 9712 40e67b __calloc_crt 64 API calls 9713 406f1e 9712->9713 9713->9711 9714 406d20 __decode_pointer 6 API calls 9713->9714 9715 406f38 9714->9715 9716 406f57 9715->9716 9717 406f3f 9715->9717 9727 4049a5 9716->9727 9718 406e0c __mtinit 64 API calls 9717->9718 9720 406f47 GetCurrentThreadId 9718->9720 9720->9711 9721 406f5d 9721->9711 9723 406db0 9722->9723 9724 406dcb 9722->9724 9725 406d20 __decode_pointer 6 API calls 9723->9725 9724->9711 9724->9712 9726 406dbb TlsSetValue 9725->9726 9726->9724 9728 4049b1 __lseeki64 9727->9728 9729 404a2a _realloc __lseeki64 9728->9729 9730 4073be __lock 65 API calls 9728->9730 9739 4049f0 9728->9739 9729->9721 9736 4049c8 ___sbh_find_block 9730->9736 9731 404a05 HeapFree 9731->9729 9732 404a17 9731->9732 9733 408302 __fileno 65 API calls 9732->9733 9734 404a1c GetLastError 9733->9734 9734->9729 9735 4049e2 9747 4049fb 9735->9747 9736->9735 9740 407421 9736->9740 9739->9729 9739->9731 9741 407460 9740->9741 9742 407702 9740->9742 9741->9742 9743 40764c VirtualFree 9741->9743 9742->9735 9744 4076b0 9743->9744 9744->9742 9745 4076bf VirtualFree HeapFree 9744->9745 9750 406940 9745->9750 9754 4072e4 RtlLeaveCriticalSection 9747->9754 9749 404a02 9749->9739 9751 406958 9750->9751 9752 40697f __VEC_memcpy 9751->9752 9753 406987 9751->9753 9752->9753 9753->9742 9754->9749 9756 407307 __lseeki64 9755->9756 9757 407317 9756->9757 9758 40732f 9756->9758 9783 408287 9757->9783 9766 40733d __lseeki64 9758->9766 9829 40e636 9758->9829 9764 40735e 9769 4073be __lock 67 API calls 9764->9769 9765 40734f 9768 408302 __fileno 67 API calls 9765->9768 9766->9693 9768->9766 9771 407365 9769->9771 9773 407399 9771->9773 9774 40736d 9771->9774 9775 4049a5 __crtLCMapStringA_stat 67 API calls 9773->9775 9776 40c276 __ioinit InitializeCriticalSectionAndSpinCount 9774->9776 9777 40738a 9775->9777 9778 407378 9776->9778 9835 4073b5 9777->9835 9778->9777 9780 4049a5 __crtLCMapStringA_stat 67 API calls 9778->9780 9781 407384 9780->9781 9782 408302 __fileno 67 API calls 9781->9782 9782->9777 9838 40e933 9783->9838 9786 40e933 __set_error_mode 67 API calls 9789 40829b 9786->9789 9787 4080dc __NMSG_WRITE 67 API calls 9788 4082b3 9787->9788 9791 4080dc __NMSG_WRITE 67 API calls 9788->9791 9789->9787 9790 40731c 9789->9790 9792 4080dc 9790->9792 9791->9790 9793 4080f0 9792->9793 9794 40e933 __set_error_mode 64 API calls 9793->9794 9825 407323 9793->9825 9795 408112 9794->9795 9796 408250 GetStdHandle 9795->9796 9798 40e933 __set_error_mode 64 API calls 9795->9798 9797 40825e _strlen 9796->9797 9796->9825 9801 408277 WriteFile 9797->9801 9797->9825 9799 408123 9798->9799 9799->9796 9800 408135 9799->9800 9800->9825 9844 4051bb 9800->9844 9801->9825 9804 40816b GetModuleFileNameA 9805 408189 9804->9805 9810 4081ac _strlen 9804->9810 9807 4051bb _strcpy_s 64 API calls 9805->9807 9809 408199 9807->9809 9809->9810 9811 4086f0 __invoke_watson 10 API calls 9809->9811 9821 4081ef 9810->9821 9860 40e87e 9810->9860 9811->9810 9816 4086f0 __invoke_watson 10 API calls 9818 408213 9816->9818 9817 405223 _strcat_s 64 API calls 9819 408227 9817->9819 9818->9817 9822 408238 9819->9822 9823 4086f0 __invoke_watson 10 API calls 9819->9823 9820 4086f0 __invoke_watson 10 API calls 9820->9821 9869 405223 9821->9869 9878 40e715 9822->9878 9823->9822 9826 40548c 9825->9826 9916 405461 GetModuleHandleW 9826->9916 9832 40e63f 9829->9832 9831 407348 9831->9764 9831->9765 9832->9831 9833 40e656 Sleep 9832->9833 9920 4046ba 9832->9920 9834 40e66b 9833->9834 9834->9831 9834->9832 9950 4072e4 RtlLeaveCriticalSection 9835->9950 9837 4073bc 9837->9766 9839 40e942 9838->9839 9840 40828e 9839->9840 9841 408302 __fileno 67 API calls 9839->9841 9840->9786 9840->9789 9842 40e965 9841->9842 9843 408818 __fileno 6 API calls 9842->9843 9843->9840 9845 4051d3 9844->9845 9846 4051cc 9844->9846 9847 408302 __fileno 67 API calls 9845->9847 9846->9845 9851 4051f9 9846->9851 9848 4051d8 9847->9848 9849 408818 __fileno 6 API calls 9848->9849 9850 4051e7 9849->9850 9850->9804 9853 4086f0 9850->9853 9851->9850 9852 408302 __fileno 67 API calls 9851->9852 9852->9848 9905 405a60 9853->9905 9855 40871d IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 9856 4087f9 GetCurrentProcess TerminateProcess 9855->9856 9857 4087ed __invoke_watson 9855->9857 9907 404fc8 9856->9907 9857->9856 9859 408168 9859->9804 9865 40e890 9860->9865 9861 40e894 9862 408302 __fileno 67 API calls 9861->9862 9863 4081dc 9861->9863 9864 40e8b0 9862->9864 9863->9820 9863->9821 9866 408818 __fileno 6 API calls 9864->9866 9865->9861 9865->9863 9867 40e8da 9865->9867 9866->9863 9867->9863 9868 408302 __fileno 67 API calls 9867->9868 9868->9864 9870 40523b 9869->9870 9873 405234 9869->9873 9871 408302 __fileno 67 API calls 9870->9871 9872 405240 9871->9872 9874 408818 __fileno 6 API calls 9872->9874 9873->9870 9876 40526f 9873->9876 9875 40524f 9874->9875 9875->9816 9875->9818 9876->9875 9877 408302 __fileno 67 API calls 9876->9877 9877->9872 9879 406d17 _doexit 6 API calls 9878->9879 9880 40e725 9879->9880 9881 40e738 LoadLibraryA 9880->9881 9884 40e7c0 9880->9884 9882 40e74d GetProcAddress 9881->9882 9894 40e862 9881->9894 9883 40e763 9882->9883 9882->9894 9886 406ca5 __encode_pointer 6 API calls 9883->9886 9885 406d20 __decode_pointer 6 API calls 9884->9885 9900 40e7ea 9884->9900 9889 40e7dd 9885->9889 9890 40e769 GetProcAddress 9886->9890 9887 406d20 __decode_pointer 6 API calls 9887->9894 9888 406d20 __decode_pointer 6 API calls 9895 40e82d 9888->9895 9891 406d20 __decode_pointer 6 API calls 9889->9891 9892 406ca5 __encode_pointer 6 API calls 9890->9892 9891->9900 9893 40e77e GetProcAddress 9892->9893 9896 406ca5 __encode_pointer 6 API calls 9893->9896 9894->9825 9899 406d20 __decode_pointer 6 API calls 9895->9899 9902 40e815 9895->9902 9897 40e793 GetProcAddress 9896->9897 9898 406ca5 __encode_pointer 6 API calls 9897->9898 9901 40e7a8 9898->9901 9899->9902 9900->9888 9900->9902 9901->9884 9903 40e7b2 GetProcAddress 9901->9903 9902->9887 9904 406ca5 __encode_pointer 6 API calls 9903->9904 9904->9884 9906 405a6c __VEC_memzero 9905->9906 9906->9855 9908 404fd0 9907->9908 9909 404fd2 IsDebuggerPresent 9907->9909 9908->9859 9915 40ee3e 9909->9915 9912 4099db SetUnhandledExceptionFilter UnhandledExceptionFilter 9913 409a00 GetCurrentProcess TerminateProcess 9912->9913 9914 4099f8 __invoke_watson 9912->9914 9913->9859 9914->9913 9915->9912 9917 405475 GetProcAddress 9916->9917 9918 40548a ExitProcess 9916->9918 9917->9918 9919 405485 9917->9919 9919->9918 9921 40476d 9920->9921 9934 4046cc 9920->9934 9922 40835a _malloc 6 API calls 9921->9922 9923 404773 9922->9923 9926 408302 __fileno 66 API calls 9923->9926 9924 4046dd 9925 408287 __FF_MSGBANNER 66 API calls 9924->9925 9927 4080dc __NMSG_WRITE 66 API calls 9924->9927 9930 40548c _malloc 3 API calls 9924->9930 9924->9934 9925->9924 9937 404765 9926->9937 9927->9924 9929 404729 RtlAllocateHeap 9929->9934 9930->9924 9931 404759 9933 408302 __fileno 66 API calls 9931->9933 9932 40835a _malloc 6 API calls 9932->9934 9935 40475e 9933->9935 9934->9924 9934->9929 9934->9931 9934->9932 9934->9935 9934->9937 9938 40466b 9934->9938 9936 408302 __fileno 66 API calls 9935->9936 9936->9937 9937->9832 9939 404677 __lseeki64 9938->9939 9940 4046a8 __lseeki64 9939->9940 9941 4073be __lock 67 API calls 9939->9941 9940->9934 9942 40468d 9941->9942 9943 407bd0 ___sbh_alloc_block 5 API calls 9942->9943 9944 404698 9943->9944 9946 4046b1 9944->9946 9949 4072e4 RtlLeaveCriticalSection 9946->9949 9948 4046b8 9948->9940 9949->9948 9950->9837 9952 40774a RtlReAllocateHeap 9951->9952 9953 40777e RtlAllocateHeap 9951->9953 9954 407768 9952->9954 9955 40776c 9952->9955 9953->9954 9956 4077a1 VirtualAlloc 9953->9956 9954->9701 9955->9953 9956->9954 9957 4077bb HeapFree 9956->9957 9957->9954 9959 4077fe VirtualAlloc 9958->9959 9961 407845 9959->9961 9961->9697 9962->9704 9963->9632 9982 4072e4 RtlLeaveCriticalSection 9964->9982 9966 406ea3 9966->9642 9968 40e256 InterlockedIncrement 9967->9968 9969 40e259 9967->9969 9968->9969 9970 40e263 InterlockedIncrement 9969->9970 9971 40e266 9969->9971 9970->9971 9972 40e270 InterlockedIncrement 9971->9972 9973 40e273 9971->9973 9972->9973 9974 40e27d InterlockedIncrement 9973->9974 9976 40e280 9973->9976 9974->9976 9975 40e299 InterlockedIncrement 9975->9976 9976->9975 9977 40e2a9 InterlockedIncrement 9976->9977 9978 40e2b4 InterlockedIncrement 9976->9978 9977->9976 9978->9645 9983 4072e4 RtlLeaveCriticalSection 9979->9983 9981 406ef1 9981->9647 9982->9966 9983->9981 9984->9457 9987 40d194 9985->9987 9989 40d201 9987->9989 9995 410aee 9987->9995 9988 40d2ff 9988->9502 9988->9503 9989->9988 9990 410aee 77 API calls _parse_cmdline 9989->9990 9990->9989 9992 40e0da 9991->9992 9994 40e0e1 9991->9994 10217 40df37 9992->10217 9994->9497 9998 410a9b 9995->9998 10001 4060ba 9998->10001 10002 4060cd 10001->10002 10008 40611a 10001->10008 10009 406f6c 10002->10009 10005 4060fa 10005->10008 10029 40dc32 10005->10029 10008->9987 10010 406ef3 __getptd_noexit 67 API calls 10009->10010 10011 406f74 10010->10011 10012 4060d2 10011->10012 10013 405438 __amsg_exit 67 API calls 10011->10013 10012->10005 10014 40e39e 10012->10014 10013->10012 10015 40e3aa __lseeki64 10014->10015 10016 406f6c __getptd 67 API calls 10015->10016 10017 40e3af 10016->10017 10018 40e3dd 10017->10018 10020 40e3c1 10017->10020 10019 4073be __lock 67 API calls 10018->10019 10021 40e3e4 10019->10021 10022 406f6c __getptd 67 API calls 10020->10022 10045 40e360 10021->10045 10024 40e3c6 10022->10024 10027 40e3d4 __lseeki64 10024->10027 10028 405438 __amsg_exit 67 API calls 10024->10028 10027->10005 10028->10027 10030 40dc3e __lseeki64 10029->10030 10031 406f6c __getptd 67 API calls 10030->10031 10032 40dc43 10031->10032 10033 4073be __lock 67 API calls 10032->10033 10034 40dc55 10032->10034 10035 40dc73 10033->10035 10037 40dc63 __lseeki64 10034->10037 10041 405438 __amsg_exit 67 API calls 10034->10041 10036 40dcbc 10035->10036 10038 40dca4 InterlockedIncrement 10035->10038 10039 40dc8a InterlockedDecrement 10035->10039 10213 40dccd 10036->10213 10037->10008 10038->10036 10039->10038 10042 40dc95 10039->10042 10041->10037 10042->10038 10043 4049a5 __crtLCMapStringA_stat 67 API calls 10042->10043 10044 40dca3 10043->10044 10044->10038 10046 40e364 10045->10046 10047 40e396 10045->10047 10046->10047 10048 40e238 ___addlocaleref 8 API calls 10046->10048 10053 40e408 10047->10053 10049 40e377 10048->10049 10049->10047 10056 40e2c7 10049->10056 10212 4072e4 RtlLeaveCriticalSection 10053->10212 10055 40e40f 10055->10024 10057 40e2d8 InterlockedDecrement 10056->10057 10058 40e35b 10056->10058 10059 40e2f0 10057->10059 10060 40e2ed InterlockedDecrement 10057->10060 10058->10047 10070 40e0ef 10058->10070 10061 40e2fa InterlockedDecrement 10059->10061 10062 40e2fd 10059->10062 10060->10059 10061->10062 10063 40e307 InterlockedDecrement 10062->10063 10064 40e30a 10062->10064 10063->10064 10065 40e314 InterlockedDecrement 10064->10065 10066 40e317 10064->10066 10065->10066 10067 40e330 InterlockedDecrement 10066->10067 10068 40e340 InterlockedDecrement 10066->10068 10069 40e34b InterlockedDecrement 10066->10069 10067->10066 10068->10066 10069->10058 10071 40e173 10070->10071 10072 40e106 10070->10072 10073 40e1c0 10071->10073 10074 4049a5 __crtLCMapStringA_stat 67 API calls 10071->10074 10072->10071 10079 40e13a 10072->10079 10084 4049a5 __crtLCMapStringA_stat 67 API calls 10072->10084 10080 40e1e7 10073->10080 10124 4110ec 10073->10124 10076 40e194 10074->10076 10078 4049a5 __crtLCMapStringA_stat 67 API calls 10076->10078 10081 40e1a7 10078->10081 10086 4049a5 __crtLCMapStringA_stat 67 API calls 10079->10086 10099 40e15b 10079->10099 10083 40e22c 10080->10083 10093 4049a5 67 API calls __crtLCMapStringA_stat 10080->10093 10087 4049a5 __crtLCMapStringA_stat 67 API calls 10081->10087 10082 4049a5 __crtLCMapStringA_stat 67 API calls 10088 40e168 10082->10088 10089 4049a5 __crtLCMapStringA_stat 67 API calls 10083->10089 10090 40e12f 10084->10090 10085 4049a5 __crtLCMapStringA_stat 67 API calls 10085->10080 10091 40e150 10086->10091 10092 40e1b5 10087->10092 10094 4049a5 __crtLCMapStringA_stat 67 API calls 10088->10094 10095 40e232 10089->10095 10100 4112c6 10090->10100 10116 411281 10091->10116 10098 4049a5 __crtLCMapStringA_stat 67 API calls 10092->10098 10093->10080 10094->10071 10095->10047 10098->10073 10099->10082 10101 4112d3 10100->10101 10115 411350 10100->10115 10102 4112e4 10101->10102 10104 4049a5 __crtLCMapStringA_stat 67 API calls 10101->10104 10103 4112f6 10102->10103 10105 4049a5 __crtLCMapStringA_stat 67 API calls 10102->10105 10106 4049a5 __crtLCMapStringA_stat 67 API calls 10103->10106 10107 411308 10103->10107 10104->10102 10105->10103 10106->10107 10108 41131a 10107->10108 10109 4049a5 __crtLCMapStringA_stat 67 API calls 10107->10109 10110 41132c 10108->10110 10112 4049a5 __crtLCMapStringA_stat 67 API calls 10108->10112 10109->10108 10111 41133e 10110->10111 10113 4049a5 __crtLCMapStringA_stat 67 API calls 10110->10113 10114 4049a5 __crtLCMapStringA_stat 67 API calls 10111->10114 10111->10115 10112->10110 10113->10111 10114->10115 10115->10079 10117 41128e 10116->10117 10123 4112c2 10116->10123 10118 41129e 10117->10118 10119 4049a5 __crtLCMapStringA_stat 67 API calls 10117->10119 10120 4112b0 10118->10120 10121 4049a5 __crtLCMapStringA_stat 67 API calls 10118->10121 10119->10118 10122 4049a5 __crtLCMapStringA_stat 67 API calls 10120->10122 10120->10123 10121->10120 10122->10123 10123->10099 10125 4110fd 10124->10125 10211 40e1e0 10124->10211 10126 4049a5 __crtLCMapStringA_stat 67 API calls 10125->10126 10127 411105 10126->10127 10128 4049a5 __crtLCMapStringA_stat 67 API calls 10127->10128 10129 41110d 10128->10129 10130 4049a5 __crtLCMapStringA_stat 67 API calls 10129->10130 10131 411115 10130->10131 10132 4049a5 __crtLCMapStringA_stat 67 API calls 10131->10132 10133 41111d 10132->10133 10134 4049a5 __crtLCMapStringA_stat 67 API calls 10133->10134 10135 411125 10134->10135 10136 4049a5 __crtLCMapStringA_stat 67 API calls 10135->10136 10137 41112d 10136->10137 10138 4049a5 __crtLCMapStringA_stat 67 API calls 10137->10138 10139 411134 10138->10139 10140 4049a5 __crtLCMapStringA_stat 67 API calls 10139->10140 10141 41113c 10140->10141 10142 4049a5 __crtLCMapStringA_stat 67 API calls 10141->10142 10143 411144 10142->10143 10144 4049a5 __crtLCMapStringA_stat 67 API calls 10143->10144 10145 41114c 10144->10145 10146 4049a5 __crtLCMapStringA_stat 67 API calls 10145->10146 10147 411154 10146->10147 10148 4049a5 __crtLCMapStringA_stat 67 API calls 10147->10148 10149 41115c 10148->10149 10150 4049a5 __crtLCMapStringA_stat 67 API calls 10149->10150 10151 411164 10150->10151 10152 4049a5 __crtLCMapStringA_stat 67 API calls 10151->10152 10153 41116c 10152->10153 10154 4049a5 __crtLCMapStringA_stat 67 API calls 10153->10154 10155 411174 10154->10155 10156 4049a5 __crtLCMapStringA_stat 67 API calls 10155->10156 10157 41117c 10156->10157 10158 4049a5 __crtLCMapStringA_stat 67 API calls 10157->10158 10159 411187 10158->10159 10160 4049a5 __crtLCMapStringA_stat 67 API calls 10159->10160 10161 41118f 10160->10161 10162 4049a5 __crtLCMapStringA_stat 67 API calls 10161->10162 10163 411197 10162->10163 10164 4049a5 __crtLCMapStringA_stat 67 API calls 10163->10164 10165 41119f 10164->10165 10166 4049a5 __crtLCMapStringA_stat 67 API calls 10165->10166 10167 4111a7 10166->10167 10168 4049a5 __crtLCMapStringA_stat 67 API calls 10167->10168 10169 4111af 10168->10169 10170 4049a5 __crtLCMapStringA_stat 67 API calls 10169->10170 10171 4111b7 10170->10171 10172 4049a5 __crtLCMapStringA_stat 67 API calls 10171->10172 10173 4111bf 10172->10173 10174 4049a5 __crtLCMapStringA_stat 67 API calls 10173->10174 10175 4111c7 10174->10175 10176 4049a5 __crtLCMapStringA_stat 67 API calls 10175->10176 10177 4111cf 10176->10177 10178 4049a5 __crtLCMapStringA_stat 67 API calls 10177->10178 10179 4111d7 10178->10179 10180 4049a5 __crtLCMapStringA_stat 67 API calls 10179->10180 10211->10085 10212->10055 10216 4072e4 RtlLeaveCriticalSection 10213->10216 10215 40dcd4 10215->10034 10216->10215 10218 40df43 __lseeki64 10217->10218 10219 406f6c __getptd 67 API calls 10218->10219 10220 40df4c 10219->10220 10221 40dc32 __setmbcp 69 API calls 10220->10221 10222 40df56 10221->10222 10248 40dcd6 10222->10248 10225 40e636 __malloc_crt 67 API calls 10226 40df77 10225->10226 10227 40e096 __lseeki64 10226->10227 10255 40dd52 10226->10255 10227->9994 10230 40e0a3 10230->10227 10235 40e0b6 10230->10235 10236 4049a5 __crtLCMapStringA_stat 67 API calls 10230->10236 10231 40dfa7 InterlockedDecrement 10232 40dfb7 10231->10232 10233 40dfc8 InterlockedIncrement 10231->10233 10232->10233 10238 4049a5 __crtLCMapStringA_stat 67 API calls 10232->10238 10233->10227 10234 40dfde 10233->10234 10234->10227 10239 4073be __lock 67 API calls 10234->10239 10237 408302 __fileno 67 API calls 10235->10237 10236->10235 10237->10227 10240 40dfc7 10238->10240 10242 40dff2 InterlockedDecrement 10239->10242 10240->10233 10243 40e081 InterlockedIncrement 10242->10243 10244 40e06e 10242->10244 10265 40e098 10243->10265 10244->10243 10246 4049a5 __crtLCMapStringA_stat 67 API calls 10244->10246 10247 40e080 10246->10247 10247->10243 10249 4060ba _LocaleUpdate::_LocaleUpdate 77 API calls 10248->10249 10250 40dcea 10249->10250 10251 40dd13 10250->10251 10252 40dcf5 GetOEMCP 10250->10252 10253 40dd18 GetACP 10251->10253 10254 40dd05 10251->10254 10252->10254 10253->10254 10254->10225 10254->10227 10256 40dcd6 getSystemCP 79 API calls 10255->10256 10257 40dd72 10256->10257 10258 40dd7d setSBCS 10257->10258 10260 40ddc1 IsValidCodePage 10257->10260 10264 40dde6 _memset __setmbcp_nolock 10257->10264 10259 404fc8 __except_handler4 5 API calls 10258->10259 10261 40df35 10259->10261 10260->10258 10262 40ddd3 GetCPInfo 10260->10262 10261->10230 10261->10231 10262->10258 10262->10264 10268 40da9f GetCPInfo 10264->10268 10401 4072e4 RtlLeaveCriticalSection 10265->10401 10267 40e09f 10267->10227 10271 40dad3 _memset 10268->10271 10277 40db85 10268->10277 10278 4110aa 10271->10278 10273 404fc8 __except_handler4 5 API calls 10275 40dc30 10273->10275 10275->10264 10276 410eab ___crtLCMapStringA 102 API calls 10276->10277 10277->10273 10279 4060ba _LocaleUpdate::_LocaleUpdate 77 API calls 10278->10279 10280 4110bd 10279->10280 10288 410ef0 10280->10288 10283 410eab 10284 4060ba _LocaleUpdate::_LocaleUpdate 77 API calls 10283->10284 10285 410ebe 10284->10285 10354 410b06 10285->10354 10289 410f11 GetStringTypeW 10288->10289 10290 410f3c 10288->10290 10291 410f31 GetLastError 10289->10291 10292 410f29 10289->10292 10290->10292 10294 411023 10290->10294 10291->10290 10293 410f75 MultiByteToWideChar 10292->10293 10295 41101d 10292->10295 10293->10295 10301 410fa2 10293->10301 10316 413a30 GetLocaleInfoA 10294->10316 10298 404fc8 __except_handler4 5 API calls 10295->10298 10299 40db40 10298->10299 10299->10283 10300 411074 GetStringTypeA 10300->10295 10304 41108f 10300->10304 10305 410fb7 _memset __crtLCMapStringA_stat 10301->10305 10306 4046ba _malloc 67 API calls 10301->10306 10303 410ff0 MultiByteToWideChar 10308 411017 10303->10308 10309 411006 GetStringTypeW 10303->10309 10310 4049a5 __crtLCMapStringA_stat 67 API calls 10304->10310 10305->10295 10305->10303 10306->10305 10312 4105b7 10308->10312 10309->10308 10310->10295 10313 4105c3 10312->10313 10314 4105d4 10312->10314 10313->10314 10315 4049a5 __crtLCMapStringA_stat 67 API calls 10313->10315 10314->10295 10315->10314 10317 413a63 10316->10317 10319 413a5e 10316->10319 10347 413c2d 10317->10347 10320 404fc8 __except_handler4 5 API calls 10319->10320 10321 411047 10320->10321 10321->10295 10321->10300 10322 413a79 10321->10322 10323 413ab9 GetCPInfo 10322->10323 10339 413b43 10322->10339 10324 413ad0 10323->10324 10325 413b2e MultiByteToWideChar 10323->10325 10324->10325 10327 413ad6 GetCPInfo 10324->10327 10330 413ae9 _strlen 10325->10330 10325->10339 10326 404fc8 __except_handler4 5 API calls 10328 411068 10326->10328 10327->10325 10329 413ae3 10327->10329 10328->10295 10328->10300 10329->10325 10329->10330 10331 4046ba _malloc 67 API calls 10330->10331 10333 413b1b _memset __crtLCMapStringA_stat 10330->10333 10331->10333 10332 413b78 MultiByteToWideChar 10334 413b90 10332->10334 10335 413baf 10332->10335 10333->10332 10333->10339 10337 413bb4 10334->10337 10338 413b97 WideCharToMultiByte 10334->10338 10336 4105b7 __freea 67 API calls 10335->10336 10336->10339 10340 413bd3 10337->10340 10341 413bbf WideCharToMultiByte 10337->10341 10338->10335 10339->10326 10342 40e67b __calloc_crt 67 API calls 10340->10342 10341->10335 10341->10340 10343 413bdb 10342->10343 10343->10335 10344 413be4 WideCharToMultiByte 10343->10344 10344->10335 10345 413bf6 10344->10345 10346 4049a5 __crtLCMapStringA_stat 67 API calls 10345->10346 10346->10335 10350 406370 10347->10350 10351 406389 10350->10351 10352 406141 strtoxl 91 API calls 10351->10352 10353 406396 10352->10353 10353->10319 10355 410b27 LCMapStringW 10354->10355 10358 410b42 10354->10358 10356 410b4a GetLastError 10355->10356 10355->10358 10356->10358 10357 410d40 10360 413a30 ___ansicp 91 API calls 10357->10360 10358->10357 10359 410b9c 10358->10359 10361 410bb5 MultiByteToWideChar 10359->10361 10384 410d37 10359->10384 10362 410d68 10360->10362 10367 410be2 10361->10367 10361->10384 10365 410d81 10362->10365 10366 410e5c LCMapStringA 10362->10366 10362->10384 10363 404fc8 __except_handler4 5 API calls 10364 40db60 10363->10364 10364->10276 10369 413a79 ___convertcp 74 API calls 10365->10369 10368 410db8 10366->10368 10372 4046ba _malloc 67 API calls 10367->10372 10381 410bfb __crtLCMapStringA_stat 10367->10381 10371 410e83 10368->10371 10377 4049a5 __crtLCMapStringA_stat 67 API calls 10368->10377 10373 410d93 10369->10373 10370 410c33 MultiByteToWideChar 10374 410c4c LCMapStringW 10370->10374 10375 410d2e 10370->10375 10382 4049a5 __crtLCMapStringA_stat 67 API calls 10371->10382 10371->10384 10372->10381 10378 410d9d LCMapStringA 10373->10378 10373->10384 10374->10375 10376 410c6d 10374->10376 10379 4105b7 __freea 67 API calls 10375->10379 10380 410c76 10376->10380 10386 410c9f 10376->10386 10377->10371 10378->10368 10387 410dbf 10378->10387 10379->10384 10380->10375 10383 410c88 LCMapStringW 10380->10383 10381->10370 10381->10384 10382->10384 10383->10375 10384->10363 10385 410cee LCMapStringW 10388 410d06 WideCharToMultiByte 10385->10388 10389 410d28 10385->10389 10391 410cba __crtLCMapStringA_stat 10386->10391 10393 4046ba _malloc 67 API calls 10386->10393 10390 4046ba _malloc 67 API calls 10387->10390 10392 410dd0 _memset __crtLCMapStringA_stat 10387->10392 10388->10389 10394 4105b7 __freea 67 API calls 10389->10394 10390->10392 10391->10375 10391->10385 10392->10368 10395 410e0e LCMapStringA 10392->10395 10393->10391 10394->10375 10397 410e2a 10395->10397 10398 410e2e 10395->10398 10400 4105b7 __freea 67 API calls 10397->10400 10399 413a79 ___convertcp 74 API calls 10398->10399 10399->10397 10400->10368 10401->10267 10403 40bd25 10402->10403 10404 406ca5 __encode_pointer 6 API calls 10403->10404 10405 40bd3d 10403->10405 10404->10403 10405->9524 10409 40bc80 10406->10409 10408 40bcc9 10408->9526 10410 40bc8c __lseeki64 10409->10410 10417 4054a4 10410->10417 10416 40bcad __lseeki64 10416->10408 10418 4073be __lock 67 API calls 10417->10418 10419 4054ab 10418->10419 10420 40bb95 10419->10420 10421 406d20 __decode_pointer 6 API calls 10420->10421 10422 40bba9 10421->10422 10423 406d20 __decode_pointer 6 API calls 10422->10423 10424 40bbb9 10423->10424 10432 40bc3c 10424->10432 10440 410375 10424->10440 10426 40bbd7 10429 40bbfb 10426->10429 10436 40bc23 10426->10436 10453 40e6c7 10426->10453 10427 406ca5 __encode_pointer 6 API calls 10428 40bc31 10427->10428 10430 406ca5 __encode_pointer 6 API calls 10428->10430 10429->10432 10433 40e6c7 __realloc_crt 73 API calls 10429->10433 10434 40bc11 10429->10434 10430->10432 10437 40bcb6 10432->10437 10433->10434 10434->10432 10435 406ca5 __encode_pointer 6 API calls 10434->10435 10435->10436 10436->10427 10502 4054ad 10437->10502 10441 410381 __lseeki64 10440->10441 10442 410391 10441->10442 10443 4103ae 10441->10443 10444 408302 __fileno 67 API calls 10442->10444 10445 4103ef RtlSizeHeap 10443->10445 10447 4073be __lock 67 API calls 10443->10447 10446 410396 10444->10446 10449 4103a6 __lseeki64 10445->10449 10448 408818 __fileno 6 API calls 10446->10448 10450 4103be ___sbh_find_block 10447->10450 10448->10449 10449->10426 10458 41040f 10450->10458 10455 40e6d0 10453->10455 10456 40e70f 10455->10456 10457 40e6f0 Sleep 10455->10457 10462 4114be 10455->10462 10456->10429 10457->10455 10461 4072e4 RtlLeaveCriticalSection 10458->10461 10460 4103ea 10460->10445 10460->10449 10461->10460 10463 4114ca __lseeki64 10462->10463 10464 4114d1 10463->10464 10465 4114df 10463->10465 10466 4046ba _malloc 67 API calls 10464->10466 10467 4114f2 10465->10467 10468 4114e6 10465->10468 10494 4114d9 _realloc __lseeki64 10466->10494 10470 411664 10467->10470 10496 4114ff ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 10467->10496 10469 4049a5 __crtLCMapStringA_stat 67 API calls 10468->10469 10469->10494 10471 411697 10470->10471 10472 411669 RtlReAllocateHeap 10470->10472 10477 4116bb 10470->10477 10478 40835a _malloc 6 API calls 10470->10478 10480 4116b1 10470->10480 10473 40835a _malloc 6 API calls 10471->10473 10472->10470 10472->10494 10475 41169d 10473->10475 10474 4073be __lock 67 API calls 10474->10496 10476 408302 __fileno 67 API calls 10475->10476 10476->10494 10479 408302 __fileno 67 API calls 10477->10479 10477->10494 10478->10470 10481 4116c4 GetLastError 10479->10481 10483 408302 __fileno 67 API calls 10480->10483 10481->10494 10485 411632 10483->10485 10484 41158a RtlAllocateHeap 10484->10496 10487 411637 GetLastError 10485->10487 10485->10494 10486 4115df RtlReAllocateHeap 10486->10496 10487->10494 10488 407bd0 ___sbh_alloc_block 5 API calls 10488->10496 10489 41164a 10491 408302 __fileno 67 API calls 10489->10491 10489->10494 10490 40835a _malloc 6 API calls 10490->10496 10492 411657 10491->10492 10492->10481 10492->10494 10493 41162d 10495 408302 __fileno 67 API calls 10493->10495 10494->10455 10495->10485 10496->10471 10496->10474 10496->10484 10496->10486 10496->10488 10496->10489 10496->10490 10496->10493 10496->10494 10497 407421 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 10496->10497 10498 411602 10496->10498 10497->10496 10501 4072e4 RtlLeaveCriticalSection 10498->10501 10500 411609 10500->10496 10501->10500 10505 4072e4 RtlLeaveCriticalSection 10502->10505 10504 4054b4 10504->10416 10505->10504 10506->9545 10508 4017d2 CreateWindowExA 10507->10508 10509 401812 10507->10509 10508->10509 10510 401816 ShowWindow KiUserCallbackDispatcher 10508->10510 10509->9547 10510->10509 10512 402661 10511->10512 10514 402693 10512->10514 10515 402689 10512->10515 10516 40267b Sleep 10512->10516 10587 40493b 10512->10587 10590 405f32 10514->10590 10619 4022b0 10515->10619 10516->10512 10519 402687 10516->10519 10518 4026a0 10603 404cd3 10518->10603 10519->10514 10523 4026c1 10606 4047fb 10523->10606 10524 4022b0 111 API calls 10524->10523 10526 4026ca _strncmp 10526->9551 10528 401466 10527->10528 10532 40141f 10527->10532 10530 4014a4 10528->10530 10531 4014b5 10528->10531 10529 40146a 10529->10528 11570 4057bd 10529->11570 11573 4013a6 10530->11573 10534 4013a6 162 API calls 10531->10534 10532->10528 10532->10529 10535 401439 10532->10535 10536 4014b0 10534->10536 11567 4012f5 10535->11567 10538 4056a8 67 API calls 10536->10538 10541 4014ce 10538->10541 10542 4012f5 MessageBoxA 10542->10528 11647 401a34 10543->11647 10545 404fc8 __except_handler4 5 API calls 10546 401cd7 10545->10546 10546->9564 10549 401bbe 10551 40601b __fcloseall 107 API calls 10549->10551 10555 401bc6 _memset _strncat _strlen 10551->10555 10552 401b45 _strncpy 10552->10549 10559 401c80 _strlen 10552->10559 11660 401611 9 API calls 10552->11660 10556 401c21 CreateProcessA 10555->10556 10557 401c58 WaitForSingleObject GetExitCodeProcess CloseHandle CloseHandle 10556->10557 10558 401c4d GetLastError 10556->10558 10557->10559 10558->10559 10559->10545 11894 4018d1 10560->11894 10565 401d4a 10568 401dab _strcat 10565->10568 10569 401d5c 10565->10569 10566 401d3e 10567 4049a5 __crtLCMapStringA_stat 67 API calls 10566->10567 10571 401d44 10567->10571 10579 4049a5 __crtLCMapStringA_stat 67 API calls 10568->10579 10572 401d88 _strcat 10569->10572 10573 401d5f 10569->10573 10570 401d16 10570->10566 10577 401d30 MessageBoxA 10570->10577 10578 4013fe 163 API calls 10571->10578 10582 4049a5 __crtLCMapStringA_stat 67 API calls 10572->10582 10574 401d70 10573->10574 10575 401d65 10573->10575 10576 4049a5 __crtLCMapStringA_stat 67 API calls 10574->10576 10580 4049a5 __crtLCMapStringA_stat 67 API calls 10575->10580 10576->10571 10577->10566 10581 401d83 10578->10581 10583 401d9e 10579->10583 10580->10571 10582->10583 10584 4013fe 163 API calls 10583->10584 10584->10581 10648 404877 10587->10648 10589 40494d 10589->10512 10593 405f3e __lseeki64 10590->10593 10591 405f4c 10592 408302 __fileno 67 API calls 10591->10592 10596 405f51 10592->10596 10593->10591 10594 405f7a 10593->10594 11103 408915 10594->11103 10598 408818 __fileno 6 API calls 10596->10598 10602 405f61 __lseeki64 10598->10602 10602->10518 11182 404c3d 10603->11182 10605 4026af 10605->10523 10605->10524 10607 404807 __lseeki64 10606->10607 10608 404838 10607->10608 10609 40481b 10607->10609 10612 408915 __lock_file 68 API calls 10608->10612 10616 404830 __lseeki64 10608->10616 10610 408302 __fileno 67 API calls 10609->10610 10611 404820 10610->10611 10613 408818 __fileno 6 API calls 10611->10613 10614 404850 10612->10614 10613->10616 11349 404784 10614->11349 10616->10526 10620 4022e2 10619->10620 10621 4022cf 10619->10621 10623 402362 10620->10623 10624 4022f9 10620->10624 11399 405e8e 10621->11399 10627 405d4b _printf 105 API calls 10623->10627 10625 402313 10624->10625 10626 4022fe 10624->10626 10630 405d4b _printf 105 API calls 10625->10630 10628 40230e 10626->10628 11402 405d4b 10626->11402 10629 40236e 10627->10629 10634 402399 10628->10634 11438 40601b 10628->11438 11419 402100 10629->11419 10633 40231e 10630->10633 10636 402353 10633->10636 10637 40232b 10633->10637 10635 404fc8 __except_handler4 5 API calls 10634->10635 10639 4023a8 10635->10639 10640 405d4b _printf 105 API calls 10636->10640 10641 405d4b _printf 105 API calls 10637->10641 10639->10514 10640->10628 10643 402335 10641->10643 10642 402385 10644 4056a8 67 API calls 10642->10644 10645 405d4b _printf 105 API calls 10643->10645 10644->10634 10646 402344 10645->10646 10647 405d4b _printf 105 API calls 10646->10647 10647->10628 10650 404883 __lseeki64 10648->10650 10649 404896 10651 408302 __fileno 67 API calls 10649->10651 10650->10649 10652 4048cb 10650->10652 10653 40489b 10651->10653 10667 408cbc 10652->10667 10655 408818 __fileno 6 API calls 10653->10655 10665 4048ab __lseeki64 @_EH4_CallFilterFunc@8 10655->10665 10656 4048d0 10657 4048e4 10656->10657 10658 4048d7 10656->10658 10660 40490b 10657->10660 10661 4048eb 10657->10661 10659 408302 __fileno 67 API calls 10658->10659 10659->10665 10685 4089f3 10660->10685 10662 408302 __fileno 67 API calls 10661->10662 10662->10665 10665->10589 10668 408cc8 __lseeki64 10667->10668 10669 4073be __lock 67 API calls 10668->10669 10670 408cd6 10669->10670 10671 408d52 10670->10671 10677 4072fb __mtinitlocknum 67 API calls 10670->10677 10682 408d4b 10670->10682 10713 408956 10670->10713 10718 4089c4 10670->10718 10672 40e636 __malloc_crt 67 API calls 10671->10672 10675 408d5c 10672->10675 10674 408de0 __lseeki64 10674->10656 10676 40c276 __ioinit InitializeCriticalSectionAndSpinCount 10675->10676 10675->10682 10679 408d81 10676->10679 10677->10670 10680 408d8c 10679->10680 10681 408d9f RtlEnterCriticalSection 10679->10681 10683 4049a5 __crtLCMapStringA_stat 67 API calls 10680->10683 10681->10682 10710 408deb 10682->10710 10683->10682 10686 408a15 10685->10686 10687 408a29 10686->10687 10699 408a48 10686->10699 10689 408302 __fileno 67 API calls 10687->10689 10688 408c05 10691 408c75 10688->10691 10692 408c5b 10688->10692 10690 408a2e 10689->10690 10693 408818 __fileno 6 API calls 10690->10693 10725 40f631 10691->10725 10694 408302 __fileno 67 API calls 10692->10694 10697 404916 10693->10697 10696 408c60 10694->10696 10698 408818 __fileno 6 API calls 10696->10698 10707 404931 10697->10707 10698->10697 10699->10688 10699->10692 10728 40fa00 10699->10728 10704 40f87c __fassign 102 API calls 10705 408c1e 10704->10705 10705->10688 10706 40f87c __fassign 102 API calls 10705->10706 10706->10688 11096 408988 10707->11096 10709 404939 10709->10665 10723 4072e4 RtlLeaveCriticalSection 10710->10723 10712 408df2 10712->10674 10714 408963 10713->10714 10715 408979 RtlEnterCriticalSection 10713->10715 10716 4073be __lock 67 API calls 10714->10716 10715->10670 10717 40896c 10716->10717 10717->10670 10719 4089d4 10718->10719 10720 4089e7 RtlLeaveCriticalSection 10718->10720 10724 4072e4 RtlLeaveCriticalSection 10719->10724 10720->10670 10722 4089e4 10722->10670 10723->10712 10724->10722 10734 40f565 10725->10734 10727 40f64c 10727->10697 11043 40f896 10728->11043 10730 408bd0 10730->10692 10731 40f87c 10730->10731 11056 40f651 10731->11056 10736 40f571 __lseeki64 10734->10736 10735 40f584 10737 408302 __fileno 67 API calls 10735->10737 10736->10735 10738 40f5c2 10736->10738 10739 40f589 10737->10739 10745 40ee46 10738->10745 10740 408818 __fileno 6 API calls 10739->10740 10744 40f598 __lseeki64 10740->10744 10744->10727 10746 40ee6b 10745->10746 10810 41194b 10746->10810 10749 40ee8c 10750 4086f0 __invoke_watson 10 API calls 10749->10750 10751 40ee96 10750->10751 10756 40ee99 10751->10756 10752 40eecf 10834 408315 10752->10834 10755 408302 __fileno 67 API calls 10757 40eede 10755->10757 10756->10752 10759 40ef8f 10756->10759 10758 408818 __fileno 6 API calls 10757->10758 10805 40eeed 10758->10805 10816 40ebc3 10759->10816 10761 40f031 10762 40f052 CreateFileA 10761->10762 10763 40f038 10761->10763 10765 40f0ec GetFileType 10762->10765 10766 40f07f 10762->10766 10764 408315 __lseeki64 67 API calls 10763->10764 10768 40f03d 10764->10768 10767 40f0f9 GetLastError 10765->10767 10772 40f13d 10765->10772 10769 40f0b8 GetLastError 10766->10769 10773 40f093 CreateFileA 10766->10773 10770 408328 __dosmaperr 67 API calls 10767->10770 10771 408302 __fileno 67 API calls 10768->10771 10837 408328 10769->10837 10775 40f122 CloseHandle 10770->10775 10776 40f047 10771->10776 10842 40e97e 10772->10842 10773->10765 10773->10769 10775->10776 10777 40f130 10775->10777 10780 408302 __fileno 67 API calls 10776->10780 10779 408302 __fileno 67 API calls 10777->10779 10781 40f135 10779->10781 10780->10805 10781->10776 10782 40f37b 10785 40f4e8 CloseHandle CreateFileA 10782->10785 10782->10805 10787 40f513 GetLastError 10785->10787 10788 40f541 10785->10788 10789 408328 __dosmaperr 67 API calls 10787->10789 10788->10805 10792 40f51f 10789->10792 10791 409072 77 API calls __read_nolock 10800 40f1d1 10791->10800 10794 40d8bb 69 API calls __lseek_nolock 10794->10800 10798 40f321 10798->10800 10803 40fb9c 69 API calls __lseeki64_nolock 10798->10803 10799 40f3e3 10801 408382 __close_nolock 70 API calls 10799->10801 10800->10782 10800->10791 10800->10794 10800->10798 10800->10799 10861 408382 10800->10861 10876 4116d9 10800->10876 10907 40a2ab 10800->10907 10802 40f3ea 10801->10802 10803->10798 10806 40f603 10805->10806 10807 40f608 10806->10807 10809 40f62f 10806->10809 11042 40eb9c RtlLeaveCriticalSection 10807->11042 10809->10744 10811 41195a 10810->10811 10815 40ee87 10810->10815 10812 408302 __fileno 67 API calls 10811->10812 10813 41195f 10812->10813 10814 408818 __fileno 6 API calls 10813->10814 10814->10815 10815->10749 10815->10756 10817 40ebcf __lseeki64 10816->10817 10818 4072fb __mtinitlocknum 67 API calls 10817->10818 10819 40ebdf 10818->10819 10820 4073be __lock 67 API calls 10819->10820 10825 40ebe4 __lseeki64 10819->10825 10830 40ebf3 10820->10830 10821 40ed36 10954 40ed54 10821->10954 10822 40eccc 10824 40e67b __calloc_crt 67 API calls 10822->10824 10828 40ecd5 10824->10828 10825->10761 10826 4073be __lock 67 API calls 10826->10830 10827 40ec74 RtlEnterCriticalSection 10829 40ec84 RtlLeaveCriticalSection 10827->10829 10827->10830 10828->10821 10944 40eafc 10828->10944 10829->10830 10830->10821 10830->10822 10830->10826 10830->10827 10832 40c276 __ioinit InitializeCriticalSectionAndSpinCount 10830->10832 10941 40ec96 10830->10941 10832->10830 10835 406ef3 __getptd_noexit 67 API calls 10834->10835 10836 40831a 10835->10836 10836->10755 10838 408315 __lseeki64 67 API calls 10837->10838 10839 408333 _realloc 10838->10839 10840 408302 __fileno 67 API calls 10839->10840 10841 408346 10840->10841 10841->10776 10843 40e9e5 10842->10843 10844 40e98c 10842->10844 10845 408302 __fileno 67 API calls 10843->10845 10844->10843 10850 40e9b0 10844->10850 10846 40e9ea 10845->10846 10847 408315 __lseeki64 67 API calls 10846->10847 10848 40e9db 10847->10848 10848->10782 10848->10800 10851 40d8bb 10848->10851 10849 40e9d5 SetStdHandle 10849->10848 10850->10848 10850->10849 10957 40ea85 10851->10957 10862 40ea85 __lseek_nolock 67 API calls 10861->10862 10864 408392 10862->10864 10863 4083e8 10864->10863 10866 40ea85 __lseek_nolock 67 API calls 10864->10866 10875 4083c6 10864->10875 10875->10863 10970 40fb9c 10876->10970 10908 40a2b7 __lseeki64 10907->10908 10909 40a2da 10908->10909 10910 40a2bf 10908->10910 10942 4072e4 _doexit RtlLeaveCriticalSection 10941->10942 10943 40ec9d 10942->10943 10943->10830 10946 40eb08 __lseeki64 10944->10946 10945 40eb63 10947 40eb85 __lseeki64 10945->10947 10948 40eb68 RtlEnterCriticalSection 10945->10948 10946->10945 10949 4073be __lock 67 API calls 10946->10949 10947->10821 10948->10947 10950 40eb34 10949->10950 10951 40eb4b 10950->10951 10952 40c276 __ioinit InitializeCriticalSectionAndSpinCount 10950->10952 10953 40eb93 ___lock_fhandle RtlLeaveCriticalSection 10951->10953 10952->10951 10953->10945 10955 4072e4 _doexit RtlLeaveCriticalSection 10954->10955 10956 40ed5b 10955->10956 10956->10825 10958 40ea92 10957->10958 10959 40eaaa 10957->10959 10960 408315 __lseeki64 67 API calls 10958->10960 10962 408315 __lseeki64 67 API calls 10959->10962 10964 40eaef 10959->10964 10961 40ea97 10960->10961 10971 40ea85 __lseek_nolock 67 API calls 10970->10971 11042->10809 11044 40f8ad 11043->11044 11055 40f8a6 _strncmp 11043->11055 11045 4060ba _LocaleUpdate::_LocaleUpdate 77 API calls 11044->11045 11046 40f8b9 11045->11046 11047 40f917 11046->11047 11048 40f8ec 11046->11048 11046->11055 11050 408302 __fileno 67 API calls 11047->11050 11047->11055 11049 408302 __fileno 67 API calls 11048->11049 11051 40f8f1 11049->11051 11052 40f924 11050->11052 11053 408818 __fileno 6 API calls 11051->11053 11054 408818 __fileno 6 API calls 11052->11054 11053->11055 11054->11055 11055->10730 11057 4060ba _LocaleUpdate::_LocaleUpdate 77 API calls 11056->11057 11058 40f665 11057->11058 11059 40f687 11058->11059 11060 40f6ad 11058->11060 11070 408bfe 11058->11070 11071 411a76 11059->11071 11062 40f6e0 11060->11062 11063 40f6b2 11060->11063 11065 408302 __fileno 67 API calls 11062->11065 11062->11070 11064 408302 __fileno 67 API calls 11063->11064 11066 40f6b7 11064->11066 11067 40f6ed 11065->11067 11068 408818 __fileno 6 API calls 11066->11068 11069 408818 __fileno 6 API calls 11067->11069 11068->11070 11069->11070 11070->10688 11070->10704 11074 411a86 11071->11074 11077 411ab8 11071->11077 11073 411a8b 11076 408302 __fileno 67 API calls 11073->11076 11074->11073 11074->11077 11075 411aa0 11075->11070 11078 411a90 11076->11078 11080 411984 11077->11080 11079 408818 __fileno 6 API calls 11078->11079 11079->11075 11081 41199a 11080->11081 11082 4119bf ___ascii_strnicmp 11080->11082 11083 4060ba _LocaleUpdate::_LocaleUpdate 77 API calls 11081->11083 11082->11075 11084 4119a5 11083->11084 11085 4119aa 11084->11085 11086 4119df 11084->11086 11087 408302 __fileno 67 API calls 11085->11087 11088 4119e9 11086->11088 11095 411a11 11086->11095 11089 4119af 11087->11089 11091 408302 __fileno 67 API calls 11088->11091 11090 408818 __fileno 6 API calls 11089->11090 11090->11082 11092 4119ee 11091->11092 11093 408818 __fileno 6 API calls 11092->11093 11093->11082 11094 40fd3a 102 API calls __tolower_l 11094->11095 11095->11082 11095->11094 11097 4089b8 RtlLeaveCriticalSection 11096->11097 11098 408999 11096->11098 11097->10709 11098->11097 11099 4089a0 11098->11099 11102 4072e4 RtlLeaveCriticalSection 11099->11102 11101 4089b5 11101->10709 11102->11101 11104 408927 11103->11104 11105 408949 RtlEnterCriticalSection 11103->11105 11104->11105 11106 40892f 11104->11106 11107 405f82 11105->11107 11108 4073be __lock 67 API calls 11106->11108 11109 405ea8 11107->11109 11108->11107 11110 405ec8 11109->11110 11111 405eb8 11109->11111 11113 405eda 11110->11113 11161 406735 11110->11161 11112 408302 __fileno 67 API calls 11111->11112 11120 405ebd 11112->11120 11124 40854e 11113->11124 11121 405fad 11120->11121 11122 408988 _fseek 2 API calls 11121->11122 11123 405fb5 11122->11123 11123->10602 11125 405ee8 11124->11125 11126 408567 11124->11126 11130 4084eb 11125->11130 11126->11125 11127 4084eb __fileno 67 API calls 11126->11127 11128 408582 11127->11128 11129 40a2ab __locking 101 API calls 11128->11129 11129->11125 11131 405f1a 11130->11131 11132 4084fa 11130->11132 11136 40d930 11131->11136 11133 408302 __fileno 67 API calls 11132->11133 11134 4084ff 11133->11134 11135 408818 __fileno 6 API calls 11134->11135 11135->11131 11137 40d93c __lseeki64 11136->11137 11138 40d944 11137->11138 11139 40d95f 11137->11139 11140 408315 __lseeki64 67 API calls 11138->11140 11141 40d96d 11139->11141 11144 40d9ae 11139->11144 11142 40d949 11140->11142 11143 408315 __lseeki64 67 API calls 11141->11143 11145 408302 __fileno 67 API calls 11142->11145 11146 40d972 11143->11146 11147 40eafc ___lock_fhandle 68 API calls 11144->11147 11154 40d951 __lseeki64 11145->11154 11148 408302 __fileno 67 API calls 11146->11148 11150 40d9b4 11147->11150 11149 40d979 11148->11149 11151 408818 __fileno 6 API calls 11149->11151 11152 40d9c1 11150->11152 11153 40d9d7 11150->11153 11151->11154 11155 40d8bb __lseek_nolock 69 API calls 11152->11155 11156 408302 __fileno 67 API calls 11153->11156 11154->11120 11157 40d9cf 11155->11157 11158 40d9dc 11156->11158 11178 40da02 11157->11178 11159 408315 __lseeki64 67 API calls 11158->11159 11159->11157 11162 406768 11161->11162 11163 406748 11161->11163 11164 4084eb __fileno 67 API calls 11162->11164 11165 408302 __fileno 67 API calls 11163->11165 11166 40676e 11164->11166 11167 40674d 11165->11167 11169 40d930 __locking 71 API calls 11166->11169 11168 408818 __fileno 6 API calls 11167->11168 11177 40675d 11168->11177 11170 406783 11169->11170 11171 4067f7 11170->11171 11173 4067b2 11170->11173 11170->11177 11172 408302 __fileno 67 API calls 11171->11172 11172->11177 11174 40d930 __locking 71 API calls 11173->11174 11173->11177 11175 406852 11174->11175 11176 40d930 __locking 71 API calls 11175->11176 11175->11177 11176->11177 11177->11113 11181 40eb9c RtlLeaveCriticalSection 11178->11181 11180 40da0a 11180->11154 11181->11180 11183 404c49 __lseeki64 11182->11183 11184 404c92 11183->11184 11185 404c5d _memset 11183->11185 11186 404c87 __lseeki64 11183->11186 11187 408915 __lock_file 68 API calls 11184->11187 11189 408302 __fileno 67 API calls 11185->11189 11186->10605 11188 404c9a 11187->11188 11195 404a33 11188->11195 11190 404c77 11189->11190 11192 408818 __fileno 6 API calls 11190->11192 11192->11186 11199 404a51 _memset 11195->11199 11202 404a6f 11195->11202 11196 404a5a 11197 408302 __fileno 67 API calls 11196->11197 11198 404a5f 11197->11198 11200 408818 __fileno 6 API calls 11198->11200 11199->11196 11199->11202 11208 404aae 11199->11208 11200->11202 11211 404cc9 11202->11211 11203 404bf8 _memset 11207 408302 __fileno 67 API calls 11203->11207 11204 404bcc _memset 11209 408302 __fileno 67 API calls 11204->11209 11205 4084eb __fileno 67 API calls 11205->11208 11207->11198 11208->11202 11208->11203 11208->11204 11208->11205 11214 408f47 11208->11214 11234 409731 11208->11234 11243 409634 11208->11243 11209->11198 11212 408988 _fseek 2 API calls 11211->11212 11213 404cd1 11212->11213 11213->11186 11215 408f57 11214->11215 11219 408f74 11214->11219 11216 408302 __fileno 67 API calls 11215->11216 11217 408f5c 11216->11217 11218 408818 __fileno 6 API calls 11217->11218 11228 408f6c 11218->11228 11220 408fa9 11219->11220 11219->11228 11273 40fb53 11219->11273 11222 4084eb __fileno 67 API calls 11220->11222 11223 408fbd 11222->11223 11224 409634 __read 79 API calls 11223->11224 11225 408fc4 11224->11225 11226 4084eb __fileno 67 API calls 11225->11226 11225->11228 11227 408fe7 11226->11227 11227->11228 11229 4084eb __fileno 67 API calls 11227->11229 11228->11208 11230 408ff3 11229->11230 11230->11228 11231 4084eb __fileno 67 API calls 11230->11231 11232 408fff 11231->11232 11233 4084eb __fileno 67 API calls 11232->11233 11233->11228 11237 409745 _memset 11234->11237 11240 409741 ___crtGetEnvironmentStringsA 11234->11240 11235 40974a 11236 408302 __fileno 67 API calls 11235->11236 11242 40974f 11236->11242 11237->11235 11239 409794 11237->11239 11237->11240 11238 408818 __fileno 6 API calls 11238->11240 11239->11240 11241 408302 __fileno 67 API calls 11239->11241 11240->11208 11241->11242 11242->11238 11244 409640 __lseeki64 11243->11244 11245 409663 11244->11245 11246 409648 11244->11246 11247 409671 11245->11247 11252 4096b2 11245->11252 11248 408315 __lseeki64 67 API calls 11246->11248 11249 408315 __lseeki64 67 API calls 11247->11249 11250 40964d 11248->11250 11251 409676 11249->11251 11253 408302 __fileno 67 API calls 11250->11253 11254 408302 __fileno 67 API calls 11251->11254 11255 4096d3 11252->11255 11256 4096bf 11252->11256 11260 409655 __lseeki64 11253->11260 11262 40967d 11254->11262 11257 40eafc ___lock_fhandle 68 API calls 11255->11257 11258 408315 __lseeki64 67 API calls 11256->11258 11261 4096d9 11257->11261 11259 4096c4 11258->11259 11263 408302 __fileno 67 API calls 11259->11263 11260->11208 11264 4096e6 11261->11264 11265 4096fc 11261->11265 11266 408818 __fileno 6 API calls 11262->11266 11263->11262 11276 409072 11264->11276 11268 408302 __fileno 67 API calls 11265->11268 11266->11260 11270 409701 11268->11270 11269 4096f4 11345 409727 11269->11345 11271 408315 __lseeki64 67 API calls 11270->11271 11271->11269 11274 40e636 __malloc_crt 67 API calls 11273->11274 11275 40fb68 11274->11275 11275->11220 11277 4090a9 11276->11277 11278 40908e 11276->11278 11280 4090b8 11277->11280 11282 4090df 11277->11282 11279 408315 __lseeki64 67 API calls 11278->11279 11281 409093 11279->11281 11283 408315 __lseeki64 67 API calls 11280->11283 11284 408302 __fileno 67 API calls 11281->11284 11286 4090fe 11282->11286 11298 409112 11282->11298 11285 4090bd 11283->11285 11299 40909b 11284->11299 11289 408302 __fileno 67 API calls 11285->11289 11287 408315 __lseeki64 67 API calls 11286->11287 11290 409103 11287->11290 11288 40916a 11292 408315 __lseeki64 67 API calls 11288->11292 11291 4090c4 11289->11291 11294 408302 __fileno 67 API calls 11290->11294 11295 408818 __fileno 6 API calls 11291->11295 11293 40916f 11292->11293 11296 408302 __fileno 67 API calls 11293->11296 11297 40910a 11294->11297 11295->11299 11296->11297 11301 408818 __fileno 6 API calls 11297->11301 11298->11288 11298->11299 11300 409146 11298->11300 11303 40918b 11298->11303 11299->11269 11300->11288 11302 409151 ReadFile 11300->11302 11301->11299 11307 4095f8 GetLastError 11302->11307 11308 40927d 11302->11308 11305 40e636 __malloc_crt 67 API calls 11303->11305 11306 4091a1 11305->11306 11311 4091c7 11306->11311 11312 4091a9 11306->11312 11309 409605 11307->11309 11310 40947e 11307->11310 11308->11307 11313 409291 11308->11313 11315 408302 __fileno 67 API calls 11309->11315 11320 408328 __dosmaperr 67 API calls 11310->11320 11342 409403 11310->11342 11314 40fb9c __lseeki64_nolock 69 API calls 11311->11314 11316 408302 __fileno 67 API calls 11312->11316 11326 4092ad 11313->11326 11330 4094c3 11313->11330 11313->11342 11317 4091d3 11314->11317 11318 40960a 11315->11318 11319 4091ae 11316->11319 11317->11302 11321 408315 __lseeki64 67 API calls 11318->11321 11322 408315 __lseeki64 67 API calls 11319->11322 11320->11342 11321->11342 11322->11299 11323 4049a5 __crtLCMapStringA_stat 67 API calls 11323->11299 11324 40953b ReadFile 11328 40955a GetLastError 11324->11328 11336 409564 11324->11336 11325 409313 ReadFile 11327 409331 GetLastError 11325->11327 11335 40933b 11325->11335 11326->11325 11332 409390 11326->11332 11327->11326 11327->11335 11328->11330 11328->11336 11329 409454 MultiByteToWideChar 11331 409478 GetLastError 11329->11331 11329->11342 11330->11324 11330->11342 11331->11310 11333 40940b 11332->11333 11334 4093fe 11332->11334 11339 4093c8 11332->11339 11332->11342 11338 409442 11333->11338 11333->11339 11337 408302 __fileno 67 API calls 11334->11337 11335->11326 11340 40fb9c __lseeki64_nolock 69 API calls 11335->11340 11336->11330 11341 40fb9c __lseeki64_nolock 69 API calls 11336->11341 11337->11342 11343 40fb9c __lseeki64_nolock 69 API calls 11338->11343 11339->11329 11340->11335 11341->11336 11342->11299 11342->11323 11344 409451 11343->11344 11344->11329 11348 40eb9c RtlLeaveCriticalSection 11345->11348 11347 40972f 11347->11260 11348->11347 11350 4047b4 11349->11350 11351 404798 11349->11351 11353 4047ad 11350->11353 11355 40854e __flush 101 API calls 11350->11355 11352 408302 __fileno 67 API calls 11351->11352 11354 40479d 11352->11354 11365 40486f 11353->11365 11356 408818 __fileno 6 API calls 11354->11356 11357 4047c0 11355->11357 11356->11353 11368 40851d 11357->11368 11360 4084eb __fileno 67 API calls 11361 4047ce 11360->11361 11372 40841e 11361->11372 11363 4047d4 11363->11353 11364 4049a5 __crtLCMapStringA_stat 67 API calls 11363->11364 11364->11353 11366 408988 _fseek 2 API calls 11365->11366 11367 404875 11366->11367 11367->10616 11369 4047c8 11368->11369 11370 40852d 11368->11370 11369->11360 11370->11369 11371 4049a5 __crtLCMapStringA_stat 67 API calls 11370->11371 11371->11369 11373 40842a __lseeki64 11372->11373 11374 408432 11373->11374 11375 40844d 11373->11375 11377 408315 __lseeki64 67 API calls 11374->11377 11376 40845b 11375->11376 11382 40849c 11375->11382 11379 408315 __lseeki64 67 API calls 11376->11379 11378 408437 11377->11378 11380 408302 __fileno 67 API calls 11378->11380 11381 408460 11379->11381 11392 40843f __lseeki64 11380->11392 11383 408302 __fileno 67 API calls 11381->11383 11384 40eafc ___lock_fhandle 68 API calls 11382->11384 11386 408467 11383->11386 11385 4084a2 11384->11385 11387 4084bd 11385->11387 11388 4084af 11385->11388 11389 408818 __fileno 6 API calls 11386->11389 11391 408302 __fileno 67 API calls 11387->11391 11390 408382 __close_nolock 70 API calls 11388->11390 11389->11392 11393 4084b7 11390->11393 11391->11393 11392->11363 11395 4084e1 11393->11395 11398 40eb9c RtlLeaveCriticalSection 11395->11398 11397 4084e9 11397->11392 11398->11397 11448 405e10 11399->11448 11403 405d57 __lseeki64 11402->11403 11404 405d82 __stbuf 11403->11404 11405 405d65 11403->11405 11408 408956 _printf 68 API calls 11404->11408 11406 408302 __fileno 67 API calls 11405->11406 11407 405d6a 11406->11407 11409 408818 __fileno 6 API calls 11407->11409 11410 405d94 __stbuf 11408->11410 11411 405d7a __lseeki64 11409->11411 11548 40d7eb 11410->11548 11411->10628 11413 405da6 __stbuf 11414 40a387 __output_l 103 API calls 11413->11414 11415 405dbe __stbuf 11414->11415 11555 40d887 11415->11555 11420 405d4b _printf 105 API calls 11419->11420 11421 40210a 11420->11421 11422 40216e 11421->11422 11423 4021be 11421->11423 11431 405d4b _printf 105 API calls 11421->11431 11432 402153 11421->11432 11433 4021d9 11421->11433 11434 402189 11421->11434 11436 4021a3 11421->11436 11437 402138 11421->11437 11428 405d4b _printf 105 API calls 11422->11428 11427 405d4b _printf 105 API calls 11423->11427 11424 405d4b _printf 105 API calls 11424->11423 11425 405d4b _printf 105 API calls 11425->11432 11426 405d4b _printf 105 API calls 11426->11422 11427->11433 11428->11434 11429 405d4b _printf 105 API calls 11435 4021f8 11429->11435 11430 405d4b _printf 105 API calls 11430->11436 11431->11437 11432->11426 11433->11429 11433->11435 11434->11430 11436->11424 11437->11425 11439 406027 __lseeki64 11438->11439 11440 4073be __lock 67 API calls 11439->11440 11447 406033 11440->11447 11441 40609c 11563 4060b1 11441->11563 11443 406071 RtlDeleteCriticalSection 11446 4049a5 __crtLCMapStringA_stat 67 API calls 11443->11446 11444 4060a8 __lseeki64 11444->10642 11445 4047fb __fcloseall 106 API calls 11445->11447 11446->11447 11447->11441 11447->11443 11447->11445 11449 405e20 11448->11449 11450 405e3d 11448->11450 11451 408302 __fileno 67 API calls 11449->11451 11450->11449 11452 405e44 11450->11452 11453 405e25 11451->11453 11459 40a387 11452->11459 11455 408818 __fileno 6 API calls 11453->11455 11457 405e35 11455->11457 11457->10620 11460 4060ba _LocaleUpdate::_LocaleUpdate 77 API calls 11459->11460 11461 40a3ee 11460->11461 11462 40a3f2 11461->11462 11465 4084eb __fileno 67 API calls 11461->11465 11477 40a433 __output_l __aulldvrm _strlen 11461->11477 11463 408302 __fileno 67 API calls 11462->11463 11464 40a3f7 11463->11464 11466 408818 __fileno 6 API calls 11464->11466 11465->11477 11467 40a409 11466->11467 11468 404fc8 __except_handler4 5 API calls 11467->11468 11469 405e6b 11468->11469 11469->11457 11479 409a14 11469->11479 11471 40af1f 101 API calls _write_multi_char 11471->11477 11472 4049a5 __crtLCMapStringA_stat 67 API calls 11472->11477 11473 40af78 101 API calls _write_string 11473->11477 11474 406d20 6 API calls __decode_pointer 11474->11477 11475 4102b7 79 API calls __cftof 11475->11477 11476 40e636 __malloc_crt 67 API calls 11476->11477 11477->11462 11477->11467 11477->11471 11477->11472 11477->11473 11477->11474 11477->11475 11477->11476 11478 40af52 101 API calls _write_multi_char 11477->11478 11500 4100d5 11477->11500 11478->11477 11480 4084eb __fileno 67 API calls 11479->11480 11481 409a24 11480->11481 11482 409a46 11481->11482 11483 409a2f 11481->11483 11485 409a4a 11482->11485 11492 409a57 __stbuf 11482->11492 11484 408302 __fileno 67 API calls 11483->11484 11495 409a34 11484->11495 11486 408302 __fileno 67 API calls 11485->11486 11486->11495 11487 409ab8 11488 409b47 11487->11488 11489 409ac7 11487->11489 11490 40a2ab __locking 101 API calls 11488->11490 11491 409ade 11489->11491 11496 409afb 11489->11496 11490->11495 11493 40a2ab __locking 101 API calls 11491->11493 11492->11487 11492->11495 11497 409aad 11492->11497 11503 40fe7b 11492->11503 11493->11495 11495->11457 11496->11495 11512 40fc21 11496->11512 11497->11487 11499 40fb53 __getbuf 67 API calls 11497->11499 11499->11487 11501 4060ba _LocaleUpdate::_LocaleUpdate 77 API calls 11500->11501 11502 4100e8 11501->11502 11502->11477 11504 40fe97 11503->11504 11505 40fe88 11503->11505 11508 408302 __fileno 67 API calls 11504->11508 11511 40febb 11504->11511 11506 408302 __fileno 67 API calls 11505->11506 11507 40fe8d 11506->11507 11507->11497 11509 40feab 11508->11509 11510 408818 __fileno 6 API calls 11509->11510 11510->11511 11511->11497 11513 40fc2d __lseeki64 11512->11513 11514 40fc5a 11513->11514 11515 40fc3e 11513->11515 11517 40fc68 11514->11517 11519 40fc89 11514->11519 11516 408315 __lseeki64 67 API calls 11515->11516 11518 40fc43 11516->11518 11520 408315 __lseeki64 67 API calls 11517->11520 11523 408302 __fileno 67 API calls 11518->11523 11521 40fca9 11519->11521 11522 40fccf 11519->11522 11524 40fc6d 11520->11524 11526 408315 __lseeki64 67 API calls 11521->11526 11527 40eafc ___lock_fhandle 68 API calls 11522->11527 11538 40fc4b __lseeki64 11523->11538 11525 408302 __fileno 67 API calls 11524->11525 11528 40fc74 11525->11528 11529 40fcae 11526->11529 11530 40fcd5 11527->11530 11531 408818 __fileno 6 API calls 11528->11531 11532 408302 __fileno 67 API calls 11529->11532 11533 40fce2 11530->11533 11534 40fcfe 11530->11534 11531->11538 11537 40fcb5 11532->11537 11535 40fb9c __lseeki64_nolock 69 API calls 11533->11535 11536 408302 __fileno 67 API calls 11534->11536 11539 40fcf3 11535->11539 11540 40fd03 11536->11540 11541 408818 __fileno 6 API calls 11537->11541 11538->11495 11544 40fd30 11539->11544 11542 408315 __lseeki64 67 API calls 11540->11542 11541->11538 11542->11539 11547 40eb9c RtlLeaveCriticalSection 11544->11547 11546 40fd38 11546->11538 11547->11546 11549 4084eb __fileno 67 API calls 11548->11549 11550 40d7fa 11549->11550 11551 40fe7b __stbuf 67 API calls 11550->11551 11553 40d800 __stbuf 11551->11553 11552 40d84d 11552->11413 11553->11552 11554 40e636 __malloc_crt 67 API calls 11553->11554 11554->11552 11556 40d892 11555->11556 11557 405dcf 11555->11557 11556->11557 11558 40854e __flush 101 API calls 11556->11558 11559 405de7 11557->11559 11558->11557 11560 405dec __stbuf 11559->11560 11561 4089c4 __getstream 2 API calls 11560->11561 11562 405df7 11561->11562 11562->11411 11566 4072e4 RtlLeaveCriticalSection 11563->11566 11565 4060b8 11565->11444 11566->11565 11580 401170 11567->11580 11569 4012fe MessageBoxA 11569->10528 11582 405363 11570->11582 11610 4053eb 11573->11610 11577 404fc8 __except_handler4 5 API calls 11579 4013fc 11577->11579 11578 4013f1 11578->11577 11579->10536 11581 401179 11580->11581 11581->11569 11583 405370 11582->11583 11584 40538d 11582->11584 11585 408302 __fileno 67 API calls 11583->11585 11586 40539a 11584->11586 11588 4053a7 11584->11588 11587 405375 11585->11587 11589 408302 __fileno 67 API calls 11586->11589 11590 408818 __fileno 6 API calls 11587->11590 11597 405297 11588->11597 11596 40539f 11589->11596 11594 401485 11590->11594 11593 408818 __fileno 6 API calls 11593->11594 11594->10542 11595 408302 __fileno 67 API calls 11595->11596 11596->11593 11598 4052c7 11597->11598 11599 4052a7 11597->11599 11601 4052d7 11598->11601 11607 4052f4 11598->11607 11600 408302 __fileno 67 API calls 11599->11600 11602 4052ac 11600->11602 11603 408302 __fileno 67 API calls 11601->11603 11604 408818 __fileno 6 API calls 11602->11604 11605 4052dc 11603->11605 11608 4052bc 11604->11608 11606 408818 __fileno 6 API calls 11605->11606 11606->11608 11607->11608 11609 409a14 __flsbuf 101 API calls 11607->11609 11608->11594 11608->11595 11609->11608 11611 405363 __vsprintf_s_l 101 API calls 11610->11611 11612 4013d1 11611->11612 11612->11578 11613 401311 11612->11613 11616 401321 _strlen 11613->11616 11614 4013a1 11614->11578 11615 401346 11623 404952 11615->11623 11616->11614 11616->11615 11617 4051bb _strcpy_s 67 API calls 11616->11617 11617->11615 11619 401372 _strlen 11619->11614 11633 405139 11619->11633 11621 401399 11622 4047fb __fcloseall 106 API calls 11621->11622 11622->11614 11624 404962 11623->11624 11625 40497d 11623->11625 11627 408302 __fileno 67 API calls 11624->11627 11626 404877 __fsopen 161 API calls 11625->11626 11628 40498d 11626->11628 11629 404967 11627->11629 11630 404976 11628->11630 11632 408302 __fileno 67 API calls 11628->11632 11631 408818 __fileno 6 API calls 11629->11631 11630->11619 11631->11630 11632->11630 11634 405145 __lseeki64 11633->11634 11635 40517d 11634->11635 11636 40515d 11634->11636 11638 405172 __lseeki64 11634->11638 11639 408915 __lock_file 68 API calls 11635->11639 11637 408302 __fileno 67 API calls 11636->11637 11640 405162 11637->11640 11638->11621 11641 405185 11639->11641 11642 408818 __fileno 6 API calls 11640->11642 11644 4051b1 11641->11644 11642->11638 11645 408988 _fseek 2 API calls 11644->11645 11646 4051b9 11645->11646 11646->11638 11648 4046ba _malloc 67 API calls 11647->11648 11649 401a60 11648->11649 11681 402b50 11649->11681 11651 401a69 _strcat _strncat 11658 401a70 11651->11658 11709 402560 11651->11709 11652 404fc8 __except_handler4 5 API calls 11653 401b06 11652->11653 11653->10552 11658->11652 11661 40493b 161 API calls 11660->11661 11662 4016dd 11661->11662 11663 401711 CopyFileA 11662->11663 11664 4047fb __fcloseall 106 API calls 11662->11664 11665 40172a 11663->11665 11666 4016e9 11664->11666 11886 4015d8 GetModuleHandleA GetProcAddress 11665->11886 11881 40154e 11666->11881 11670 401733 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 11680 40178c 11682 402650 166 API calls 11681->11682 11685 402b5e 11682->11685 11683 402c3b 11683->11651 11684 40493b 161 API calls 11684->11685 11685->11683 11685->11684 11686 402b99 11685->11686 11687 402b8b Sleep 11685->11687 11689 402b97 11685->11689 11690 4022b0 111 API calls 11686->11690 11687->11685 11687->11689 11688 405f32 _fseek 105 API calls 11691 402bb0 11688->11691 11689->11688 11690->11689 11716 4038c0 11691->11716 11710 402580 11709->11710 11711 40256b 11709->11711 11821 4023b0 11710->11821 11799 402450 11711->11799 11717 404cd3 __fread_nolock 81 API calls 11716->11717 11718 4038dc 11717->11718 11719 4038f2 11718->11719 11720 4022b0 111 API calls 11718->11720 11751 40639b 11719->11751 11720->11719 11752 4063b4 11751->11752 11755 406141 11752->11755 11756 4060ba _LocaleUpdate::_LocaleUpdate 77 API calls 11755->11756 11759 406156 11756->11759 11757 406168 11758 408302 __fileno 67 API calls 11757->11758 11759->11757 11763 4061a5 11759->11763 11800 40493b 161 API calls 11799->11800 11802 40247e 11800->11802 11801 402490 11804 40493b 161 API calls 11801->11804 11802->11801 11803 4022b0 111 API calls 11802->11803 11803->11801 11805 40249e 11804->11805 11806 4024b8 11805->11806 11807 4047fb __fcloseall 106 API calls 11805->11807 11809 405f32 _fseek 105 API calls 11806->11809 11811 402512 11806->11811 11808 4024af 11807->11808 11810 4022b0 111 API calls 11808->11810 11815 4024cd 11809->11815 11810->11806 11812 4047fb __fcloseall 106 API calls 11811->11812 11814 40252d 11812->11814 11813 404cd3 __fread_nolock 81 API calls 11813->11815 11815->11811 11815->11813 11817 405139 69 API calls 11815->11817 11817->11815 11822 40493b 161 API calls 11821->11822 11823 4023c0 11822->11823 11824 4023d2 11823->11824 11825 4022b0 111 API calls 11823->11825 11826 405f32 _fseek 105 API calls 11824->11826 11825->11824 11827 4023e1 11826->11827 11828 402426 11827->11828 11829 4023ea 11827->11829 11841 403760 11828->11841 11831 4046ba _malloc 67 API calls 11829->11831 11833 4023f3 11831->11833 11844 403490 11841->11844 11845 4034b5 11844->11845 11846 4034ad 11844->11846 11882 401566 11881->11882 11883 4046ba _malloc 67 API calls 11882->11883 11887 40160b 11886->11887 11888 4015fe GetCurrentProcess 11886->11888 11887->11670 11887->11680 11888->11887 11942 404414 11894->11942 11896 401a2d 11902 4031c0 11896->11902 11897 4098bc 102 API calls 11901 4018e2 _strcat _strrchr 11897->11901 11898 404414 67 API calls _strtok 11898->11901 11899 414101 102 API calls __strlwr 11899->11901 11900 4013fe 163 API calls 11900->11901 11901->11896 11901->11897 11901->11898 11901->11899 11901->11900 11903 4046ba _malloc 67 API calls 11902->11903 11904 403200 11903->11904 11947 4026f0 GetDiskFreeSpaceExA 11904->11947 11907 403213 11909 404fc8 __except_handler4 5 API calls 11907->11909 11908 40322f 11911 402b50 168 API calls 11908->11911 11912 401d0b 11909->11912 11913 403239 11911->11913 11912->10565 11912->10570 11914 4046ba _malloc 67 API calls 11913->11914 11929 403247 11914->11929 11915 403390 11916 4033a0 11915->11916 11960 402a10 11915->11960 11916->11907 11986 402740 GetModuleFileNameA 11916->11986 11917 403310 11917->11915 11921 40334a CopyFileA 11917->11921 11921->11907 11921->11915 11927 4046ba _malloc 67 API calls 11927->11929 11929->11917 11929->11927 11933 402560 165 API calls 11929->11933 11933->11929 11943 406f6c __getptd 67 API calls 11942->11943 11944 404437 11943->11944 11945 404fc8 __except_handler4 5 API calls 11944->11945 11946 4044d3 11945->11946 11946->11901 11948 402722 11947->11948 11948->11907 11948->11908 11949 402870 11948->11949 12028 405740 11949->12028 11951 4028c4 11951->11951 11952 402909 FindFirstFileA 11951->11952 11953 4029d7 FindClose 11952->11953 11961 402a38 11960->11961 11961->11961 12029 405750 12028->12029 12030 40576d 12028->12030 12032 408302 __fileno 67 API calls 12029->12032 12030->12029 12031 405774 12030->12031 12033 40a387 __output_l 103 API calls 12031->12033 12034 405755 12032->12034 12035 40579a 12033->12035 12036 408818 __fileno 6 API calls 12034->12036 12037 405765 12035->12037 12038 409a14 __flsbuf 101 API calls 12035->12038 12036->12037 12037->11951 12038->12037 12269 405588 __lseeki64 12268->12269 12270 4073be __lock 67 API calls 12269->12270 12271 40558f 12270->12271 12272 405658 __initterm 12271->12272 12273 4055bb 12271->12273 12287 405693 12272->12287 12275 406d20 __decode_pointer 6 API calls 12273->12275 12277 4055c6 12275->12277 12279 405648 __initterm 12277->12279 12281 406d20 __decode_pointer 6 API calls 12277->12281 12278 405690 __lseeki64 12278->9570 12279->12272 12286 4055db 12281->12286 12282 405687 12283 40548c _malloc 3 API calls 12282->12283 12283->12278 12284 406d17 6 API calls _doexit 12284->12286 12285 406d20 6 API calls __decode_pointer 12285->12286 12286->12279 12286->12284 12286->12285 12288 405674 12287->12288 12289 405699 12287->12289 12288->12278 12291 4072e4 RtlLeaveCriticalSection 12288->12291 12292 4072e4 RtlLeaveCriticalSection 12289->12292 12291->12282 12292->12288 12301 401834 12302 4018b8 PostQuitMessage 12301->12302 12303 40184f 12301->12303 12307 4018c0 12302->12307 12304 401854 12303->12304 12305 40186d BeginPaint GetClientRect 12303->12305 12304->12307 12308 40185b NtdllDefWindowProc_A 12304->12308 12312 4045e0 12305->12312 12310 404fc8 __except_handler4 5 API calls 12307->12310 12308->12307 12311 4018cd 12310->12311 12313 40189f DrawTextA EndPaint 12312->12313 12313->12307 12565 4088f5 12572 4086d8 12565->12572 12568 408908 12570 4049a5 __crtLCMapStringA_stat 67 API calls 12568->12570 12569 40601b __fcloseall 107 API calls 12569->12568 12571 408913 12570->12571 12575 4085fe 12572->12575 12574 4086df 12574->12568 12574->12569 12576 40860a __lseeki64 12575->12576 12577 4073be __lock 67 API calls 12576->12577 12583 408619 12577->12583 12578 4086b1 12588 4086cf 12578->12588 12580 408956 _printf 68 API calls 12580->12583 12581 4086bd __lseeki64 12581->12574 12583->12578 12583->12580 12584 4085b6 105 API calls __fflush_nolock 12583->12584 12585 4086a0 12583->12585 12584->12583 12586 4089c4 __getstream 2 API calls 12585->12586 12587 4086ae 12586->12587 12587->12583 12591 4072e4 RtlLeaveCriticalSection 12588->12591 12590 4086d6 12590->12581 12591->12590

    Control-flow Graph

    APIs
    • _malloc.LIBCMT ref: 00401E7A
      • Part of subcall function 004046BA: __FF_MSGBANNER.LIBCMT ref: 004046DD
      • Part of subcall function 004046BA: __NMSG_WRITE.LIBCMT ref: 004046E4
      • Part of subcall function 004046BA: RtlAllocateHeap.NTDLL(00000000,?,00000001), ref: 00404731
    • CreateMutexA.KERNELBASE(00000000,00000000,00000318), ref: 00401E8C
    • GetLastError.KERNEL32 ref: 00401E92
    • _strlen.LIBCMT ref: 00401ECD
    • _strlen.LIBCMT ref: 00401EDD
    • _strlen.LIBCMT ref: 00401F16
    • _strlen.LIBCMT ref: 00401F26
    • _strlen.LIBCMT ref: 00401F66
    • _strlen.LIBCMT ref: 00401F76
    • _strlen.LIBCMT ref: 00401FB6
    • _strlen.LIBCMT ref: 00401FC6
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00402011
    • GetTempPathA.KERNEL32(00000104,?), ref: 00402031
    • GetTempFileNameA.KERNEL32(?,FLU,00000000,?), ref: 00402046
    • DeleteFileA.KERNEL32(?), ref: 00402053
    • _strlen.LIBCMT ref: 00402067
    • CreateDirectoryA.KERNEL32(?,00000000), ref: 00402099
      • Part of subcall function 004013FE: swprintf.LIBCMT ref: 00401480
      • Part of subcall function 00401CDF: MessageBoxA.USER32(00000000,00000000,00000000), ref: 00401D38
    • _strncmp.LIBCMT ref: 00402075
      • Part of subcall function 004049A5: __lock.LIBCMT ref: 004049C3
      • Part of subcall function 004049A5: ___sbh_find_block.LIBCMT ref: 004049CE
      • Part of subcall function 004049A5: ___sbh_free_block.LIBCMT ref: 004049DD
      • Part of subcall function 004049A5: HeapFree.KERNEL32(00000000,?,004177D0,0000000C,0040739F,00000000,00417948,0000000C,004073D9,?,?,?,00411421,00000004,00417C38,0000000C), ref: 00404A0D
      • Part of subcall function 004049A5: GetLastError.KERNEL32(?,00411421,00000004,00417C38,0000000C,0040E691,?,?,00000000,00000000,00000000,?,00406F1E,00000001,00000214), ref: 00404A1E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _strlen$File$CreateErrorHeapLastNameTemp$AllocateDeleteDirectoryFreeMessageModuleMutexPath___sbh_find_block___sbh_free_block__lock_malloc_strncmpswprintf
    • String ID: -cmsg$-cmsg $-coh$-coh $-o $-s $FLU$Local\FUMutexName
    • API String ID: 2080818568-112401573
    • Opcode ID: 8565448094c9fabb384253f26313dc656fce7faebb17f7b735fd9eba31cd3180
    • Instruction ID: f13b9500db5cf2fdbfef360ed6f043dedbddf05904c77ae10fa87ade50a28a67
    • Opcode Fuzzy Hash: 8565448094c9fabb384253f26313dc656fce7faebb17f7b735fd9eba31cd3180
    • Instruction Fuzzy Hash: DA718572904205AFEB24BBB1DC45EEE3B68AB85708F10003FF604B71D2EB399540CB58

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 154 401834-40184d 155 4018b8-4018ba PostQuitMessage 154->155 156 40184f-401852 154->156 157 4018c0 155->157 158 401854-401859 156->158 159 40186d-4018b6 BeginPaint GetClientRect call 4045e0 DrawTextA EndPaint 156->159 161 4018c2-4018ce call 404fc8 157->161 158->157 162 40185b-40186b NtdllDefWindowProc_A 158->162 159->157 162->161
    APIs
    • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 00401865
    • BeginPaint.USER32(?,?), ref: 00401874
    • GetClientRect.USER32(?,?), ref: 00401881
    • _strlen.LIBCMT ref: 0040189A
    • DrawTextA.USER32(00000000,Please wait...,00000000,?,00000001), ref: 004018A3
    • EndPaint.USER32(?,?), ref: 004018AE
    • PostQuitMessage.USER32(00000000), ref: 004018BA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: Paint$BeginClientDrawMessageNtdllPostProc_QuitRectTextWindow_strlen
    • String ID: *$Please wait...
    • API String ID: 3585501550-310496419
    • Opcode ID: 0b9f259886c2e8d8265fc05c1827541f8b14f46f23242a06cbee0394f8c172e5
    • Instruction ID: 4dd80ec288db4b62e7ff0d84e0455e0fcd25cdf9ab30a6d22abe7f1842d97108
    • Opcode Fuzzy Hash: 0b9f259886c2e8d8265fc05c1827541f8b14f46f23242a06cbee0394f8c172e5
    • Instruction Fuzzy Hash: 33112B72500108FBD701ABA8DD49EFE77BCEB49304B508136F502E61A0D7789A059B69

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 267 4376d0-4376dd 268 4376ea-4376ef 267->268 269 4376f1 268->269 270 4376f3 269->270 271 4376e0-4376e5 269->271 273 4376f8-4376fa 270->273 272 4376e6-4376e8 271->272 272->268 272->269 274 437703-437707 273->274 275 4376fc-437701 273->275 274->273 276 437709 274->276 275->274 277 437714-437719 276->277 278 43770b-437712 276->278 279 43771b-437724 277->279 280 437728-43772a 277->280 278->273 278->277 281 437726 279->281 282 43779a-43779d 279->282 283 437733-437737 280->283 284 43772c-437731 280->284 281->280 287 4377a2-4377a5 282->287 285 437740-437742 283->285 286 437739-43773e 283->286 284->283 289 437764-437773 285->289 290 437744 285->290 286->285 288 4377a7-4377a9 287->288 288->287 291 4377ab-4377ae 288->291 293 437775-43777c 289->293 294 437784-437791 289->294 292 437745-437747 290->292 291->287 295 4377b0-4377cc 291->295 296 437750-437754 292->296 297 437749-43774e 292->297 293->293 298 43777e 293->298 294->294 299 437793-437795 294->299 295->288 300 4377ce 295->300 296->292 301 437756 296->301 297->296 298->272 299->272 302 4377d4-4377d8 300->302 303 437761 301->303 304 437758-43775f 301->304 305 437816-437846 VirtualProtect * 2 302->305 306 4377da-4377f0 LoadLibraryA 302->306 303->289 304->292 304->303 308 43784a-43784e 305->308 307 4377f1-4377f6 306->307 307->302 309 4377f8-437807 GetProcAddress 307->309 308->308 310 437850 308->310 311 437810 ExitProcess 309->311 312 437809-43780e 309->312 312->307
    Memory Dump Source
    • Source File: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 71ae8178db3a66adb13442b4a249dddd31793b7a2b77b7130bd57b40c639ccc2
    • Instruction ID: 55d6107a75208e6dedf5cbf38e280ece3e4ffeb315001ed265430692a0fad248
    • Opcode Fuzzy Hash: 71ae8178db3a66adb13442b4a249dddd31793b7a2b77b7130bd57b40c639ccc2
    • Instruction Fuzzy Hash: 015128F16487520BD7315E78CDD06A5BB94EB1A334F28177AC9E1873C5E79C2806C7A8

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __amsg_exit$_fast_error_exit$CommandEnvironmentInitializeLineStrings___crt__cinit__ioinit__mtinit__setargv__setenvp__wincmdln
    • String ID:
    • API String ID: 3545360858-0
    • Opcode ID: f55ea4e93cdfae3b47f987d4bf8d73404d29df4f07ec6ee2fa2f3088e080a7b9
    • Instruction ID: 7f9845ccf83d47d0208cfa3dd8e882dda803d7003e942a83c03e6db5ba0379fd
    • Opcode Fuzzy Hash: f55ea4e93cdfae3b47f987d4bf8d73404d29df4f07ec6ee2fa2f3088e080a7b9
    • Instruction Fuzzy Hash: 42215370D49B049AFB147BB2A946B6F6664EF0071DF10483FF405BA1C2EABC88859E5D

    Control-flow Graph

    APIs
    • KiUserCallbackDispatcher.NTDLL(00000000), ref: 004017B8
    • GetSystemMetrics.USER32(00000001), ref: 004017BE
    • CreateWindowExA.USER32(00000000,Window,Nuvoton Flash Update Tool,80880000,-00000069,-0000009B,000000D2,0000006E,00000000,00000000,?,00000000), ref: 00401803
    • ShowWindow.USER32(00000000,?), ref: 0040181B
    • KiUserCallbackDispatcher.NTDLL ref: 00401827
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: CallbackDispatcherUserWindow$CreateMetricsShowSystem
    • String ID: Nuvoton Flash Update Tool$Window
    • API String ID: 2363862556-599115452
    • Opcode ID: be37ca720a6fec147d08e4b9a590f6ce7b7f8294bf0507c6bd921885c9de1557
    • Instruction ID: 1cf8fc465e946f803013fd292a57106d4a460a93c848c879d3f3f7887aa7ce13
    • Opcode Fuzzy Hash: be37ca720a6fec147d08e4b9a590f6ce7b7f8294bf0507c6bd921885c9de1557
    • Instruction Fuzzy Hash: 5501F972750711BFD7125FB4AC4CFAB3EADE7C8711F14483AF500E6191D6A4A441CB28

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 172 404a33-404a4f 173 404a51-404a54 172->173 174 404a72 172->174 173->174 175 404a56-404a58 173->175 176 404a74-404a78 174->176 177 404a79-404a7e 175->177 178 404a5a-404a69 call 408302 175->178 180 404a80-404a8b 177->180 181 404a8d-404a90 177->181 190 404a6a-404a6f call 408818 178->190 180->181 183 404aae-404ac1 180->183 184 404a92-404a9a call 405a60 181->184 185 404a9d-404a9f 181->185 188 404ac3-404ac9 183->188 189 404acb 183->189 184->185 185->178 187 404aa1-404aac 185->187 187->178 187->183 192 404ad2-404ad4 188->192 189->192 190->174 194 404bc4-404bc7 192->194 195 404ada-404ae1 192->195 194->176 197 404ae3-404ae8 195->197 198 404b27-404b2a 195->198 197->198 201 404aea 197->201 199 404b94-404b95 call 408f47 198->199 200 404b2c-404b30 198->200 207 404b9a-404b9e 199->207 203 404b51-404b58 200->203 204 404b32-404b3b 200->204 205 404af0-404af4 201->205 206 404c25 201->206 211 404b5a 203->211 212 404b5c-404b5f 203->212 208 404b46-404b4b 204->208 209 404b3d-404b44 204->209 213 404af6 205->213 214 404af8-404afb 205->214 210 404c29-404c32 206->210 207->210 215 404ba4-404ba8 207->215 216 404b4d-404b4f 208->216 209->216 210->176 211->212 217 404b65-404b7b call 4084eb call 409634 212->217 218 404bf8-404bfc 212->218 213->214 219 404b01-404b22 call 409731 214->219 220 404bcc-404bd2 214->220 215->218 223 404baa-404bb9 215->223 216->212 241 404b81-404b84 217->241 242 404c37-404c3b 217->242 221 404c0e-404c20 call 408302 218->221 222 404bfe-404c0b call 405a60 218->222 231 404bbc-404bbe 219->231 224 404be3-404bf3 call 408302 220->224 225 404bd4-404be0 call 405a60 220->225 221->190 222->221 223->231 224->190 225->224 231->194 231->195 241->206 243 404b8a-404b92 241->243 242->210 243->231
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
    • String ID:
    • API String ID: 3886058894-0
    • Opcode ID: ba4df12e5b988ea9f83b8fcca753877d76c40a3aef18d5ba92c5ac3350b89337
    • Instruction ID: 6dc5c9f63e16c19c60eeb3d75317718148f919c4155afa3ce9aacf3d1c47d86c
    • Opcode Fuzzy Hash: ba4df12e5b988ea9f83b8fcca753877d76c40a3aef18d5ba92c5ac3350b89337
    • Instruction Fuzzy Hash: 5951E3B1A00204EBCB209FA98944A9FBB75EFC1320F14823BE925722D0D7789E51CF59

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 244 402650-40265f 245 402661-402674 call 40493b 244->245 248 402696-4026b5 call 405f32 call 404cd3 245->248 249 402676-402679 245->249 259 4026c4-4026e8 call 4047fb call 405ada 248->259 260 4026b7-4026c1 call 4022b0 248->260 250 402689-402693 call 4022b0 249->250 251 40267b-402685 Sleep 249->251 250->248 251->245 254 402687 251->254 254->248 260->259
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: Sleep__fread_nolock__fsopen_fseek_strncmp
    • String ID: AHXX
    • API String ID: 2366002348-1807168166
    • Opcode ID: 767e7a1a58b364449a9693a02ec593de220677a22e6f973bcf6e1155576d4aa7
    • Instruction ID: c37c82d072a685b29b90b03a1b87c44c1a0edcd69af0e97925b51c7e0d5c6eb3
    • Opcode Fuzzy Hash: 767e7a1a58b364449a9693a02ec593de220677a22e6f973bcf6e1155576d4aa7
    • Instruction Fuzzy Hash: 3F01F9F2A4471039F12075659C87F6F210C8742728F10063BF619761D2E5BA9A0141BF

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 313 404c3d-404c51 call 407eb8 316 404c53-404c56 313->316 317 404c8a 313->317 316->317 319 404c58-404c5b 316->319 318 404c8c-404c91 call 407efd 317->318 321 404c92-404cad call 408915 call 404a33 319->321 322 404c5d-404c61 319->322 334 404cb2-404cc7 call 404cc9 321->334 325 404c72-404c87 call 408302 call 408818 322->325 326 404c63-404c6f call 405a60 322->326 325->317 326->325 334->318
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __lock_file_memset
    • String ID:
    • API String ID: 26237723-0
    • Opcode ID: 92754d5ebd34ea83f09b3b840a0b11f5a31ce0a13565c81ef6a16daa5dab5496
    • Instruction ID: dce89d9f424f3ff3ecd1ad94c1a1c0aa29fddc81f75565c6e727210f33e9abde
    • Opcode Fuzzy Hash: 92754d5ebd34ea83f09b3b840a0b11f5a31ce0a13565c81ef6a16daa5dab5496
    • Instruction Fuzzy Hash: BE016DB1805209EBDF22AFA1CC0249F3A20AF40720F05817BF924262D1C7398A62DFD9

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 338 4047fb-404819 call 407eb8 341 404838-40483c 338->341 342 40481b-404836 call 408302 call 408818 338->342 344 40484a-404855 call 408915 call 404784 341->344 345 40483e 341->345 350 404844-404849 call 407efd 342->350 356 40485a-40486a call 40486f 344->356 347 404841 345->347 347->350 356->347
    APIs
      • Part of subcall function 00408302: __getptd_noexit.LIBCMT ref: 00408302
      • Part of subcall function 00408818: __decode_pointer.LIBCMT ref: 00408823
    • __lock_file.LIBCMT ref: 0040484B
      • Part of subcall function 00408915: __lock.LIBCMT ref: 0040893A
    • __fclose_nolock.LIBCMT ref: 00404855
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __decode_pointer__fclose_nolock__getptd_noexit__lock__lock_file
    • String ID:
    • API String ID: 717694121-0
    • Opcode ID: 56c03c318f0d627eace7ba44fc2451671e05ed73f1eb78214da3e554f7642d6d
    • Instruction ID: 744dffb88b720ac09e790225845c17770a4fd893448e1305e55c26c15cc3dacb
    • Opcode Fuzzy Hash: 56c03c318f0d627eace7ba44fc2451671e05ed73f1eb78214da3e554f7642d6d
    • Instruction Fuzzy Hash: 90F0C8B2C0520085C711BB2A880265E7AA49FC1334F11CA6FE574771D1CB3C59429B5E

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 359 40548c-40549d call 405461 ExitProcess
    APIs
    • ___crtCorExitProcess.LIBCMT ref: 00405494
      • Part of subcall function 00405461: GetModuleHandleW.KERNEL32(mscoree.dll,?,00405499,?,?,004046F3,000000FF,0000001E,?,0040E647,?,00000001,?,?,00407348,00000018), ref: 0040546B
      • Part of subcall function 00405461: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0040547B
    • ExitProcess.KERNEL32 ref: 0040549D
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: ExitProcess$AddressHandleModuleProc___crt
    • String ID:
    • API String ID: 2427264223-0
    • Opcode ID: 7177857381d44b339cf50db4fa47a8771b969b20e63409ebe98ec3a1f6cf0251
    • Instruction ID: 7840fc3f8f1d9011e0ad5e14e95efe73fbfe7621e5692a9ff6139c53c7f7316b
    • Opcode Fuzzy Hash: 7177857381d44b339cf50db4fa47a8771b969b20e63409ebe98ec3a1f6cf0251
    • Instruction Fuzzy Hash: 20B04831000508BBCB012B62EC0A98A3E2AEA807A1B148025B80849061DA72AA929A89

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 362 4080ac-4080ce HeapCreate 363 4080d0-4080d1 362->363 364 4080d2-4080db 362->364
    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 004080C1
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: CreateHeap
    • String ID:
    • API String ID: 10892065-0
    • Opcode ID: ae9763bd8f644d0f4786c269ee46d89e939af661feed9d8e3c2758acd7132950
    • Instruction ID: 8fa0ab9d9efd42a1935edfcd8972d2c17a5a4deb6e057b4b4df76c32ce643e84
    • Opcode Fuzzy Hash: ae9763bd8f644d0f4786c269ee46d89e939af661feed9d8e3c2758acd7132950
    • Instruction Fuzzy Hash: 41D05E726507059EDB105FB5AD097663BEC9784395F048436B80CC6190E6B4D5509A48

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 365 40493b-404951 call 404877
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __fsopen
    • String ID:
    • API String ID: 3646066109-0
    • Opcode ID: b5f1e3f8c0985568a2b975540194b91a49099896255c8aa19d8b1f82aed34cac
    • Instruction ID: f95237979f1c5846dddcd27aad135eab44c03c9d8f3c64067a621dc7d222edc2
    • Opcode Fuzzy Hash: b5f1e3f8c0985568a2b975540194b91a49099896255c8aa19d8b1f82aed34cac
    • Instruction Fuzzy Hash: E5C092B754024C77CF112A83EC02E4A3F1A9BC1764F148021FB1C291A1AA77EA61D689

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 368 4056a8-4056b4 call 40557c 370 4056b9-4056bd 368->370
    APIs
    • _doexit.LIBCMT ref: 004056B4
      • Part of subcall function 0040557C: __lock.LIBCMT ref: 0040558A
      • Part of subcall function 0040557C: __decode_pointer.LIBCMT ref: 004055C1
      • Part of subcall function 0040557C: __decode_pointer.LIBCMT ref: 004055D6
      • Part of subcall function 0040557C: __decode_pointer.LIBCMT ref: 00405600
      • Part of subcall function 0040557C: __decode_pointer.LIBCMT ref: 00405616
      • Part of subcall function 0040557C: __decode_pointer.LIBCMT ref: 00405623
      • Part of subcall function 0040557C: __initterm.LIBCMT ref: 00405652
      • Part of subcall function 0040557C: __initterm.LIBCMT ref: 00405662
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __decode_pointer$__initterm$__lock_doexit
    • String ID:
    • API String ID: 1597249276-0
    • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
    • Instruction ID: 23e37c46c76d3ea1cb9fa48a39cfe1f561427936b3cb337eab43370ee01939b4
    • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
    • Instruction Fuzzy Hash: E8B0923298060C33DA202542AC03F0A3A0A87C1B64E240021BA0C291E1A9B2A9A5888D
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __invoke_watson_strcpy_s
    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$?$T
    • API String ID: 3990783250-1230703744
    • Opcode ID: bce4f6b20b5be04094cfd0d3a90b1aed5ecc2659c89314c707dcce361637fbd5
    • Instruction ID: 1f1f38a5171cc0cfaf63f40fe0c2a03535788cb8127d452b8a2f9641d9799ed8
    • Opcode Fuzzy Hash: bce4f6b20b5be04094cfd0d3a90b1aed5ecc2659c89314c707dcce361637fbd5
    • Instruction Fuzzy Hash: D062A171E0065A8BDF14CFA8C5403EEBBB1FF54311F54816BD816AB381D7788A86CB98
    APIs
    • _sprintf.LIBCMT ref: 004028BF
    • FindFirstFileA.KERNEL32(?,?,?,00000000,?), ref: 0040292D
    • _sprintf.LIBCMT ref: 00402967
    • FindFirstFileA.KERNEL32(?,?), ref: 004029CC
    • FindClose.KERNEL32(00000000), ref: 004029D8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: Find$FileFirst_sprintf$Close
    • String ID: .exe$FUrep
    • API String ID: 1211650730-2859872544
    • Opcode ID: 6be2900ba5bc446e5326daeb18f7424a77297df40848b910a5b57b4ddc5c78b0
    • Instruction ID: a8dfba24ddf6f2ad3a1b96e0c355d722fe7b14cac474d7563ffb552bf2dff24c
    • Opcode Fuzzy Hash: 6be2900ba5bc446e5326daeb18f7424a77297df40848b910a5b57b4ddc5c78b0
    • Instruction Fuzzy Hash: A74107701087858FC725CB28D9989EBBBE5EFC9300F11862EE899D7390EB759448C799
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 004099C9
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004099DE
    • UnhandledExceptionFilter.KERNEL32(00416ACC), ref: 004099E9
    • GetCurrentProcess.KERNEL32(C0000409), ref: 00409A05
    • TerminateProcess.KERNEL32(00000000), ref: 00409A0C
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 2579439406-0
    • Opcode ID: 198bba26c7be076e61dcaef8401e461012ca6d5fd355e9cd124247f9669f3046
    • Instruction ID: 6df0053adf25e75117556794615b0754d00daf640825ebb8b0d2f504d57cb16e
    • Opcode Fuzzy Hash: 198bba26c7be076e61dcaef8401e461012ca6d5fd355e9cd124247f9669f3046
    • Instruction Fuzzy Hash: 3E21E3B9911344DFE700EFA5E984A843BF0FB48740F10A07AE90997BB0E7B459858F4D
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _memset
    • String ID:
    • API String ID: 2102423945-0
    • Opcode ID: 80527d86115d66d10184407f554bd980a89e073e06867996d96bf944e9a053de
    • Instruction ID: 2719c25028b2964a963ab2a271ffcdf57eff4c161546a46cc739ece6188be7e6
    • Opcode Fuzzy Hash: 80527d86115d66d10184407f554bd980a89e073e06867996d96bf944e9a053de
    • Instruction Fuzzy Hash: C7A104709083824FD711CE28C59026BBFE5EFD6304F144A7EE9D167382D3399A4AC79A
    APIs
    • GetDiskFreeSpaceExA.KERNEL32 ref: 0040270E
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: DiskFreeSpace
    • String ID:
    • API String ID: 1705453755-0
    • Opcode ID: 7fa45b61e74cf9f79088d2bd21c4ab5ad7d055186bfc16143c512fbb37a47155
    • Instruction ID: f330874e7cdb97657f19c3ad480c9a7c12e910a9927b2e212953bd0ede7f8aa4
    • Opcode Fuzzy Hash: 7fa45b61e74cf9f79088d2bd21c4ab5ad7d055186bfc16143c512fbb37a47155
    • Instruction Fuzzy Hash: D5E012346543015BD704EF20DE59B4B77D5AB84B41F804D38F545DB2C0E3B9990CC79A
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_0000CFE8), ref: 0040D02F
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 60b7e3fe404f69667ea992068b43ecc70ec854a88509bcf5d10e662ee912d222
    • Instruction ID: 2f52fb7ba1cb4ad789a5c1a6a3f8c844c2865c88a70f2b8e2df5dffb9245326f
    • Opcode Fuzzy Hash: 60b7e3fe404f69667ea992068b43ecc70ec854a88509bcf5d10e662ee912d222
    • Instruction Fuzzy Hash: E5900260351501C68600A7B95C5DA852991AACC7867A185716002D40D4DA644000555A
    APIs
      • Part of subcall function 00401A34: _malloc.LIBCMT ref: 00401A5B
    • _strncpy.LIBCMT ref: 00401B75
    • __fcloseall.LIBCMT ref: 00401BB0
    • __fcloseall.LIBCMT ref: 00401BC1
    • _strncat.LIBCMT ref: 00401BD0
    • _strlen.LIBCMT ref: 00401BD9
    • _strncat.LIBCMT ref: 00401BEB
    • _memset.LIBCMT ref: 00401C10
    • _memset.LIBCMT ref: 00401C1C
    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00401C43
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00415CBC,00000000,00000001), ref: 00401C4D
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00401C5D
    • GetExitCodeProcess.KERNEL32(?,?), ref: 00401C6A
    • CloseHandle.KERNEL32(?), ref: 00401C79
    • CloseHandle.KERNEL32(?), ref: 00401C7E
    • _strlen.LIBCMT ref: 00401C9E
    • _strlen.LIBCMT ref: 00401CAB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _strlen$CloseHandleProcess__fcloseall_memset_strncat$CodeCreateErrorExitLastObjectSingleWait_malloc_strncpy
    • String ID: -bec$-bec $-if $-runbsf $i2c
    • API String ID: 3324597316-406442058
    • Opcode ID: 31f4ab88ed1526c60a5e635369d4c10c188644256ff341ac6f58cd9782edfdaf
    • Instruction ID: 4ec7579e8a8b02e7694737c12fa4a89657318d557ef3c3bb4c3bebb1a852eaca
    • Opcode Fuzzy Hash: 31f4ab88ed1526c60a5e635369d4c10c188644256ff341ac6f58cd9782edfdaf
    • Instruction Fuzzy Hash: F1518872D00248AADB10ABA5EC45EEF7BBCEF48314F14443BF505B2191EB3C99048B68
    APIs
    • lstrcpy.KERNEL32(?,TVicHW32.sys), ref: 00401652
    • lstrcpy.KERNEL32(?,TVicHW64.sys), ref: 00401660
    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040166E
    • lstrcat.KERNEL32(?,\drivers\), ref: 00401686
    • lstrcat.KERNEL32(?,?), ref: 00401696
    • lstrcpy.KERNEL32(?,?), ref: 004016A0
    • lstrcpy.KERNEL32(?,?), ref: 004016AD
    • lstrcat.KERNEL32(?,?), ref: 004016BD
    • lstrcat.KERNEL32(?,?), ref: 004016CA
      • Part of subcall function 0040493B: __fsopen.LIBCMT ref: 00404948
    • CopyFileA.KERNEL32(?,?,00000000), ref: 00401721
    • GetModuleHandleA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection), ref: 00401744
    • GetProcAddress.KERNEL32(00000000), ref: 0040174D
    • GetModuleHandleA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection), ref: 00401758
    • GetProcAddress.KERNEL32(00000000), ref: 0040175B
    • CopyFileA.KERNEL32(?,?,00000000), ref: 00401783
      • Part of subcall function 0040154E: _malloc.LIBCMT ref: 00401569
      • Part of subcall function 0040154E: 74D41540.VERSION(00000000,00415CBC,00000000,?,?,?,00000000,00000000,?,?), ref: 0040158C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: lstrcatlstrcpy$AddressCopyFileHandleModuleProc$D41540DirectorySystem__fsopen_malloc
    • String ID: TVicHW32.sys$TVicHW64.sys$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$\drivers\$kernel32
    • API String ID: 3178957742-2758921077
    • Opcode ID: b60890f1a3503ce63d4b602ea2b07d268a25b69e701c4c0326ce008c21acf88b
    • Instruction ID: c5eb5fac36edd1ab76eba7e42002dac0df6a4527c06735851329c875dfc35cc2
    • Opcode Fuzzy Hash: b60890f1a3503ce63d4b602ea2b07d268a25b69e701c4c0326ce008c21acf88b
    • Instruction Fuzzy Hash: 3B41ECB291024CAADF30EFF5DC89ECE77ACAB48304F11452BAA09D7151DA78D6458F64
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _printf
    • String ID: %s missing$Failed to compress %s$Failed to open %s$Memory allocation failed %s$Reading from %s failed$There is not enough space on drive$Writing to %s failed
    • API String ID: 723836530-3683205635
    • Opcode ID: 3a4027b462162ad5a6a50c437409e611084f9c27c3cb0eadeb5ec5186ad3e7f3
    • Instruction ID: 390be67d09cdb724ff97686d3c01a47f9a740aa9f018bcd15236d3e1abfaf7c1
    • Opcode Fuzzy Hash: 3a4027b462162ad5a6a50c437409e611084f9c27c3cb0eadeb5ec5186ad3e7f3
    • Instruction Fuzzy Hash: 51115EB0909B00A7EA402B415E0E5CB6D84DD62B08B15C47FF44C7E2C2F2BEC5599EAF
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _strtok$__strlwr_strcat$__getptd_strrchr
    • String ID: -cmsg$-coh$.exe
    • API String ID: 2054980399-586899726
    • Opcode ID: ddd1e3a9480941dd67566616629b63406c1bd87d1a0f8e8ea7f6421d09e0d373
    • Instruction ID: daee60b6a93fcd967a7de978cb950dda6c30c4eb0e34f876ebf12504e36bb5d0
    • Opcode Fuzzy Hash: ddd1e3a9480941dd67566616629b63406c1bd87d1a0f8e8ea7f6421d09e0d373
    • Instruction Fuzzy Hash: 0F315EB365971229F92471667C57F9B168CCB91778F20003FFA04BA1E2EE7E9D4084AD
    APIs
    • _malloc.LIBCMT ref: 00402E50
      • Part of subcall function 004046BA: __FF_MSGBANNER.LIBCMT ref: 004046DD
      • Part of subcall function 004046BA: __NMSG_WRITE.LIBCMT ref: 004046E4
      • Part of subcall function 004046BA: RtlAllocateHeap.NTDLL(00000000,?,00000001), ref: 00404731
      • Part of subcall function 00402650: Sleep.KERNEL32(000000FA), ref: 00402680
      • Part of subcall function 00402650: _fseek.LIBCMT ref: 0040269B
      • Part of subcall function 00402650: __fread_nolock.LIBCMT ref: 004026AA
      • Part of subcall function 00402650: _strncmp.LIBCMT ref: 004026D6
    • _malloc.LIBCMT ref: 00402EBB
    • _malloc.LIBCMT ref: 00402ED2
    • _strncpy.LIBCMT ref: 00402F14
    • _malloc.LIBCMT ref: 00402F3A
    • _malloc.LIBCMT ref: 00402F52
    • _strncpy.LIBCMT ref: 00402F9A
      • Part of subcall function 00402C40: _malloc.LIBCMT ref: 00402C44
      • Part of subcall function 00405FEB: DeleteFileA.KERNEL32(?,?,00403D46,?,?,?), ref: 00405FF3
      • Part of subcall function 00405FEB: GetLastError.KERNEL32 ref: 00405FFD
      • Part of subcall function 00405FEB: __dosmaperr.LIBCMT ref: 0040600C
    • _malloc.LIBCMT ref: 00402FCD
    • _malloc.LIBCMT ref: 00402FEB
    • _malloc.LIBCMT ref: 00403032
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _malloc$_strncpy$AllocateDeleteErrorFileHeapLastSleep__dosmaperr__fread_nolock_fseek_strncmp
    • String ID: .tmp
    • API String ID: 1077077875-2986845003
    • Opcode ID: 9ea4bbf3d634008f5fc82c8f363c5e8382ca436f74c39de2ba870d23d5ef5ab8
    • Instruction ID: 37ba2904df3d9823651b2d5de5d7e307e317590d2fb1cc1cfeef1be77dc65240
    • Opcode Fuzzy Hash: 9ea4bbf3d634008f5fc82c8f363c5e8382ca436f74c39de2ba870d23d5ef5ab8
    • Instruction Fuzzy Hash: E2B1E2B0A042029FC328DF28C981A27F7E5BF88304F14856EE5495B3C2E779E951CBD9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _fseek$__wfopen_s$__fread_nolock$__fseek_nolock__lock_file
    • String ID: .tmp$wb+
    • API String ID: 933030327-1507332519
    • Opcode ID: c0094b74ebda08a865674a722f3ca168325d1cc8fe1930203f7491c5635f4751
    • Instruction ID: 18ac9957c6aa1dc69943f09a9cb54da27e6243f9c9932203dcdc9a45fdee6a6e
    • Opcode Fuzzy Hash: c0094b74ebda08a865674a722f3ca168325d1cc8fe1930203f7491c5635f4751
    • Instruction Fuzzy Hash: 9B51ECB15083416FE320EF65CC82FAB7798ABD4704F14493DF684672C2EA78E5448B9A
    APIs
    • __vswprintf.LIBCMT ref: 004022DD
      • Part of subcall function 00405E8E: __vsprintf_l.LIBCMT ref: 00405E9E
    • _printf.LIBCMT ref: 00402309
    • _printf.LIBCMT ref: 00402319
    • _printf.LIBCMT ref: 0040233F
    • _printf.LIBCMT ref: 00402349
    • _printf.LIBCMT ref: 00402330
      • Part of subcall function 00405D4B: __stbuf.LIBCMT ref: 00405DA1
      • Part of subcall function 00405D4B: __output_l.LIBCMT ref: 00405DB9
      • Part of subcall function 00405D4B: __ftbuf.LIBCMT ref: 00405DCA
    • _printf.LIBCMT ref: 00402358
    • __fcloseall.LIBCMT ref: 00402380
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _printf$__fcloseall__ftbuf__output_l__stbuf__vsprintf_l__vswprintf
    • String ID: Error %d$Error %d
    • API String ID: 3853979076-600224260
    • Opcode ID: 8e5477119bb3f71064b26e893e7b6d57078d967389269548839556b3a400f9cd
    • Instruction ID: 49633a08206f613e657b383c6326dce30d920fae71d15d53b22ebbfa9e1a2462
    • Opcode Fuzzy Hash: 8e5477119bb3f71064b26e893e7b6d57078d967389269548839556b3a400f9cd
    • Instruction Fuzzy Hash: 6711A1B2500200ABD630B7758E4BBEB76949FE5704F14483FB988752C1E6BCD54489AF
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,004178F8,0000000C,00406F47,00000000,00000000,?,00000000,?,0040101B,?,?,00415C90), ref: 00406E1E
    • __crt_waiting_on_module_handle.LIBCMT ref: 00406E29
      • Part of subcall function 00405408: Sleep.KERNEL32(000003E8,00000000,?,00406D6F,KERNEL32.DLL,?,00406DBB,?,00000000,?,0040101B,?,?,00415C90), ref: 00405414
      • Part of subcall function 00405408: GetModuleHandleW.KERNEL32(?,?,00406D6F,KERNEL32.DLL,?,00406DBB,?,00000000,?,0040101B,?,?,00415C90), ref: 0040541D
    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00406E52
    • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00406E62
    • __lock.LIBCMT ref: 00406E84
    • InterlockedIncrement.KERNEL32(00420138), ref: 00406E91
    • __lock.LIBCMT ref: 00406EA5
    • ___addlocaleref.LIBCMT ref: 00406EC3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
    • API String ID: 1028249917-2843748187
    • Opcode ID: c93c9f14678bb327ce72342197a0b131b4ce90c27da7fa20a8dfa6764ac69880
    • Instruction ID: 370c4a453f9527b03cbd195256e81a95704cfde9a7854f7aacd47b981beba66d
    • Opcode Fuzzy Hash: c93c9f14678bb327ce72342197a0b131b4ce90c27da7fa20a8dfa6764ac69880
    • Instruction Fuzzy Hash: 0C11C3709447009ED7109F7AC80179ABBE4AF04318F10852FE499A63D1C778A941CF9D
    APIs
    • __wfopen_s.LIBCMT ref: 004039DC
    • Sleep.KERNEL32(000000FA), ref: 004039F5
      • Part of subcall function 004022B0: __vswprintf.LIBCMT ref: 004022DD
      • Part of subcall function 004022B0: _printf.LIBCMT ref: 00402309
      • Part of subcall function 004022B0: __fcloseall.LIBCMT ref: 00402380
    • __wfopen_s.LIBCMT ref: 00403A1C
    • Sleep.KERNEL32(000000FA), ref: 00403A35
    • _fseek.LIBCMT ref: 00403A5E
    • _ftell.LIBCMT ref: 00403A68
    • _fseek.LIBCMT ref: 00403A78
    • __fread_nolock.LIBCMT ref: 00403A91
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: Sleep__wfopen_s_fseek$__fcloseall__fread_nolock__vswprintf_ftell_printf
    • String ID: ab+
    • API String ID: 669739137-1294174304
    • Opcode ID: 4b32efcf49464804236c7e0260b134c629de66e68d2961c99cc564dce9fe2c18
    • Instruction ID: 862efc8666cd4963f9580d00043b2002f28743bc2b2c21e88ba1549d5625bc52
    • Opcode Fuzzy Hash: 4b32efcf49464804236c7e0260b134c629de66e68d2961c99cc564dce9fe2c18
    • Instruction Fuzzy Hash: 6731E8B2A043006BD220EF65CC42F6BB6ACABC5704F04493EF695771C1D678E9058BAB
    APIs
    • _malloc.LIBCMT ref: 004031FB
      • Part of subcall function 004046BA: __FF_MSGBANNER.LIBCMT ref: 004046DD
      • Part of subcall function 004046BA: __NMSG_WRITE.LIBCMT ref: 004046E4
      • Part of subcall function 004046BA: RtlAllocateHeap.NTDLL(00000000,?,00000001), ref: 00404731
      • Part of subcall function 004026F0: GetDiskFreeSpaceExA.KERNEL32 ref: 0040270E
    • _malloc.LIBCMT ref: 00403242
    • _malloc.LIBCMT ref: 004032CB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _malloc$AllocateDiskFreeHeapSpace
    • String ID: ReadMe.txt
    • API String ID: 2338698063-1789431278
    • Opcode ID: 931e0a5ece422a68a42c3ef7e03972e06dc0890a145eb5b81c3e80848ac20664
    • Instruction ID: 46175a259f093b081afdc5a53347db39955771dd1f1fb6107be6ec15acc1f33a
    • Opcode Fuzzy Hash: 931e0a5ece422a68a42c3ef7e03972e06dc0890a145eb5b81c3e80848ac20664
    • Instruction Fuzzy Hash: 408109715043419BC714DF25D891AABB7E8BFC9304F04897EF88997381E739EA08C79A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _strlen$__wfopen_s_strcpy_s
    • String ID: ab+$update.log
    • API String ID: 2601613033-2574336263
    • Opcode ID: 978d86f40e704335e5815c714d73de1e400675b37cd3ea472732b76ee38d6999
    • Instruction ID: 8753d6b4cb48f81154bdc3ce0a9135871b943940d455b6ce72dfcc4232a15052
    • Opcode Fuzzy Hash: 978d86f40e704335e5815c714d73de1e400675b37cd3ea472732b76ee38d6999
    • Instruction Fuzzy Hash: 9601B1B1912204FBEB11AB51DD02BCE3A64AF40758F600037F904790E2E7BD5B809A9D
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _strtok
    • String ID:
    • API String ID: 1675499619-0
    • Opcode ID: 6a703242efe55d424a99105dcb90bf55d0f93dc5dbf6e352152614512f81314c
    • Instruction ID: 8048e60ad9a14299f83927c1cd8c71b889c9f891cc99d35ec7a6fe31f88e3d20
    • Opcode Fuzzy Hash: 6a703242efe55d424a99105dcb90bf55d0f93dc5dbf6e352152614512f81314c
    • Instruction Fuzzy Hash: C23106366043466ADB10BAB59C82FDF27DC9B41354F10017FFA05F61D2EA7C894582AD
    APIs
      • Part of subcall function 00402650: Sleep.KERNEL32(000000FA), ref: 00402680
      • Part of subcall function 00402650: _fseek.LIBCMT ref: 0040269B
      • Part of subcall function 00402650: __fread_nolock.LIBCMT ref: 004026AA
      • Part of subcall function 00402650: _strncmp.LIBCMT ref: 004026D6
      • Part of subcall function 0040493B: __fsopen.LIBCMT ref: 00404948
    • Sleep.KERNEL32(000000FA,?,?), ref: 00402B90
    • _fseek.LIBCMT ref: 00402BAB
    • _fseek.LIBCMT ref: 00402BCF
    • _malloc.LIBCMT ref: 00402BE6
    • _fseek.LIBCMT ref: 00402BF2
    • _malloc.LIBCMT ref: 00402C06
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _fseek$Sleep_malloc$__fread_nolock__fsopen_strncmp
    • String ID:
    • API String ID: 1639090907-0
    • Opcode ID: a21f36b184e389274e83b6429785d2aff77163b6d95a59808c5afae02f190621
    • Instruction ID: 8003af9ef2f5da178f51b093a37a81b4dae3e384dfd4f4c9dd704a419efdd0ab
    • Opcode Fuzzy Hash: a21f36b184e389274e83b6429785d2aff77163b6d95a59808c5afae02f190621
    • Instruction Fuzzy Hash: 97213BB594421066DB207F668D86F6B77A89F41728F04413EF9097A2C3E97DE80182BE
    APIs
    • CopyFileA.KERNEL32(?,00000000,00000000), ref: 00402A7A
      • Part of subcall function 0040493B: __fsopen.LIBCMT ref: 00404948
    • _malloc.LIBCMT ref: 00402ADD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: CopyFile__fsopen_malloc
    • String ID: Messages.txt
    • API String ID: 2574532697-927597410
    • Opcode ID: f6fcf69aa9c912b755bf916f682d5a90e107dbff799cd7994e606d2e7586e9eb
    • Instruction ID: 3eacb031f304ec70200b1f3a7947c44c7a13ab544bd14205e8b22d2f6a377069
    • Opcode Fuzzy Hash: f6fcf69aa9c912b755bf916f682d5a90e107dbff799cd7994e606d2e7586e9eb
    • Instruction Fuzzy Hash: 2F3107706043455FD720EB249D81BEB77E89B95704F41443EE989973C2FBB9A404C79A
    APIs
    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 004015EB
    • GetProcAddress.KERNEL32(00000000), ref: 004015F2
    • GetCurrentProcess.KERNEL32(00000000), ref: 00401602
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: AddressCurrentHandleModuleProcProcess
    • String ID: IsWow64Process$kernel32
    • API String ID: 4190356694-3789238822
    • Opcode ID: b2aca0ec7bf92af278214477662a4d3f7d5c5d7740f1b72562a74feca57423ff
    • Instruction ID: 9a3b83f776da344963104e0b8a714f039fee01f3c7fa5efd94b2982bb78a5a7f
    • Opcode Fuzzy Hash: b2aca0ec7bf92af278214477662a4d3f7d5c5d7740f1b72562a74feca57423ff
    • Instruction Fuzzy Hash: 76E0E676941714F7CB1097E4DD0DACE7B6CEB48799B114451B901E3150D778DA0486E8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _fseek_malloc$__fread_nolock
    • String ID:
    • API String ID: 4292992340-0
    • Opcode ID: b17d128d1fee479573328fadd862354f9c26940b3acd077026021a0d8309b77c
    • Instruction ID: b6225a47b14886cf5607417cd21ea5aeae2a00ed47b3fc5580effaca9e4b2edd
    • Opcode Fuzzy Hash: b17d128d1fee479573328fadd862354f9c26940b3acd077026021a0d8309b77c
    • Instruction Fuzzy Hash: AF4109B19043107BD521AE655C82F6F769CEBC1B14F04093EF984762C2F67D9A0587EB
    APIs
      • Part of subcall function 0040493B: __fsopen.LIBCMT ref: 00404948
    • _fseek.LIBCMT ref: 00403670
    • _fseek.LIBCMT ref: 0040367A
    • _malloc.LIBCMT ref: 00403688
    • __fread_nolock.LIBCMT ref: 004036B1
    • _malloc.LIBCMT ref: 004036CF
      • Part of subcall function 004022B0: __vswprintf.LIBCMT ref: 004022DD
      • Part of subcall function 004022B0: _printf.LIBCMT ref: 00402309
      • Part of subcall function 004022B0: __fcloseall.LIBCMT ref: 00402380
      • Part of subcall function 004049A5: __lock.LIBCMT ref: 004049C3
      • Part of subcall function 004049A5: ___sbh_find_block.LIBCMT ref: 004049CE
      • Part of subcall function 004049A5: ___sbh_free_block.LIBCMT ref: 004049DD
      • Part of subcall function 004049A5: HeapFree.KERNEL32(00000000,?,004177D0,0000000C,0040739F,00000000,00417948,0000000C,004073D9,?,?,?,00411421,00000004,00417C38,0000000C), ref: 00404A0D
      • Part of subcall function 004049A5: GetLastError.KERNEL32(?,00411421,00000004,00417C38,0000000C,0040E691,?,?,00000000,00000000,00000000,?,00406F1E,00000001,00000214), ref: 00404A1E
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _fseek_malloc$ErrorFreeHeapLast___sbh_find_block___sbh_free_block__fcloseall__fread_nolock__fsopen__lock__vswprintf_printf
    • String ID:
    • API String ID: 1382160792-0
    • Opcode ID: 26e2c6dfb10ae880395ccc8cab07e0334f8c5e11a5d8db95b1e7772bda4d1d93
    • Instruction ID: 3eeebca1c346b6f77922f680f9f337c9749621d28cbe54a08cd24c51514e10b8
    • Opcode Fuzzy Hash: 26e2c6dfb10ae880395ccc8cab07e0334f8c5e11a5d8db95b1e7772bda4d1d93
    • Instruction Fuzzy Hash: 5D31E5F19403113AD120BEA25C82F6B759C9B91B15F10093EFD54762C2F6BE9A0542FA
    APIs
    • _malloc.LIBCMT ref: 00401A5B
      • Part of subcall function 004046BA: __FF_MSGBANNER.LIBCMT ref: 004046DD
      • Part of subcall function 004046BA: __NMSG_WRITE.LIBCMT ref: 004046E4
      • Part of subcall function 004046BA: RtlAllocateHeap.NTDLL(00000000,?,00000001), ref: 00404731
      • Part of subcall function 00402B50: Sleep.KERNEL32(000000FA,?,?), ref: 00402B90
      • Part of subcall function 00402B50: _fseek.LIBCMT ref: 00402BAB
      • Part of subcall function 00402B50: _fseek.LIBCMT ref: 00402BCF
      • Part of subcall function 00402B50: _malloc.LIBCMT ref: 00402BE6
      • Part of subcall function 00402B50: _fseek.LIBCMT ref: 00402BF2
      • Part of subcall function 00402B50: _malloc.LIBCMT ref: 00402C06
    • _strcat.LIBCMT ref: 00401A7F
    • _strncat.LIBCMT ref: 00401A8C
    • _strcat.LIBCMT ref: 00401AB8
    • _strncat.LIBCMT ref: 00401ACC
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _fseek_malloc$_strcat_strncat$AllocateHeapSleep
    • String ID:
    • API String ID: 4099709153-0
    • Opcode ID: ba5bf949d4ad24f7aadd043d2b5d4d6bd326073b62294adc8feddded278aaa32
    • Instruction ID: 4c486aade4d108400fa8c8343c85ae053f1b59c45874b80b17de3f84fc053f14
    • Opcode Fuzzy Hash: ba5bf949d4ad24f7aadd043d2b5d4d6bd326073b62294adc8feddded278aaa32
    • Instruction Fuzzy Hash: 75210775600114ABCB20EFA6CD41E9B77B8AF89714F00447AF145E71D1DA78E9818F98
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _strlen
    • String ID:
    • API String ID: 4218353326-0
    • Opcode ID: 23fbe9b6ad5bed6b898c158665aeefe29976a05bf6fd13301e6f89663f8d438e
    • Instruction ID: 1b00dbdc83848280184812239523aa17ce44544585329b6842cfcccb6d514d03
    • Opcode Fuzzy Hash: 23fbe9b6ad5bed6b898c158665aeefe29976a05bf6fd13301e6f89663f8d438e
    • Instruction Fuzzy Hash: 3001891E0085EA1AE33625BE2880BFB57494A43794B54013BDAC0B7BE6A57D88C341BD
    APIs
    • __getptd.LIBCMT ref: 0040DC3E
      • Part of subcall function 00406F6C: __getptd_noexit.LIBCMT ref: 00406F6F
      • Part of subcall function 00406F6C: __amsg_exit.LIBCMT ref: 00406F7C
    • __amsg_exit.LIBCMT ref: 0040DC5E
    • __lock.LIBCMT ref: 0040DC6E
    • InterlockedDecrement.KERNEL32(?), ref: 0040DC8B
    • InterlockedIncrement.KERNEL32(02481660), ref: 0040DCB6
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
    • String ID:
    • API String ID: 4271482742-0
    • Opcode ID: 81e311dddf522e7d3084aa7a70a752c3268e01e8a930758be3bab5eebd167faf
    • Instruction ID: e617878ee2f16a8e25a8b4d4c559af0235a3eabdace909a070287724ea69338b
    • Opcode Fuzzy Hash: 81e311dddf522e7d3084aa7a70a752c3268e01e8a930758be3bab5eebd167faf
    • Instruction Fuzzy Hash: 3401A531E09711ABE720ABA9990579A77A07F04714F00003BE804B77C1C77C6946CBDE
    APIs
    • __lock.LIBCMT ref: 004049C3
      • Part of subcall function 004073BE: __mtinitlocknum.LIBCMT ref: 004073D4
      • Part of subcall function 004073BE: __amsg_exit.LIBCMT ref: 004073E0
      • Part of subcall function 004073BE: RtlEnterCriticalSection.NTDLL(?), ref: 004073E8
    • ___sbh_find_block.LIBCMT ref: 004049CE
    • ___sbh_free_block.LIBCMT ref: 004049DD
    • HeapFree.KERNEL32(00000000,?,004177D0,0000000C,0040739F,00000000,00417948,0000000C,004073D9,?,?,?,00411421,00000004,00417C38,0000000C), ref: 00404A0D
    • GetLastError.KERNEL32(?,00411421,00000004,00417C38,0000000C,0040E691,?,?,00000000,00000000,00000000,?,00406F1E,00000001,00000214), ref: 00404A1E
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
    • String ID:
    • API String ID: 2714421763-0
    • Opcode ID: 89c0ff2ed7c23e1dd56953e22bf33076d678943e9418c9a16457b95e7bd3d70b
    • Instruction ID: 84755761099dd51f23b0207d8ba843017362870df5e383530f9929849ac19495
    • Opcode Fuzzy Hash: 89c0ff2ed7c23e1dd56953e22bf33076d678943e9418c9a16457b95e7bd3d70b
    • Instruction Fuzzy Hash: 4001A7B1E45201EADB20ABB29D0A79F3A64AF40768F20403FF600761C1CA3C99409F9D
    APIs
      • Part of subcall function 00402650: Sleep.KERNEL32(000000FA), ref: 00402680
      • Part of subcall function 00402650: _fseek.LIBCMT ref: 0040269B
      • Part of subcall function 00402650: __fread_nolock.LIBCMT ref: 004026AA
      • Part of subcall function 00402650: _strncmp.LIBCMT ref: 004026D6
    • Sleep.KERNEL32(000000FA,?,?,?,?,00403145,?,00000000,?,00000000,?), ref: 00402CF1
    • _fseek.LIBCMT ref: 00402D10
      • Part of subcall function 00402C40: _malloc.LIBCMT ref: 00402C44
      • Part of subcall function 004022B0: __vswprintf.LIBCMT ref: 004022DD
      • Part of subcall function 004022B0: _printf.LIBCMT ref: 00402309
      • Part of subcall function 004022B0: __fcloseall.LIBCMT ref: 00402380
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: Sleep_fseek$__fcloseall__fread_nolock__vswprintf_malloc_printf_strncmp
    • String ID: AHXX$ab+
    • API String ID: 4212895356-2189246863
    • Opcode ID: aa5074da67624f636bc94e4a837e2084076de8f3a3d0ea4624bec317f6683db4
    • Instruction ID: 36c90d3fd171ca64309d4177e0d021297623ecf75b3871874227e348100f8a01
    • Opcode Fuzzy Hash: aa5074da67624f636bc94e4a837e2084076de8f3a3d0ea4624bec317f6683db4
    • Instruction Fuzzy Hash: 3A3116B5604110ABD720AF16CDC6F6B7799AF85308F04807AF9056F2C3D779EC4287AA
    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,74DE8B60,?), ref: 0040276D
      • Part of subcall function 0040493B: __fsopen.LIBCMT ref: 00404948
    • __fread_nolock.LIBCMT ref: 0040280E
    • __fread_nolock.LIBCMT ref: 0040283B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __fread_nolock$FileModuleName__fsopen
    • String ID: Target.exe
    • API String ID: 2117439025-950882348
    • Opcode ID: a72cc3f7129ac1c3e1d76f16084bbd8381b00982c090409cd93cb19dfcc02525
    • Instruction ID: 14f32651891ab7ca99fda4062542255699bf2445bfe1a4bb10b185fa9a7fd621
    • Opcode Fuzzy Hash: a72cc3f7129ac1c3e1d76f16084bbd8381b00982c090409cd93cb19dfcc02525
    • Instruction Fuzzy Hash: 263148756043405BD320EB359D85FD777D4AFC9300F05803EFA88AB3D2EA79940983AA
    APIs
    • __fread_nolock.LIBCMT ref: 004025B8
    • _strncpy.LIBCMT ref: 004025DE
    • __fread_nolock.LIBCMT ref: 004025F1
      • Part of subcall function 004022B0: __vswprintf.LIBCMT ref: 004022DD
      • Part of subcall function 004022B0: _printf.LIBCMT ref: 00402309
      • Part of subcall function 004022B0: __fcloseall.LIBCMT ref: 00402380
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __fread_nolock$__fcloseall__vswprintf_printf_strncpy
    • String ID: loadAppendixEntry
    • API String ID: 2454332532-1848498687
    • Opcode ID: 6cfc6128c87d84d3316c368bd86132e255f16fb7bb7e7b0528be50d13663434e
    • Instruction ID: a2ae9de9f5ce6144e48f3da8598412fb7f2ab621182596fac52061c18583e269
    • Opcode Fuzzy Hash: 6cfc6128c87d84d3316c368bd86132e255f16fb7bb7e7b0528be50d13663434e
    • Instruction Fuzzy Hash: 1A01BEB19043407AE620FF664C07F5BB7E89F85B04F408D6EF554661D2E6F8910487AB
    APIs
    • GetModuleHandleA.KERNEL32(KERNEL32,0040584B), ref: 0040CE1F
    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040CE2F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: IsProcessorFeaturePresent$KERNEL32
    • API String ID: 1646373207-3105848591
    • Opcode ID: 278876fe050b092a17d163973210eb19038aff7eefd944aef3556e15ebeade95
    • Instruction ID: 3d953e03e469096359f81002a8816d2acfd62e72651eef726d163bcf37c06b7f
    • Opcode Fuzzy Hash: 278876fe050b092a17d163973210eb19038aff7eefd944aef3556e15ebeade95
    • Instruction Fuzzy Hash: 61F01D30A00A0DD2DB001BA5ED4E6AF7A79FB80746F9205A195D5B00C4DE34C0B5D2DA
    APIs
    • LoadCursorA.USER32(00000000,00007F02), ref: 00401E1A
    • RegisterClassExA.USER32(00000030), ref: 00401E3C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: ClassCursorLoadRegister
    • String ID: 0$Window
    • API String ID: 1693014935-3868708051
    • Opcode ID: 2edf8ed269dab38aaddf65b2fc2e006d855c7ef136a6be0691d672e015d157bc
    • Instruction ID: 19b5dac3f314ba373096e42b926c340972aae28eb5609f511956d6f05cda5a0c
    • Opcode Fuzzy Hash: 2edf8ed269dab38aaddf65b2fc2e006d855c7ef136a6be0691d672e015d157bc
    • Instruction Fuzzy Hash: 85F092B1C11228ABCB01DF98D9496DEBFB8BB08704F50812AE404B6240D3B84A05CFD8
    APIs
    Strings
    • %d files compressed and added successfully to %s, xrefs: 004031B1
    • %d files added successfully to %s, xrefs: 004031A3
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _printf
    • String ID: %d files added successfully to %s$%d files compressed and added successfully to %s
    • API String ID: 723836530-2584807077
    • Opcode ID: 79809b5fa3fbe735bbce4060b7cdd4cf33db6ebb1866b4b113656256bca825aa
    • Instruction ID: 719c7f7874df1082bfcb9ca8da80f4d50e1cbe676ac997e25a0c3758f51fe535
    • Opcode Fuzzy Hash: 79809b5fa3fbe735bbce4060b7cdd4cf33db6ebb1866b4b113656256bca825aa
    • Instruction Fuzzy Hash: 37D0C2B2D8063432D83225125C4BFE7680DCB60F95F86407FBC08782C2E0BECA4485FA
    APIs
    • RemoveDirectoryA.KERNEL32(T4@,00000000,00403454,?), ref: 0041416E
    • GetLastError.KERNEL32 ref: 00414178
    • __dosmaperr.LIBCMT ref: 00414187
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: DirectoryErrorLastRemove__dosmaperr
    • String ID: T4@
    • API String ID: 4061612599-1493363993
    • Opcode ID: b60becf4e369671bb11eed667a8f7553dc9830da5dc1b4e27e4af324fd980eda
    • Instruction ID: b1c379bf969d63926bb224c0a2c4e692d88dab086508e548b84942566873d674
    • Opcode Fuzzy Hash: b60becf4e369671bb11eed667a8f7553dc9830da5dc1b4e27e4af324fd980eda
    • Instruction Fuzzy Hash: DED05E3125460AB68B001BF6BC0C9DB3F5DAAD13743508936F41CC1190EE39CCC09058
    APIs
    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040FFD8
    • __isleadbyte_l.LIBCMT ref: 0041000C
    • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00000109,75FF5003,00BFBBEF,00000000,?,?,?,0040F44D,00000109,00BFBBEF,00000003), ref: 0041003D
    • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00000109,00000001,00BFBBEF,00000000,?,?,?,0040F44D,00000109,00BFBBEF,00000003), ref: 004100AB
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
    • String ID:
    • API String ID: 3058430110-0
    • Opcode ID: c6e65ad2396201a31396ff49d2e056812b876317f5d4d6a8b17c88786ae9998c
    • Instruction ID: 8bbd8488c1e8a46f27f4758db847ebc68d80bf04ad459b20f6593d2b3a7dbc8d
    • Opcode Fuzzy Hash: c6e65ad2396201a31396ff49d2e056812b876317f5d4d6a8b17c88786ae9998c
    • Instruction Fuzzy Hash: 1A31DF30A00296EFCB20DF64C880AAE3BA5FF06311B14857BF4659B2D1E775C984DB99
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
    • Instruction ID: 4c89a29667a6a644c93cfcc237eb108a22ca2270e76d77b3e81f939bd98d48fb
    • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
    • Instruction Fuzzy Hash: 6C116036000149FBCF125F84CC91CEE3F22BF19354B588626FA5869170D23AC972AB85
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: Sleep__wfopen_s_fseek_ftell
    • String ID:
    • API String ID: 1505929214-0
    • Opcode ID: b3d6d89ea08bfaef7207b80891168195adeb8ff2e64cdcc1383dd4582f542d2d
    • Instruction ID: a6b85ff962b1b7f914773e7661d2fde02549b559be859891dbfccd327188d66b
    • Opcode Fuzzy Hash: b3d6d89ea08bfaef7207b80891168195adeb8ff2e64cdcc1383dd4582f542d2d
    • Instruction Fuzzy Hash: 91F0D6B2A042106AD120EA56CC46F4BB7ACDBD5728F11453EF645731C2D278E90187AA
    APIs
    • __getptd.LIBCMT ref: 0040E3AA
      • Part of subcall function 00406F6C: __getptd_noexit.LIBCMT ref: 00406F6F
      • Part of subcall function 00406F6C: __amsg_exit.LIBCMT ref: 00406F7C
    • __getptd.LIBCMT ref: 0040E3C1
    • __amsg_exit.LIBCMT ref: 0040E3CF
    • __lock.LIBCMT ref: 0040E3DF
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
    • String ID:
    • API String ID: 3521780317-0
    • Opcode ID: dd8fc863e8f885b3c561b8df2c5cb76211283750ad3f1d1176e03c5728d6e8d8
    • Instruction ID: be2d1a64a67f66b6d49fb417a76dbfb2d431602fb7aad831492336e3cfa94afe
    • Opcode Fuzzy Hash: dd8fc863e8f885b3c561b8df2c5cb76211283750ad3f1d1176e03c5728d6e8d8
    • Instruction Fuzzy Hash: 7CF06231944710CAD720BB77D40674A76A0AB00724F514A7FB841B72D2CB7CA8519B9E
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: CopyFile_malloc
    • String ID: ReadMe.txt
    • API String ID: 656287990-1789431278
    • Opcode ID: 3864d7a58a2ede866a744287c8fec881c84d35688d2b0279a4daea497b2f4607
    • Instruction ID: 34c1bd59c38787f9ef00acb25da45058d6ef4a0886a37208756b6f2f2863ea9f
    • Opcode Fuzzy Hash: 3864d7a58a2ede866a744287c8fec881c84d35688d2b0279a4daea497b2f4607
    • Instruction Fuzzy Hash: B241E1702042428FC715CF2894A09A7BBE5EF9A304F1485BEECC59B3A1DB35EA09C795
    APIs
      • Part of subcall function 0040493B: __fsopen.LIBCMT ref: 00404948
    • _fseek.LIBCMT ref: 004024C8
    • __fread_nolock.LIBCMT ref: 004024EC
      • Part of subcall function 004022B0: __vswprintf.LIBCMT ref: 004022DD
      • Part of subcall function 004022B0: _printf.LIBCMT ref: 00402309
      • Part of subcall function 004022B0: __fcloseall.LIBCMT ref: 00402380
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __fcloseall__fread_nolock__fsopen__vswprintf_fseek_printf
    • String ID: wb+
    • API String ID: 390474772-1434998690
    • Opcode ID: cb3be42f533742ed902167bdcb2c3c63011ca4700bd618292155323f51da8213
    • Instruction ID: ac44070a1f7cc776ba13a6f684cee5ab7e46ed3b197c9fbe6b39a1c9c301d360
    • Opcode Fuzzy Hash: cb3be42f533742ed902167bdcb2c3c63011ca4700bd618292155323f51da8213
    • Instruction Fuzzy Hash: 6F21B4F29002003BD721AE659D86FBB765CABC5318F04453EF948722C2E9BD990543BA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: swprintf
    • String ID: Exit Code = %d (%s)$Exit Code = %d (SUCCESS)
    • API String ID: 233258989-98890273
    • Opcode ID: 1ab350eb4244525582af5ebeea66bdccec0f06b0ed0fcc4db9d3b94c07057b6f
    • Instruction ID: edc2077cb815b9ce99a6c7c69256a64476b0036bde7191caedbb070315da29aa
    • Opcode Fuzzy Hash: 1ab350eb4244525582af5ebeea66bdccec0f06b0ed0fcc4db9d3b94c07057b6f
    • Instruction Fuzzy Hash: 1A21B772C0172676EB20BA758C46FAF325C5F01768F55413BF904BB2F2E67C994081AE
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: _strlen
    • String ID: QA
    • API String ID: 4218353326-1179289999
    • Opcode ID: a8d11eb3ef38a85dbdc09f48ff4fd92956afbae64ba74dd0aa2e2847e573e60f
    • Instruction ID: aa28490803a7165b5ef98f90feedd0a1fa81f26eb6cb4971e131ca711d2ab4ff
    • Opcode Fuzzy Hash: a8d11eb3ef38a85dbdc09f48ff4fd92956afbae64ba74dd0aa2e2847e573e60f
    • Instruction Fuzzy Hash: 41F059339082612AE7240512BC0274B6B81ABC0778F25883FF548B54F1E77E89C4159D
    APIs
    • __fread_nolock.LIBCMT ref: 00403876
    • __wcstoui64.LIBCMT ref: 0040389D
      • Part of subcall function 004022B0: __vswprintf.LIBCMT ref: 004022DD
      • Part of subcall function 004022B0: _printf.LIBCMT ref: 00402309
      • Part of subcall function 004022B0: __fcloseall.LIBCMT ref: 00402380
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __fcloseall__fread_nolock__vswprintf__wcstoui64_printf
    • String ID: ReadIntFromFile
    • API String ID: 985187543-3473613045
    • Opcode ID: e6eceb80573a1a7a8e269e1e1e216eba209d3fd0d6775ae1fe7d02717fd72f6b
    • Instruction ID: 31e979536ebfa4fa8f718abca7e187700f6df70b53f4c26c056aa020dd9aba05
    • Opcode Fuzzy Hash: e6eceb80573a1a7a8e269e1e1e216eba209d3fd0d6775ae1fe7d02717fd72f6b
    • Instruction Fuzzy Hash: 5AF0B4B1A183006BD614EF24DC43B5B77D0AB84704F508D3EF549A62D1F6789118875B
    APIs
    • __fread_nolock.LIBCMT ref: 004038D7
    • __wcstoui64.LIBCMT ref: 004038FE
      • Part of subcall function 004022B0: __vswprintf.LIBCMT ref: 004022DD
      • Part of subcall function 004022B0: _printf.LIBCMT ref: 00402309
      • Part of subcall function 004022B0: __fcloseall.LIBCMT ref: 00402380
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668544809.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1668521710.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000419000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000431000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668544809.0000000000436000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668643905.0000000000437000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668664027.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_flupdate.jbxd
    Similarity
    • API ID: __fcloseall__fread_nolock__vswprintf__wcstoui64_printf
    • String ID: ReadShortFromFile
    • API String ID: 985187543-2101736889
    • Opcode ID: 472770fdc4e90951eaf27427f3ecdbdbecaa1354d98841b549ba467b5e190b03
    • Instruction ID: f030ab604bc500c78fd9def6e026a44a33565679af9ae8dcb61d94eb4ce200a8
    • Opcode Fuzzy Hash: 472770fdc4e90951eaf27427f3ecdbdbecaa1354d98841b549ba467b5e190b03
    • Instruction Fuzzy Hash: 77E026B954830036F110BB588C43F9B32949B80B04F804D1DF718751E2F2F8A24442AF