There are a number of functions being called that cannot be traced back to an actual function. There is barely any information to indicate which function is being called. This is a common problem that comes up when analyzing malware. The solution is to solve this problem using a tool called Immunity Debugger. The tool that I am going to use to automate this problem is the tool that is called PyCommandPyCommands. PyCommands are saved in the applications directory and are called slowly using PyCommand commands. These commands are launched using the command box at the bottom of the window.”]
Source: https://blog.talosintelligence.com/2014/04/using-immunity-debugger-api-to-automate.html

