Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
to.exe

Overview

General Information

Sample name:to.exe
Analysis ID:1446064
MD5:6dc33ba531fce8c8ee24585f48d14297
SHA1:ebcf11b40ac7087e9390a63968928b2d09e1678d
SHA256:c450f93d63c121ab42dc4b8978eebe263e53530ef6107a461f68f7f2f2f51cdd
Tags:exe
Infos:

Detection

CobaltStrike
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
.NET source code contains very large strings
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • to.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\to.exe" MD5: 6DC33BA531FCE8C8EE24585F48D14297)
    • conhost.exe (PID: 6604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTP"], "Port": 4545, "SleepTime": 55000, "MaxGetSize": 2098751, "Jitter": 40, "C2Server": "138.68.79.95,/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6", "HttpPostUri": "/messages/IgTsSe2N7hV72H5tmL7bVrTR", "Malleable_C2_Instructions": ["Remove 1190 bytes from the end", "Remove 12 bytes from the end", "Remove 397 bytes from the beginning", "NetBIOS decode 'a'"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 96, "Spawnto_x86": "%windir%\\syswow64\\bootcfg.exe", "Spawnto_x64": "%windir%\\sysnative\\bootcfg.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 11629, "ProcInject_PrependAppend_x86": ["kJCQkJCQkJCQ", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQkJCQkJCQ", "Empty"], "ProcInject_Execute": ["CreateThread", "CreateRemoteThread", "NtQueueApcThread", "RtlCreateUserThread", "ntdll.dll:RtlUserThreadStart", "NtQueueApcThread-s", "SetThreadContext", "CreateRemoteThread", "kernel32.dll:LoadLibraryA", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2913285622.0000000002241000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
    00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
    • 0x1c93c:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
    00000000.00000002.2913371456.0000000002270000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.2913371456.0000000002270000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_b54b94acRule for beacon sleep obfuscation routineunknown
      • 0x137:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
      00000000.00000002.2913495283.0000000012513000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
        Click to see the 2 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: to.exeAvira: detected
        Source: 00000000.00000002.2913495283.0000000012513000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTP"], "Port": 4545, "SleepTime": 55000, "MaxGetSize": 2098751, "Jitter": 40, "C2Server": "138.68.79.95,/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6", "HttpPostUri": "/messages/IgTsSe2N7hV72H5tmL7bVrTR", "Malleable_C2_Instructions": ["Remove 1190 bytes from the end", "Remove 12 bytes from the end", "Remove 397 bytes from the beginning", "NetBIOS decode 'a'"], "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 96, "Spawnto_x86": "%windir%\\syswow64\\bootcfg.exe", "Spawnto_x64": "%windir%\\sysnative\\bootcfg.exe", "CryptoScheme": 0, "Proxy_Behavior": "Use IE settings", "Watermark": 987654321, "bStageCleanup": "True", "bCFGCaution": "False", "KillDate": 0, "bProcInject_StartRWX": "True", "bProcInject_UseRWX": "False", "bProcInject_MinAllocSize": 11629, "ProcInject_PrependAppend_x86": ["kJCQkJCQkJCQ", "Empty"], "ProcInject_PrependAppend_x64": ["kJCQkJCQkJCQ", "Empty"], "ProcInject_Execute": ["CreateThread", "CreateRemoteThread", "NtQueueApcThread", "RtlCreateUserThread", "ntdll.dll:RtlUserThreadStart", "NtQueueApcThread-s", "SetThreadContext", "CreateRemoteThread", "kernel32.dll:LoadLibraryA", "RtlCreateUserThread"], "ProcInject_AllocationMethod": "VirtualAllocEx", "bUsesCookies": "True", "HostHeader": ""}
        Source: to.exeReversingLabs: Detection: 36%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 72.1% probability
        Source: to.exeJoe Sandbox ML: detected
        Source: to.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: to.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Networking

        barindex
        Source: Malware configuration extractorURLs: 138.68.79.95
        Source: unknownDNS traffic detected: query: 171.39.242.20.in-addr.arpa replaycode: Name error (3)
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
        Source: to.exe, 00000000.00000002.2913963149.000000001B4B4000.00000004.00000020.00020000.00000000.sdmp, to.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6
        Source: to.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6.
        Source: to.exe, 00000000.00000002.2913963149.000000001B4B4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6Cryptographic
        Source: to.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6b
        Source: to.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6h
        Source: to.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6p

        System Summary

        barindex
        Source: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
        Source: 00000000.00000002.2913371456.0000000002270000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
        Source: 00000000.00000002.2913495283.0000000012513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
        Source: to.exe, Program.csLong String: Length: 311752
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0223C2800_2_0223C280
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_02226B380_2_02226B38
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0223CBF00_2_0223CBF0
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0222F1A80_2_0222F1A8
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_02230E640_2_02230E64
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_02231F9C0_2_02231F9C
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_022315280_2_02231528
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_022700000_2_02270000
        Source: to.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
        Source: 00000000.00000002.2913371456.0000000002270000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
        Source: 00000000.00000002.2913495283.0000000012513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
        Source: to.exe, Program.csBase64 encoded string: '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
        Source: classification engineClassification label: mal96.troj.winEXE@2/0@1/0
        Source: C:\Users\user\Desktop\to.exeMutant created: NULL
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6604:120:WilError_03
        Source: to.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: to.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        Source: C:\Users\user\Desktop\to.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: to.exeReversingLabs: Detection: 36%
        Source: unknownProcess created: C:\Users\user\Desktop\to.exe "C:\Users\user\Desktop\to.exe"
        Source: C:\Users\user\Desktop\to.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\to.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\to.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
        Source: to.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
        Source: to.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0221935D push edi; iretd 0_2_0221935E
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0223A86F push ebp; iretd 0_2_0223A870
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0223A84F push ebp; iretd 0_2_0223A850
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0223A898 push ebp; iretd 0_2_0223A899
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0221F901 push ebx; iretd 0_2_0221F902
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0221B91C pushad ; retf 0_2_0221B91D
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0221971E push cs; retf 0_2_0221971F
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_0221AD58 push ebp; iretd 0_2_0221AD59
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\to.exeMemory allocated: B60000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\to.exeMemory allocated: 1A3C0000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -44076s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -97516s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -37895s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -40528s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -51729s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -39072s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -47028s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -39187s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -34918s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -42263s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -50718s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -36384s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -48486s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -36856s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -53331s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -48704s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -43197s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -36423s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -45842s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -45788s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -47676s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -52687s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -48750s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -46553s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -44785s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -49484s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -50280s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -35766s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -45780s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -53571s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -46648s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -49639s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -46734s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -36246s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -46581s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -36062s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -45121s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -37676s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -47603s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -34426s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -38749s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -50313s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -36712s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -52133s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -49229s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -34541s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -38765s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -49515s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -49014s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -36682s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -48169s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -48106s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -54025s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -49744s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -47207s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -33947s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -53334s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -53431s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -48623s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -33521s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -52493s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -50653s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -48000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\to.exe TID: 6608Thread sleep time: -38973s >= -30000sJump to behavior
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 44076Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 48758Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 37895Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 40528Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 51729Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 39072Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 47028Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 39187Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 34918Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 42263Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 50718Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 36384Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 48486Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 36856Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 53331Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 48704Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 43197Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 36423Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 45842Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 45788Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 47676Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 52687Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 48750Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 46553Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 44785Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 49484Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 50280Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 35766Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 45780Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 53571Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 46648Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 49639Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 46734Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 36246Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 46581Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 36062Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 45121Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 37676Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 47603Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 34426Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 38749Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 50313Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 36712Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 52133Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 49229Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 34541Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 38765Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 49515Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 49014Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 36682Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 48169Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 48106Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 54025Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 49744Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 47207Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 33947Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 53334Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 53431Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 48623Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 33521Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 52493Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 50653Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 48000Jump to behavior
        Source: C:\Users\user\Desktop\to.exeThread delayed: delay time: 38973Jump to behavior
        Source: to.exe, 00000000.00000002.2913963149.000000001B4B4000.00000004.00000020.00020000.00000000.sdmp, to.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\to.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\to.exeQueries volume information: C:\Users\user\Desktop\to.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\to.exeCode function: 0_2_02224E28 GetUserNameA,strrchr,_snprintf,0_2_02224E28
        Source: C:\Users\user\Desktop\to.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000002.2913285622.0000000002241000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2913371456.0000000002270000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000002.2913495283.0000000012513000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: to.exe PID: 6576, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
        DLL Side-Loading
        1
        Process Injection
        1
        Disable or Modify Tools
        OS Credential Dumping1
        Security Software Discovery
        Remote Services1
        Archive Collected Data
        1
        Encrypted Channel
        Exfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        DLL Side-Loading
        21
        Virtualization/Sandbox Evasion
        LSASS Memory21
        Virtualization/Sandbox Evasion
        Remote Desktop ProtocolData from Removable Media1
        Non-Application Layer Protocol
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        Process Injection
        Security Account Manager1
        Account Discovery
        SMB/Windows Admin SharesData from Network Shared Drive11
        Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Obfuscated Files or Information
        NTDS1
        System Owner/User Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        DLL Side-Loading
        LSA Secrets12
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        to.exe37%ReversingLabs
        to.exe100%AviraHEUR/AGEN.1305446
        to.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6h0%Avira URL Cloudsafe
        http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6.0%Avira URL Cloudsafe
        http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju60%Avira URL Cloudsafe
        http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6Cryptographic0%Avira URL Cloudsafe
        http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6p0%Avira URL Cloudsafe
        http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6b0%Avira URL Cloudsafe
        138.68.79.950%Avira URL Cloudsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        171.39.242.20.in-addr.arpa
        unknown
        unknowntrue
          unknown
          NameMaliciousAntivirus DetectionReputation
          138.68.79.95true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6hto.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6to.exe, 00000000.00000002.2913963149.000000001B4B4000.00000004.00000020.00020000.00000000.sdmp, to.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6pto.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6bto.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6Cryptographicto.exe, 00000000.00000002.2913963149.000000001B4B4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://138.68.79.95:4545/messages/EUZe0uldTA2AbkYWRhTDDfV6zreju6.to.exe, 00000000.00000002.2912546253.0000000000658000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1446064
          Start date and time:2024-05-22 22:07:02 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 17s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:to.exe
          Detection:MAL
          Classification:mal96.troj.winEXE@2/0@1/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 10
          • Number of non-executed functions: 35
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 138.68.79.95
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtDeviceIoControlFile calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: to.exe
          TimeTypeDescription
          16:07:57API Interceptor65x Sleep call for process: to.exe modified
          No context
          No context
          No context
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):4.013345678436382
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          • Win32 Executable (generic) a (10002005/4) 49.78%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          File name:to.exe
          File size:628'736 bytes
          MD5:6dc33ba531fce8c8ee24585f48d14297
          SHA1:ebcf11b40ac7087e9390a63968928b2d09e1678d
          SHA256:c450f93d63c121ab42dc4b8978eebe263e53530ef6107a461f68f7f2f2f51cdd
          SHA512:610c85c99f931ea5fdebb31743bea9f902eee5bb27a8c3708266018116079afeaf2b56f3fed99ed8513b619ae8b34458536234a5875db4cf0e7bcabefce96542
          SSDEEP:12288:GAZs5aKLy6Xnud0CeCWchG5KLJ4QG/y/sp0OwwyQm1AMCZWMqw5OD:eXr/p0iyh1A
          TLSH:AED439342DEA602AB173EF698BE475DADA5FB7633B03585D10A1038A0723D42EED153D
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....O>f................................. ........@.. ....................................@................................
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x49ad2e
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x663E4FDF [Fri May 10 16:48:31 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x9acd80x53.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x9c0000x4c8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x9e0000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x98d340x98e0023d75d1886dcd8ca2846d68859b74184False0.480210036794767data4.012370674858687IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0x9c0000x4c80x6004849b375f65ccb47316f0f1e1e917f13False0.37109375data3.6782600390338445IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x9e0000xc0x2009894ec3063af32abda01354b264192bfFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_VERSION0x9c0a00x234data0.4645390070921986
          RT_MANIFEST0x9c2d80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
          DLLImport
          mscoree.dll_CorExeMain
          TimestampSource PortDest PortSource IPDest IP
          May 22, 2024 22:08:28.121212006 CEST5356434162.159.36.2192.168.2.4
          May 22, 2024 22:08:28.843261003 CEST5631153192.168.2.41.1.1.1
          May 22, 2024 22:08:29.152483940 CEST53563111.1.1.1192.168.2.4
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          May 22, 2024 22:08:28.843261003 CEST192.168.2.41.1.1.10x408dStandard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          May 22, 2024 22:08:29.152483940 CEST1.1.1.1192.168.2.40x408dName error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:16:07:52
          Start date:22/05/2024
          Path:C:\Users\user\Desktop\to.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\to.exe"
          Imagebase:0x100000
          File size:628'736 bytes
          MD5 hash:6DC33BA531FCE8C8EE24585F48D14297
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2913285622.0000000002241000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2913371456.0000000002270000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.2913371456.0000000002270000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2913495283.0000000012513000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.2913495283.0000000012513000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          Reputation:low
          Has exited:false

          Target ID:1
          Start time:16:07:52
          Start date:22/05/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7699e0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:3.3%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:4.8%
            Total number of Nodes:954
            Total number of Limit Nodes:59
            execution_graph 15226 2270000 15228 2270021 15226->15228 15227 22700ce SleepEx 15229 22700de 15227->15229 15228->15227 15228->15228 16119 221ea1c 16120 221ea43 _DllMainCRTStartup 16119->16120 16122 221eac6 16120->16122 16123 221d65c 16120->16123 16124 221d5a4 _DllMainCRTStartup 16123->16124 16127 221bee8 16124->16127 16126 221d63a 16126->16122 16128 221bf09 16127->16128 16129 221bf2c 16128->16129 16131 221bf1d 16128->16131 16141 221bf4c 16129->16141 16134 221d424 16131->16134 16132 221bf2a 16132->16126 16135 221d445 16134->16135 16136 221d451 16135->16136 16137 221d458 16135->16137 16148 221d338 16136->16148 16139 221bf4c _DllMainCRTStartup 3 API calls 16137->16139 16140 221d456 16139->16140 16140->16132 16154 221d474 16141->16154 16144 221bf98 16144->16132 16145 221bf90 16147 222e244 free 3 API calls 16145->16147 16147->16144 16149 221d363 _DllMainCRTStartup 16148->16149 16150 221bf4c _DllMainCRTStartup 3 API calls 16149->16150 16151 221d3d0 16150->16151 16152 221d407 16151->16152 16153 221bf4c _DllMainCRTStartup 3 API calls 16151->16153 16152->16140 16153->16151 16155 222e284 malloc 3 API calls 16154->16155 16157 221d4a2 _DllMainCRTStartup 16155->16157 16156 221bf68 16156->16144 16156->16145 16162 221ded4 16156->16162 16157->16156 16158 221d4f6 16157->16158 16159 221d4ef 16157->16159 16172 2229f90 16158->16172 16160 222e244 free 3 API calls 16159->16160 16160->16156 16163 221df31 16162->16163 16164 221df08 16162->16164 16166 221dfa0 16163->16166 16170 221df55 _setmbcp 16163->16170 16215 221dc04 16163->16215 16165 222e284 malloc 3 API calls 16164->16165 16167 221df10 16165->16167 16166->16145 16168 222daa8 _DllMainCRTStartup 3 API calls 16167->16168 16168->16163 16170->16166 16171 221dc04 _DllMainCRTStartup 3 API calls 16170->16171 16171->16166 16174 2229fbd _DllMainCRTStartup 16172->16174 16175 222a035 16174->16175 16176 221098c 16174->16176 16175->16156 16178 22109b8 _DllMainCRTStartup 16176->16178 16177 22109d7 16177->16175 16178->16177 16179 222e284 malloc 3 API calls 16178->16179 16180 2210a07 16179->16180 16180->16177 16186 2213300 16180->16186 16182 2210a52 16183 222e244 free 3 API calls 16182->16183 16183->16177 16184 2210a24 _DllMainCRTStartup 16184->16182 16198 2213170 16184->16198 16188 221332f _DllMainCRTStartup 16186->16188 16187 2213352 16187->16184 16188->16187 16189 222e284 malloc 3 API calls 16188->16189 16190 2213368 16189->16190 16190->16187 16191 222e284 malloc 3 API calls 16190->16191 16192 2213381 16191->16192 16193 221338d 16192->16193 16195 22108bc _DllMainCRTStartup 3 API calls 16192->16195 16197 22133c3 _setmbcp _DllMainCRTStartup 16192->16197 16194 222e244 free 3 API calls 16193->16194 16194->16187 16195->16197 16196 222e244 free 3 API calls 16196->16193 16197->16193 16197->16196 16199 221319d _DllMainCRTStartup 16198->16199 16200 22132c4 16199->16200 16201 222e284 malloc 3 API calls 16199->16201 16200->16182 16202 22131c2 16201->16202 16203 222e284 malloc 3 API calls 16202->16203 16204 22131cd 16203->16204 16205 22132d0 16204->16205 16206 22132c8 16204->16206 16214 22131e2 16204->16214 16205->16200 16208 222e244 free 3 API calls 16205->16208 16207 222e244 free 3 API calls 16206->16207 16207->16205 16208->16200 16209 222e244 free 3 API calls 16210 22132b4 16209->16210 16211 222e244 free 3 API calls 16210->16211 16212 22132bc 16211->16212 16213 222e244 free 3 API calls 16212->16213 16213->16200 16214->16209 16216 221dc4a setSBCS 16215->16216 16217 221de96 _DllMainCRTStartup 16216->16217 16241 22273d0 16216->16241 16217->16170 16219 221dc8b 16220 221dce8 16219->16220 16222 221dcb3 16219->16222 16221 222e63c _snprintf 3 API calls 16220->16221 16228 221dcd8 setSBCS 16221->16228 16244 22221f4 16222->16244 16223 222e63c _snprintf 3 API calls 16227 221dd1f 16223->16227 16226 222e63c _snprintf 3 API calls 16226->16228 16258 2226b38 16227->16258 16228->16223 16230 221dd63 16231 221dda6 16230->16231 16264 2221d70 16230->16264 16235 221ddc4 16231->16235 16236 221ddd6 16231->16236 16238 222e63c _snprintf 3 API calls 16235->16238 16237 222e63c _snprintf 3 API calls 16236->16237 16239 221ddd4 _DllMainCRTStartup 16237->16239 16238->16239 16239->16217 16239->16239 16274 221dfbc 16239->16274 16242 2224fec _DllMainCRTStartup 3 API calls 16241->16242 16243 22273f9 _DllMainCRTStartup 16242->16243 16243->16219 16245 2222217 strchr 16244->16245 16246 221dcbc 16245->16246 16247 222e284 malloc 3 API calls 16245->16247 16246->16226 16248 2222269 16247->16248 16249 222e284 malloc 3 API calls 16248->16249 16250 2222276 _setmbcp setSBCS _DllMainCRTStartup 16249->16250 16252 2222342 _setmbcp setSBCS 16250->16252 16278 222f420 16250->16278 16253 22221f4 _DllMainCRTStartup 3 API calls 16252->16253 16254 2222446 16253->16254 16255 222e244 free 3 API calls 16254->16255 16256 2222460 16255->16256 16257 222e244 free 3 API calls 16256->16257 16257->16246 16263 2226b87 _setmbcp setSBCS _DllMainCRTStartup 16258->16263 16259 22272f5 16261 2226f29 _setmbcp setSBCS _DllMainCRTStartup 16259->16261 16262 222e63c _snprintf 3 API calls 16259->16262 16260 222e63c RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap _snprintf 16260->16263 16261->16230 16262->16261 16263->16259 16263->16260 16263->16261 16263->16263 16268 2221da1 _setmbcp setSBCS strchr 16264->16268 16265 221dd87 16269 2221c0c 16265->16269 16266 22221f4 _DllMainCRTStartup 3 API calls 16266->16268 16267 222e63c RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap _snprintf 16267->16268 16268->16265 16268->16266 16268->16267 16272 2221c39 _setmbcp setSBCS strchr 16269->16272 16270 2221d57 16270->16231 16271 22221f4 _DllMainCRTStartup 3 API calls 16271->16272 16272->16270 16272->16271 16273 222e63c _snprintf 3 API calls 16272->16273 16273->16272 16275 221dfe7 16274->16275 16276 221dff5 16275->16276 16277 222ee04 _DllMainCRTStartup 3 API calls 16275->16277 16276->16239 16277->16276 16279 2234844 _getptd 3 API calls 16278->16279 16280 222f429 16279->16280 16280->16252 16502 222166c 16503 2221697 16502->16503 16506 2221414 16503->16506 16505 22216b1 16507 2221446 setSBCS 16506->16507 16512 222ac30 16507->16512 16511 22214a6 16511->16505 16526 222ad70 16512->16526 16514 222ac54 16533 2226930 16514->16533 16517 2222728 16518 2222760 _DllMainCRTStartup 16517->16518 16519 22227de 16518->16519 16583 2222f40 16518->16583 16521 22227ee 16519->16521 16523 2222808 _DllMainCRTStartup 16519->16523 16590 22224d8 16521->16590 16524 22224d8 6 API calls 16523->16524 16525 2222806 16524->16525 16525->16511 16527 222ad99 setSBCS 16526->16527 16528 222ada2 16527->16528 16529 222adac 16527->16529 16536 222ae3c 16528->16536 16531 222ae3c 3 API calls 16529->16531 16532 222adaa _setmbcp setSBCS strstr 16531->16532 16532->16514 16540 2226780 16533->16540 16537 222ae6f setSBCS 16536->16537 16537->16537 16538 222e63c _snprintf 3 API calls 16537->16538 16539 222aed9 16538->16539 16539->16532 16541 22267ae setSBCS 16540->16541 16544 22264ec 16541->16544 16543 22214a2 16543->16511 16543->16517 16545 222651a 16544->16545 16546 222651e 16545->16546 16550 222652b 16545->16550 16551 22201e8 16546->16551 16548 22201e8 4 API calls 16549 2226526 16548->16549 16549->16543 16550->16548 16550->16549 16552 2220254 16551->16552 16553 22201fb 16551->16553 16554 221ff34 3 API calls 16552->16554 16553->16552 16555 222020c 16553->16555 16559 2220230 _DllMainCRTStartup 16554->16559 16560 221ff34 16555->16560 16557 2220220 16564 2220038 16557->16564 16559->16549 16561 221ff4f setSBCS 16560->16561 16563 221ffc1 _DllMainCRTStartup 16560->16563 16562 221d590 _DllMainCRTStartup 3 API calls 16561->16562 16561->16563 16562->16563 16563->16557 16565 222007a 16564->16565 16566 222007e 16565->16566 16570 222008d 16565->16570 16567 221d65c _DllMainCRTStartup 3 API calls 16566->16567 16581 2220086 16567->16581 16568 22200a7 16569 221d590 _DllMainCRTStartup 3 API calls 16568->16569 16569->16581 16570->16568 16571 222c3b8 _DllMainCRTStartup VirtualProtect 16570->16571 16572 222012d 16571->16572 16572->16568 16573 2220135 16572->16573 16574 222e284 malloc 3 API calls 16573->16574 16575 2220141 setSBCS 16574->16575 16576 222016a 16575->16576 16579 222018f 16575->16579 16577 221d65c _DllMainCRTStartup 3 API calls 16576->16577 16578 2220172 setSBCS 16577->16578 16580 222e244 free 3 API calls 16578->16580 16579->16581 16582 221d590 _DllMainCRTStartup 3 API calls 16579->16582 16580->16581 16581->16559 16582->16578 16584 2222f62 16583->16584 16585 2222f81 16584->16585 16586 2222f6e 16584->16586 16604 22230f0 16585->16604 16600 2222fa4 16586->16600 16589 2222f7f 16589->16519 16591 22224f1 16590->16591 16592 22224fe 16590->16592 16623 2222e78 16591->16623 16594 2222f40 5 API calls 16592->16594 16595 22224fc 16594->16595 16596 2222535 16595->16596 16634 2222540 16595->16634 16596->16525 16599 221d59c _DllMainCRTStartup 3 API calls 16599->16596 16601 2222fd9 _setmbcp _DllMainCRTStartup 16600->16601 16602 221d590 _DllMainCRTStartup 3 API calls 16601->16602 16603 22230d1 16601->16603 16602->16603 16603->16589 16605 2223119 16604->16605 16615 222c1c8 16605->16615 16608 222314d 16619 221d59c 16608->16619 16609 2223167 16611 2223160 16609->16611 16613 222c3b8 _DllMainCRTStartup VirtualProtect 16609->16613 16614 22231e3 16609->16614 16611->16589 16612 221d590 _DllMainCRTStartup 3 API calls 16612->16611 16613->16614 16614->16611 16614->16612 16618 222c1fe _DllMainCRTStartup 16615->16618 16616 222c2a4 VirtualAlloc 16617 2223145 16616->16617 16617->16608 16617->16609 16618->16616 16618->16617 16620 221d5a4 _DllMainCRTStartup 16619->16620 16621 221bee8 _DllMainCRTStartup 3 API calls 16620->16621 16622 221d63a 16621->16622 16622->16611 16624 2222ea1 16623->16624 16625 222c1c8 _DllMainCRTStartup VirtualAlloc 16624->16625 16626 2222ed3 16625->16626 16627 2222ef0 _setmbcp 16626->16627 16628 2222edb 16626->16628 16638 2222df0 16627->16638 16629 221d59c _DllMainCRTStartup 3 API calls 16628->16629 16632 2222eee 16629->16632 16632->16595 16633 222c2ec _DllMainCRTStartup VirtualFree 16633->16632 16637 222256e _DllMainCRTStartup 16634->16637 16635 222251b 16635->16596 16635->16599 16637->16635 16644 2222a64 16637->16644 16639 2222e0f 16638->16639 16640 222c3b8 _DllMainCRTStartup VirtualProtect 16639->16640 16643 2222e5c 16639->16643 16641 2222e46 16640->16641 16642 221d590 _DllMainCRTStartup 3 API calls 16641->16642 16641->16643 16642->16643 16643->16632 16643->16633 16645 2222a97 setSBCS 16644->16645 16647 2222aff _DllMainCRTStartup 16645->16647 16648 2222984 16645->16648 16647->16637 16649 222e284 malloc 3 API calls 16648->16649 16650 22229c7 _setmbcp 16649->16650 16651 222c1c8 _DllMainCRTStartup VirtualAlloc 16650->16651 16652 2222a12 16651->16652 16653 222e244 free 3 API calls 16652->16653 16654 2222a4a 16653->16654 16654->16647 15238 2230b48 15240 2230b64 _DllMainCRTStartup 15238->15240 15243 2230bf4 15240->15243 15245 2230bbe 15240->15245 15250 22309e8 15240->15250 15242 2230c3b 15242->15245 15246 22309e8 _CRT_INIT 4 API calls 15242->15246 15243->15245 15281 22283e0 15243->15281 15244 2230c12 15244->15242 15247 22283e0 _DllMainCRTStartup 17 API calls 15244->15247 15246->15245 15248 2230c2e 15247->15248 15249 22309e8 _CRT_INIT 4 API calls 15248->15249 15249->15242 15251 2230a77 15250->15251 15254 22309fa _heap_init 15250->15254 15252 2230acd 15251->15252 15257 2230a7b _CRT_INIT 15251->15257 15253 2230b30 15252->15253 15260 2230ad2 _getptd_noexit 15252->15260 15273 2230a03 _CRT_INIT _mtterm 15253->15273 15358 2234808 15253->15358 15254->15273 15291 22349b0 15254->15291 15257->15273 15318 222ef6c 15257->15318 15260->15273 15344 2233728 15260->15344 15263 2230a0f _RTC_Initialize 15263->15273 15297 223837c 15263->15297 15264 2230aef _getptd_noexit 15266 2230b10 15264->15266 15267 2230b26 15264->15267 15264->15273 15348 22348ec 15266->15348 15353 222e244 15267->15353 15272 2230a3d 15272->15273 15312 2237ee0 15272->15312 15273->15243 15282 22284bb 15281->15282 15287 2228402 _DllMainCRTStartup 15281->15287 15628 222a47c 15282->15628 15284 2228407 _DllMainCRTStartup 15284->15244 15285 2228465 _DllMainCRTStartup 15576 221ba74 15285->15576 15287->15284 15287->15285 15640 222c2ec 15287->15640 15290 222c2ec _DllMainCRTStartup VirtualFree 15290->15285 15292 22349bb _mtinit _mtinitlocks 15291->15292 15293 2233728 _calloc_crt 3 API calls 15292->15293 15296 2234a0e _mtterm 15292->15296 15294 22349ea _getptd_noexit 15293->15294 15295 22348ec _initptd 3 API calls 15294->15295 15294->15296 15295->15296 15296->15263 15298 223839b 15297->15298 15301 2230a31 15298->15301 15362 22337a8 15298->15362 15303 2236e40 15301->15303 15302 222e244 free 3 API calls 15302->15301 15440 2232d8c 15303->15440 15305 2236e6f 15306 2233728 _calloc_crt RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap 15305->15306 15307 2236e83 15306->15307 15308 2236e93 _ioinit __updatetmbcinfo 15307->15308 15309 2236f74 15307->15309 15310 2233728 _calloc_crt RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap 15307->15310 15308->15272 15309->15308 15311 22370ce GetFileType 15309->15311 15310->15307 15311->15309 15313 2237ef8 15312->15313 15315 2237efd 15312->15315 15459 2233df0 15313->15459 15463 2237fd4 15315->15463 15319 222ef83 15318->15319 15320 222efa5 15319->15320 15323 222e244 free 3 API calls 15319->15323 15321 222e244 free 3 API calls 15320->15321 15322 222efb4 15321->15322 15324 222efdb 15322->15324 15326 222e244 free 3 API calls 15322->15326 15323->15319 15325 222e244 free 3 API calls 15324->15325 15327 222efea 15325->15327 15326->15322 15328 222e244 free 3 API calls 15327->15328 15329 222effe 15328->15329 15330 222e244 free 3 API calls 15329->15330 15331 222f00a 15330->15331 15332 222f035 15331->15332 15333 222e244 free 3 API calls 15331->15333 15334 222f056 15332->15334 15335 222e244 free 3 API calls 15332->15335 15333->15332 15336 222e244 free 3 API calls 15334->15336 15337 222f06f 15334->15337 15335->15334 15336->15337 15338 222e244 free 3 API calls 15337->15338 15339 222f0a0 15337->15339 15338->15339 15339->15273 15340 223716c 15339->15340 15343 2237187 15340->15343 15341 22371cf 15341->15273 15342 222e244 free 3 API calls 15342->15343 15343->15341 15343->15342 15345 223374d 15344->15345 15347 223378a 15345->15347 15543 2238cec 15345->15543 15347->15264 15349 2232d8c _lock 3 API calls 15348->15349 15350 2234952 __updatetmbcinfo 15349->15350 15351 2232d8c _lock 3 API calls 15350->15351 15352 2234971 __updatetmbcinfo __addlocaleref 15351->15352 15352->15273 15354 222e269 realloc 15353->15354 15355 222e249 RtlDeleteBoundaryDescriptor 15353->15355 15354->15273 15355->15354 15356 222e264 15355->15356 15357 2230d18 _errno 2 API calls 15356->15357 15357->15354 15359 223483e 15358->15359 15360 223481c _getptd_noexit 15358->15360 15359->15273 15550 22346d4 15360->15550 15364 22337d0 15362->15364 15365 2233805 15364->15365 15366 222e284 15364->15366 15365->15301 15365->15302 15367 222e318 _callnewh 15366->15367 15368 222e29c _callnewh _mtinitlocknum 15366->15368 15371 2230d18 _errno 2 API calls 15367->15371 15369 222e2d4 RtlAllocateHeap 15368->15369 15373 222e2fd 15368->15373 15376 222e302 15368->15376 15378 2230df0 15368->15378 15387 2230e64 15368->15387 15369->15368 15372 222e30d 15369->15372 15371->15372 15372->15364 15403 2230d18 15373->15403 15377 2230d18 _errno 2 API calls 15376->15377 15377->15372 15406 2238704 15378->15406 15380 2230dfe 15381 2238704 _set_error_mode 3 API calls 15380->15381 15384 2230e0d 15380->15384 15381->15384 15382 2230e64 _NMSG_WRITE 3 API calls 15383 2230e24 15382->15383 15386 2230e64 _NMSG_WRITE 3 API calls 15383->15386 15384->15382 15385 2230e2e 15384->15385 15385->15368 15386->15385 15388 2230e98 _NMSG_WRITE 15387->15388 15389 2238704 _set_error_mode 3 API calls 15388->15389 15391 2230fb5 __crtMessageBoxW _invoke_watson _ftell_nolock 15388->15391 15390 2230eae 15389->15390 15390->15391 15392 2238704 _set_error_mode 3 API calls 15390->15392 15391->15368 15393 2230ebf 15392->15393 15393->15391 15410 22385b0 15393->15410 15395 2230efb 15395->15391 15396 22385b0 _NMSG_WRITE 3 API calls 15395->15396 15397 2230f3b _putenv_helper 15395->15397 15396->15397 15397->15391 15398 2230f85 15397->15398 15417 2238638 15397->15417 15398->15391 15424 2238528 15398->15424 15400 2230f9f 15400->15391 15402 2238528 _NMSG_WRITE 3 API calls 15400->15402 15402->15391 15431 2234868 15403->15431 15407 223870c 15406->15407 15408 2230d18 _errno 3 API calls 15407->15408 15409 2238716 _invalid_parameter_noinfo 15407->15409 15408->15409 15409->15380 15411 22385be 15410->15411 15412 22385c8 15410->15412 15411->15412 15415 22385e5 15411->15415 15413 2230d18 _errno 3 API calls 15412->15413 15414 22385d1 _invalid_parameter_noinfo 15413->15414 15414->15395 15415->15414 15416 2230d18 _errno 3 API calls 15415->15416 15416->15414 15421 2238645 15417->15421 15418 223864a 15419 2230d18 _errno 3 API calls 15418->15419 15420 223864f _invalid_parameter_noinfo 15418->15420 15419->15420 15420->15398 15421->15418 15421->15420 15422 2238688 15421->15422 15422->15420 15423 2230d18 _errno 3 API calls 15422->15423 15423->15420 15426 2238543 15424->15426 15427 2238539 15424->15427 15425 2230d18 _errno 3 API calls 15428 223854c _invalid_parameter_noinfo 15425->15428 15426->15425 15427->15426 15429 223857a 15427->15429 15428->15400 15429->15428 15430 2230d18 _errno 3 API calls 15429->15430 15430->15428 15432 2234878 _getptd_noexit 15431->15432 15433 2233728 _calloc_crt 3 API calls 15432->15433 15439 2230d21 15432->15439 15434 223489a _getptd_noexit 15433->15434 15435 22348b7 15434->15435 15436 22348cd 15434->15436 15434->15439 15438 22348ec _initptd 3 API calls 15435->15438 15437 222e244 free 3 API calls 15436->15437 15437->15439 15438->15439 15439->15376 15441 2232daf 15440->15441 15442 2232daa 15440->15442 15444 2232e58 15442->15444 15445 2232e75 15444->15445 15446 2232e84 _mtinitlocknum 15444->15446 15447 2230df0 _FF_MSGBANNER 3 API calls 15445->15447 15448 22337a8 _malloc_crt 3 API calls 15446->15448 15458 2232e9f 15446->15458 15449 2232e7a 15447->15449 15450 2232eb0 15448->15450 15451 2230e64 _NMSG_WRITE 3 API calls 15449->15451 15452 2232ec7 15450->15452 15453 2232eb8 15450->15453 15451->15446 15455 2232d8c _lock 3 API calls 15452->15455 15454 2230d18 _errno 3 API calls 15453->15454 15454->15458 15456 2232ed1 15455->15456 15457 222e244 free 3 API calls 15456->15457 15456->15458 15457->15458 15458->15441 15460 2233e07 15459->15460 15461 2233dfd 15459->15461 15460->15315 15469 22341c8 15461->15469 15465 2238012 15463->15465 15468 2238078 15465->15468 15539 223a544 15465->15539 15466 2237f53 15467 223a544 parse_cmdline 3 API calls 15467->15468 15468->15466 15468->15467 15491 2234844 15469->15491 15471 22341ec 15494 223410c 15471->15494 15473 22341f4 15501 2233e18 15473->15501 15476 22337a8 _malloc_crt 3 API calls 15477 2234218 _setmbcp 15476->15477 15477->15477 15489 22343c8 __updatetmbcinfo 15477->15489 15504 2234424 15477->15504 15479 22342bb 15480 22342c6 15479->15480 15481 22343db 15479->15481 15482 22342ea 15480->15482 15484 222e244 free 3 API calls 15480->15484 15483 22343f4 15481->15483 15485 222e244 free 3 API calls 15481->15485 15481->15489 15487 2232d8c _lock 3 API calls 15482->15487 15482->15489 15486 2230d18 _errno 3 API calls 15483->15486 15484->15482 15485->15483 15486->15489 15488 223431a 15487->15488 15488->15489 15490 222e244 free 3 API calls 15488->15490 15489->15460 15490->15489 15492 2234868 _getptd_noexit 3 API calls 15491->15492 15493 223484f 15492->15493 15493->15471 15495 2234844 _getptd 3 API calls 15494->15495 15496 223411b 15495->15496 15497 2232d8c _lock 3 API calls 15496->15497 15499 2234136 __updatetmbcinfo 15496->15499 15498 2234149 15497->15498 15498->15499 15500 222e244 free 3 API calls 15498->15500 15499->15473 15500->15499 15509 2230600 15501->15509 15505 2233e18 getSystemCP 3 API calls 15504->15505 15508 2234451 setSBCS 15505->15508 15506 2234459 setSBCS _ftell_nolock 15506->15479 15508->15506 15525 2233f28 15508->15525 15510 2230616 15509->15510 15516 2230677 15509->15516 15511 2234844 _getptd 3 API calls 15510->15511 15512 223061b 15511->15512 15513 2230650 15512->15513 15517 223753c 15512->15517 15515 223410c __updatetmbcinfo 3 API calls 15513->15515 15513->15516 15515->15516 15516->15476 15516->15489 15518 2234844 _getptd 3 API calls 15517->15518 15519 2237547 15518->15519 15520 2237570 15519->15520 15522 2237562 15519->15522 15521 2232d8c _lock 3 API calls 15520->15521 15524 2237567 __updatetmbcinfo _updatetlocinfoEx_nolock 15521->15524 15523 2234844 _getptd 3 API calls 15522->15523 15523->15524 15524->15513 15527 2233f64 15525->15527 15529 2234051 _ftell_nolock 15527->15529 15533 223918c 15527->15533 15528 2233fe5 15536 2237a50 15528->15536 15529->15506 15531 2234018 15532 2237a50 __crtLCMapStringA 3 API calls 15531->15532 15532->15529 15534 2230600 __crtGetStringTypeA 3 API calls 15533->15534 15535 22391b0 15534->15535 15535->15528 15537 2230600 __crtGetStringTypeA 3 API calls 15536->15537 15538 2237a75 15537->15538 15538->15531 15540 223a4c8 15539->15540 15541 2230600 __crtGetStringTypeA 3 API calls 15540->15541 15542 223a4ec 15541->15542 15542->15465 15544 2238d01 15543->15544 15545 2238d1e _callnewh 15543->15545 15544->15545 15546 2238d0f 15544->15546 15548 2238d36 RtlAllocateHeap 15545->15548 15549 2238d14 15545->15549 15547 2230d18 _errno 2 API calls 15546->15547 15547->15549 15548->15545 15548->15549 15549->15345 15551 22346dd 15550->15551 15575 22347fc 15550->15575 15552 22346f8 15551->15552 15553 222e244 free 3 API calls 15551->15553 15554 2234706 15552->15554 15555 222e244 free 3 API calls 15552->15555 15553->15552 15556 2234714 15554->15556 15557 222e244 free 3 API calls 15554->15557 15555->15554 15558 2234722 15556->15558 15559 222e244 free 3 API calls 15556->15559 15557->15556 15560 2234730 15558->15560 15561 222e244 free 3 API calls 15558->15561 15559->15558 15562 223473e 15560->15562 15563 222e244 free 3 API calls 15560->15563 15561->15560 15564 223474f 15562->15564 15565 222e244 free 3 API calls 15562->15565 15563->15562 15566 2234767 15564->15566 15567 222e244 free 3 API calls 15564->15567 15565->15564 15568 2232d8c _lock 3 API calls 15566->15568 15567->15566 15570 2234773 15568->15570 15569 22347a0 __updatetmbcinfo 15571 2232d8c _lock 3 API calls 15569->15571 15570->15569 15572 222e244 free 3 API calls 15570->15572 15573 22347b2 __updatetmbcinfo _updatetlocinfoEx_nolock 15571->15573 15572->15569 15574 222e244 free 3 API calls 15573->15574 15574->15575 15575->15359 15644 2224fec 15576->15644 15578 221ba92 _DllMainCRTStartup 15579 222e284 malloc 3 API calls 15578->15579 15580 221bb40 15579->15580 15651 222b230 15580->15651 15586 221bbb5 15587 222daa8 _DllMainCRTStartup 3 API calls 15586->15587 15588 221bbcf _DllMainCRTStartup 15587->15588 15590 221bbdd _DllMainCRTStartup 15588->15590 15700 222ca74 15588->15700 15591 221bbf9 15590->15591 15592 222ca74 _DllMainCRTStartup 5 API calls 15590->15592 15674 221e1f8 15591->15674 15592->15591 15595 221bc0e 15680 221e274 15595->15680 15596 222ca74 _DllMainCRTStartup 5 API calls 15596->15595 15599 222ca74 _DllMainCRTStartup 5 API calls 15600 221bc1c 15599->15600 15601 222e284 malloc 3 API calls 15600->15601 15602 221bc4f 15601->15602 15603 221bc5c 15602->15603 15604 222ca74 _DllMainCRTStartup 5 API calls 15602->15604 15605 222daa8 _DllMainCRTStartup 3 API calls 15603->15605 15604->15603 15606 221bc78 15605->15606 15690 2224c60 15606->15690 15629 2224fec _DllMainCRTStartup 3 API calls 15628->15629 15630 222a4a0 setSBCS _DllMainCRTStartup 15629->15630 15631 222e284 malloc 3 API calls 15630->15631 15632 222a52d setSBCS 15631->15632 15633 222daa8 _DllMainCRTStartup 3 API calls 15632->15633 15634 222a55e _DllMainCRTStartup 15633->15634 15638 222a575 _setmbcp _DllMainCRTStartup 15634->15638 16041 221e014 15634->16041 15636 222a802 setSBCS _DllMainCRTStartup 15636->15284 15637 222e284 malloc 3 API calls 15637->15638 15638->15636 15638->15637 15639 222daa8 _DllMainCRTStartup 3 API calls 15638->15639 15639->15638 15641 222c311 _DllMainCRTStartup 15640->15641 15642 222c399 VirtualFree 15640->15642 15641->15642 15643 2228487 15641->15643 15642->15643 15643->15285 15643->15290 15645 222e284 malloc 3 API calls 15644->15645 15646 222500d 15645->15646 15647 222e284 malloc 3 API calls 15646->15647 15650 2225015 setSBCS _DllMainCRTStartup 15646->15650 15648 2225021 15647->15648 15649 222e244 free 3 API calls 15648->15649 15648->15650 15649->15650 15650->15578 15652 222b259 _DllMainCRTStartup 15651->15652 15708 222f44c 15652->15708 15655 222e284 malloc 3 API calls 15656 222b2a1 _setmbcp setSBCS 15655->15656 15658 222b30a 15656->15658 15711 223081c 15656->15711 15659 223081c _DllMainCRTStartup 3 API calls 15658->15659 15660 221bb87 15659->15660 15661 22224a0 15660->15661 15662 22224b3 _DllMainCRTStartup 15661->15662 15663 222f44c _DllMainCRTStartup 3 API calls 15662->15663 15664 22224bb 15663->15664 15714 2221f5c 15664->15714 15667 222daa8 15668 222dae7 15667->15668 15669 222dafd setSBCS 15667->15669 15670 222daf3 15668->15670 15671 222daff 15668->15671 15669->15586 15672 222e284 malloc 3 API calls 15670->15672 15719 2230914 15671->15719 15672->15669 15676 221e20e 15674->15676 15675 221bc05 15675->15595 15675->15596 15676->15675 15733 22298dc 15676->15733 15678 221e248 15737 2229914 15678->15737 15682 221e299 15680->15682 15681 221bc13 15681->15599 15681->15600 15682->15681 15683 222e284 malloc 3 API calls 15682->15683 15684 221e315 _setmbcp _DllMainCRTStartup 15683->15684 15685 221e36b setSBCS 15684->15685 15686 22298dc _DllMainCRTStartup 3 API calls 15684->15686 15689 222e244 free 3 API calls 15685->15689 15687 221e34c 15686->15687 15688 2229914 _DllMainCRTStartup 3 API calls 15687->15688 15688->15685 15689->15681 15691 2224c7e _DllMainCRTStartup 15690->15691 15900 222a0b4 15691->15900 15693 2224ca8 15694 222f44c _DllMainCRTStartup 3 API calls 15693->15694 15695 2224cbf _DllMainCRTStartup 15694->15695 15904 2224e28 15695->15904 15697 2224d94 _setmbcp setSBCS _DllMainCRTStartup 15913 2229bcc 15697->15913 15699 2224df5 15701 222ca88 15700->15701 16015 221c268 15701->16015 15703 222caa4 16024 2223e24 15703->16024 15707 222caae _DllMainCRTStartup 15709 2234844 _getptd 3 API calls 15708->15709 15710 222b261 15709->15710 15710->15655 15712 2234844 _getptd 3 API calls 15711->15712 15713 2230840 _ftell_nolock _DllMainCRTStartup 15712->15713 15713->15656 15715 221bb94 15714->15715 15718 2221f87 _DllMainCRTStartup 15714->15718 15715->15667 15716 222e284 malloc 3 API calls 15716->15718 15717 222daa8 _DllMainCRTStartup 3 API calls 15717->15718 15718->15715 15718->15716 15718->15717 15720 2230938 15719->15720 15721 223092e 15719->15721 15723 223093d 15720->15723 15727 2230944 _callnewh 15720->15727 15722 222e284 malloc 3 API calls 15721->15722 15731 2230936 realloc 15722->15731 15724 222e244 free 3 API calls 15723->15724 15724->15731 15725 223098d _callnewh 15726 2230d18 _errno 3 API calls 15725->15726 15726->15731 15727->15725 15728 22309cb 15727->15728 15730 22309b2 15727->15730 15727->15731 15729 2230d18 _errno 3 API calls 15728->15729 15729->15731 15732 2230d18 _errno 3 API calls 15730->15732 15731->15669 15732->15731 15734 22298f7 15733->15734 15736 22298f3 _DllMainCRTStartup 15733->15736 15742 2229b54 15734->15742 15736->15678 15738 222e63c _snprintf 3 API calls 15737->15738 15739 222997c 15738->15739 15740 222e63c _snprintf 3 API calls 15739->15740 15741 2229992 _DllMainCRTStartup 15740->15741 15741->15675 15749 222e63c 15742->15749 15744 2229b71 15745 222e63c _snprintf 3 API calls 15744->15745 15746 2229bbc 15745->15746 15758 222ee04 15746->15758 15750 222e66e setSBCS 15749->15750 15751 222e673 15750->15751 15753 222e692 15750->15753 15752 2230d18 _errno 3 API calls 15751->15752 15756 222e678 _invalid_parameter_noinfo 15752->15756 15762 2231528 15753->15762 15755 222e6c2 15755->15756 15779 223139c 15755->15779 15756->15744 15759 2232cec 15758->15759 15883 2232ab0 15759->15883 15761 2229bc6 15761->15736 15763 2230600 __crtGetStringTypeA 3 API calls 15762->15763 15764 223158e 15763->15764 15765 2230d18 _errno 3 API calls 15764->15765 15766 2231593 15765->15766 15767 2231ef3 15766->15767 15772 22315c0 _snprintf 15766->15772 15800 2234a54 15766->15800 15768 2230d18 _errno 3 API calls 15767->15768 15770 2231ef8 _invalid_parameter_noinfo _ftell_nolock 15768->15770 15770->15755 15772->15767 15772->15770 15773 22329d4 RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap write_char 15772->15773 15774 222e244 free 3 API calls 15772->15774 15775 22337a8 _malloc_crt 3 API calls 15772->15775 15776 2232a1c RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap write_string 15772->15776 15777 2231f48 RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap write_multi_char 15772->15777 15778 2238c14 RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap _snprintf 15772->15778 15804 22376f4 15772->15804 15773->15772 15774->15772 15775->15772 15776->15772 15777->15772 15778->15772 15780 2234a54 _fileno 3 API calls 15779->15780 15781 22313be 15780->15781 15782 22313e0 15781->15782 15783 22313c9 15781->15783 15785 22313e5 15782->15785 15794 22313f2 _snprintf 15782->15794 15784 2230d18 _errno 3 API calls 15783->15784 15793 22313ce 15784->15793 15786 2230d18 _errno 3 API calls 15785->15786 15786->15793 15787 2231457 15788 2231464 15787->15788 15789 22314ef 15787->15789 15790 2231480 15788->15790 15796 2231499 15788->15796 15791 2235434 _flush 3 API calls 15789->15791 15816 2235434 15790->15816 15791->15793 15793->15756 15794->15787 15794->15793 15797 223144b 15794->15797 15807 22389bc 15794->15807 15796->15793 15833 2236c08 15796->15833 15797->15787 15813 2238a1c 15797->15813 15801 2234a5d 15800->15801 15803 2234a62 _invalid_parameter_noinfo 15800->15803 15802 2230d18 _errno 3 API calls 15801->15802 15802->15803 15803->15772 15805 2230600 __crtGetStringTypeA 3 API calls 15804->15805 15806 2237706 15805->15806 15806->15772 15808 22389c5 15807->15808 15809 22389d2 15807->15809 15810 2230d18 _errno 3 API calls 15808->15810 15811 2230d18 _errno 3 API calls 15809->15811 15812 22389ca _invalid_parameter_noinfo 15809->15812 15810->15812 15811->15812 15812->15797 15814 22337a8 _malloc_crt 3 API calls 15813->15814 15815 2238a35 15814->15815 15815->15787 15817 2235457 15816->15817 15819 223546f 15816->15819 15853 2230ca8 15817->15853 15820 22354e6 15819->15820 15824 22354a1 15819->15824 15822 2230ca8 __doserrno 3 API calls 15820->15822 15825 22354eb 15822->15825 15823 2230d18 _errno 3 API calls 15831 2235464 _invalid_parameter_noinfo _unlock_fhandle 15823->15831 15856 22392b0 15824->15856 15827 2230d18 _errno 3 API calls 15825->15827 15827->15831 15828 22354a8 15829 2230d18 _errno 3 API calls 15828->15829 15828->15831 15830 22354ca 15829->15830 15832 2230ca8 __doserrno 3 API calls 15830->15832 15831->15793 15832->15831 15834 2236c2b 15833->15834 15836 2236c43 15833->15836 15835 2230ca8 __doserrno 3 API calls 15834->15835 15838 2236c30 15835->15838 15837 2236cbd 15836->15837 15841 2236c75 15836->15841 15839 2230ca8 __doserrno 3 API calls 15837->15839 15840 2230d18 _errno 3 API calls 15838->15840 15842 2236cc2 15839->15842 15851 2236c38 _invalid_parameter_noinfo _unlock_fhandle 15840->15851 15843 22392b0 __lock_fhandle 3 API calls 15841->15843 15844 2230d18 _errno 3 API calls 15842->15844 15845 2236c7c 15843->15845 15844->15851 15846 2236c9a 15845->15846 15847 2236c88 15845->15847 15849 2230d18 _errno 3 API calls 15846->15849 15860 2236cec 15847->15860 15850 2236c9f 15849->15850 15852 2230ca8 __doserrno 3 API calls 15850->15852 15851->15793 15852->15851 15854 2234868 _getptd_noexit 3 API calls 15853->15854 15855 2230cb1 15854->15855 15855->15823 15857 22392e8 15856->15857 15859 22392f2 __updatetmbcinfo 15856->15859 15858 2232d8c _lock 3 API calls 15857->15858 15858->15859 15859->15828 15868 22395ec 15860->15868 15862 2236d0b 15863 2236d11 15862->15863 15865 2236d22 15862->15865 15864 2230d18 _errno 3 API calls 15863->15864 15866 2236d16 15864->15866 15865->15866 15878 2230cc8 15865->15878 15866->15851 15869 22395f5 15868->15869 15871 223960a 15868->15871 15870 2230ca8 __doserrno RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap 15869->15870 15873 22395fa 15870->15873 15872 2230ca8 __doserrno RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap 15871->15872 15877 2239602 _invalid_parameter_noinfo 15871->15877 15874 2239644 15872->15874 15875 2230d18 _errno RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap 15873->15875 15876 2230d18 _errno RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap 15874->15876 15875->15877 15876->15877 15877->15862 15879 2234868 _getptd_noexit RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap 15878->15879 15880 2230cd9 15879->15880 15881 2234868 _getptd_noexit RtlDeleteBoundaryDescriptor RtlAllocateHeap RtlAllocateHeap 15880->15881 15882 2230cf2 realloc 15881->15882 15882->15866 15884 2230600 __crtGetStringTypeA 3 API calls 15883->15884 15887 2232adc 15884->15887 15885 2232af7 15886 2230d18 _errno 3 API calls 15885->15886 15892 2232afc _invalid_parameter_noinfo 15886->15892 15887->15885 15889 2232b0c 15887->15889 15890 2232b5e 15889->15890 15893 2237618 15889->15893 15891 2230d18 _errno 3 API calls 15890->15891 15890->15892 15891->15892 15892->15761 15894 2230600 __crtGetStringTypeA 3 API calls 15893->15894 15895 223763a 15894->15895 15896 22376f4 _isleadbyte_l 3 API calls 15895->15896 15899 2237644 15895->15899 15897 2237667 15896->15897 15898 223918c __crtGetStringTypeA 3 API calls 15897->15898 15898->15899 15899->15889 15901 222a0d1 _DllMainCRTStartup 15900->15901 15919 22108bc 15901->15919 15903 222a102 _DllMainCRTStartup 15903->15693 15905 2224fec _DllMainCRTStartup 3 API calls 15904->15905 15906 2224e51 _DllMainCRTStartup 15905->15906 15907 2224e9f GetUserNameA 15906->15907 15908 2224ec8 15907->15908 15925 221e008 15908->15925 15910 2224ecd strrchr _DllMainCRTStartup 15911 222e63c _snprintf 3 API calls 15910->15911 15912 2224fa0 _DllMainCRTStartup 15911->15912 15912->15697 15914 2229bfe _setmbcp _DllMainCRTStartup 15913->15914 15936 2210cc4 15914->15936 15916 2229cba 15918 2229d09 15916->15918 15956 2210b64 15916->15956 15918->15699 15920 22108ec _DllMainCRTStartup 15919->15920 15921 222e284 malloc 3 API calls 15920->15921 15924 221090d 15920->15924 15923 2210921 15921->15923 15922 222e244 free 3 API calls 15922->15924 15923->15922 15923->15924 15924->15903 15926 221e014 15925->15926 15933 221e118 15926->15933 15928 221e02f WSASocketA 15929 221e051 15928->15929 15930 221e058 WSAIoctl 15928->15930 15929->15910 15932 221e099 closesocket 15930->15932 15932->15929 15934 221e12c WSAStartup 15933->15934 15935 221e144 15933->15935 15934->15935 15935->15928 15937 2210d5e _DllMainCRTStartup 15936->15937 15955 2210d77 _DllMainCRTStartup _ftell_nolock 15937->15955 15960 223de08 15937->15960 15939 2210d6f _DllMainCRTStartup 15940 2210f0c 15939->15940 15946 2210e6d 15939->15946 15939->15955 15941 222e244 free 3 API calls 15940->15941 15943 2210f14 15941->15943 15945 2213e64 _DllMainCRTStartup 3 API calls 15943->15945 15951 2210f40 15945->15951 15967 2213e64 15946->15967 15947 2210ef3 15949 222e244 free 3 API calls 15947->15949 15948 2210efd 15950 222e244 free 3 API calls 15948->15950 15949->15955 15950->15955 15953 2213e64 _DllMainCRTStartup 3 API calls 15951->15953 15954 221105c 15951->15954 15951->15955 15952 2213e64 _DllMainCRTStartup 3 API calls 15952->15955 15953->15954 15954->15952 15954->15955 15955->15916 15957 2210ba5 _DllMainCRTStartup 15956->15957 15959 2210b9b _DllMainCRTStartup 15956->15959 15957->15959 15973 221360c 15957->15973 15959->15918 15961 2238cec _calloc_impl 3 API calls 15960->15961 15962 223de1d 15961->15962 15963 2230d18 _errno 3 API calls 15962->15963 15966 223de3a 15962->15966 15964 223de30 15963->15964 15965 2230d18 _errno 3 API calls 15964->15965 15964->15966 15965->15966 15966->15939 15968 2213e90 15967->15968 15969 223de08 calloc 3 API calls 15968->15969 15970 2210eea 15968->15970 15971 2213ecf _DllMainCRTStartup 15969->15971 15970->15947 15970->15948 15971->15970 15972 222e244 free 3 API calls 15971->15972 15972->15970 15975 221363d _DllMainCRTStartup 15973->15975 15974 2213893 15974->15959 15975->15974 15976 222e284 malloc 3 API calls 15975->15976 15977 22136ae 15976->15977 15978 222e284 malloc 3 API calls 15977->15978 15979 22136b8 15978->15979 15980 222e284 malloc 3 API calls 15979->15980 15981 22136c3 15980->15981 15982 221389f 15981->15982 15984 2213897 15981->15984 15987 22136e1 15981->15987 15983 22138ac 15982->15983 15986 222e244 free 3 API calls 15982->15986 15983->15974 15988 222e244 free 3 API calls 15983->15988 15985 222e244 free 3 API calls 15984->15985 15985->15982 15986->15983 15989 22108bc _DllMainCRTStartup 3 API calls 15987->15989 15988->15974 15991 2213723 _setmbcp setSBCS 15989->15991 15990 222e244 free 3 API calls 15992 2213883 15990->15992 15999 2213797 _setmbcp 15991->15999 16000 22144f0 15991->16000 15993 222e244 free 3 API calls 15992->15993 15994 221388b 15993->15994 15995 222e244 free 3 API calls 15994->15995 15995->15974 15997 22144f0 _DllMainCRTStartup 3 API calls 15997->15999 15998 22137bf 15998->15997 15998->15998 15998->15999 15999->15990 16001 221451c _DllMainCRTStartup 16000->16001 16002 2214639 16001->16002 16003 222e284 malloc 3 API calls 16001->16003 16002->15998 16004 221453f 16003->16004 16005 222e284 malloc 3 API calls 16004->16005 16006 221454a 16005->16006 16007 2214645 16006->16007 16008 221463d 16006->16008 16014 221455f 16006->16014 16007->16002 16010 222e244 free 3 API calls 16007->16010 16009 222e244 free 3 API calls 16008->16009 16009->16007 16010->16002 16011 222e244 free 3 API calls 16012 2214631 16011->16012 16013 222e244 free 3 API calls 16012->16013 16013->16002 16014->16011 16016 221c286 16015->16016 16017 221c32d 16016->16017 16019 221c314 setSBCS _DllMainCRTStartup 16016->16019 16020 221c2b9 16016->16020 16018 222c2ec _DllMainCRTStartup VirtualFree 16017->16018 16017->16019 16018->16019 16019->15703 16020->16019 16037 222c3b8 16020->16037 16023 221c268 _DllMainCRTStartup 2 API calls 16023->16019 16025 2223e33 16024->16025 16026 2223e44 16025->16026 16027 222e244 free 3 API calls 16025->16027 16028 222dba0 16026->16028 16027->16025 16029 222dc2f 16028->16029 16034 222dbba setSBCS 16028->16034 16030 222dc40 16029->16030 16031 222e244 free 3 API calls 16029->16031 16032 222dc51 16030->16032 16033 222e244 free 3 API calls 16030->16033 16031->16030 16032->15707 16033->16032 16034->16029 16035 222e244 free 3 API calls 16034->16035 16036 222c2ec _DllMainCRTStartup VirtualFree 16034->16036 16035->16034 16036->16034 16040 222c3ef _DllMainCRTStartup 16037->16040 16038 222c492 VirtualProtect 16039 221c305 16038->16039 16039->16019 16039->16023 16040->16038 16040->16039 16042 221e118 _DllMainCRTStartup WSAStartup 16041->16042 16043 221e02f WSASocketA 16042->16043 16044 221e051 16043->16044 16045 221e058 WSAIoctl 16043->16045 16044->15638 16047 221e099 closesocket 16045->16047 16047->16044 16048 7ffd9b880a75 16049 7ffd9b880a7f 16048->16049 16050 7ffd9b880a57 16049->16050 16051 7ffd9b880bb5 VirtualAlloc 16049->16051 16052 7ffd9b880bf7 16051->16052 15230 222c3b8 15233 222c3ef _DllMainCRTStartup 15230->15233 15231 222c492 VirtualProtect 15232 222c486 15231->15232 15233->15231 15233->15232 15234 222c1c8 15237 222c1fe _DllMainCRTStartup 15234->15237 15235 222c2a4 VirtualAlloc 15236 222c298 15235->15236 15237->15235 15237->15236

            Control-flow Graph

            APIs
              • Part of subcall function 02224FEC: malloc.LIBCMT ref: 02225008
            • GetUserNameA.ADVAPI32(?,?,?,?,?,?,?,-00000001,?,-00000001,?,00000002,0221BC89), ref: 02224EAF
            • strrchr.LIBCMT ref: 02224EED
            • _snprintf.LIBCMT ref: 02224F9B
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: NameUser_snprintfmallocstrrchr
            • String ID:
            • API String ID: 1238167203-0
            • Opcode ID: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
            • Instruction ID: 68b8d0cca34df3a831357e04e30cd39368f1f21b79bd8b0e97628ed75d1b1ace
            • Opcode Fuzzy Hash: d69273eeb4579e6a96eb8d0c87a60564a21875d7210b55cf29d23a145d20b21e
            • Instruction Fuzzy Hash: 4B41B430728B184FEB48FBACA455A7972C3EBDC310B50852DE48FC3259DE78D8068B42

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 157 2270000-227001f 158 2270021-227002f 157->158 159 2270036-2270039 158->159 160 2270031-2270034 158->160 159->158 162 227003b-227003c 159->162 160->159 161 2270069-2270073 160->161 164 2270075-2270076 161->164 165 22700ce-22700dc SleepEx 161->165 163 227003e-2270065 162->163 163->163 169 2270067 163->169 166 2270078-227007f 164->166 167 2270137-2270138 165->167 168 22700de-22700df 165->168 170 22700b7-22700cc 166->170 171 2270081 166->171 173 227013b-2270149 167->173 172 22700e1-22700e8 168->172 169->158 170->165 170->166 174 2270083-22700b5 171->174 175 2270120-2270135 172->175 176 22700ea 172->176 177 2270150-2270153 173->177 178 227014b-227014e 173->178 174->170 174->174 175->167 175->172 179 22700ec-227011e 176->179 177->173 181 2270155-2270156 177->181 178->177 180 2270183-2270197 178->180 179->175 179->179 182 2270158-227017f 181->182 182->182 183 2270181 182->183 183->173
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913371456.0000000002270000.00000020.00001000.00020000.00000000.sdmp, Offset: 02270000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2270000_to.jbxd
            Yara matches
            Similarity
            • API ID: Sleep
            • String ID:
            • API String ID: 3472027048-0
            • Opcode ID: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
            • Instruction ID: 48fc0ac70100d0ac2b199203b594c686d312b4dabb0ffee1dae98ba9c0ea8ce9
            • Opcode Fuzzy Hash: 88e8bec169d31fc803aeef05fed04f98ffb8ac2501b92b4af572ff67ccb03544
            • Instruction Fuzzy Hash: 93513834228A468F871DCE5C95C1A36B7D5F785309315A6BDD59BCB26BCA30D846CB80

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: IoctlSocketStartupclosesocket
            • String ID: _Cy
            • API String ID: 365704328-1085951347
            • Opcode ID: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
            • Instruction ID: 5541d66587f26a4dc64919723272badc4c64870f7d166aab9870fd534e5ac884
            • Opcode Fuzzy Hash: 9f6035121241c12ff71e8e552415c275c25b201d0c9d2d3551ffb33b20d91594
            • Instruction Fuzzy Hash: E131C53062CE494BDB64EF689884B66B7E1FBA8315F21463EEC8ED3255DB34C5428741

            Control-flow Graph

            APIs
            • _snprintf.LIBCMT ref: 0221D725
              • Part of subcall function 0222E63C: _errno.LIBCMT ref: 0222E673
              • Part of subcall function 0222E63C: _invalid_parameter_noinfo.LIBCMT ref: 0222E67E
            • _snprintf.LIBCMT ref: 0221D7BD
            • InternetCloseHandle.WININET ref: 0221D898
              • Part of subcall function 02221D70: strchr.LIBCMT ref: 02221DD6
              • Part of subcall function 02221D70: _snprintf.LIBCMT ref: 02221E0C
              • Part of subcall function 02221C0C: strchr.LIBCMT ref: 02221C69
              • Part of subcall function 02221C0C: _snprintf.LIBCMT ref: 02221CB3
            • _snprintf.LIBCMT ref: 0221D7D4
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _snprintf$strchr$CloseHandleInternet_errno_invalid_parameter_noinfo
            • String ID:
            • API String ID: 1147558511-0
            • Opcode ID: 6e2045361780fadf1587795c869fcd23f7db7a84374f415de51a140654aa30c6
            • Instruction ID: fed2ef2ef196a0d5a3842796d1439d3c1f91c076be8a54e8e66301a34995d229
            • Opcode Fuzzy Hash: 6e2045361780fadf1587795c869fcd23f7db7a84374f415de51a140654aa30c6
            • Instruction Fuzzy Hash: 35810A31628B588FDB18EF68D884ABAB3E6FB94711F40052EE48AC7155DF34D906CB81

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: Internet$ConnectOpen
            • String ID:
            • API String ID: 2790792615-0
            • Opcode ID: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
            • Instruction ID: 0690cd86c5d7da7a7cb16b5ea1639a82a91ea0876ed37b2577a642febce88759
            • Opcode Fuzzy Hash: c02896be98f17698b461471e8597e5ae08ffedd86d74317b17a8770a829ca45e
            • Instruction Fuzzy Hash: 99419B30628B148FDB49EFA8D895729B3D6FB98304F51042DD48BC36A5DB7CD906CB86

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 184 222c3b8-222c3e9 185 222c3ef-222c406 184->185 186 222c48d-222c490 184->186 187 222c408-222c40b 185->187 188 222c40d-222c410 185->188 189 222c492-222c4a4 VirtualProtect 186->189 190 222c4a6-222c4b3 186->190 187->188 191 222c417-222c424 187->191 188->186 192 222c412-222c415 188->192 193 222c4bd-222c4d7 189->193 190->193 194 222c426-222c429 191->194 195 222c42b-222c442 191->195 192->186 192->191 196 222c448-222c45d 194->196 195->196 198 222c467-222c47d call 222e0f3 196->198 199 222c45f-222c465 196->199 202 222c482-222c484 198->202 199->202 202->186 203 222c486-222c48b 202->203 203->193
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: ProtectVirtual
            • String ID:
            • API String ID: 544645111-0
            • Opcode ID: aac624e9975941b750356ceb78cd3aa232c6bd2fb96b7d29432793f1a6c54ced
            • Instruction ID: 24e70d738faef9d629b2c88ae1bfe11c709866ebdd60ecfd519c317ffedebf6e
            • Opcode Fuzzy Hash: aac624e9975941b750356ceb78cd3aa232c6bd2fb96b7d29432793f1a6c54ced
            • Instruction Fuzzy Hash: 1831803062CB598F9B58DF9CA89563A37E5FB98310B51012FE44AC3329DB75E845CB82

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 204 221e118-221e12a 205 221e12c-221e13e WSAStartup 204->205 206 221e14e-221e150 204->206 207 221e1d2-221e1e3 call 222f414 205->207 208 221e144 205->208 209 221e152-221e159 206->209 210 221e1c9-221e1d1 206->210 208->206 209->210 211 221e15b-221e1c3 call 222a434 * 2 call 222a454 * 4 209->211 211->210
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: Startup
            • String ID:
            • API String ID: 724789610-0
            • Opcode ID: df88eb95308a54b3e1dd63d5abd955df02cfb1df72e04a0c2f97fe2a777c2e26
            • Instruction ID: 430f44bd0f9583270b0f910311b7962a3acdb26a6f9a25ef801d1ca39025bf09
            • Opcode Fuzzy Hash: df88eb95308a54b3e1dd63d5abd955df02cfb1df72e04a0c2f97fe2a777c2e26
            • Instruction Fuzzy Hash: 0C0161B07207499BFB19ABE0E85C76436A6FB55304FC00439AA55CB2A5DB7E860CCF01

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 227 7ffd9b880a75-7ffd9b880a7d 228 7ffd9b880a80-7ffd9b880a8d 227->228 229 7ffd9b880a7f 227->229 230 7ffd9b880a90-7ffd9b880a9d 228->230 231 7ffd9b880a8f 228->231 229->228 232 7ffd9b880aa0-7ffd9b880aad 230->232 233 7ffd9b880a9f 230->233 231->230 234 7ffd9b880ab0-7ffd9b880aba 232->234 235 7ffd9b880aaf 232->235 233->232 236 7ffd9b880abc-7ffd9b880aee call 7ffd9b8804a8 234->236 237 7ffd9b880a57-7ffd9b880a70 234->237 235->234 242 7ffd9b880af0-7ffd9b880b0a 236->242 243 7ffd9b880b0b-7ffd9b880bf5 VirtualAlloc 236->243 253 7ffd9b880bfd-7ffd9b880c25 243->253 254 7ffd9b880bf7 243->254 254->253
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2914203103.00007FFD9B880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B880000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ffd9b880000_to.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 4f6b64b2b175abfda5f080dac6f944c937640d41828d416fe148bc2b69b8be54
            • Instruction ID: 39ae6450118c73416b6e3903a766deaf4183506a9cb26b8bbe64b1a374ab7587
            • Opcode Fuzzy Hash: 4f6b64b2b175abfda5f080dac6f944c937640d41828d416fe148bc2b69b8be54
            • Instruction Fuzzy Hash: 5C516D31B0DB890FD7199778A8666F57BE0EF49321F1501BFE09DC31A3DA2869438381

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 256 222c1c8-222c1f8 257 222c1fe-222c215 256->257 258 222c29f-222c2a2 256->258 259 222c217-222c21a 257->259 260 222c21c-222c21f 257->260 261 222c2a4-222c2b6 VirtualAlloc 258->261 262 222c2b8-222c2c4 258->262 259->260 263 222c226-222c233 259->263 260->258 264 222c221-222c224 260->264 265 222c2ce-222c2e8 261->265 262->265 266 222c235-222c238 263->266 267 222c23a-222c251 263->267 264->258 264->263 268 222c257-222c26f 266->268 267->268 270 222c271-222c277 268->270 271 222c279-222c28f call 222e0e0 268->271 273 222c294-222c296 270->273 271->273 273->258 275 222c298-222c29d 273->275 275->265
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: aae31d7e320f49b2b7b8d2523f04f5552282cf255c9fc24f679e558ee007d563
            • Instruction ID: f40713bf7e3ba4364ffeb61a1c5d1dcc28801df26be3efd92295d2a0b7f8b7a4
            • Opcode Fuzzy Hash: aae31d7e320f49b2b7b8d2523f04f5552282cf255c9fc24f679e558ee007d563
            • Instruction Fuzzy Hash: 0531923062CB599F9B59DF9CA89162A77E1F79C700B11062FE449C3324DBB5E805CB82

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 276 222c2ec-222c30b 277 222c311-222c31a 276->277 278 222c399-222c3a2 VirtualFree 276->278 280 222c326-222c329 277->280 281 222c31c-222c324 277->281 279 222c3a8-222c3b7 278->279 280->278 282 222c32b-222c333 280->282 281->280 283 222c335-222c35c 281->283 282->278 282->283 285 222c35e-222c36a 283->285 286 222c36c-222c389 call 222e106 283->286 289 222c38e-222c390 285->289 286->289 289->278 290 222c392-222c397 289->290 290->279
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
            • Instruction ID: 546bef70ce4adaf66a831cb19a4b0f01a91ee29cc976f1ff6f5a7a19006057ca
            • Opcode Fuzzy Hash: 33013136f0bb95f1eb9f3645b418df4a5ff2efb559231014e174e8ee2656166c
            • Instruction Fuzzy Hash: FD21C030628B588FDB54DB9CE44872D37E5F79C301F010D2ED449C7224CB799888CB85
            APIs
              • Part of subcall function 02230600: _getptd.LIBCMT ref: 02230616
              • Part of subcall function 02230600: __updatetlocinfo.LIBCMT ref: 0223064B
              • Part of subcall function 02230600: __updatetmbcinfo.LIBCMT ref: 02230672
            • _errno.LIBCMT ref: 02232002
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • _fileno.LIBCMT ref: 0223202F
              • Part of subcall function 02234A54: _errno.LIBCMT ref: 02234A5D
              • Part of subcall function 02234A54: _invalid_parameter_noinfo.LIBCMT ref: 02234A68
            • write_multi_char.LIBCMT ref: 0223266B
            • write_string.LIBCMT ref: 02232688
            • write_multi_char.LIBCMT ref: 022326A5
            • write_string.LIBCMT ref: 02232704
            • write_multi_char.LIBCMT ref: 0223275D
            • free.LIBCMT ref: 02232771
            • _isleadbyte_l.LIBCMT ref: 02232842
            • write_char.LIBCMT ref: 02232858
            • write_char.LIBCMT ref: 02232879
            • _errno.LIBCMT ref: 0223297C
            • _invalid_parameter_noinfo.LIBCMT ref: 02232987
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
            • String ID: $@
            • API String ID: 3613058218-1077428164
            • Opcode ID: 0599035506f01076b605f9026c3628a483f4ccd483033c44f83e2593a1d2db07
            • Instruction ID: 0fbc2a8cc0707f78ef0993cdd2236c90b040dff158ae193548d4bffd8a813084
            • Opcode Fuzzy Hash: 0599035506f01076b605f9026c3628a483f4ccd483033c44f83e2593a1d2db07
            • Instruction Fuzzy Hash: 6F5229B1938B4ACADB2E8A9CC8553B9B7E1FB95314F24432DDD87C3159DB74DC028A42
            APIs
              • Part of subcall function 02230600: _getptd.LIBCMT ref: 02230616
              • Part of subcall function 02230600: __updatetlocinfo.LIBCMT ref: 0223064B
              • Part of subcall function 02230600: __updatetmbcinfo.LIBCMT ref: 02230672
            • _errno.LIBCMT ref: 0223158E
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • _fileno.LIBCMT ref: 022315BB
              • Part of subcall function 02234A54: _errno.LIBCMT ref: 02234A5D
              • Part of subcall function 02234A54: _invalid_parameter_noinfo.LIBCMT ref: 02234A68
            • write_multi_char.LIBCMT ref: 02231BEB
            • write_string.LIBCMT ref: 02231C08
            • write_multi_char.LIBCMT ref: 02231C25
            • write_string.LIBCMT ref: 02231C84
            • write_multi_char.LIBCMT ref: 02231CDD
            • free.LIBCMT ref: 02231CF1
            • _isleadbyte_l.LIBCMT ref: 02231DC2
            • write_char.LIBCMT ref: 02231DD8
            • write_char.LIBCMT ref: 02231DF9
            • _errno.LIBCMT ref: 02231EF3
            • _invalid_parameter_noinfo.LIBCMT ref: 02231EFE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errnowrite_multi_char$_invalid_parameter_noinfowrite_charwrite_string$__updatetlocinfo__updatetmbcinfo_fileno_getptd_getptd_noexit_isleadbyte_lfree
            • String ID:
            • API String ID: 3613058218-3916222277
            • Opcode ID: 99560b4e6a3ba651302837abcdacc877c80be0c82fbf8e81c16206e006ab6ccb
            • Instruction ID: a6915c4793641a82d023eeccce7412511aa518079f8f39f3daa4acb30df80709
            • Opcode Fuzzy Hash: 99560b4e6a3ba651302837abcdacc877c80be0c82fbf8e81c16206e006ab6ccb
            • Instruction Fuzzy Hash: AB522BB0938B4A8AD72E8ADCC8513B9B7E1FB96314F14462DD88FC3159DB75D812C742
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _snprintf$_errno_invalid_parameter_noinfo
            • String ID:
            • API String ID: 3442832105-0
            • Opcode ID: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
            • Instruction ID: ae993b1b208ef0e28b095c301210422eb4a15b1be53d6270964285ce789e5709
            • Opcode Fuzzy Hash: 5c5fb6f4a09e06ccff5c46792293312cb34477fc99d63142bfc01bcec4b0117e
            • Instruction Fuzzy Hash: EF52D13052CE99ABE71EAB6CD4426F0F3E1FFA8309F405218D985C7525EB35E58AC781
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _initp_misc_winsig
            • String ID:
            • API String ID: 2710132595-0
            • Opcode ID: c8c90554330dcabd03fa81e8dd660722591610607187a6cda5de2b4df199049a
            • Instruction ID: 7628f671c13fcb3b4f9be8bc21ffab7c7a2afc14210af46ef2431b7c771bfa88
            • Opcode Fuzzy Hash: c8c90554330dcabd03fa81e8dd660722591610607187a6cda5de2b4df199049a
            • Instruction Fuzzy Hash: 7FA1CC71619A09CFEF95FFB5E8989AA37B2F768301321893A904AC3174DABCD545CF40
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
            • Instruction ID: 5dfbd5608844e426112561b239b0f35d059f0cb3b4fa8af22d1060a88d628447
            • Opcode Fuzzy Hash: 598c92a77d3f8dda66df7f00e42631b8bb25fed254ebd76fcbad8f8343bff3d7
            • Instruction Fuzzy Hash: 22520A312286558FD31CCB1CC4B1B7AB7E1FB89340F44896DE287CB696C639DA45CB91
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
            • Instruction ID: 979c8ff8fce483180b26710dcdfd31d27258d753c715599aed36c6b6ed079e9b
            • Opcode Fuzzy Hash: b966ddc3a4a27f87df3b0e1d0093439f08c10720c9c40116a815356078c1d6ce
            • Instruction Fuzzy Hash: 9152EE312286558FD31CCF1CC5A1E7AB7E1FB8D340F448A6DE28ACB692C639D645CB91
            APIs
            • _errno.LIBCMT ref: 02235E4E
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • __doserrno.LIBCMT ref: 02235E45
              • Part of subcall function 02230CA8: _getptd_noexit.LIBCMT ref: 02230CAC
            • __doserrno.LIBCMT ref: 02235EAB
            • _errno.LIBCMT ref: 02235EB2
            • _invalid_parameter_noinfo.LIBCMT ref: 02235F16
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: __doserrno_errno_getptd_noexit$_invalid_parameter_noinfo
            • String ID:
            • API String ID: 388111225-0
            • Opcode ID: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
            • Instruction ID: 6747f955140acb0e03513226f4155ec4ad0858e8a850856ca7720cc9066e14e3
            • Opcode Fuzzy Hash: f569b21a01fad2a92039226acf8a97d91cb16fac7f3924a9cc2c8e1a455bf938
            • Instruction Fuzzy Hash: 683138F02387094FD35BAFE8888113D36D1EF4B320B910659D45ACB2A9DB74AD028BA1
            APIs
            • _errno.LIBCMT ref: 02236C33
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • __doserrno.LIBCMT ref: 02236C2B
              • Part of subcall function 02230CA8: _getptd_noexit.LIBCMT ref: 02230CAC
            • __lock_fhandle.LIBCMT ref: 02236C77
            • _lseeki64_nolock.LIBCMT ref: 02236C90
            • _unlock_fhandle.LIBCMT ref: 02236CB3
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseeki64_nolock_unlock_fhandle
            • String ID:
            • API String ID: 2644381645-0
            • Opcode ID: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
            • Instruction ID: bde2ee74152a614af365767c699ab9115b9f1a27a0399a48511047f7ecba052e
            • Opcode Fuzzy Hash: 1a0056bbafc3a7faafb75a0a5683c60387dc6450d26c6e1c9b28f7a797692c5c
            • Instruction Fuzzy Hash: 39216AB0638B051FE34BABDCD84537D72D9FF86321F450A4DD01AC7299CBA46C428AA6
            APIs
            • _errno.LIBCMT ref: 02236ABB
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • __doserrno.LIBCMT ref: 02236AB3
              • Part of subcall function 02230CA8: _getptd_noexit.LIBCMT ref: 02230CAC
            • __lock_fhandle.LIBCMT ref: 02236AFF
            • _lseek_nolock.LIBCMT ref: 02236B18
            • _unlock_fhandle.LIBCMT ref: 02236B39
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_lseek_nolock_unlock_fhandle
            • String ID:
            • API String ID: 1078912150-0
            • Opcode ID: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
            • Instruction ID: ad05752699fad58a6eace6e7326458a75602b61a789615d881350229d5b701af
            • Opcode Fuzzy Hash: af586274eb7c0247a5ed565ce490a43ddd2b1adc4c580e4a875ff27a69eb19f0
            • Instruction Fuzzy Hash: 802167B07387044FD31B6FE8D8413BC76DAEF82330F15065CD05687299DBB45C028AAA
            APIs
            • _errno.LIBCMT ref: 0223545F
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • __doserrno.LIBCMT ref: 02235457
              • Part of subcall function 02230CA8: _getptd_noexit.LIBCMT ref: 02230CAC
            • __lock_fhandle.LIBCMT ref: 022354A3
            • _unlock_fhandle.LIBCMT ref: 022354DD
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _getptd_noexit$__doserrno__lock_fhandle_errno_unlock_fhandle
            • String ID:
            • API String ID: 2464146582-0
            • Opcode ID: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
            • Instruction ID: 39d8206000f1668a4501013adf2d6e5a17df49aa755b0743a756e01de3d3948f
            • Opcode Fuzzy Hash: c89056d156aae0bb9c491ae48c02d203d405bbf82af9f534bcd04b22b5544d86
            • Instruction Fuzzy Hash: ED2148B162C7044FD35EAFA8D88137D36C2EF8A332F55064DD11A87299DAA45C128AA2
            APIs
            • _errno.LIBCMT ref: 02234C79
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • __doserrno.LIBCMT ref: 02234C71
              • Part of subcall function 02230CA8: _getptd_noexit.LIBCMT ref: 02230CAC
            • __lock_fhandle.LIBCMT ref: 02234CBD
            • _close_nolock.LIBCMT ref: 02234CD0
            • _unlock_fhandle.LIBCMT ref: 02234CE9
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _getptd_noexit$__doserrno__lock_fhandle_close_nolock_errno_unlock_fhandle
            • String ID:
            • API String ID: 2140805544-0
            • Opcode ID: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
            • Instruction ID: 9d73efa2eb2c1510abc90510530f77f0a7af2cb7d4f47d28d230c41c81e3b328
            • Opcode Fuzzy Hash: d63a0d9a057a00514656f61d256491cfcc4309f98023220473e92bade8306c33
            • Instruction Fuzzy Hash: 491138B1139B084FD35BBFE9C88036876D1FF46321F250A9DE41A872D9CAB99841CB71
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: free$BoundaryDeleteDescriptor_errno
            • String ID:
            • API String ID: 3555341564-0
            • Opcode ID: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
            • Instruction ID: bc30a058d0c3d4ff0cc199ae59f7b23c8ed1e791ffd37284d0699366af65d5d1
            • Opcode Fuzzy Hash: f2c387d57ff385ba375dc00a6173171a26f2c39e06d74853e0125178de0f68c4
            • Instruction Fuzzy Hash: 7131C230274E1B9FFB64EBD8E894B6872E1FB58315F6540698006C22A8CF7DA949DB11
            APIs
            • malloc.LIBCMT ref: 022136A9
              • Part of subcall function 0222E284: _FF_MSGBANNER.LIBCMT ref: 0222E2B4
              • Part of subcall function 0222E284: _NMSG_WRITE.LIBCMT ref: 0222E2BE
              • Part of subcall function 0222E284: RtlAllocateHeap.NTDLL ref: 0222E2D9
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E2F2
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E2FD
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E308
            • malloc.LIBCMT ref: 022136B3
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E318
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E31D
            • malloc.LIBCMT ref: 022136BE
            • free.LIBCMT ref: 0221387E
            • free.LIBCMT ref: 02213886
            • free.LIBCMT ref: 0221388E
              • Part of subcall function 022144F0: malloc.LIBCMT ref: 0221453A
              • Part of subcall function 022144F0: malloc.LIBCMT ref: 02214545
              • Part of subcall function 022144F0: free.LIBCMT ref: 0221462C
              • Part of subcall function 022144F0: free.LIBCMT ref: 02214634
            • free.LIBCMT ref: 0221389A
            • free.LIBCMT ref: 022138A7
            • free.LIBCMT ref: 022138B4
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: free$malloc$_errno$_callnewh$AllocateHeap
            • String ID:
            • API String ID: 2779598320-0
            • Opcode ID: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
            • Instruction ID: 130d36fd4e866d7a54ec527900f94d817259405ce2c453d3d10c06eaa7eea6f7
            • Opcode Fuzzy Hash: 78c5723810e6e6d18fab4a62d391ea0db65c57382cb75ed74f6abc212771b6cb
            • Instruction Fuzzy Hash: AD81EB70738B4D4BC729EFAC9441B7A73D3EB95704F55029ED48BC3249EF60D8068686
            APIs
            • _errno.LIBCMT ref: 0222EE36
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • _invalid_parameter_noinfo.LIBCMT ref: 0222EE42
            • __crtIsPackagedApp.LIBCMT ref: 0222EE53
            • _dosmaperr.LIBCMT ref: 0222EE9D
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: Packaged__crt_dosmaperr_errno_getptd_noexit_invalid_parameter_noinfo
            • String ID:
            • API String ID: 2917016420-0
            • Opcode ID: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
            • Instruction ID: 46849d99b63f7668092eb2271b40356f89546a7294963ebbbfe25c8a0795aa8c
            • Opcode Fuzzy Hash: cfbfe809ff06962f400f8854e8dfaca57605153f463412cb5835124c7fa4a529
            • Instruction Fuzzy Hash: 32312530734B1A9FDB48EFB8984436976D1FF88320F15426DE40AC33A8DB79D8458B42
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errno$__doserrno__lock_fhandle_getptd_noexit_unlock_fhandle
            • String ID:
            • API String ID: 4120058822-0
            • Opcode ID: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
            • Instruction ID: e3dfbe17278d9347f44c04e2592c5bae5c59c9d505f47c818eb6454ed719dd37
            • Opcode Fuzzy Hash: 9341880fa3ae8ea43da77f4714028596b22b009dd5c4526b8d460d71b2af8a07
            • Instruction Fuzzy Hash: 792135F0638B054FD717AFE898D03AD7691EF87310B450A1CE11B8B2D9D7E858818BA1
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errno$_filbuf_fileno_getptd_noexit_invalid_parameter_noinfomemcpy_s
            • String ID:
            • API String ID: 2328795619-0
            • Opcode ID: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
            • Instruction ID: 3368c13348a2d92310d1ec84cb8a28bd2740b923d6e90249125cf521afed9a91
            • Opcode Fuzzy Hash: 4bbdce99b29ecd3e24264ac9f3b66a56e11342a03ebc5466d7d382185dba5216
            • Instruction Fuzzy Hash: 91517F3033CF2A1B972C9AAC555513573E2FBD8724B14032EE856C3A9DEF62D85A86C1
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errno$_getptd_noexit_getstream_invalid_parameter_noinfo_openfile
            • String ID:
            • API String ID: 1547050394-0
            • Opcode ID: 25a8bf288fd42ce426ab2ae56b53d18e2e8359fd32586f4ae3706e9ff750b65b
            • Instruction ID: fbd773bf6b2715730a3dd7f46a22e3227101b1267ffb08a50070f3071828aee6
            • Opcode Fuzzy Hash: 25a8bf288fd42ce426ab2ae56b53d18e2e8359fd32586f4ae3706e9ff750b65b
            • Instruction Fuzzy Hash: B92101B0638B5E5FE7A5EFA8940432A72E2FF89310F44096A9449C3228EF75CC418791
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: freemallocstrchr$BoundaryDeleteDescriptor_errnorand
            • String ID:
            • API String ID: 4223773762-0
            • Opcode ID: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
            • Instruction ID: ed9b02933b0d91bbc734b1f77b78c1e8d3c281da4dd5b255b48232a579001f1a
            • Opcode Fuzzy Hash: f35e4bf4a30ec4413237561f10dac7197b8990473e0b46e11b580f4fb44e5963
            • Instruction Fuzzy Hash: 91711920638FA99BDB69EB6C94003F6B3D1FF89309F04026DD98AC7159DE36954BC781
            APIs
            • malloc.LIBCMT ref: 022131BD
              • Part of subcall function 0222E284: _FF_MSGBANNER.LIBCMT ref: 0222E2B4
              • Part of subcall function 0222E284: _NMSG_WRITE.LIBCMT ref: 0222E2BE
              • Part of subcall function 0222E284: RtlAllocateHeap.NTDLL ref: 0222E2D9
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E2F2
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E2FD
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E308
            • malloc.LIBCMT ref: 022131C8
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E318
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E31D
            • free.LIBCMT ref: 022132AF
            • free.LIBCMT ref: 022132B7
            • free.LIBCMT ref: 022132BF
            • free.LIBCMT ref: 022132CB
            • free.LIBCMT ref: 022132D8
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: free$_errno$_callnewhmalloc$AllocateHeap
            • String ID:
            • API String ID: 4095668141-0
            • Opcode ID: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
            • Instruction ID: bece0d05f92ee5770cbd757d59dfcc85d6634015e941fa0444ca74363bae7e8b
            • Opcode Fuzzy Hash: a46d6df1e63736bbf5e6f8efd513222b2720334364c4a35ae3722e37f335d37b
            • Instruction Fuzzy Hash: 8A41F530728F5A5F975DEBAC9441A7A77D2FB5930475002ADD84BC320AEFA0EC028BC5
            APIs
              • Part of subcall function 02224FEC: malloc.LIBCMT ref: 02225008
            • malloc.LIBCMT ref: 0221BB3B
              • Part of subcall function 0222E284: _FF_MSGBANNER.LIBCMT ref: 0222E2B4
              • Part of subcall function 0222E284: _NMSG_WRITE.LIBCMT ref: 0222E2BE
              • Part of subcall function 0222E284: RtlAllocateHeap.NTDLL ref: 0222E2D9
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E2F2
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E2FD
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E308
              • Part of subcall function 0222B230: malloc.LIBCMT ref: 0222B29C
              • Part of subcall function 0222DAA8: malloc.LIBCMT ref: 0222DAF8
              • Part of subcall function 0222DAA8: realloc.LIBCMT ref: 0222DB07
            • malloc.LIBCMT ref: 0221BC4A
            • _snprintf.LIBCMT ref: 0221BCC1
            • _snprintf.LIBCMT ref: 0221BCE7
            • _snprintf.LIBCMT ref: 0221BD0E
            • free.LIBCMT ref: 0221BEC6
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: malloc$_snprintf$_errno$AllocateHeap_callnewhfreerealloc
            • String ID:
            • API String ID: 705544021-0
            • Opcode ID: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
            • Instruction ID: cb36d720ce67fea3219bef792454d813172670f7cb0563c71c14337cb987ed18
            • Opcode Fuzzy Hash: fd4b1ce187cf5d2c7b3c7d1d5f2f485ec143d87fcb2d796d9dd721ce5a89571b
            • Instruction Fuzzy Hash: 8CC1E630734B155BDB18FBF88855A7DB2E3EB94304F90052D9847C7699DE39D90A8B82
            APIs
              • Part of subcall function 02224FEC: malloc.LIBCMT ref: 02225008
              • Part of subcall function 0222F620: _errno.LIBCMT ref: 0222F577
              • Part of subcall function 0222F620: _invalid_parameter_noinfo.LIBCMT ref: 0222F582
            • fseek.LIBCMT ref: 02220730
              • Part of subcall function 0222FEA4: _errno.LIBCMT ref: 0222FECC
              • Part of subcall function 0222FEA4: _invalid_parameter_noinfo.LIBCMT ref: 0222FED7
            • _ftelli64.LIBCMT ref: 02220738
              • Part of subcall function 0222FF18: _errno.LIBCMT ref: 0222FF36
              • Part of subcall function 0222FF18: _invalid_parameter_noinfo.LIBCMT ref: 0222FF41
            • fseek.LIBCMT ref: 02220748
              • Part of subcall function 0222FEA4: _fseek_nolock.LIBCMT ref: 0222FEF5
            • malloc.LIBCMT ref: 02220788
              • Part of subcall function 0222E284: _FF_MSGBANNER.LIBCMT ref: 0222E2B4
              • Part of subcall function 0222E284: _NMSG_WRITE.LIBCMT ref: 0222E2BE
              • Part of subcall function 0222E284: RtlAllocateHeap.NTDLL ref: 0222E2D9
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E2F2
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E2FD
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E308
            • fclose.LIBCMT ref: 02220845
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errno$_invalid_parameter_noinfo$fseekmalloc$AllocateHeap_callnewh_fseek_nolock_ftelli64fclose
            • String ID:
            • API String ID: 495604859-0
            • Opcode ID: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
            • Instruction ID: 145b7b02f15b03ad613e60a525888f4976f9b8df52c8ee3cd70a1d17f695a862
            • Opcode Fuzzy Hash: f1c4e02295faa99f8843714657dd5281141177bf23df19fa39898597ddf49910
            • Instruction Fuzzy Hash: B751C831738B584FC74DEBACD455A7A72D2FB98310B90426ED44FC3299DE649D068BC2
            APIs
            • _mtinitlocknum.LIBCMT ref: 02239375
              • Part of subcall function 02232E58: _FF_MSGBANNER.LIBCMT ref: 02232E75
              • Part of subcall function 02232E58: _NMSG_WRITE.LIBCMT ref: 02232E7F
            • _lock.LIBCMT ref: 02239388
            • _lock.LIBCMT ref: 022393E3
            • _calloc_crt.LIBCMT ref: 0223949A
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _lock$_calloc_crt_mtinitlocknum
            • String ID:
            • API String ID: 3962633935-0
            • Opcode ID: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
            • Instruction ID: 776e9e8a86ba9f17cf601c9573c744a10f8411a152490af9fea24410a197751f
            • Opcode Fuzzy Hash: b1e94c722dda090378a8e761eed7513b06593d91ccd6790d0d4411b736f80c7c
            • Instruction Fuzzy Hash: CE5128B1538B098FDB19DF98C881266B7E0FB59314F11425DD88AC7269DBB4D882CBC2
            APIs
            • malloc.LIBCMT ref: 0221453A
              • Part of subcall function 0222E284: _FF_MSGBANNER.LIBCMT ref: 0222E2B4
              • Part of subcall function 0222E284: _NMSG_WRITE.LIBCMT ref: 0222E2BE
              • Part of subcall function 0222E284: RtlAllocateHeap.NTDLL ref: 0222E2D9
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E2F2
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E2FD
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E308
            • malloc.LIBCMT ref: 02214545
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E318
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E31D
            • free.LIBCMT ref: 0221462C
            • free.LIBCMT ref: 02214634
            • free.LIBCMT ref: 02214640
            • free.LIBCMT ref: 0221464D
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: free$_errno$_callnewhmalloc$AllocateHeap
            • String ID:
            • API String ID: 4095668141-0
            • Opcode ID: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
            • Instruction ID: 4379df0832dac1cb8b73e3ec789ae7d6a748c60668649c160d7854d5008cab2e
            • Opcode Fuzzy Hash: 9dd44889f23309e2c133c4e883ac3d7c03cf28f4ebc62bcd805b5d39935d1e2d
            • Instruction Fuzzy Hash: 6C412B31328B5E4B9B19FBAC4845A7A77D5EBE6359B14422DD88BC3216EE20D807C7C1
            APIs
            • _fileno.LIBCMT ref: 022313B9
              • Part of subcall function 02234A54: _errno.LIBCMT ref: 02234A5D
              • Part of subcall function 02234A54: _invalid_parameter_noinfo.LIBCMT ref: 02234A68
            • _errno.LIBCMT ref: 022313C9
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • _errno.LIBCMT ref: 022313E5
            • _isatty.LIBCMT ref: 02231446
            • _getbuf.LIBCMT ref: 02231452
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errno$_fileno_getbuf_getptd_noexit_invalid_parameter_noinfo_isatty
            • String ID:
            • API String ID: 304646821-0
            • Opcode ID: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
            • Instruction ID: b4d85f3382dba86ddcf059db80a303cd179a3e27dee15b3671505dd616ea2a20
            • Opcode Fuzzy Hash: c35e8c2de9f02937b40d8dcb44627bb11330896f7d068decc206105344bae12a
            • Instruction Fuzzy Hash: E141E4B0234B098FCB5AEFA8C48176577E1FF48320B540699D95ECB29ED774C861CB81
            APIs
            • malloc.LIBCMT ref: 0222824F
              • Part of subcall function 0222E284: _FF_MSGBANNER.LIBCMT ref: 0222E2B4
              • Part of subcall function 0222E284: _NMSG_WRITE.LIBCMT ref: 0222E2BE
              • Part of subcall function 0222E284: RtlAllocateHeap.NTDLL ref: 0222E2D9
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E2F2
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E2FD
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E308
            • _snprintf.LIBCMT ref: 02228267
              • Part of subcall function 0222E63C: _errno.LIBCMT ref: 0222E673
              • Part of subcall function 0222E63C: _invalid_parameter_noinfo.LIBCMT ref: 0222E67E
            • free.LIBCMT ref: 0222827E
              • Part of subcall function 0222E244: RtlDeleteBoundaryDescriptor.NTDLL ref: 0222E25A
              • Part of subcall function 0222E244: _errno.LIBCMT ref: 0222E264
            • malloc.LIBCMT ref: 022282CE
            • _snprintf.LIBCMT ref: 022282E6
            • free.LIBCMT ref: 0222830E
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errno$_snprintffreemalloc$AllocateBoundaryDeleteDescriptorHeap_callnewh_invalid_parameter_noinfo
            • String ID:
            • API String ID: 383335425-0
            • Opcode ID: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
            • Instruction ID: 04808a64986203972fc94a66b4bbb56ecd70008fd81f1f26329a117bccaba058
            • Opcode Fuzzy Hash: faf2166294d0965833cb84c6e7fe882f3c5ed13ceeefabe40a4c11aee224dca5
            • Instruction Fuzzy Hash: 2731F82032CEAC1FD75CABAC68113B877D3E789310745429DD08FC325ADE65EC468B96
            APIs
            • malloc.LIBCMT ref: 0221EC85
              • Part of subcall function 0222E284: _FF_MSGBANNER.LIBCMT ref: 0222E2B4
              • Part of subcall function 0222E284: _NMSG_WRITE.LIBCMT ref: 0222E2BE
              • Part of subcall function 0222E284: RtlAllocateHeap.NTDLL ref: 0222E2D9
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E2F2
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E2FD
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E308
            • free.LIBCMT ref: 0221ECC0
            • fwrite.LIBCMT ref: 0221ED01
            • fclose.LIBCMT ref: 0221ED09
            • free.LIBCMT ref: 0221ED16
              • Part of subcall function 0222E244: RtlDeleteBoundaryDescriptor.NTDLL ref: 0222E25A
              • Part of subcall function 0222E244: _errno.LIBCMT ref: 0222E264
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errno$free$AllocateBoundaryDeleteDescriptorHeap_callnewhfclosefwritemalloc
            • String ID:
            • API String ID: 1599808278-0
            • Opcode ID: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
            • Instruction ID: b69ea2c1f1cf75eb705ef1627b2d10bbc0ca57bf616ba94454fbd6af0b7bb0c1
            • Opcode Fuzzy Hash: c287650ca013cd6fba82a94b2bfab312077d62521af6d54d1c0599a360ecab3d
            • Instruction Fuzzy Hash: 5821A420238F1D5FC789FBAC845476EB2D2FB9C340F90066DA44AC3298ED65D9058B82
            APIs
            • _errno.LIBCMT ref: 022395FD
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • __doserrno.LIBCMT ref: 022395F5
              • Part of subcall function 02230CA8: _getptd_noexit.LIBCMT ref: 02230CAC
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _getptd_noexit$__doserrno_errno
            • String ID:
            • API String ID: 2964073243-0
            • Opcode ID: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
            • Instruction ID: d153a5e4ef6465070a07428c91697433ece760b0174c38535c803d09ac75bb1e
            • Opcode Fuzzy Hash: 7de39b626677fa29025c8f4af27b0a540db68e2d6824cc23474586602198323a
            • Instruction Fuzzy Hash: 2EF0C8B0136A894FE79BA7F4C8903543291FF06325F944254D015C71FCDBBC54858F22
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _snprintf
            • String ID:
            • API String ID: 3512837008-0
            • Opcode ID: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
            • Instruction ID: b2260b6955ed756888dd9dbf28199f82cf559d67c9b245f1fb9eec58770b7ee2
            • Opcode Fuzzy Hash: 72e4e973a1d0442b98f7febb78707b45b3081222fbe35b5ecbc6412512dc3076
            • Instruction Fuzzy Hash: FD81E931628B488FDB54FF68DC84BAA73E6FBA9304F000569D44AC3155DF38D945CB42
            APIs
            • malloc.LIBCMT ref: 0222E00F
              • Part of subcall function 0222E284: _FF_MSGBANNER.LIBCMT ref: 0222E2B4
              • Part of subcall function 0222E284: _NMSG_WRITE.LIBCMT ref: 0222E2BE
              • Part of subcall function 0222E284: RtlAllocateHeap.NTDLL ref: 0222E2D9
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E2F2
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E2FD
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E308
            • malloc.LIBCMT ref: 0222E01D
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E318
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E31D
            • malloc.LIBCMT ref: 0222E03F
            • _snprintf.LIBCMT ref: 0222E05A
              • Part of subcall function 0222E63C: _errno.LIBCMT ref: 0222E673
              • Part of subcall function 0222E63C: _invalid_parameter_noinfo.LIBCMT ref: 0222E67E
            • malloc.LIBCMT ref: 0222E075
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errnomalloc$_callnewh$AllocateHeap_invalid_parameter_noinfo_snprintf
            • String ID:
            • API String ID: 3487649172-0
            • Opcode ID: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
            • Instruction ID: 31bfc5bef6e76264e60a56785afdb27477abc26e085725c200c4ed302876b875
            • Opcode Fuzzy Hash: b352101c7262c8bcb4a5e96376bd10b91777e0dce9561e268234f3b9efdf5141
            • Instruction Fuzzy Hash: 9D11C430A2CF181FD7A8EF6CA04422576D2FB8C310F51465EE09EC3399EA34AC454BC1
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errno_fileno_flush_getptd_noexit_invalid_parameter_noinfo
            • String ID:
            • API String ID: 634798775-0
            • Opcode ID: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
            • Instruction ID: 169f402da865fafb2f87886b42cc551de449626e4af7dcbf14ac45c45db7f103
            • Opcode Fuzzy Hash: 34e7f92ebff520e6a17a4e985317f9f17b8bd586bad3667c73d28a98cf0395a5
            • Instruction Fuzzy Hash: 5B418F30338F1E5FC72C6EED564527572E1EB58310B10026ED49AC397EEBA2D85A86C2
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: clock
            • String ID:
            • API String ID: 3195780754-0
            • Opcode ID: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
            • Instruction ID: 4d6242bedcc69bcab5bcc7e386b0b6bbf93bc32180e259b44ba235aaf91284c4
            • Opcode Fuzzy Hash: 88d80a52c757cc5c40c2c6d70a970e4954adb33c3b78b443ec03df4506b3ea8d
            • Instruction Fuzzy Hash: 7711207141C70D4F8728ADE85442736B7D0E799250F15062EECCAC3116FAA49D8286D6
            APIs
            • calloc.LIBCMT ref: 02210D6A
              • Part of subcall function 0223DE08: _calloc_impl.LIBCMT ref: 0223DE18
              • Part of subcall function 0223DE08: _errno.LIBCMT ref: 0223DE2B
              • Part of subcall function 0223DE08: _errno.LIBCMT ref: 0223DE35
            • free.LIBCMT ref: 02210EF3
            • free.LIBCMT ref: 02210EFD
              • Part of subcall function 0222E244: RtlDeleteBoundaryDescriptor.NTDLL ref: 0222E25A
              • Part of subcall function 0222E244: _errno.LIBCMT ref: 0222E264
            • free.LIBCMT ref: 02210F0F
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errnofree$BoundaryDeleteDescriptor_calloc_implcalloc
            • String ID:
            • API String ID: 3013916351-0
            • Opcode ID: d93992b633c35f2e37b516dd72fb4d9a33d59668b61f8d19e3ffcf9038676577
            • Instruction ID: 00ac9a5124a520b33f3c1ecc9e9f60d8eec297f0de5ea67fed7b39e05b71874d
            • Opcode Fuzzy Hash: d93992b633c35f2e37b516dd72fb4d9a33d59668b61f8d19e3ffcf9038676577
            • Instruction Fuzzy Hash: 55D15E70A18B498FDB58DF5CD484BAABBE1FBA8305F10452EE88DC3255DB70D945CB42
            APIs
            • _errno.LIBCMT ref: 0222E8B1
              • Part of subcall function 02230D18: _getptd_noexit.LIBCMT ref: 02230D1C
            • _invalid_parameter_noinfo.LIBCMT ref: 0222E8BC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: _errno_getptd_noexit_invalid_parameter_noinfo
            • String ID: B
            • API String ID: 1812809483-1255198513
            • Opcode ID: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
            • Instruction ID: d852b2c6f777951cc42b47776725197dc90e2b9390a68993e570115d34051255
            • Opcode Fuzzy Hash: c02d2d703cad3fde31994e70e132d1470a84cf0b2fdde3fa0011d2dc5e3ae6ea
            • Instruction Fuzzy Hash: BF118F30628B084FD744EF589485765B7D1FB98324F5047AEA459C72A4DF74D944CB82
            APIs
            • malloc.LIBCMT ref: 02229D78
              • Part of subcall function 0222E284: _FF_MSGBANNER.LIBCMT ref: 0222E2B4
              • Part of subcall function 0222E284: _NMSG_WRITE.LIBCMT ref: 0222E2BE
              • Part of subcall function 0222E284: RtlAllocateHeap.NTDLL ref: 0222E2D9
              • Part of subcall function 0222E284: _callnewh.LIBCMT ref: 0222E2F2
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E2FD
              • Part of subcall function 0222E284: _errno.LIBCMT ref: 0222E308
            • free.LIBCMT ref: 02229EBF
            • free.LIBCMT ref: 02229F23
            • free.LIBCMT ref: 02229F2F
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: free$_errno$AllocateHeap_callnewhmalloc
            • String ID:
            • API String ID: 106865790-0
            • Opcode ID: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
            • Instruction ID: 8e2910473e7c20af5f7add405975b394663b1065634ef3d0b96e6ab542b41a1d
            • Opcode Fuzzy Hash: 220d10eecca3932b28677e19a5d899b4e1de467fae96e5e6bbac4d4284393be2
            • Instruction Fuzzy Hash: 6551E730338B295BDB58EBA8D49067D73E2FB88300F600A2DD54BC325DDF76D54A8A85
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2913255827.0000000002210000.00000020.00001000.00020000.00000000.sdmp, Offset: 02210000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2210000_to.jbxd
            Yara matches
            Similarity
            • API ID: malloc
            • String ID:
            • API String ID: 2803490479-0
            • Opcode ID: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
            • Instruction ID: 83cef668ca86e99ad0c68a22160229a980d6218f74b28d9acc7f7a78f7980f84
            • Opcode Fuzzy Hash: eb22e79342f6c44f5990d3d93bc1acaf377093f70efb3d4e41a798bd81bbd69f
            • Instruction Fuzzy Hash: 0A41E47062CB054BCB1DDFACD481A7A73E2FB9931074445ADD88BC324AEF30E8468A85