Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Metamask_setup.exe

Overview

General Information

Sample name:Metamask_setup.exe
Analysis ID:1379472
MD5:618f137baf526f754d3ee3885acb9c04
SHA1:a7f29acee8f33eee1b569fc992bdbbe2f413042c
SHA256:512ec746b8318aa67bb11aa498a94d0e9848c241e7296c46757dcf1997e28be4
Infos:

Detection

Meduza Stealer
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Meduza Stealer
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Program does not show much activity (idle)

Classification

  • System is w10x64
  • Metamask_setup.exe (PID: 7064 cmdline: C:\Users\user\Desktop\Metamask_setup.exe MD5: 618F137BAF526F754D3EE3885ACB9C04)
  • cleanup
{"C2 url": "77.105.147.171:15666"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: Metamask_setup.exe PID: 7064JoeSecurity_MeduzaStealerYara detected Meduza StealerJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Metamask_setup.exeAvira: detected
    Source: Metamask_setup.exeMalware Configuration Extractor: Meduza Stealer {"C2 url": "77.105.147.171:15666"}
    Source: Metamask_setup.exeReversingLabs: Detection: 81%
    Source: Metamask_setup.exeVirustotal: Detection: 79%Perma Link
    Source: Metamask_setup.exeJoe Sandbox ML: detected
    Source: Metamask_setup.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0D308C GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,0_2_00007FF6DF0D308C
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0D2FDC FindClose,FindFirstFileExW,GetLastError,GetCurrentDirectoryW,GetLastError,0_2_00007FF6DF0D2FDC
    Source: global trafficTCP traffic: 192.168.2.4:49729 -> 77.105.147.171:15666
    Source: Joe Sandbox ViewASN Name: PLUSTELECOM-ASRU PLUSTELECOM-ASRU
    Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.171
    Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.171
    Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.171
    Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.171
    Source: unknownTCP traffic detected without corresponding DNS query: 77.105.147.171
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0896F0 std::_Lockit::_Lockit,std::_Lockit::_Lockit,std::_Facet_Register,Concurrency::cancel_current_task,Concurrency::cancel_current_task,_invalid_parameter_noinfo_noreturn,InternetOpenW,InternetOpenUrlA,InternetReadFile,InternetReadFile,InternetCloseHandle,InternetCloseHandle,0_2_00007FF6DF0896F0
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF09F110 GetModuleHandleA,GetProcAddress,OpenProcess,NtQuerySystemInformation,NtQuerySystemInformation,GetCurrentProcess,NtQueryObject,GetFinalPathNameByHandleA,CloseHandle,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6DF09F110
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF075F000_2_00007FF6DF075F00
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0B08740_2_00007FF6DF0B0874
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0A80900_2_00007FF6DF0A8090
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0BD4880_2_00007FF6DF0BD488
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0D308C0_2_00007FF6DF0D308C
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0510E00_2_00007FF6DF0510E0
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0B61100_2_00007FF6DF0B6110
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0AB5100_2_00007FF6DF0AB510
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0B036C0_2_00007FF6DF0B036C
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0D4F900_2_00007FF6DF0D4F90
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0807900_2_00007FF6DF080790
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0AF7A00_2_00007FF6DF0AF7A0
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0A83A00_2_00007FF6DF0A83A0
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0BBF9C0_2_00007FF6DF0BBF9C
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0C78300_2_00007FF6DF0C7830
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF091A800_2_00007FF6DF091A80
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0A36800_2_00007FF6DF0A3680
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF075AD00_2_00007FF6DF075AD0
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0896F00_2_00007FF6DF0896F0
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0D6EF40_2_00007FF6DF0D6EF4
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0BBB080_2_00007FF6DF0BBB08
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0B8D500_2_00007FF6DF0B8D50
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0AD5900_2_00007FF6DF0AD590
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0A71800_2_00007FF6DF0A7180
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0D69A80_2_00007FF6DF0D69A8
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0AF9A40_2_00007FF6DF0AF9A4
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0AF59C0_2_00007FF6DF0AF59C
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0959C00_2_00007FF6DF0959C0
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0BB2000_2_00007FF6DF0BB200
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0BC61C0_2_00007FF6DF0BC61C
    Source: classification engineClassification label: mal80.troj.spyw.winEXE@1/0@0/1
    Source: Metamask_setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Metamask_setup.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Metamask_setup.exeReversingLabs: Detection: 81%
    Source: Metamask_setup.exeVirustotal: Detection: 79%
    Source: Metamask_setup.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: Metamask_setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: Metamask_setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: Metamask_setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: Metamask_setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Metamask_setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: Metamask_setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: Metamask_setup.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: Metamask_setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Metamask_setup.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: Metamask_setup.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: Metamask_setup.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: Metamask_setup.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: Metamask_setup.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: Metamask_setup.exeStatic PE information: section name: _RDATA
    Source: C:\Users\user\Desktop\Metamask_setup.exeAPI coverage: 2.4 %
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0D308C GetFileAttributesExW,GetLastError,FindFirstFileW,GetLastError,FindClose,__std_fs_open_handle,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,GetFileInformationByHandleEx,GetLastError,CloseHandle,CloseHandle,CloseHandle,0_2_00007FF6DF0D308C
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0D2FDC FindClose,FindFirstFileExW,GetLastError,GetCurrentDirectoryW,GetLastError,0_2_00007FF6DF0D2FDC
    Source: Metamask_setup.exe, 00000000.00000002.1642063251.000002A5FD5A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0AE280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6DF0AE280
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0CCE58 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6DF0CCE58
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0AE280 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6DF0AE280
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF6DF0C70C0
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: GetLocaleInfoW,0_2_00007FF6DF0BA4DC
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: EnumSystemLocalesW,0_2_00007FF6DF0B9F9C
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF6DF0C6678
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: EnumSystemLocalesW,0_2_00007FF6DF0C6AA4
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF6DF0C6EDC
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: EnumSystemLocalesW,0_2_00007FF6DF0C69D4
    Source: C:\Users\user\Desktop\Metamask_setup.exeCode function: 0_2_00007FF6DF0CD3CC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6DF0CD3CC

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: Metamask_setup.exe PID: 7064, type: MEMORYSTR
    Source: Metamask_setup.exe, 00000000.00000002.1642063251.000002A5FD57C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum\wallets
    Source: Metamask_setup.exe, 00000000.00000002.1642063251.000002A5FD57C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ElectronCash\wallets
    Source: Metamask_setup.exe, 00000000.00000002.1642063251.000002A5FD57C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty (Web)
    Source: Metamask_setup.exe, 00000000.00000002.1642063251.000002A5FD57C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodus\exodus.wallet
    Source: Metamask_setup.exe, 00000000.00000002.1642063251.000002A5FD57C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore
    Source: Metamask_setup.exe, 00000000.00000002.1642063251.000002A5FD57C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum\keystore

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: Metamask_setup.exe PID: 7064, type: MEMORYSTR
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
    Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory11
    Security Software Discovery
    Remote Desktop Protocol1
    Data from Local System
    Exfiltration Over Bluetooth1
    Non-Standard Port
    SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
    Domain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
    File and Directory Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Ingress Tool Transfer
    Data Encrypted for ImpactDNS ServerEmail Addresses
    Local AccountsCronLogin HookLogin HookBinary PaddingNTDS12
    System Information Discovery
    Distributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Metamask_setup.exe82%ReversingLabsWin64.Spyware.Medusastealer
    Metamask_setup.exe79%VirustotalBrowse
    Metamask_setup.exe100%AviraTR/Spy.Agent.kgbyf
    Metamask_setup.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    77.105.147.171
    unknownRussian Federation
    42031PLUSTELECOM-ASRUtrue
    Joe Sandbox version:38.0.0 Ammolite
    Analysis ID:1379472
    Start date and time:2024-01-23 13:24:14 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 1m 59s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:1
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:Metamask_setup.exe
    Detection:MAL
    Classification:mal80.troj.spyw.winEXE@1/0@0/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    PLUSTELECOM-ASRUhttp://jerryposter.comGet hashmaliciousUnknownBrowse
    • 77.105.140.181
    hostcr.exeGet hashmaliciousRemcosBrowse
    • 77.105.132.70
    file.exeGet hashmaliciousPrivateLoaderBrowse
    • 77.105.147.130
    p1vNyPdVh2.exeGet hashmaliciousStealc, Vidar, zgRATBrowse
    • 77.105.132.229
    Judicial request.exeGet hashmaliciousRMSRemoteAdmin, Remote UtilitiesBrowse
    • 77.105.132.124
    Judicial request.exeGet hashmaliciousRMSRemoteAdmin, Remote UtilitiesBrowse
    • 77.105.132.124
    0442.EXE.exeGet hashmaliciousQuasarBrowse
    • 77.105.132.124
    gbquas.exeGet hashmaliciousQuasarBrowse
    • 77.105.132.124
    c_unpack.exeGet hashmaliciousRMSRemoteAdmin, Remote UtilitiesBrowse
    • 77.105.132.124
    c_unpack.exeGet hashmaliciousRMSRemoteAdmin, Remote UtilitiesBrowse
    • 77.105.132.124
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):6.338845189889762
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:Metamask_setup.exe
    File size:790'016 bytes
    MD5:618f137baf526f754d3ee3885acb9c04
    SHA1:a7f29acee8f33eee1b569fc992bdbbe2f413042c
    SHA256:512ec746b8318aa67bb11aa498a94d0e9848c241e7296c46757dcf1997e28be4
    SHA512:41d93eb646043fc2a16c0cb123d724db9091109dfd4ed457f45444859a38f463b3b410188d9ec1c0df8a3037a7846e8c94bd8e0dbe29634d44f01feb8a4bdf1e
    SSDEEP:12288:k/Dduefh+bErggggggggMfAF3m5mz1U/uuUtw/8DvC5mukp:mDduz6ggggggggMYF3Imzy2NAaC5M
    TLSH:1EF40934E69C3669D06BA078FC4B5C02E93278AA1320BFEB12D55A511F97EE15F3D360
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5...q.o.q.o.q.o.:.h.p.o.:.i.p.o.d.j...o.d.k.~.o.d.l.y.o.:.j...o.:.l.v.o.:.k.c.o.q.n...o.:.n.j.o.G.f.}.o.G...p.o.G.m.p.o.Richq.o
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x14007cb70
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x64F15F28 [Fri Sep 1 03:48:56 2023 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:59fc3561b97c1724a66e573b2805c788
    Instruction
    dec eax
    sub esp, 28h
    call 00007F397938B398h
    dec eax
    add esp, 28h
    jmp 00007F397938A9BFh
    int3
    int3
    and dword ptr [0003DBE5h], 00000000h
    ret
    dec eax
    mov dword ptr [esp+08h], ebx
    push ebp
    dec eax
    lea ebp, dword ptr [esp-000004C0h]
    dec eax
    sub esp, 000005C0h
    mov ebx, ecx
    mov ecx, 00000017h
    call dword ptr [0001C68Ah]
    test eax, eax
    je 00007F397938AB46h
    mov ecx, ebx
    int 29h
    mov ecx, 00000003h
    call 00007F397938AB09h
    xor edx, edx
    dec eax
    lea ecx, dword ptr [ebp-10h]
    inc ecx
    mov eax, 000004D0h
    call 00007F397938C484h
    dec eax
    lea ecx, dword ptr [ebp-10h]
    call dword ptr [0001C62Dh]
    dec eax
    mov ebx, dword ptr [ebp+000000E8h]
    dec eax
    lea edx, dword ptr [ebp+000004D8h]
    dec eax
    mov ecx, ebx
    inc ebp
    xor eax, eax
    call dword ptr [0001C61Bh]
    dec eax
    test eax, eax
    je 00007F397938AB7Eh
    dec eax
    and dword ptr [esp+38h], 00000000h
    dec eax
    lea ecx, dword ptr [ebp+000004E0h]
    dec eax
    mov edx, dword ptr [ebp+000004D8h]
    dec esp
    mov ecx, eax
    dec eax
    mov dword ptr [esp+30h], ecx
    dec esp
    mov eax, ebx
    dec eax
    lea ecx, dword ptr [ebp+000004E8h]
    dec eax
    mov dword ptr [esp+28h], ecx
    dec eax
    lea ecx, dword ptr [ebp-10h]
    dec eax
    mov dword ptr [esp+20h], ecx
    xor ecx, ecx
    call dword ptr [0001C5E2h]
    dec eax
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0xb5b900x118.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc60000x1e0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xbd0000x79e0.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0xc70000xb54.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0xa76a00x38.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0xa77000x28.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa75600x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x990000x650.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x97edc0x9800014fecd9441573d8f8846ade337580eadFalse0.42626953125zlib compressed data6.304920226712859IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x990000x1e0c00x1e2002619a9f8e04fbdc4bbf68a1be1ba22e6False0.4567313926348548DIY-Thermocam raw data (Lepton 2.x), scale 25856-27648, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 154742504910672534362390528.000000, slope 2543115696954447765978707132416.0000005.510471051944646IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0xb80000x44840x1e001ac5d7acfbfbd5b995f739e66ca25ec4False0.16067708333333333data3.2862763790147604IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0xbd0000x79e00x7a009063aa876dbea603cc0cba3a374e398dFalse0.40320824795081966data5.843380934302045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    _RDATA0xc50000x15c0x200392099a42f1a81299705ff2d92da8379False0.41015625data3.3726519446433953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0xc60000x1e00x20040051623f806a9ed9f88c3948606ca62False0.52734375data4.7137725829467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0xc70000xb540xc00b58ee936f6aedd3f50b5062d1561ba30False0.4661458333333333data5.269667204999112IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0xc60600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    WS2_32.dllhtons, inet_pton, WSAStartup, send, socket, connect, recv, WSACleanup, closesocket
    CRYPT32.dllCryptUnprotectData
    WININET.dllInternetQueryDataAvailable, InternetReadFile, InternetCloseHandle, InternetOpenW, InternetOpenUrlA, InternetOpenA, HttpQueryInfoW
    ntdll.dllNtQueryObject, NtQuerySystemInformation
    RstrtMgr.DLLRmGetList, RmStartSession, RmEndSession, RmRegisterResources
    KERNEL32.dllMultiByteToWideChar, LocalFree, WideCharToMultiByte, IsDebuggerPresent, WriteProcessMemory, TerminateProcess, GetModuleFileNameW, WaitForSingleObject, ResumeThread, CloseHandle, GetThreadContext, VirtualAllocEx, CreateProcessW, SetThreadContext, GetExitCodeProcess, ExitProcess, ReadFile, GetModuleFileNameA, GetVolumeInformationW, GetGeoInfoA, HeapFree, EnterCriticalSection, GetCurrentProcess, GetProcessId, GetProductInfo, LeaveCriticalSection, SetFilePointer, InitializeCriticalSectionEx, GetModuleHandleA, OpenProcess, HeapSize, GetLogicalDriveStringsW, GetFinalPathNameByHandleA, GetTimeZoneInformation, GetLastError, HeapReAlloc, GetNativeSystemInfo, HeapAlloc, GetUserGeoID, DecodePointer, GetProcAddress, GetFileSize, DeleteCriticalSection, GetComputerNameW, GetProcessHeap, GlobalMemoryStatusEx, GetModuleHandleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, IsProcessorFeaturePresent, GetCurrentProcessId, GetSystemTimeAsFileTime, FreeLibrary, GetModuleHandleExW, VirtualAlloc, VirtualProtect, VirtualQuery, GetCurrentThreadId, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, InitializeCriticalSectionAndSpinCount, LoadLibraryExW, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetStdHandle, GetFileType, GetStartupInfoW, RaiseException, GetFileSizeEx, SetFilePointerEx, FlushFileBuffers, WriteFile, GetConsoleOutputCP, GetConsoleMode, ReadConsoleW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetStringTypeW, SetStdHandle, CreateFileW, WriteConsoleW, OutputDebugStringW, SetEndOfFile, FreeEnvironmentStringsW, SetEnvironmentVariableW, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, QueryPerformanceCounter, InitializeSListHead, RtlUnwindEx, RtlUnwind, RtlPcToFileHeader, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LCMapStringEx, GetCommandLineA, GetCommandLineW, GetSystemInfo, GetEnvironmentStringsW, GetFileInformationByHandleEx, AreFileApisANSI, GetFileAttributesExW, FindNextFileW, FindFirstFileExW, FindFirstFileW, FindClose, FormatMessageA, GetLocaleInfoEx, GetCurrentDirectoryW
    USER32.dllEnumDisplayDevicesW, GetDC, GetSystemMetrics, GetWindowRect, ReleaseDC, GetDesktopWindow
    GDI32.dllBitBlt, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetDeviceCaps, DeleteDC, GetObjectW, DeleteObject
    ADVAPI32.dllRegCloseKey, RegQueryValueExA, RegOpenKeyExA, GetUserNameW, RegEnumKeyExA, GetCurrentHwProfileW
    SHELL32.dllShellExecuteA, SHGetKnownFolderPath
    ole32.dllCoTaskMemFree, CreateStreamOnHGlobal
    SHLWAPI.dll
    gdiplus.dllGdiplusStartup, GdiplusShutdown, GdipGetImageEncoders, GdipCloneImage, GdipAlloc, GdipCreateBitmapFromScan0, GdipSaveImageToStream, GdipGetImageEncodersSize, GdipDisposeImage, GdipFree, GdipCreateBitmapFromHBITMAP
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Jan 23, 2024 13:24:59.873930931 CET4972915666192.168.2.477.105.147.171
    Jan 23, 2024 13:25:00.086932898 CET156664972977.105.147.171192.168.2.4
    Jan 23, 2024 13:25:00.588654995 CET4972915666192.168.2.477.105.147.171
    Jan 23, 2024 13:25:00.802571058 CET156664972977.105.147.171192.168.2.4
    Jan 23, 2024 13:25:01.307445049 CET4972915666192.168.2.477.105.147.171
    Jan 23, 2024 13:25:01.520523071 CET156664972977.105.147.171192.168.2.4
    Jan 23, 2024 13:25:02.026153088 CET4972915666192.168.2.477.105.147.171
    Jan 23, 2024 13:25:02.239245892 CET156664972977.105.147.171192.168.2.4
    Jan 23, 2024 13:25:02.744898081 CET4972915666192.168.2.477.105.147.171
    Jan 23, 2024 13:25:02.958246946 CET156664972977.105.147.171192.168.2.4

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:13:24:59
    Start date:23/01/2024
    Path:C:\Users\user\Desktop\Metamask_setup.exe
    Wow64 process (32bit):false
    Commandline:C:\Users\user\Desktop\Metamask_setup.exe
    Imagebase:0x7ff6df050000
    File size:790'016 bytes
    MD5 hash:618F137BAF526F754D3EE3885ACB9C04
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:1.2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:19.7%
      Total number of Nodes:2000
      Total number of Limit Nodes:10
      execution_graph 13884 7ff6df0896f0 13950 7ff6df0d379c 13884->13950 13886 7ff6df089720 13887 7ff6df0d379c std::_Lockit::_Lockit 6 API calls 13886->13887 13889 7ff6df089745 13886->13889 13887->13889 13888 7ff6df0897bd 13983 7ff6df0cc440 13888->13983 13889->13888 13954 7ff6df088d60 13889->13954 13893 7ff6df0897cf 13894 7ff6df0897d5 13893->13894 13895 7ff6df089836 13893->13895 13980 7ff6df0d39ac 13894->13980 13992 7ff6df088ae0 13895->13992 13900 7ff6df089a78 13902 7ff6df089a81 13900->13902 13903 7ff6df089a8a 13900->13903 13901 7ff6df089ac2 14067 7ff6df0890c0 13901->14067 14024 7ff6df08a160 13902->14024 13904 7ff6df0898c5 13904->13900 13904->13901 13907 7ff6df089a89 13907->13903 13910 7ff6df089b15 13911 7ff6df089d90 230 API calls 13910->13911 13913 7ff6df08a282 13910->13913 13911->13913 13912 7ff6df08a42d 13915 7ff6df08a43f 13912->13915 13916 7ff6df08a436 13912->13916 13913->13912 13914 7ff6df08a46c 13913->13914 13918 7ff6df0890c0 230 API calls 13914->13918 13917 7ff6df08a160 230 API calls 13916->13917 13919 7ff6df08a43e 13917->13919 13920 7ff6df08a4b0 13918->13920 13919->13915 13921 7ff6df0cf3f4 Concurrency::cancel_current_task 2 API calls 13920->13921 13922 7ff6df08a4c1 13921->13922 13923 7ff6df08a63e 13922->13923 13924 7ff6df08a50d 13922->13924 14085 7ff6df072550 13923->14085 13927 7ff6df08a596 13924->13927 13928 7ff6df08a56a 13924->13928 13926 7ff6df08a643 14088 7ff6df072490 13926->14088 13931 7ff6df0cc580 std::_Facet_Register 55 API calls 13927->13931 13933 7ff6df08a57f memcpy_s 13927->13933 13928->13926 13929 7ff6df08a577 13928->13929 14075 7ff6df0cc580 13929->14075 13931->13933 13937 7ff6df08a5fb memcpy_s 13933->13937 14094 7ff6df0ae56c 13933->14094 13951 7ff6df0d37b0 13950->13951 13952 7ff6df0d37ab 13950->13952 13951->13886 14099 7ff6df0bb678 13952->14099 13955 7ff6df088d90 13954->13955 13978 7ff6df088e7a __std_exception_copy 13954->13978 13956 7ff6df0cc580 std::_Facet_Register 55 API calls 13955->13956 13955->13978 13957 7ff6df088da2 13956->13957 13958 7ff6df0d379c std::_Lockit::_Lockit 6 API calls 13957->13958 13959 7ff6df088dd3 13958->13959 13960 7ff6df088e0f 13959->13960 13961 7ff6df088f0d 13959->13961 14132 7ff6df0d3b5c 13960->14132 14139 7ff6df0d3614 13961->14139 13972 7ff6df0d3e21 13975 7ff6df0d3e56 13972->13975 13976 7ff6df0d3e5c 13972->13976 13979 7ff6df0d3e30 13972->13979 14154 7ff6df0ae850 13972->14154 13975->13976 13975->13979 14163 7ff6df0be178 13975->14163 13976->13979 14168 7ff6df0d43d8 13976->14168 13978->13893 13979->13893 13981 7ff6df0cc580 std::_Facet_Register 55 API calls 13980->13981 13982 7ff6df0d39bf 13981->13982 13982->13888 13984 7ff6df0cc449 13983->13984 13985 7ff6df089823 13984->13985 13986 7ff6df0cce8c IsProcessorFeaturePresent 13984->13986 13987 7ff6df0ccea4 13986->13987 14494 7ff6df0cd080 RtlCaptureContext 13987->14494 13993 7ff6df088aee Concurrency::cancel_current_task 13992->13993 13994 7ff6df0cf3f4 Concurrency::cancel_current_task 2 API calls 13993->13994 13995 7ff6df088aff 13994->13995 13996 7ff6df0ce208 __std_exception_copy 53 API calls 13995->13996 13997 7ff6df088b2d 13996->13997 13997->13904 13998 7ff6df089d90 13997->13998 13999 7ff6df089dce 13998->13999 14000 7ff6df089e4e 13998->14000 14499 7ff6df089cf0 13999->14499 14002 7ff6df0cc440 _log10_special 8 API calls 14000->14002 14004 7ff6df089e7b 14002->14004 14004->13904 14005 7ff6df089e3b 14005->14000 14006 7ff6df08a160 236 API calls 14005->14006 14006->14000 14007 7ff6df089e90 14008 7ff6df0890c0 236 API calls 14007->14008 14009 7ff6df089ed2 14008->14009 14010 7ff6df0cf3f4 Concurrency::cancel_current_task 2 API calls 14009->14010 14011 7ff6df089ee3 14010->14011 14012 7ff6df089d90 236 API calls 14011->14012 14013 7ff6df089f3b 14011->14013 14012->14013 14014 7ff6df08a040 14013->14014 14016 7ff6df08a002 14013->14016 14018 7ff6df0890c0 236 API calls 14014->14018 14015 7ff6df08a013 14015->13904 14016->14015 14017 7ff6df08a160 236 API calls 14016->14017 14017->14015 14019 7ff6df08a082 14018->14019 14020 7ff6df0cf3f4 Concurrency::cancel_current_task 2 API calls 14019->14020 14021 7ff6df08a093 14020->14021 14503 7ff6df0896f0 14021->14503 14023 7ff6df08a0d6 14023->13904 14025 7ff6df08a1a9 14024->14025 14026 7ff6df08a177 14024->14026 14025->13907 14026->14025 14027 7ff6df0890c0 230 API calls 14026->14027 14028 7ff6df08a1ef 14027->14028 14029 7ff6df0cf3f4 Concurrency::cancel_current_task 2 API calls 14028->14029 14030 7ff6df08a200 14029->14030 14031 7ff6df089d90 230 API calls 14030->14031 14037 7ff6df08a282 14030->14037 14031->14037 14032 7ff6df08a46c 14036 7ff6df0890c0 230 API calls 14032->14036 14033 7ff6df08a42d 14034 7ff6df08a43e 14033->14034 14035 7ff6df08a160 230 API calls 14033->14035 14034->13907 14035->14034 14038 7ff6df08a4b0 14036->14038 14037->14032 14037->14033 14039 7ff6df0cf3f4 Concurrency::cancel_current_task 2 API calls 14038->14039 14040 7ff6df08a4c1 14039->14040 14041 7ff6df08a63e 14040->14041 14042 7ff6df08a50d 14040->14042 14043 7ff6df072550 55 API calls 14041->14043 14045 7ff6df08a596 14042->14045 14046 7ff6df08a56a 14042->14046 14044 7ff6df08a643 14043->14044 14050 7ff6df072490 Concurrency::cancel_current_task 55 API calls 14044->14050 14049 7ff6df0cc580 std::_Facet_Register 55 API calls 14045->14049 14051 7ff6df08a57f memcpy_s 14045->14051 14046->14044 14047 7ff6df08a577 14046->14047 14048 7ff6df0cc580 std::_Facet_Register 55 API calls 14047->14048 14048->14051 14049->14051 14050->14051 14052 7ff6df0ae56c _invalid_parameter_noinfo_noreturn 52 API calls 14051->14052 14055 7ff6df08a5fb memcpy_s 14051->14055 14053 7ff6df08a64f std::_Locinfo::_Locinfo_ctor 14052->14053 14054 7ff6df08a662 InternetOpenW 14053->14054 14056 7ff6df08a76b 14054->14056 14057 7ff6df08a6cb InternetOpenUrlA 14054->14057 14055->13907 14059 7ff6df0cc440 _log10_special 8 API calls 14056->14059 14061 7ff6df08a762 InternetCloseHandle 14057->14061 14062 7ff6df08a6fc InternetReadFile 14057->14062 14060 7ff6df08a77e 14059->14060 14060->13907 14061->14056 14063 7ff6df08a759 InternetCloseHandle 14062->14063 14064 7ff6df08a719 14062->14064 14063->14061 14064->14063 14065 7ff6df08ad30 55 API calls 14064->14065 14066 7ff6df08a73c InternetReadFile 14065->14066 14066->14063 14066->14064 14596 7ff6df0888a0 14067->14596 14069 7ff6df0890e3 14070 7ff6df0cf3f4 14069->14070 14071 7ff6df0cf413 14070->14071 14072 7ff6df0cf45e RaiseException 14071->14072 14073 7ff6df0cf43c RtlPcToFileHeader 14071->14073 14072->13910 14074 7ff6df0cf454 14073->14074 14074->14072 14077 7ff6df0cc58b 14075->14077 14076 7ff6df0b7f98 __std_exception_copy 12 API calls 14076->14077 14077->14076 14078 7ff6df0cc5a4 14077->14078 14079 7ff6df0c75a4 std::_Facet_Register 2 API calls 14077->14079 14080 7ff6df0cc5aa 14077->14080 14078->13933 14079->14077 14081 7ff6df0cc5b5 14080->14081 14082 7ff6df0cd3a0 Concurrency::cancel_current_task 2 API calls 14080->14082 14083 7ff6df072490 Concurrency::cancel_current_task 55 API calls 14081->14083 14082->14081 14084 7ff6df0cc5bb 14083->14084 14086 7ff6df0d35cc 55 API calls 14085->14086 14087 7ff6df072560 14086->14087 14089 7ff6df07249e Concurrency::cancel_current_task 14088->14089 14090 7ff6df0cf3f4 Concurrency::cancel_current_task 2 API calls 14089->14090 14091 7ff6df0724af 14090->14091 14092 7ff6df0ce208 __std_exception_copy 53 API calls 14091->14092 14093 7ff6df0724dd 14092->14093 14093->13933 14095 7ff6df0ae3e4 _invalid_parameter_noinfo_noreturn 52 API calls 14094->14095 14096 7ff6df0ae585 14095->14096 14097 7ff6df0ae59c _invalid_parameter_noinfo_noreturn 17 API calls 14096->14097 14098 7ff6df0ae59a 14097->14098 14102 7ff6df0baa08 14099->14102 14123 7ff6df0ba018 14102->14123 14105 7ff6df0ba018 __crtLCMapStringW 5 API calls 14106 7ff6df0baa47 14105->14106 14107 7ff6df0ba018 __crtLCMapStringW 5 API calls 14106->14107 14108 7ff6df0baa66 14107->14108 14109 7ff6df0ba018 __crtLCMapStringW 5 API calls 14108->14109 14110 7ff6df0baa85 14109->14110 14111 7ff6df0ba018 __crtLCMapStringW 5 API calls 14110->14111 14112 7ff6df0baaa4 14111->14112 14113 7ff6df0ba018 __crtLCMapStringW 5 API calls 14112->14113 14114 7ff6df0baac3 14113->14114 14115 7ff6df0ba018 __crtLCMapStringW 5 API calls 14114->14115 14116 7ff6df0baae2 14115->14116 14117 7ff6df0ba018 __crtLCMapStringW 5 API calls 14116->14117 14118 7ff6df0bab01 14117->14118 14119 7ff6df0ba018 __crtLCMapStringW 5 API calls 14118->14119 14120 7ff6df0bab20 14119->14120 14121 7ff6df0ba018 __crtLCMapStringW 5 API calls 14120->14121 14122 7ff6df0bab3f 14121->14122 14124 7ff6df0ba075 14123->14124 14130 7ff6df0ba070 __crtLCMapStringW 14123->14130 14124->14105 14125 7ff6df0ba0a5 LoadLibraryExW 14127 7ff6df0ba17a 14125->14127 14128 7ff6df0ba0ca GetLastError 14125->14128 14126 7ff6df0ba19a GetProcAddressForCaller 14126->14124 14127->14126 14129 7ff6df0ba191 FreeLibrary 14127->14129 14128->14130 14129->14126 14130->14124 14130->14125 14130->14126 14131 7ff6df0ba104 LoadLibraryExW 14130->14131 14131->14127 14131->14130 14188 7ff6df0d522c 14132->14188 14273 7ff6df0725f0 14139->14273 14142 7ff6df0cf3f4 Concurrency::cancel_current_task 2 API calls 14143 7ff6df088f19 14142->14143 14143->13972 14144 7ff6df0c4478 14143->14144 14396 7ff6df0b8318 GetLastError 14144->14396 14146 7ff6df0c4481 14437 7ff6df0bb024 14146->14437 14149 7ff6df0c4448 14150 7ff6df0b8318 _Getctype 52 API calls 14149->14150 14151 7ff6df0c4451 14150->14151 14152 7ff6df0bb024 _Getctype 52 API calls 14151->14152 14153 7ff6df0c446a 14152->14153 14153->13972 14155 7ff6df0ae88a 14154->14155 14159 7ff6df0ae869 14154->14159 14156 7ff6df0b8318 _Getctype 52 API calls 14155->14156 14157 7ff6df0ae88f 14156->14157 14158 7ff6df0bb024 _Getctype 52 API calls 14157->14158 14160 7ff6df0ae8a8 14158->14160 14159->13975 14160->14159 14454 7ff6df0baf1c 14160->14454 14164 7ff6df0b8318 _Getctype 52 API calls 14163->14164 14165 7ff6df0be181 14164->14165 14166 7ff6df0bb024 _Getctype 52 API calls 14165->14166 14167 7ff6df0be19a 14166->14167 14167->13976 14169 7ff6df0d442d MultiByteToWideChar 14168->14169 14172 7ff6df0d4419 14168->14172 14170 7ff6df0d445b 14169->14170 14186 7ff6df0d4590 __std_exception_copy 14169->14186 14174 7ff6df0b7f98 __std_exception_copy 12 API calls 14170->14174 14175 7ff6df0d4486 std::_Locinfo::_Locinfo_ctor 14170->14175 14170->14186 14171 7ff6df0cc440 _log10_special 8 API calls 14173 7ff6df0d46b4 14171->14173 14172->14169 14173->13979 14174->14175 14176 7ff6df0d44da MultiByteToWideChar 14175->14176 14175->14186 14177 7ff6df0d4500 LCMapStringEx 14176->14177 14176->14186 14178 7ff6df0d453a 14177->14178 14177->14186 14179 7ff6df0d4544 14178->14179 14180 7ff6df0d4595 14178->14180 14181 7ff6df0d4557 LCMapStringEx 14179->14181 14179->14186 14182 7ff6df0b7f98 __std_exception_copy 12 API calls 14180->14182 14183 7ff6df0d45b3 std::_Locinfo::_Locinfo_ctor 14180->14183 14180->14186 14181->14186 14182->14183 14184 7ff6df0d4608 LCMapStringEx 14183->14184 14183->14186 14185 7ff6df0d463c WideCharToMultiByte 14184->14185 14184->14186 14185->14186 14186->14171 14189 7ff6df0baa08 std::_Locinfo::_Locinfo_ctor 5 API calls 14188->14189 14190 7ff6df0d5242 14189->14190 14197 7ff6df0d4f50 14190->14197 14204 7ff6df0bb608 EnterCriticalSection 14197->14204 14278 7ff6df0ce208 14273->14278 14275 7ff6df072638 14276 7ff6df0cc440 _log10_special 8 API calls 14275->14276 14277 7ff6df072653 14276->14277 14277->14142 14279 7ff6df0ce229 14278->14279 14282 7ff6df0ce25e __std_exception_copy 14278->14282 14280 7ff6df0b7f98 __std_exception_copy 12 API calls 14279->14280 14279->14282 14281 7ff6df0ce247 14280->14281 14281->14282 14284 7ff6df0c04a8 14281->14284 14282->14275 14285 7ff6df0c04bf 14284->14285 14286 7ff6df0c04b5 14284->14286 14287 7ff6df0b7450 memcpy_s 11 API calls 14285->14287 14286->14285 14291 7ff6df0c04da 14286->14291 14288 7ff6df0c04c6 14287->14288 14293 7ff6df0ae54c 14288->14293 14289 7ff6df0c04d2 14289->14282 14291->14289 14292 7ff6df0b7450 memcpy_s 11 API calls 14291->14292 14292->14288 14296 7ff6df0ae3e4 14293->14296 14297 7ff6df0ae40f 14296->14297 14304 7ff6df0ae480 14297->14304 14301 7ff6df0ae46e 14301->14289 14302 7ff6df0ae459 14302->14301 14303 7ff6df0ae160 _invalid_parameter_noinfo_noreturn 52 API calls 14302->14303 14303->14301 14323 7ff6df0ae1c8 14304->14323 14308 7ff6df0ae436 14308->14302 14314 7ff6df0ae160 14308->14314 14315 7ff6df0ae1b3 14314->14315 14316 7ff6df0ae173 GetLastError 14314->14316 14315->14302 14317 7ff6df0ae183 14316->14317 14318 7ff6df0b8558 _invalid_parameter_noinfo_noreturn 16 API calls 14317->14318 14319 7ff6df0ae19e SetLastError 14318->14319 14319->14315 14320 7ff6df0ae1c1 14319->14320 14361 7ff6df0ae684 14320->14361 14324 7ff6df0ae21f 14323->14324 14325 7ff6df0ae1e4 GetLastError 14323->14325 14324->14308 14329 7ff6df0ae234 14324->14329 14326 7ff6df0ae1f4 14325->14326 14336 7ff6df0b8558 14326->14336 14330 7ff6df0ae250 GetLastError SetLastError 14329->14330 14331 7ff6df0ae268 14329->14331 14330->14331 14331->14308 14332 7ff6df0ae59c IsProcessorFeaturePresent 14331->14332 14333 7ff6df0ae5af 14332->14333 14353 7ff6df0ae280 14333->14353 14337 7ff6df0b8592 FlsSetValue 14336->14337 14338 7ff6df0b8577 FlsGetValue 14336->14338 14339 7ff6df0b859f 14337->14339 14341 7ff6df0ae20f SetLastError 14337->14341 14340 7ff6df0b858c 14338->14340 14338->14341 14342 7ff6df0bb708 _Getctype 11 API calls 14339->14342 14340->14337 14341->14324 14343 7ff6df0b85ae 14342->14343 14344 7ff6df0b85cc FlsSetValue 14343->14344 14345 7ff6df0b85bc FlsSetValue 14343->14345 14347 7ff6df0b85d8 FlsSetValue 14344->14347 14348