Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
yoyo.exe

Overview

General Information

Sample name:yoyo.exe
Analysis ID:1546036
MD5:0ced0787f8e64762035adea6c6aff9e2
SHA1:3f3822cccdd892f20a8535a8137420e4e1b49344
SHA256:79937a1b5c371c64c42abd995ddc3beff64be580f3f11ece7aceaccf1b306cee
Infos:

Detection

Score:24
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

NDIS Filter Driver detected (likely used to intercept and sniff network traffic)
Detected potential crypto function
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • yoyo.exe (PID: 6388 cmdline: "C:\Users\user\Desktop\yoyo.exe" -install MD5: 0CED0787F8E64762035ADEA6C6AFF9E2)
    • conhost.exe (PID: 1892 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • yoyo.exe (PID: 2676 cmdline: "C:\Users\user\Desktop\yoyo.exe" /install MD5: 0CED0787F8E64762035ADEA6C6AFF9E2)
    • conhost.exe (PID: 7100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • yoyo.exe (PID: 5852 cmdline: "C:\Users\user\Desktop\yoyo.exe" /load MD5: 0CED0787F8E64762035ADEA6C6AFF9E2)
    • conhost.exe (PID: 6052 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\yoyo.exeCode function: 0_2_00007FF6BDD115E4 CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,CryptHashData,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF6BDD115E4
Source: yoyo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

Networking

barindex
Source: yoyo.exeStatic PE information: Found NDIS imports: FwpmEngineClose0, FwpmEngineOpen0, FwpmFilterAdd0, FwpmFilterCreateEnumHandle0, FwpmFilterDeleteById0, FwpmFilterDestroyEnumHandle0, FwpmFilterEnum0, FwpmFreeMemory0, FwpmProviderAdd0, FwpmProviderCreateEnumHandle0, FwpmProviderDeleteByKey0, FwpmProviderDestroyEnumHandle0, FwpmProviderEnum0
Source: C:\Users\user\Desktop\yoyo.exeCode function: 0_2_00007FF6BDD191700_2_00007FF6BDD19170
Source: C:\Users\user\Desktop\yoyo.exeCode function: String function: 00007FF6BDD11550 appears 50 times
Source: yoyo.exeStatic PE information: Number of sections : 18 > 10
Source: classification engineClassification label: sus24.troj.winEXE@6/3@0/0
Source: C:\Users\user\Desktop\yoyo.exeCode function: 0_2_00007FF6BDD12AE8 GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,CloseHandle,AdjustTokenPrivileges,CloseHandle,GetLastError,CloseHandle,CloseHandle,0_2_00007FF6BDD12AE8
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7100:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1892:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6052:120:WilError_03
Source: yoyo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\yoyo.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: yoyo.exeString found in binary or memory: --help
Source: yoyo.exeString found in binary or memory: --help
Source: yoyo.exeString found in binary or memory: --help
Source: yoyo.exeString found in binary or memory: --help
Source: yoyo.exeString found in binary or memory: 3DRS1l3nc3r.3xe unbl0ck <f1lt3r 1d>-h--helpblockedrblock[-] Missing second argument. Please provide the full path of the process to block.
Source: yoyo.exeString found in binary or memory: 3DRS1l3nc3r.3xe unbl0ck <f1lt3r 1d>-h--helpblockedrblock[-] Missing second argument. Please provide the full path of the process to block.
Source: unknownProcess created: C:\Users\user\Desktop\yoyo.exe "C:\Users\user\Desktop\yoyo.exe" -install
Source: C:\Users\user\Desktop\yoyo.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\yoyo.exe "C:\Users\user\Desktop\yoyo.exe" /install
Source: C:\Users\user\Desktop\yoyo.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Users\user\Desktop\yoyo.exe "C:\Users\user\Desktop\yoyo.exe" /load
Source: C:\Users\user\Desktop\yoyo.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\yoyo.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\yoyo.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\yoyo.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\yoyo.exeSection loaded: fwpuclnt.dllJump to behavior
Source: yoyo.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: yoyo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: yoyo.exeStatic PE information: section name: .xdata
Source: yoyo.exeStatic PE information: section name: /4
Source: yoyo.exeStatic PE information: section name: /19
Source: yoyo.exeStatic PE information: section name: /31
Source: yoyo.exeStatic PE information: section name: /45
Source: yoyo.exeStatic PE information: section name: /57
Source: yoyo.exeStatic PE information: section name: /70
Source: yoyo.exeStatic PE information: section name: /81
Source: yoyo.exeStatic PE information: section name: /92
Source: C:\Users\user\Desktop\yoyo.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-3793
Source: C:\Users\user\Desktop\yoyo.exeAPI coverage: 7.4 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\yoyo.exeCode function: 0_2_00007FF6BDD11190 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,0_2_00007FF6BDD11190
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Access Token Manipulation
1
Access Token Manipulation
1
Network Sniffing
1
Network Sniffing
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
Process Injection
1
Process Injection
LSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1546036 Sample: yoyo.exe Startdate: 31/10/2024 Architecture: WINDOWS Score: 24 18 NDIS Filter Driver detected (likely used to intercept and sniff network traffic) 2->18 6 yoyo.exe 1 2->6         started        8 yoyo.exe 1 2->8         started        10 yoyo.exe 1 2->10         started        process3 process4 12 conhost.exe 6->12         started        14 conhost.exe 8->14         started        16 conhost.exe 10->16         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1546036
Start date and time:2024-10-31 12:00:19 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 12s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Cmdline fuzzy
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:yoyo.exe
Detection:SUS
Classification:sus24.troj.winEXE@6/3@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 23
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: yoyo.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\yoyo.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):32
Entropy (8bit):4.452819531114783
Encrypted:false
SSDEEP:3:34F3Xlslovn:qqly
MD5:CAF0F008F51248BD8771E99EE040C51A
SHA1:F92EFA13B109747BCB1726C52B16DAAC1091887F
SHA-256:2179C85F3082CDCCB0E59E8421FA8E83B13DD51DD540A5299E4AECC8149A0D11
SHA-512:1DFCD3A3B88063F3D8DFB645380D96ECD85B65C1A9B59BC2A40E34175D31DC97FB47CC87096D96732C20CA0BBEBE1434345B315E3A41F951F93FE55A1F817B1F
Malicious:false
Reputation:low
Preview:[-] Invalid argument: "/load"...
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.752655646033032
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:yoyo.exe
File size:591'348 bytes
MD5:0ced0787f8e64762035adea6c6aff9e2
SHA1:3f3822cccdd892f20a8535a8137420e4e1b49344
SHA256:79937a1b5c371c64c42abd995ddc3beff64be580f3f11ece7aceaccf1b306cee
SHA512:4dbb7e2f3a28bdbf27db5a818567f44be6df0439736dc1326117440c05f1370d02178ef859734f4c830337a9b2f1dd3cfe74fb9cad33d996c54f2af36c2d8743
SSDEEP:6144:oOvmKmAUS+NKnkg2RuO2NKVuciE0HyViv7LI3nDsq6KSTm+tmogOKietNDFBsY7v:oumpQ/kLIFU48EDLeDslh98BBXD
TLSH:C0C44B94B744FDFADC894BB408D323096379F081971AEF2F1624FE380D5AB98DD6254A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...h]#g.*..(.....&....&.......................@..........................................`... ............................
Icon Hash:00928e8e8686b000
Entrypoint:0x1400014f0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x67235D68 [Thu Oct 31 10:35:20 2024 UTC]
TLS Callbacks:0x400033b0, 0x1, 0x40003380, 0x1
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:5123fa917cc2430dc63d9ccf1a383aab
Instruction
dec eax
sub esp, 28h
dec eax
mov eax, dword ptr [0000DF95h]
mov dword ptr [eax], 00000000h
call 00007FB09101A2DFh
nop
nop
dec eax
add esp, 28h
ret
nop dword ptr [eax]
dec eax
sub esp, 28h
call 00007FB091024814h
dec eax
test eax, eax
sete al
movzx eax, al
neg eax
dec eax
add esp, 28h
ret
nop
nop
nop
nop
nop
nop
nop
dec eax
lea ecx, dword ptr [00000009h]
jmp 00007FB09101A629h
nop dword ptr [eax+00h]
ret
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
push ebp
push ebx
dec eax
sub esp, 38h
dec eax
lea ebp, dword ptr [esp+30h]
dec eax
mov dword ptr [ebp+20h], ecx
dec eax
mov dword ptr [ebp+28h], edx
dec esp
mov dword ptr [ebp+30h], eax
dec esp
mov dword ptr [ebp+38h], ecx
dec eax
lea eax, dword ptr [ebp+28h]
dec eax
mov dword ptr [ebp-10h], eax
dec eax
mov ebx, dword ptr [ebp-10h]
mov ecx, 00000001h
dec eax
mov eax, dword ptr [0000AD1Dh]
call eax
dec ecx
mov eax, ebx
dec eax
mov edx, dword ptr [ebp+20h]
dec eax
mov ecx, eax
call 00007FB09101D651h
mov dword ptr [ebp-04h], eax
mov eax, dword ptr [ebp-04h]
dec eax
add esp, 38h
pop ebx
pop ebp
ret
push ebp
dec eax
mov ebp, esp
dec eax
sub esp, 30h
dec eax
mov dword ptr [ebp+10h], ecx
dec eax
mov dword ptr [ebp+18h], edx
dec esp
mov dword ptr [ebp+20h], eax
dec esp
mov dword ptr [ebp+00h], ecx
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x130000xef4.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x100000x660.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x160000x108.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xeae00x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x133940x330.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xaf580xb00087d6448fb1725c8a624296c524e428d9False0.4808016690340909data6.189659237557355IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0xc0000x3000x40026de311d7ec811c685d04f170c782cb8False0.21484375dBase III DBT, version number 0, next free block index 10, 1st item "P\277"2.1522558928735593IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0xd0000x2b100x2c0009edab67c4bb3a99a8dc238b39fef2ecFalse0.4169034090909091data5.411947680544488IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.pdata0x100000x6600x8002f27b18be013dad0f05c18b4bd023de0False0.419921875data3.9472676031765923IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.xdata0x110000x6600x800dc29bd5bc044883f211409fbac249752False0.275390625data3.9137802324692066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.bss0x120000xba00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x130000xef40x10002cef9d1d111be37139b89822d5c7a267False0.3212890625data4.365882503662465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT0x140000x680x200b103b8c6870eb0d3294fa1bfed9225d9False0.072265625data0.3406417195159507IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x150000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.reloc0x160000x1080x200d2b6819971e2f0cbe7af8659321c305bFalse0.419921875data2.999927855757088IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/40x170000x7400x8002f86504001f606364ee31c1afbafdd1fFalse0.21435546875data1.8239951159683898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/190x180000x49eca0x4a00009fcac5b714ca8b81488d89da2f10b04False0.30402766047297297data6.072112238318745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/310x620000x425e0x4400d6e26d5fb092f81946a3d5aeb0cbd025False0.16015625data4.657520941799018IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/450x670000x9c400x9e00ce7e71fc681abc9652cb1d4600c1f62cFalse0.3764833860759494data5.422244785088024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/570x710000x1d900x1e00a6a7c2bffce6316833498b3ac3038077False0.2779947916666667data4.608007288379467IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/700x730000x97b0xa0064d168a85f1d435ee925ff8405f7551fFalse0.361328125data4.67227975326816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/810x740000x156370x15800676f3b91b2c25d7337b13e53ba8992f7False0.22447311046511628data2.7222671694363108IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/920x8a0000x13900x1400bf97901156be399597c5a46ddadc47caFalse0.2099609375data1.864343230941564IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
ADVAPI32.dllAdjustTokenPrivileges, CryptAcquireContextA, CryptCreateHash, CryptDestroyHash, CryptGetHashParam, CryptHashData, CryptReleaseContext, GetSidSubAuthority, GetSidSubAuthorityCount, GetTokenInformation, LookupPrivilegeValueA, OpenProcessToken, OpenThreadToken
fwpuclnt.dllFwpmEngineClose0, FwpmEngineOpen0, FwpmFilterAdd0, FwpmFilterCreateEnumHandle0, FwpmFilterDeleteById0, FwpmFilterDestroyEnumHandle0, FwpmFilterEnum0, FwpmFreeMemory0, FwpmProviderAdd0, FwpmProviderCreateEnumHandle0, FwpmProviderDeleteByKey0, FwpmProviderDestroyEnumHandle0, FwpmProviderEnum0
KERNEL32.dllCloseHandle, CreateToolhelp32Snapshot, DeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetCurrentThread, GetFileAttributesW, GetLastError, GetStartupInfoA, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, LocalAlloc, LocalFree, MultiByteToWideChar, OpenProcess, Process32First, Process32Next, QueryDosDeviceW, QueryFullProcessImageNameW, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WideCharToMultiByte
msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _commode, _errno, _fmode, _initterm, _lock, _onexit, _stricmp, fwprintf, _unlock, abort, calloc, exit, fprintf, fputc, fputwc, free, fwrite, islower, isspace, isupper, localeconv, malloc, memcpy, signal, strcmp, strerror, strlen, strncmp, towlower, vfprintf, wcschr, wcscmp, wcslen, wcsncpy
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:07:01:09
Start date:31/10/2024
Path:C:\Users\user\Desktop\yoyo.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\yoyo.exe" -install
Imagebase:0x7ff6bdd10000
File size:591'348 bytes
MD5 hash:0CED0787F8E64762035ADEA6C6AFF9E2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:07:01:09
Start date:31/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:07:01:11
Start date:31/10/2024
Path:C:\Users\user\Desktop\yoyo.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\yoyo.exe" /install
Imagebase:0x7ff6bdd10000
File size:591'348 bytes
MD5 hash:0CED0787F8E64762035ADEA6C6AFF9E2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:07:01:11
Start date:31/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:07:01:13
Start date:31/10/2024
Path:C:\Users\user\Desktop\yoyo.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\yoyo.exe" /load
Imagebase:0x7ff6bdd10000
File size:591'348 bytes
MD5 hash:0CED0787F8E64762035ADEA6C6AFF9E2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:6
Start time:07:01:13
Start date:31/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff6d64d0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:4.7%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:8%
    Total number of Nodes:792
    Total number of Limit Nodes:5
    execution_graph 4378 7ff6bdd1689a 4380 7ff6bdd1689f 4378->4380 4379 7ff6bdd16a29 wcslen 4380->4379 4381 7ff6bdd147f0 2 API calls 4380->4381 4382 7ff6bdd168de 4381->4382 4382->4379 4024 7ff6bdd1b920 ___lc_codepage_func ___mb_cur_max_func 4025 7ff6bdd1b95f 4024->4025 4026 7ff6bdd1b978 4024->4026 4025->4026 4027 7ff6bdd1b970 4025->4027 4030 7ff6bdd1b9e0 4025->4030 4027->4026 4031 7ff6bdd1b730 4027->4031 4028 7ff6bdd1b730 4 API calls 4028->4030 4030->4026 4030->4028 4032 7ff6bdd1b878 4031->4032 4035 7ff6bdd1b745 4031->4035 4032->4027 4033 7ff6bdd1b808 4033->4027 4034 7ff6bdd1b7e8 4037 7ff6bdd1b840 MultiByteToWideChar 4034->4037 4038 7ff6bdd1b7f3 4034->4038 4035->4033 4035->4034 4036 7ff6bdd1b779 IsDBCSLeadByteEx 4035->4036 4039 7ff6bdd1b794 4035->4039 4036->4034 4036->4039 4037->4033 4041 7ff6bdd1b888 _errno 4037->4041 4038->4027 4039->4033 4040 7ff6bdd1b7be MultiByteToWideChar 4039->4040 4040->4041 4042 7ff6bdd1b7d8 4040->4042 4041->4033 4042->4027 4043 7ff6bdd16825 4044 7ff6bdd16748 4043->4044 4045 7ff6bdd1682e localeconv 4043->4045 4048 7ff6bdd1b8b0 ___mb_cur_max_func ___lc_codepage_func 4045->4048 4049 7ff6bdd1b730 4 API calls 4048->4049 4050 7ff6bdd1686b 4049->4050 4383 7ff6bdd18ba7 strerror 4386 7ff6bdd172e0 4383->4386 4387 7ff6bdd17320 strlen 4386->4387 4388 7ff6bdd17306 4386->4388 4387->4388 4388->4387 4054 7ff6bdd18a31 4055 7ff6bdd18a41 4054->4055 4058 7ff6bdd16dc0 4055->4058 4057 7ff6bdd18a61 4060 7ff6bdd16dd7 4058->4060 4059 7ff6bdd16df7 4059->4057 4060->4059 4061 7ff6bdd16ecd fwprintf 4060->4061 4062 7ff6bdd16f03 fwprintf 4060->4062 4061->4059 4062->4059 4392 7ff6bdd133b0 4393 7ff6bdd133c2 4392->4393 4396 7ff6bdd133d2 4393->4396 4397 7ff6bdd13e70 4393->4397 4395 7ff6bdd13425 4398 7ff6bdd13e7e 4397->4398 4399 7ff6bdd13f40 4397->4399 4400 7ff6bdd13e84 4398->4400 4402 7ff6bdd13e8e 4398->4402 4403 7ff6bdd13ed0 4398->4403 4399->4395 4401 7ff6bdd13ec0 InitializeCriticalSection 4400->4401 4400->4402 4401->4402 4402->4395 4403->4402 4404 7ff6bdd13f11 DeleteCriticalSection 4403->4404 4405 7ff6bdd13f00 free 4403->4405 4404->4402 4405->4404 4405->4405 4063 7ff6bdd1ba30 ___mb_cur_max_func ___lc_codepage_func 4064 7ff6bdd1b730 4 API calls 4063->4064 4065 7ff6bdd1ba7e 4064->4065 3997 7ff6bdd163b3 3998 7ff6bdd163ca 3997->3998 4001 7ff6bdd163da 3997->4001 4004 7ff6bdd14a10 3998->4004 4000 7ff6bdd16a29 wcslen 4001->4000 4007 7ff6bdd147f0 4001->4007 4003 7ff6bdd168de 4003->4000 4005 7ff6bdd14a36 4004->4005 4006 7ff6bdd14a50 strlen 4004->4006 4005->4006 4006->4005 4012 7ff6bdd1bb20 4007->4012 4009 7ff6bdd1bb20 2 API calls 4011 7ff6bdd1481d 4009->4011 4010 7ff6bdd14889 4010->4003 4011->4009 4011->4010 4013 7ff6bdd1bb3e 4012->4013 4016 7ff6bdd1ba90 4013->4016 4015 7ff6bdd1bb56 4015->4011 4017 7ff6bdd1bac0 WideCharToMultiByte 4016->4017 4020 7ff6bdd1baa4 4016->4020 4019 7ff6bdd1bb04 _errno 4017->4019 4017->4020 4018 7ff6bdd1baab 4018->4015 4019->4015 4020->4018 4020->4019 4066 7ff6bdd18934 4067 7ff6bdd18939 localeconv 4066->4067 4068 7ff6bdd18928 4066->4068 4069 7ff6bdd1b8b0 6 API calls 4067->4069 4070 7ff6bdd18976 4069->4070 4071 7ff6bdd1bef9 EnterCriticalSection 4072 7ff6bdd166fb 4073 7ff6bdd1670f 4072->4073 4077 7ff6bdd164d3 4072->4077 4074 7ff6bdd155c0 21 API calls 4073->4074 4076 7ff6bdd1672e 4074->4076 4076->4076 4077->4072 4078 7ff6bdd155c0 4077->4078 4079 7ff6bdd155da 4078->4079 4090 7ff6bdd15653 4078->4090 4091 7ff6bdd14680 4079->4091 4082 7ff6bdd15678 4083 7ff6bdd1567c strlen 4082->4083 4084 7ff6bdd15687 4082->4084 4083->4084 4104 7ff6bdd15420 4084->4104 4085 7ff6bdd15634 4086 7ff6bdd15708 strlen 4085->4086 4087 7ff6bdd1563c 4085->4087 4086->4087 4095 7ff6bdd14c20 4087->4095 4090->4077 4092 7ff6bdd14698 4091->4092 4108 7ff6bdd19170 4092->4108 4094 7ff6bdd1470f 4094->4082 4094->4085 4094->4090 4098 7ff6bdd14c40 4095->4098 4096 7ff6bdd14dd2 4102 7ff6bdd14df5 4096->4102 4200 7ff6bdd14b10 4096->4200 4098->4096 4099 7ff6bdd14ced 4098->4099 4100 7ff6bdd14ea8 4098->4100 4099->4096 4103 7ff6bdd147f0 2 API calls 4099->4103 4101 7ff6bdd14b10 8 API calls 4100->4101 4100->4102 4101->4102 4102->4090 4103->4099 4105 7ff6bdd1544c 4104->4105 4106 7ff6bdd14c20 8 API calls 4105->4106 4107 7ff6bdd154bc 4106->4107 4109 7ff6bdd191b6 4108->4109 4110 7ff6bdd19470 4108->4110 4111 7ff6bdd193e0 4109->4111 4117 7ff6bdd191c6 4109->4117 4112 7ff6bdd18f50 6 API calls 4110->4112 4113 7ff6bdd1940d 4111->4113 4155 7ff6bdd18f50 4111->4155 4112->4113 4113->4094 4114 7ff6bdd19440 4116 7ff6bdd18f50 6 API calls 4114->4116 4116->4113 4117->4113 4117->4114 4117->4117 4125 7ff6bdd192c6 4117->4125 4148 7ff6bdd1aad0 4117->4148 4119 7ff6bdd191ff 4120 7ff6bdd19438 4119->4120 4119->4125 4159 7ff6bdd1abd0 4120->4159 4122 7ff6bdd197c0 4124 7ff6bdd18f10 6 API calls 4122->4124 4146 7ff6bdd195b0 4122->4146 4123 7ff6bdd197a9 4123->4094 4124->4146 4125->4122 4125->4123 4126 7ff6bdd19573 4125->4126 4125->4146 4165 7ff6bdd18f10 4126->4165 4128 7ff6bdd1abd0 5 API calls 4129 7ff6bdd19a81 4128->4129 4131 7ff6bdd1abd0 5 API calls 4129->4131 4138 7ff6bdd19771 4129->4138 4130 7ff6bdd1abd0 5 API calls 4130->4113 4131->4138 4132 7ff6bdd1acf0 6 API calls 4132->4146 4133 7ff6bdd1ae70 10 API calls 4133->4146 4134 7ff6bdd19cc8 4134->4094 4136 7ff6bdd1b000 7 API calls 4136->4146 4137 7ff6bdd19a1f 4137->4134 4173 7ff6bdd1ac40 4137->4173 4138->4130 4140 7ff6bdd1aad0 6 API calls 4142 7ff6bdd1a4fd memcpy 4140->4142 4141 7ff6bdd19a3d 4141->4128 4141->4134 4187 7ff6bdd1b000 4142->4187 4145 7ff6bdd1ac40 8 API calls 4145->4146 4146->4132 4146->4133 4146->4134 4146->4136 4146->4137 4146->4138 4146->4140 4146->4141 4146->4145 4147 7ff6bdd1abd0 Sleep InitializeCriticalSection InitializeCriticalSection EnterCriticalSection LeaveCriticalSection 4146->4147 4169 7ff6bdd1ad20 4146->4169 4180 7ff6bdd1b180 4146->4180 4147->4146 4193 7ff6bdd1a9a0 4148->4193 4151 7ff6bdd1aae4 malloc 4152 7ff6bdd1ab11 4151->4152 4153 7ff6bdd1ab20 4151->4153 4152->4153 4154 7ff6bdd1ab53 LeaveCriticalSection 4152->4154 4153->4119 4154->4153 4156 7ff6bdd18f63 4155->4156 4157 7ff6bdd1aad0 6 API calls 4156->4157 4158 7ff6bdd18f84 4157->4158 4158->4113 4160 7ff6bdd1ac18 4159->4160 4161 7ff6bdd1abde 4159->4161 4160->4114 4162 7ff6bdd1a9a0 4 API calls 4161->4162 4163 7ff6bdd1abf7 4162->4163 4163->4160 4164 7ff6bdd1ac20 LeaveCriticalSection 4163->4164 4166 7ff6bdd18f1c 4165->4166 4167 7ff6bdd1aad0 6 API calls 4166->4167 4168 7ff6bdd18f3b 4167->4168 4168->4146 4170 7ff6bdd1ad42 4169->4170 4171 7ff6bdd1aad0 6 API calls 4170->4171 4172 7ff6bdd1ad65 4171->4172 4172->4146 4174 7ff6bdd1ac60 4173->4174 4175 7ff6bdd1ac8f 4174->4175 4176 7ff6bdd1aad0 6 API calls 4174->4176 4175->4141 4177 7ff6bdd1acbd 4176->4177 4177->4175 4178 7ff6bdd1acc5 memcpy 4177->4178 4179 7ff6bdd1abd0 5 API calls 4178->4179 4179->4175 4181 7ff6bdd1b1a1 4180->4181 4182 7ff6bdd1b1d9 4180->4182 4181->4182 4184 7ff6bdd1b320 4181->4184 4183 7ff6bdd1aad0 6 API calls 4182->4183 4186 7ff6bdd1b1e7 4183->4186 4185 7ff6bdd1aad0 6 API calls 4184->4185 4185->4186 4186->4146 4188 7ff6bdd1b02f 4187->4188 4189 7ff6bdd1aad0 6 API calls 4188->4189 4191 7ff6bdd1b03e 4189->4191 4190 7ff6bdd1b104 4190->4146 4191->4190 4192 7ff6bdd1abd0 5 API calls 4191->4192 4192->4190 4194 7ff6bdd1aa2e EnterCriticalSection 4193->4194 4195 7ff6bdd1a9b3 4193->4195 4198 7ff6bdd1a9b7 4194->4198 4197 7ff6bdd1a9ff InitializeCriticalSection InitializeCriticalSection 4195->4197 4195->4198 4196 7ff6bdd1a9df 4196->4151 4196->4152 4197->4198 4198->4194 4198->4196 4199 7ff6bdd1a9c8 Sleep 4198->4199 4199->4198 4199->4199 4201 7ff6bdd14bc0 4200->4201 4204 7ff6bdd14b2a 4200->4204 4203 7ff6bdd1b8b0 6 API calls 4201->4203 4202 7ff6bdd14ba0 4202->4102 4203->4204 4204->4202 4205 7ff6bdd1bb20 2 API calls 4204->4205 4206 7ff6bdd14b64 4205->4206 4206->4102 4409 7ff6bdd16480 4410 7ff6bdd166d7 4409->4410 4414 7ff6bdd1649b 4409->4414 4412 7ff6bdd14fe0 19 API calls 4410->4412 4411 7ff6bdd14fe0 19 API calls 4411->4414 4413 7ff6bdd166f6 4412->4413 4413->4413 4414->4410 4414->4411 4415 7ff6bdd13380 4416 7ff6bdd13389 4415->4416 4417 7ff6bdd1338d 4416->4417 4418 7ff6bdd13e70 3 API calls 4416->4418 4419 7ff6bdd133a5 4418->4419 4420 7ff6bdd1aa80 4421 7ff6bdd1aaa0 DeleteCriticalSection 4420->4421 4422 7ff6bdd1aa95 4420->4422 4213 7ff6bdd18a03 4214 7ff6bdd18a17 4213->4214 4218 7ff6bdd18a2c 4213->4218 4219 7ff6bdd17b90 4214->4219 4215 7ff6bdd17b90 13 API calls 4217 7ff6bdd18cef 4215->4217 4217->4217 4218->4215 4220 7ff6bdd17ec8 4219->4220 4223 7ff6bdd17bf0 4219->4223 4221 7ff6bdd16c90 10 API calls 4220->4221 4222 7ff6bdd17dc8 4221->4222 4222->4218 4224 7ff6bdd17db3 4223->4224 4227 7ff6bdd17c05 4223->4227 4230 7ff6bdd16c90 4224->4230 4226 7ff6bdd16dc0 2 API calls 4226->4227 4227->4226 4229 7ff6bdd17d60 4227->4229 4234 7ff6bdd16d40 4227->4234 4229->4218 4231 7ff6bdd16ca4 4230->4231 4238 7ff6bdd16b00 4231->4238 4233 7ff6bdd16ce0 4233->4222 4235 7ff6bdd16d70 localeconv 4234->4235 4237 7ff6bdd16d50 4234->4237 4236 7ff6bdd1b8b0 6 API calls 4235->4236 4236->4237 4237->4227 4239 7ff6bdd16b1a 4238->4239 4240 7ff6bdd16c28 4239->4240 4249 7ff6bdd16b3a 4239->4249 4241 7ff6bdd16c30 4240->4241 4242 7ff6bdd16c62 fwprintf 4240->4242 4243 7ff6bdd16c76 fwprintf 4241->4243 4244 7ff6bdd16c3d fwprintf 4241->4244 4245 7ff6bdd16c49 4242->4245 4243->4245 4244->4245 4245->4233 4246 7ff6bdd16b58 4246->4233 4247 7ff6bdd16b7b strlen 4248 7ff6bdd1b8b0 6 API calls 4247->4248 4248->4249 4249->4246 4249->4247 4250 7ff6bdd16604 4251 7ff6bdd1661f 4250->4251 4252 7ff6bdd16637 4250->4252 4256 7ff6bdd15bd0 4251->4256 4254 7ff6bdd15bd0 8 API calls 4252->4254 4255 7ff6bdd167a3 4254->4255 4255->4255 4257 7ff6bdd15da0 4256->4257 4259 7ff6bdd15c30 4256->4259 4257->4252 4258 7ff6bdd147f0 2 API calls 4258->4259 4259->4257 4259->4258 4260 7ff6bdd14b10 8 API calls 4259->4260 4260->4259 4426 7ff6bdd18788 4427 7ff6bdd18797 4426->4427 4428 7ff6bdd16dc0 2 API calls 4427->4428 4428->4427 4429 7ff6bdd1668b 4430 7ff6bdd1650b 4429->4430 4431 7ff6bdd16523 4429->4431 4432 7ff6bdd15510 19 API calls 4430->4432 4433 7ff6bdd15510 19 API calls 4431->4433 4432->4431 4434 7ff6bdd166be 4433->4434 4434->4434 4435 7ff6bdd1888a 4436 7ff6bdd188ac 4435->4436 4437 7ff6bdd18a41 4435->4437 4438 7ff6bdd16b00 10 API calls 4436->4438 4439 7ff6bdd16dc0 2 API calls 4437->4439 4440 7ff6bdd18880 4438->4440 4441 7ff6bdd18a61 4439->4441 4442 7ff6bdd16dc0 2 API calls 4440->4442 4442->4440 4443 7ff6bdd13b8e signal 4444 7ff6bdd13ba4 signal 4443->4444 4445 7ff6bdd13bb8 4443->4445 4444->4445 4264 7ff6bdd11010 4265 7ff6bdd11058 4264->4265 4266 7ff6bdd1107a __set_app_type 4265->4266 4267 7ff6bdd11084 4265->4267 4266->4267 4268 7ff6bdd18d15 4269 7ff6bdd18d1a 4268->4269 4270 7ff6bdd18d3b 4269->4270 4271 7ff6bdd18df4 wcslen 4269->4271 4272 7ff6bdd16dc0 2 API calls 4270->4272 4271->4270 4273 7ff6bdd18d59 4272->4273 4449 7ff6bdd18a94 4450 7ff6bdd18aa8 4449->4450 4451 7ff6bdd18abd 4449->4451 4455 7ff6bdd17a20 4450->4455 4453 7ff6bdd17a20 26 API calls 4451->4453 4454 7ff6bdd18d10 4453->4454 4454->4454 4456 7ff6bdd17b38 4455->4456 4457 7ff6bdd17a3a 4455->4457 4459 7ff6bdd16c90 10 API calls 4456->4459 4458 7ff6bdd17330 11 API calls 4457->4458 4460 7ff6bdd17a6d 4458->4460 4461 7ff6bdd17ab3 4459->4461 4460->4456 4462 7ff6bdd17a80 4460->4462 4461->4451 4463 7ff6bdd17ad8 4462->4463 4464 7ff6bdd17a94 4462->4464 4465 7ff6bdd17adc strlen 4463->4465 4468 7ff6bdd17ae7 4463->4468 4466 7ff6bdd17b68 strlen 4464->4466 4467 7ff6bdd17a9c 4464->4467 4465->4468 4466->4467 4470 7ff6bdd16f20 9 API calls 4467->4470 4469 7ff6bdd17880 9 API calls 4468->4469 4469->4461 4470->4461 4471 7ff6bdd13d56 4472 7ff6bdd13d80 4471->4472 4474 7ff6bdd13d76 4471->4474 4473 7ff6bdd13d97 EnterCriticalSection LeaveCriticalSection 4472->4473 4472->4474 4274 7ff6bdd1bed9 GetLastError 4275 7ff6bdd187d8 4276 7ff6bdd18715 4275->4276 4277 7ff6bdd16dc0 2 API calls 4276->4277 4278 7ff6bdd186a7 4276->4278 4277->4276 4279 7ff6bdd163df 4282 7ff6bdd16401 4279->4282 4280 7ff6bdd147f0 2 API calls 4281 7ff6bdd16686 4280->4281 4281->4281 4282->4280 4287 7ff6bdd13de0 4288 7ff6bdd13e00 EnterCriticalSection 4287->4288 4289 7ff6bdd13df1 4287->4289 4290 7ff6bdd13e19 4288->4290 4291 7ff6bdd13e43 LeaveCriticalSection 4288->4291 4290->4291 4292 7ff6bdd13e3e free 4290->4292 4292->4291 4293 7ff6bdd13fe0 strlen 4294 7ff6bdd14070 4293->4294 4296 7ff6bdd13ff6 4293->4296 4295 7ff6bdd1405e 4296->4294 4296->4295 4297 7ff6bdd14049 strncmp 4296->4297 4297->4295 4297->4296 4478 7ff6bdd18a66 4479 7ff6bdd18a7a 4478->4479 4480 7ff6bdd18a8f 4478->4480 4484 7ff6bdd17440 4479->4484 4482 7ff6bdd17440 24 API calls 4480->4482 4483 7ff6bdd18cad 4482->4483 4483->4483 4485 7ff6bdd17455 4484->4485 4486 7ff6bdd17330 11 API calls 4485->4486 4487 7ff6bdd1748f 4486->4487 4488 7ff6bdd174e8 4487->4488 4489 7ff6bdd174a0 4487->4489 4490 7ff6bdd16c90 10 API calls 4488->4490 4491 7ff6bdd16f20 9 API calls 4489->4491 4492 7ff6bdd174f7 4490->4492 4493 7ff6bdd174af 4491->4493 4492->4480 4493->4480 4494 7ff6bdd16568 4495 7ff6bdd16574 4494->4495 4496 7ff6bdd14a10 strlen 4495->4496 4497 7ff6bdd16581 4496->4497 4497->4497 3636 7ff6bdd114f0 3639 7ff6bdd11190 3636->3639 3638 7ff6bdd11506 3640 7ff6bdd11470 GetStartupInfoA 3639->3640 3641 7ff6bdd111c4 3639->3641 3642 7ff6bdd113d8 3640->3642 3643 7ff6bdd111f1 Sleep 3641->3643 3644 7ff6bdd11206 3641->3644 3642->3638 3643->3641 3645 7ff6bdd11239 3644->3645 3646 7ff6bdd1143c _initterm 3644->3646 3648 7ff6bdd113c4 3644->3648 3659 7ff6bdd137f0 3645->3659 3646->3645 3648->3642 3650 7ff6bdd11190 59 API calls 3648->3650 3649 7ff6bdd11261 SetUnhandledExceptionFilter 3653 7ff6bdd11284 3649->3653 3651 7ff6bdd114e6 3650->3651 3651->3638 3652 7ff6bdd1131e malloc 3654 7ff6bdd1138b 3652->3654 3655 7ff6bdd11345 3652->3655 3653->3652 3679 7ff6bdd1261a 3654->3679 3656 7ff6bdd11350 strlen malloc memcpy 3655->3656 3656->3656 3657 7ff6bdd11386 3656->3657 3657->3654 3665 7ff6bdd13828 3659->3665 3678 7ff6bdd13812 3659->3678 3660 7ff6bdd13a60 3662 7ff6bdd13a5a 3660->3662 3660->3678 3661 7ff6bdd139ee 3666 7ff6bdd13aac 3661->3666 3714 7ff6bdd135d0 3661->3714 3662->3660 3663 7ff6bdd135d0 8 API calls 3662->3663 3662->3666 3663->3662 3664 7ff6bdd13ac8 3667 7ff6bdd13560 8 API calls 3664->3667 3665->3660 3665->3661 3665->3664 3674 7ff6bdd138d0 3665->3674 3665->3678 3743 7ff6bdd13560 3666->3743 3671 7ff6bdd13ad4 3667->3671 3668 7ff6bdd13a28 3672 7ff6bdd135d0 8 API calls 3668->3672 3671->3649 3672->3662 3673 7ff6bdd135d0 8 API calls 3673->3674 3674->3661 3674->3666 3674->3668 3674->3673 3675 7ff6bdd13980 3674->3675 3676 7ff6bdd13976 3674->3676 3677 7ff6bdd139b2 VirtualProtect 3675->3677 3675->3678 3676->3675 3677->3675 3678->3649 3680 7ff6bdd1262e 3679->3680 3681 7ff6bdd12634 3680->3681 3685 7ff6bdd12643 3680->3685 3682 7ff6bdd12593 EnterCriticalSection 3681->3682 3694 7ff6bdd12639 3682->3694 3683 7ff6bdd12687 3771 7ff6bdd12593 3683->3771 3685->3683 3686 7ff6bdd12696 3685->3686 3792 7ff6bdd128f2 3686->3792 3688 7ff6bdd1269b 3689 7ff6bdd126c7 3688->3689 3690 7ff6bdd126d1 strcmp 3688->3690 3688->3694 3804 7ff6bdd117dc 3689->3804 3691 7ff6bdd126ef 3690->3691 3692 7ff6bdd12723 strcmp 3690->3692 3695 7ff6bdd1270b 3691->3695 3696 7ff6bdd126f5 3691->3696 3697 7ff6bdd1274b strcmp 3692->3697 3698 7ff6bdd12741 3692->3698 3694->3648 3833 7ff6bdd11d80 FwpmEngineOpen0 3695->3833 3699 7ff6bdd11550 EnterCriticalSection 3696->3699 3702 7ff6bdd127fd 3697->3702 3703 7ff6bdd1276d 3697->3703 3861 7ff6bdd12206 FwpmEngineOpen0 3698->3861 3699->3694 3800 7ff6bdd11550 3702->3800 3705 7ff6bdd12789 3703->3705 3706 7ff6bdd12773 3703->3706 3887 7ff6bdd14370 3705->3887 3707 7ff6bdd11550 EnterCriticalSection 3706->3707 3707->3694 3710 7ff6bdd127dc 3712 7ff6bdd11550 EnterCriticalSection 3710->3712 3711 7ff6bdd127ef 3902 7ff6bdd12462 3711->3902 3712->3694 3715 7ff6bdd13780 3714->3715 3716 7ff6bdd135f2 3714->3716 3715->3668 3717 7ff6bdd137dd 3716->3717 3718 7ff6bdd136a0 3716->3718 3720 7ff6bdd1365c VirtualQuery 3716->3720 3719 7ff6bdd13560 4 API calls 3717->3719 3718->3668 3718->3718 3727 7ff6bdd137ec 3719->3727 3721 7ff6bdd13688 3720->3721 3722 7ff6bdd137c2 3720->3722 3721->3718 3724 7ff6bdd13730 VirtualProtect 3721->3724 3722->3717 3723 7ff6bdd13560 4 API calls 3722->3723 3723->3717 3724->3718 3725 7ff6bdd1376c GetLastError 3724->3725 3725->3715 3726 7ff6bdd13560 4 API calls 3725->3726 3726->3715 3728 7ff6bdd139ee 3727->3728 3729 7ff6bdd13a5a 3727->3729 3731 7ff6bdd13ac8 3727->3731 3733 7ff6bdd13812 3727->3733 3734 7ff6bdd13aac 3727->3734 3735 7ff6bdd13a28 3727->3735 3740 7ff6bdd135d0 VirtualQuery VirtualProtect GetLastError VirtualProtect 3727->3740 3741 7ff6bdd13976 3727->3741 3728->3734 3737 7ff6bdd135d0 4 API calls 3728->3737 3730 7ff6bdd135d0 4 API calls 3729->3730 3729->3733 3729->3734 3730->3729 3732 7ff6bdd13560 4 API calls 3731->3732 3738 7ff6bdd13ad4 3732->3738 3733->3668 3736 7ff6bdd13560 4 API calls 3734->3736 3739 7ff6bdd135d0 4 API calls 3735->3739 3736->3731 3737->3735 3738->3668 3739->3729 3740->3727 3741->3733 3742 7ff6bdd139b2 VirtualProtect 3741->3742 3742->3741 3747 7ff6bdd1358d 3743->3747 3744 7ff6bdd137dd 3746 7ff6bdd13560 4 API calls 3744->3746 3745 7ff6bdd136a0 3745->3664 3745->3745 3767 7ff6bdd137ec 3746->3767 3747->3744 3747->3745 3748 7ff6bdd1365c VirtualQuery 3747->3748 3749 7ff6bdd13688 3748->3749 3750 7ff6bdd137c2 3748->3750 3749->3745 3753 7ff6bdd13730 VirtualProtect 3749->3753 3750->3744 3751 7ff6bdd13560 4 API calls 3750->3751 3751->3744 3752 7ff6bdd13812 3752->3664 3753->3745 3754 7ff6bdd1376c GetLastError 3753->3754 3754->3745 3755 7ff6bdd13560 4 API calls 3754->3755 3755->3745 3756 7ff6bdd139ee 3760 7ff6bdd13aac 3756->3760 3764 7ff6bdd135d0 4 API calls 3756->3764 3757 7ff6bdd135d0 4 API calls 3759 7ff6bdd13a5a 3757->3759 3758 7ff6bdd13ac8 3761 7ff6bdd13560 4 API calls 3758->3761 3759->3752 3759->3757 3759->3760 3763 7ff6bdd13560 4 API calls 3760->3763 3765 7ff6bdd13ad4 3761->3765 3762 7ff6bdd13a28 3766 7ff6bdd135d0 4 API calls 3762->3766 3763->3758 3764->3762 3765->3664 3766->3759 3767->3752 3767->3756 3767->3758 3767->3759 3767->3760 3767->3762 3768 7ff6bdd135d0 VirtualQuery VirtualProtect GetLastError VirtualProtect 3767->3768 3769 7ff6bdd13976 3767->3769 3768->3767 3769->3752 3770 7ff6bdd139b2 VirtualProtect 3769->3770 3770->3769 3772 7ff6bdd11550 EnterCriticalSection 3771->3772 3773 7ff6bdd125a7 3772->3773 3774 7ff6bdd11550 EnterCriticalSection 3773->3774 3775 7ff6bdd125b3 3774->3775 3776 7ff6bdd11550 EnterCriticalSection 3775->3776 3777 7ff6bdd125bf 3776->3777 3778 7ff6bdd11550 EnterCriticalSection 3777->3778 3779 7ff6bdd125cb 3778->3779 3780 7ff6bdd11550 EnterCriticalSection 3779->3780 3781 7ff6bdd125d7 3780->3781 3782 7ff6bdd11550 EnterCriticalSection 3781->3782 3783 7ff6bdd125e3 3782->3783 3784 7ff6bdd11550 EnterCriticalSection 3783->3784 3785 7ff6bdd125ef 3784->3785 3786 7ff6bdd11550 EnterCriticalSection 3785->3786 3787 7ff6bdd125fb 3786->3787 3788 7ff6bdd11550 EnterCriticalSection 3787->3788 3789 7ff6bdd12607 3788->3789 3790 7ff6bdd11550 EnterCriticalSection 3789->3790 3791 7ff6bdd12613 3790->3791 3791->3694 3797 7ff6bdd12928 3792->3797 3793 7ff6bdd12993 GetTokenInformation 3794 7ff6bdd129c1 3793->3794 3795 7ff6bdd12a24 GetTokenInformation 3794->3795 3796 7ff6bdd1295a 3794->3796 3795->3796 3798 7ff6bdd12a7b CloseHandle 3795->3798 3796->3688 3797->3793 3797->3796 3798->3796 3801 7ff6bdd11585 3800->3801 3925 7ff6bdd14590 3801->3925 3803 7ff6bdd11594 3803->3694 3932 7ff6bdd14330 3804->3932 3807 7ff6bdd11874 3808 7ff6bdd11550 EnterCriticalSection 3807->3808 3817 7ff6bdd11888 3808->3817 3809 7ff6bdd1188d 3810 7ff6bdd118ce 3809->3810 3811 7ff6bdd118b2 3809->3811 3813 7ff6bdd11921 3810->3813 3814 7ff6bdd118f2 3810->3814 3812 7ff6bdd11550 EnterCriticalSection 3811->3812 3812->3817 3818 7ff6bdd11966 strcmp 3813->3818 3819 7ff6bdd11d20 Process32Next 3813->3819 3822 7ff6bdd11550 EnterCriticalSection 3813->3822 3827 7ff6bdd11c18 FwpmFilterAdd0 3813->3827 3828 7ff6bdd11bcc FwpmProviderAdd0 3813->3828 3831 7ff6bdd11550 EnterCriticalSection 3813->3831 3934 7ff6bdd115e4 3813->3934 3947 7ff6bdd12ef1 3813->3947 3954 7ff6bdd13077 FwpmEngineOpen0 3813->3954 3963 7ff6bdd13037 3813->3963 3816 7ff6bdd11550 EnterCriticalSection 3814->3816 3816->3817 3817->3694 3818->3813 3819->3813 3820 7ff6bdd11d3e 3819->3820 3821 7ff6bdd11d53 FwpmEngineClose0 3820->3821 3823 7ff6bdd11550 EnterCriticalSection 3820->3823 3821->3817 3822->3813 3823->3821 3827->3813 3830 7ff6bdd11c75 FwpmFilterAdd0 3827->3830 3829 7ff6bdd13077 6 API calls 3828->3829 3829->3827 3830->3813 3831->3830 3834 7ff6bdd11eb9 3833->3834 3835 7ff6bdd11ed2 3833->3835 3836 7ff6bdd11550 EnterCriticalSection 3834->3836 3837 7ff6bdd12ef1 6 API calls 3835->3837 3839 7ff6bdd11ecd 3836->3839 3838 7ff6bdd11f01 3837->3838 3838->3839 3840 7ff6bdd13077 6 API calls 3838->3840 3839->3694 3845 7ff6bdd12079 3840->3845 3841 7ff6bdd1207d FwpmFilterAdd0 3843 7ff6bdd1214c 3841->3843 3844 7ff6bdd12130 3841->3844 3847 7ff6bdd11550 EnterCriticalSection 3843->3847 3846 7ff6bdd11550 EnterCriticalSection 3844->3846 3845->3841 3848 7ff6bdd120cc 3845->3848 3849 7ff6bdd120e2 3845->3849 3850 7ff6bdd1214a 3846->3850 3851 7ff6bdd12160 FwpmFilterAdd0 3847->3851 3852 7ff6bdd11550 EnterCriticalSection 3848->3852 3853 7ff6bdd13077 6 API calls 3849->3853 3850->3851 3854 7ff6bdd121cc 3851->3854 3855 7ff6bdd121b0 3851->3855 3852->3841 3853->3841 3857 7ff6bdd11550 EnterCriticalSection 3854->3857 3856 7ff6bdd11550 EnterCriticalSection 3855->3856 3858 7ff6bdd121ca 3856->3858 3857->3858 3859 7ff6bdd13037 2 API calls 3858->3859 3860 7ff6bdd121ec FwpmEngineClose0 3859->3860 3860->3839 3862 7ff6bdd1227b 3861->3862 3863 7ff6bdd12291 3861->3863 3864 7ff6bdd11550 EnterCriticalSection 3862->3864 3866 7ff6bdd122c8 FwpmFilterEnum0 3863->3866 3867 7ff6bdd122b2 3863->3867 3865 7ff6bdd1228c 3864->3865 3865->3694 3869 7ff6bdd122f7 3866->3869 3877 7ff6bdd12329 3866->3877 3868 7ff6bdd11550 EnterCriticalSection 3867->3868 3868->3865 3870 7ff6bdd11550 EnterCriticalSection 3869->3870 3874 7ff6bdd12308 FwpmFilterDestroyEnumHandle0 FwpmEngineClose0 3870->3874 3871 7ff6bdd123d1 3873 7ff6bdd13077 6 API calls 3871->3873 3872 7ff6bdd12334 wcscmp 3872->3866 3875 7ff6bdd12369 FwpmFilterDeleteById0 3872->3875 3876 7ff6bdd123e5 3873->3876 3874->3865 3875->3877 3879 7ff6bdd123e9 FwpmProviderDeleteByKey0 3876->3879 3880 7ff6bdd1241c 3876->3880 3877->3866 3877->3871 3877->3872 3878 7ff6bdd11550 EnterCriticalSection 3877->3878 3878->3877 3881 7ff6bdd1241e 3879->3881 3882 7ff6bdd12402 3879->3882 3883 7ff6bdd1243c FwpmFilterDestroyEnumHandle0 FwpmEngineClose0 3880->3883 3885 7ff6bdd11550 EnterCriticalSection 3880->3885 3884 7ff6bdd11550 EnterCriticalSection 3881->3884 3882->3880 3886 7ff6bdd11550 EnterCriticalSection 3882->3886 3883->3865 3884->3880 3885->3883 3886->3880 3888 7ff6bdd1438e 3887->3888 3889 7ff6bdd144b8 _errno 3888->3889 3890 7ff6bdd143ac isspace 3888->3890 3891 7ff6bdd1439f 3888->3891 3901 7ff6bdd127b5 3889->3901 3892 7ff6bdd143a8 3890->3892 3893 7ff6bdd143bc 3890->3893 3891->3889 3892->3890 3894 7ff6bdd143f3 isupper 3893->3894 3899 7ff6bdd14416 3893->3899 3895 7ff6bdd14403 islower 3894->3895 3894->3899 3895->3899 3895->3901 3896 7ff6bdd14443 isupper 3898 7ff6bdd14457 islower 3896->3898 3896->3899 3897 7ff6bdd14463 3900 7ff6bdd14560 _errno 3897->3900 3897->3901 3898->3897 3898->3899 3899->3896 3899->3897 3899->3901 3900->3901 3901->3710 3901->3711 3903 7ff6bdd124b1 3902->3903 3904 7ff6bdd124ba 3903->3904 3906 7ff6bdd124d0 3903->3906 3905 7ff6bdd11550 EnterCriticalSection 3904->3905 3907 7ff6bdd124cb 3905->3907 3908 7ff6bdd124e9 3906->3908 3909 7ff6bdd124fb 3906->3909 3907->3694 3910 7ff6bdd11550 EnterCriticalSection 3908->3910 3911 7ff6bdd12512 3909->3911 3912 7ff6bdd12504 3909->3912 3914 7ff6bdd124f9 3910->3914 3913 7ff6bdd11550 EnterCriticalSection 3911->3913 3915 7ff6bdd11550 EnterCriticalSection 3912->3915 3913->3914 3916 7ff6bdd13077 6 API calls 3914->3916 3915->3914 3917 7ff6bdd1253b 3916->3917 3918 7ff6bdd1253f FwpmProviderDeleteByKey0 3917->3918 3919 7ff6bdd12580 FwpmEngineClose0 3917->3919 3920 7ff6bdd12558 3918->3920 3921 7ff6bdd12574 3918->3921 3919->3907 3920->3919 3923 7ff6bdd11550 EnterCriticalSection 3920->3923 3922 7ff6bdd11550 EnterCriticalSection 3921->3922 3922->3919 3924 7ff6bdd12572 3923->3924 3924->3919 3928 7ff6bdd1bcb0 3925->3928 3927 7ff6bdd145a7 3927->3803 3930 7ff6bdd1bcbf 3928->3930 3929 7ff6bdd1bcd3 EnterCriticalSection 3931 7ff6bdd1bce8 3929->3931 3930->3929 3930->3931 3931->3927 3933 7ff6bdd117e8 FwpmEngineOpen0 3932->3933 3933->3807 3933->3809 3935 7ff6bdd11634 3934->3935 3936 7ff6bdd11638 3935->3936 3937 7ff6bdd11649 3935->3937 3938 7ff6bdd11550 EnterCriticalSection 3936->3938 3939 7ff6bdd11677 3937->3939 3942 7ff6bdd1169d 3937->3942 3941 7ff6bdd11644 3938->3941 3940 7ff6bdd11550 EnterCriticalSection 3939->3940 3940->3941 3941->3813 3943 7ff6bdd116c9 3942->3943 3944 7ff6bdd116fc 3942->3944 3945 7ff6bdd11550 EnterCriticalSection 3943->3945 3944->3941 3946 7ff6bdd11550 EnterCriticalSection 3944->3946 3945->3941 3946->3941 3948 7ff6bdd12f1c 3947->3948 3953 7ff6bdd12f20 3948->3953 3968 7ff6bdd12d53 3948->3968 3950 7ff6bdd12f43 3951 7ff6bdd12f5d malloc 3950->3951 3950->3953 3952 7ff6bdd12f8d wcslen malloc 3951->3952 3951->3953 3952->3953 3953->3813 3955 7ff6bdd130da 3954->3955 3956 7ff6bdd130e4 3954->3956 3955->3813 3957 7ff6bdd1311b 3956->3957 3958 7ff6bdd13105 FwpmEngineClose0 3956->3958 3959 7ff6bdd1314a FwpmEngineClose0 3957->3959 3962 7ff6bdd13160 3957->3962 3958->3955 3959->3955 3960 7ff6bdd131e7 FwpmFreeMemory0 3961 7ff6bdd131f3 FwpmProviderDestroyEnumHandle0 FwpmEngineClose0 3960->3961 3961->3955 3962->3955 3962->3960 3962->3961 3964 7ff6bdd1304a 3963->3964 3965 7ff6bdd13070 3963->3965 3966 7ff6bdd13067 free 3964->3966 3967 7ff6bdd13057 free 3964->3967 3965->3813 3966->3965 3967->3966 3969 7ff6bdd12d8d 3968->3969 3970 7ff6bdd12d83 3968->3970 3969->3950 3970->3969 3972 7ff6bdd128a8 3970->3972 3975 7ff6bdd1286c 3972->3975 3978 7ff6bdd12830 3975->3978 3981 7ff6bdd145e0 3978->3981 3980 7ff6bdd12866 3980->3969 3982 7ff6bdd145ef 3981->3982 3983 7ff6bdd14630 3981->3983 3988 7ff6bdd185b0 _errno 3982->3988 3984 7ff6bdd185b0 3 API calls 3983->3984 3986 7ff6bdd14645 3984->3986 3986->3980 3989 7ff6bdd18651 3988->3989 3996 7ff6bdd14608 3988->3996 3990 7ff6bdd186c8 3989->3990 3992 7ff6bdd18686 3989->3992 3991 7ff6bdd16dc0 fwprintf fwprintf 3990->3991 3995 7ff6bdd186ec 3990->3995 3991->3995 3993 7ff6bdd16dc0 fwprintf fwprintf 3992->3993 3992->3996 3993->3996 3994 7ff6bdd16dc0 fwprintf fwprintf 3994->3995 3995->3994 3995->3996 3996->3980 4298 7ff6bdd164f0 4299 7ff6bdd1650b 4298->4299 4300 7ff6bdd16523 4298->4300 4304 7ff6bdd15510 4299->4304 4302 7ff6bdd15510 19 API calls 4300->4302 4303 7ff6bdd166be 4302->4303 4303->4303 4305 7ff6bdd15525 4304->4305 4306 7ff6bdd14680 11 API calls 4305->4306 4307 7ff6bdd15556 4306->4307 4308 7ff6bdd15420 8 API calls 4307->4308 4310 7ff6bdd155a0 4307->4310 4309 7ff6bdd15576 4308->4309 4309->4300 4310->4300 4498 7ff6bdd16770 4499 7ff6bdd1661f 4498->4499 4500 7ff6bdd16637 4498->4500 4501 7ff6bdd15bd0 8 API calls 4499->4501 4502 7ff6bdd15bd0 8 API calls 4500->4502 4501->4500 4503 7ff6bdd167a3 4502->4503 4503->4503 4504 7ff6bdd1b470 4505 7ff6bdd1aad0 6 API calls 4504->4505 4506 7ff6bdd1b48c 4505->4506 4507 7ff6bdd1bb70 ___lc_codepage_func ___mb_cur_max_func 4508 7ff6bdd1bba2 4507->4508 4513 7ff6bdd1bbac 4507->4513 4509 7ff6bdd1bc08 4508->4509 4510 7ff6bdd1bba7 4508->4510 4512 7ff6bdd1ba90 2 API calls 4509->4512 4509->4513 4511 7ff6bdd1ba90 2 API calls 4510->4511 4510->4513 4511->4510 4512->4509 4318 7ff6bdd1bdf2 4319 7ff6bdd1bdf5 VirtualQuery 4318->4319 4321 7ff6bdd164b8 4322 7ff6bdd1670f 4321->4322 4323 7ff6bdd164d3 4321->4323 4324 7ff6bdd155c0 21 API calls 4322->4324 4323->4322 4325 7ff6bdd155c0 21 API calls 4323->4325 4326 7ff6bdd1672e 4324->4326 4325->4323 4326->4326 4327 7ff6bdd1beb9 LeaveCriticalSection 4514 7ff6bdd13b40 4516 7ff6bdd13b62 4514->4516 4515 7ff6bdd13b74 4516->4515 4517 7ff6bdd13c78 4516->4517 4518 7ff6bdd13bd3 4516->4518 4517->4515 4520 7ff6bdd13cd9 signal 4517->4520 4518->4515 4519 7ff6bdd13be3 signal 4518->4519 4519->4515 4521 7ff6bdd13ca0 signal 4519->4521 4521->4515 4328 7ff6bdd18ac2 4329 7ff6bdd18ac6 4328->4329 4332 7ff6bdd18aeb 4329->4332 4334 7ff6bdd17970 4329->4334 4331 7ff6bdd17970 24 API calls 4333 7ff6bdd18cce 4331->4333 4332->4331 4333->4333 4335 7ff6bdd17985 4334->4335 4344 7ff6bdd17330 4335->4344 4338 7ff6bdd179c7 4348 7ff6bdd17880 4338->4348 4339 7ff6bdd17a00 4340 7ff6bdd16c90 10 API calls 4339->4340 4342 7ff6bdd17a0f 4340->4342 4342->4332 4345 7ff6bdd17348 4344->4345 4346 7ff6bdd19170 11 API calls 4345->4346 4347 7ff6bdd173bf 4346->4347 4347->4338 4347->4339 4349 7ff6bdd178ac 4348->4349 4352 7ff6bdd16f20 4349->4352 4351 7ff6bdd1791c 4355 7ff6bdd16f40 4352->4355 4353 7ff6bdd170d2 4354 7ff6bdd16d40 7 API calls 4353->4354 4359 7ff6bdd170f5 4353->4359 4354->4359 4355->4353 4356 7ff6bdd16fed 4355->4356 4357 7ff6bdd171a8 4355->4357 4356->4353 4360 7ff6bdd16dc0 2 API calls 4356->4360 4358 7ff6bdd16d40 7 API calls 4357->4358 4357->4359 4358->4359 4359->4351 4360->4356 4361 7ff6bdd166c3 4362 7ff6bdd166d7 4361->4362 4363 7ff6bdd1649b 4361->4363 4365 7ff6bdd14fe0 19 API calls 4362->4365 4363->4361 4367 7ff6bdd14fe0 4363->4367 4366 7ff6bdd166f6 4365->4366 4366->4366 4368 7ff6bdd14ff5 4367->4368 4369 7ff6bdd14680 11 API calls 4368->4369 4370 7ff6bdd1502f 4369->4370 4371 7ff6bdd14c20 8 API calls 4370->4371 4372 7ff6bdd15088 4370->4372 4373 7ff6bdd1504f 4371->4373 4372->4363 4373->4363 4522 7ff6bdd11f47 4523 7ff6bdd11550 EnterCriticalSection 4522->4523 4524 7ff6bdd11f5d 4523->4524 4374 7ff6bdd188c9 4375 7ff6bdd16dc0 2 API calls 4374->4375 4376 7ff6bdd18880 4375->4376 4376->4374 4377 7ff6bdd1bec9 InitializeCriticalSection 4525 7ff6bdd13c49 signal 4526 7ff6bdd13cc0 signal 4525->4526 4527 7ff6bdd13bbd 4525->4527 4528 7ff6bdd13450 4529 7ff6bdd1346f 4528->4529 4530 7ff6bdd134ad fprintf 4529->4530 4531 7ff6bdd18853 4532 7ff6bdd18d1a 4531->4532 4533 7ff6bdd1886a 4531->4533 4534 7ff6bdd18d3b 4532->4534 4535 7ff6bdd18df4 wcslen 4532->4535 4536 7ff6bdd172e0 strlen 4533->4536 4538 7ff6bdd16dc0 2 API calls 4534->4538 4535->4534 4537 7ff6bdd18877 4536->4537 4540 7ff6bdd16dc0 2 API calls 4537->4540 4539 7ff6bdd18d59 4538->4539 4540->4537 4541 7ff6bdd18b53 4542 7ff6bdd18ac6 4541->4542 4543 7ff6bdd17970 24 API calls 4542->4543 4545 7ff6bdd18aeb 4542->4545 4543->4545 4544 7ff6bdd17970 24 API calls 4546 7ff6bdd18cce 4544->4546 4545->4544 4546->4546

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 57 7ff6bdd11190-7ff6bdd111be 58 7ff6bdd11470-7ff6bdd11473 GetStartupInfoA 57->58 59 7ff6bdd111c4-7ff6bdd111e1 57->59 63 7ff6bdd11480-7ff6bdd1149a call 7ff6bdd1b6f0 58->63 60 7ff6bdd111f9-7ff6bdd11204 59->60 61 7ff6bdd11206-7ff6bdd11214 60->61 62 7ff6bdd111e8-7ff6bdd111eb 60->62 66 7ff6bdd11427-7ff6bdd11436 call 7ff6bdd1b6f8 61->66 67 7ff6bdd1121a-7ff6bdd1121e 61->67 64 7ff6bdd11410-7ff6bdd11421 62->64 65 7ff6bdd111f1-7ff6bdd111f6 Sleep 62->65 64->66 64->67 65->60 74 7ff6bdd11239-7ff6bdd1123b 66->74 75 7ff6bdd1143c-7ff6bdd11457 _initterm 66->75 70 7ff6bdd114a0-7ff6bdd114b9 call 7ff6bdd1b6e0 67->70 71 7ff6bdd11224-7ff6bdd11233 67->71 83 7ff6bdd114be-7ff6bdd114c0 call 7ff6bdd1b6b0 70->83 71->74 71->75 77 7ff6bdd1145d-7ff6bdd11462 74->77 78 7ff6bdd11241-7ff6bdd1124e 74->78 75->77 75->78 77->78 80 7ff6bdd1125c-7ff6bdd112a4 call 7ff6bdd137f0 SetUnhandledExceptionFilter call 7ff6bdd1bca0 call 7ff6bdd13550 call 7ff6bdd1bd80 78->80 81 7ff6bdd11250-7ff6bdd11258 78->81 95 7ff6bdd112a6 80->95 96 7ff6bdd112c2-7ff6bdd112c8 80->96 81->80 86 7ff6bdd114c5-7ff6bdd114ec call 7ff6bdd11190 83->86 97 7ff6bdd11300-7ff6bdd11306 95->97 98 7ff6bdd112ca-7ff6bdd112d8 96->98 99 7ff6bdd112b0-7ff6bdd112b2 96->99 100 7ff6bdd11308-7ff6bdd11312 97->100 101 7ff6bdd1131e-7ff6bdd11343 malloc 97->101 104 7ff6bdd112be 98->104 102 7ff6bdd112f9 99->102 103 7ff6bdd112b4-7ff6bdd112b7 99->103 105 7ff6bdd11318 100->105 106 7ff6bdd11400-7ff6bdd11405 100->106 107 7ff6bdd1138b-7ff6bdd113bf call 7ff6bdd13340 call 7ff6bdd1261a 101->107 108 7ff6bdd11345-7ff6bdd1134a 101->108 102->97 109 7ff6bdd112b9 103->109 110 7ff6bdd112e0-7ff6bdd112e2 103->110 104->96 105->101 106->105 119 7ff6bdd113c4-7ff6bdd113d2 107->119 111 7ff6bdd11350-7ff6bdd11384 strlen malloc memcpy 108->111 109->104 110->102 113 7ff6bdd112e4 110->113 111->111 114 7ff6bdd11386 111->114 116 7ff6bdd112e8-7ff6bdd112f2 113->116 114->107 116->102 118 7ff6bdd112f4-7ff6bdd112f7 116->118 118->102 118->116 119->83 120 7ff6bdd113d8-7ff6bdd113e0 119->120 120->63 121 7ff6bdd113e6-7ff6bdd113f5 120->121
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
    • String ID:
    • API String ID: 649803965-0
    • Opcode ID: 8e8e1c4fcdddae686a3859912da9df7e63c832aa451dfcbd3b3ed6f6b2078654
    • Instruction ID: 6c12f547560d7c93304b4728c3c010cf56d9e524d958faa7b860fcd1e3bfabb4
    • Opcode Fuzzy Hash: 8e8e1c4fcdddae686a3859912da9df7e63c832aa451dfcbd3b3ed6f6b2078654
    • Instruction Fuzzy Hash: 4A816632A0962685FA289F6DE45177967A5EF46B84F844335EF8CCF395FE2DE8408300

    Control-flow Graph

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID:
    • String ID: --help$[-] Invalid argument: "%s".$[-] Missing argument for 'unblock' command. Please provide the filter id.$[-] Missing second argument. Please provide the full path of the process to block.$[-] Please provide filter id in digits.$block$blockedr$unblock$unblockall
    • API String ID: 0-1343951423
    • Opcode ID: a1f5a942b81b39526af0c875133be3563ea7c3f539a1f4775d90065ddb0e0c2e
    • Instruction ID: 296e7f85346154ed480a524d31bfa7755535469070e97e68c74e47c2da8a3ffe
    • Opcode Fuzzy Hash: a1f5a942b81b39526af0c875133be3563ea7c3f539a1f4775d90065ddb0e0c2e
    • Instruction Fuzzy Hash: 4A51EA61F08A2785FF589B5DD8422B92B60EF50B88F404635DB9DCF7A6FE6DE4508380

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: InformationToken
    • String ID:
    • API String ID: 4114910276-0
    • Opcode ID: 5ebe81de34f8a81fd4ad5d0e22b75095c2bceccae0736c6ab83d0423507e7119
    • Instruction ID: efb4105c98a927b404f8e3a3d7af37e0fae4d5972acb5dd2b3099649e631fff6
    • Opcode Fuzzy Hash: 5ebe81de34f8a81fd4ad5d0e22b75095c2bceccae0736c6ab83d0423507e7119
    • Instruction Fuzzy Hash: F3511D31B14A1989FB58CBAEEC5136D27A4FB48B88F104536CE9CDB764EE3DDA018700

    Control-flow Graph

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID:
    • String ID: (null)
    • API String ID: 0-3941151225
    • Opcode ID: 277a38aae66470e09b00c03dd7e63efea3c016a318b3a435c9f7eab8fcab638c
    • Instruction ID: 0b59f4e19e7a668026eea2e9e4418349de71382a923f2310fcfeb8b0601c0b70
    • Opcode Fuzzy Hash: 277a38aae66470e09b00c03dd7e63efea3c016a318b3a435c9f7eab8fcab638c
    • Instruction Fuzzy Hash: 23F06850B0956281D918AE4A94142B91340FF46BC0F998335EFCDCF341FE2CE004C300
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID:
    • String ID: $ $Infinity$NaN
    • API String ID: 0-3274152445
    • Opcode ID: 746a551bc9c21b6dcb8ca8af37f64b55f7c17c2e536a855da10a888d86e291d5
    • Instruction ID: 9d6db48fafedcf161e4faf0a8ddff1f4915ee2ffb5b3071340542bf643176af0
    • Opcode Fuzzy Hash: 746a551bc9c21b6dcb8ca8af37f64b55f7c17c2e536a855da10a888d86e291d5
    • Instruction Fuzzy Hash: B8C2C972A1D6628AD7298F29E04076A77A0FF85784F105335EBDD9BB85EF3DE4418B00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID:
    • String ID: [-] CryptAcquireContext failed$[-] CryptCreateHash failed$[-] CryptGetHashParam failed$[-] CryptHashData failed
    • API String ID: 0-1349797346
    • Opcode ID: 0d549a6b189c3e7ec0395dca60d590b3758f91a51c5070be1aff903a9f3de338
    • Instruction ID: f045713543d899727527471c3af8fbbc7524935d4661918722d0d6293e812cfa
    • Opcode Fuzzy Hash: 0d549a6b189c3e7ec0395dca60d590b3758f91a51c5070be1aff903a9f3de338
    • Instruction Fuzzy Hash: C441FF31B14A1588FB54DB6AE85037D6360EB54B88F104635CE9D9BB64FF3DD7058350
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID:
    • String ID: SeDebugPrivilege
    • API String ID: 0-2896544425
    • Opcode ID: 15ef276a64f916bf1306cb3ce0f6ba863cb929d9ad5c7e86edde9c1118fa826e
    • Instruction ID: 7a89530b7417a6cb0ac296840be7f74c2488aed15410305682e739277c708ab6
    • Opcode Fuzzy Hash: 15ef276a64f916bf1306cb3ce0f6ba863cb929d9ad5c7e86edde9c1118fa826e
    • Instruction Fuzzy Hash: A8313D20B08B0688FB498B6EEC513696765EF44B88F00427ACE9CDF7B4FE6DD6458340

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: EngineFwpmOpen0
    • String ID: D3l3t3d cu5t0m WFP pr0v1d3r.$D3l3t3d f1lt3r 1d: %llu.$[-] Fa1l3d t0 d3l3t3 f1lt3r 1d: %llu w1th 3rr0r c0d3: 0x%x.$[-] Fwpm3n9in30p3n0 fa1l3d w1th 3rr0r c0d3: 0x%x.$[-] FwpmF1lt3rCr3@t3EnumH@ndl30 fa1l3d w1th 3rr0r c0d3: 0x%x.$[-] FwpmF1lt3rEnum0 fa1l3d w1th 3rr0r c0d3: 0x%x.$[-] FwpmPr0v1d3rD3l3t3ByK3y0 fa1l3d w1th 3rr0r c0d3: 0x%x.$[-] Un@bl3 t0 f1nd @ny WFP f1lt3r cr3@t3d by th1s t00l.
    • API String ID: 3955677900-2486579242
    • Opcode ID: 5469e4bc3f2a37ee838d28c19d4839e425a73c37482a8dede6d7aaa6909bcc82
    • Instruction ID: 554553cdc4b60703dab7f7b9c222bb55cb17fc926424027027b074007e99c17c
    • Opcode Fuzzy Hash: 5469e4bc3f2a37ee838d28c19d4839e425a73c37482a8dede6d7aaa6909bcc82
    • Instruction Fuzzy Hash: A2613C32F04A2699FB04DBA9E4453AD3BB0EB04798F504235DF8DABB99EE38D1448740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 343 7ff6bdd117dc-7ff6bdd11872 call 7ff6bdd14330 FwpmEngineOpen0 346 7ff6bdd1188d-7ff6bdd118b0 call 7ff6bdd12ae8 call 7ff6bdd1bf10 343->346 347 7ff6bdd11874-7ff6bdd11888 call 7ff6bdd11550 343->347 355 7ff6bdd118ce-7ff6bdd118f0 call 7ff6bdd1be98 346->355 356 7ff6bdd118b2-7ff6bdd118c9 call 7ff6bdd11550 346->356 352 7ff6bdd11d76-7ff6bdd11d7f 347->352 361 7ff6bdd11921-7ff6bdd11961 call 7ff6bdd115e4 call 7ff6bdd11763 355->361 362 7ff6bdd118f2-7ff6bdd1191c call 7ff6bdd11550 355->362 356->352 371 7ff6bdd11d11-7ff6bdd11d1a 361->371 362->352 372 7ff6bdd11966-7ff6bdd11992 strcmp 371->372 373 7ff6bdd11d20-7ff6bdd11d38 Process32Next 371->373 376 7ff6bdd11998-7ff6bdd119f0 call 7ff6bdd11550 372->376 377 7ff6bdd11d0a 372->377 373->361 375 7ff6bdd11d3e-7ff6bdd11d45 373->375 378 7ff6bdd11d47-7ff6bdd11d4e call 7ff6bdd11550 375->378 379 7ff6bdd11d53-7ff6bdd11d75 FwpmEngineClose0 375->379 376->377 385 7ff6bdd119f6-7ff6bdd11af7 376->385 377->371 378->379 379->352 387 7ff6bdd11cf7-7ff6bdd11d01 385->387 388 7ff6bdd11afd-7ff6bdd11b0b 385->388 387->377 389 7ff6bdd11b0e call 7ff6bdd12ef1 388->389 390 7ff6bdd11b13-7ff6bdd11b20 389->390 390->387 391 7ff6bdd11b26-7ff6bdd11bca call 7ff6bdd13077 390->391 394 7ff6bdd11c18-7ff6bdd11c53 FwpmFilterAdd0 391->394 395 7ff6bdd11bcc-7ff6bdd11c13 FwpmProviderAdd0 call 7ff6bdd13077 391->395 397 7ff6bdd11c75-7ff6bdd11cc6 FwpmFilterAdd0 394->397 398 7ff6bdd11c55-7ff6bdd11c70 call 7ff6bdd11550 394->398 395->394 400 7ff6bdd11ce8-7ff6bdd11cf2 call 7ff6bdd13037 397->400 401 7ff6bdd11cc8-7ff6bdd11ce3 call 7ff6bdd11550 397->401 398->397 400->387 401->400
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: EngineFwpmOpen0
    • String ID: ;9rJ$Added WFP filter for "%S" (Filter id: %d, IPv4 layer).$Added WFP filter for "%S" (Filter id: %d, IPv6 layer).$Detected EDR process: %s (PID: %d)$[-] CreateToolhelp32Snapshot failed with error code: 0x%x.$[-] FwpmEngineOpen0 failed with error code: 0x%x.$[-] No EDR process was detected.$[-] Process32First failed with error code: 0x%x.
    • API String ID: 3955677900-4237853555
    • Opcode ID: 83c8f3ecb41d1a42e4bf191b75c24cf6198a7e900ae99d7db97f2324be9af394
    • Instruction ID: 378b0405934133e1f2495aa4358ea51174b7bfdce06b85ad945749bba722ec9d
    • Opcode Fuzzy Hash: 83c8f3ecb41d1a42e4bf191b75c24cf6198a7e900ae99d7db97f2324be9af394
    • Instruction Fuzzy Hash: 2CE11A72A05B9689EB24DF69D8543E933A0EB0478CF404239DB8C8FB99EF79D644C344

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: EngineFwpmOpen0
    • String ID: ;9rJ$Added WFP filter for "%s" (Filter id: %d, IPv4 layer).$Added WFP filter for "%s" (Filter id: %d, IPv6 layer).$[-] Failed to add filter in IPv4 layer with error code: 0x%x.$[-] Failed to add filter in IPv6 layer with error code: 0x%x.$[-] Fwpm3n9in30p3n0 fa1l3d w1th 3rr0r c0d3: 0x%x.$[-] FwpmPr0v1d3r@dd0 fa1l3d w1th 3rr0r c0d3: 0x%x.
    • API String ID: 3955677900-487333015
    • Opcode ID: c7d430b2df92e523775ff3ccf861fa4d0579403a6dc2d8b5553dd8021caba58e
    • Instruction ID: 36f11cbbcbb62bf4d20266c98e4f27b6f679487efb747eff6af9ca1842f88091
    • Opcode Fuzzy Hash: c7d430b2df92e523775ff3ccf861fa4d0579403a6dc2d8b5553dd8021caba58e
    • Instruction Fuzzy Hash: 07B10A72A04B968AEB25DF69D8443ED37A4F708788F404129DB4D8FB98EF79D244C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: Fwpm$Close0DeleteEngineKey0Provider
    • String ID: D3l3t3d cu5t0m WFP pr0v1d3r.$D3l3t3d f1lt3r 1d: %llu.$[-] Fa1l3d t0 d3l3t3 f1lt3r 1d: %llu w1th 3rr0r c0d3: 0x%x.$[-] Fwpm3n9in30p3n0 fa1l3d w1th 3rr0r c0d3: 0x%x.$[-] FwpmPr0v1d3rD3l3t3ByK3y0 fa1l3d w1th 3rr0r c0d3: 0x%x.$[-] Th3 f1lt3r d035 n0t 3x15t.
    • API String ID: 1345698549-3345345927
    • Opcode ID: 6491f3e0c504a0de250c1059ee2f2ca5589d67ee8cadecfff803922eb0c39b58
    • Instruction ID: 6b1c33c800b928c80815175a0940df9cfeba0092d9793e49f5d7216cc857097f
    • Opcode Fuzzy Hash: 6491f3e0c504a0de250c1059ee2f2ca5589d67ee8cadecfff803922eb0c39b58
    • Instruction Fuzzy Hash: 26312721F09622D9FB08DB69D4553BD37B0EB04388F504A35DA8D9BA99FE38EA048740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: QueryVirtual
    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
    • API String ID: 1804819252-1534286854
    • Opcode ID: 6087b65781e204cf0afe2e745eb8bf4e038d8ac1a1228aa1d9b9705cc89b1a57
    • Instruction ID: 1e9e7efa51d45f7d0102e9d1039e1d289637075c46abb026627b8c09f38fe272
    • Opcode Fuzzy Hash: 6087b65781e204cf0afe2e745eb8bf4e038d8ac1a1228aa1d9b9705cc89b1a57
    • Instruction Fuzzy Hash: 2771BE72B09A5296EA189B19E84566977A1FF49BA4F444339EFDC8B390FE3CE445C300
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID:
    • String ID: %*.*S$%-*.*S$%.*S
    • API String ID: 0-2115465065
    • Opcode ID: 8f6010bd01fc55410a588afeb82d4736cb3e88d09d33c926a748f7f23b714659
    • Instruction ID: 3bb1ebf5811b649ab34becd72c68a550f68813b16d4a16fb3f0a827fb66b26c0
    • Opcode Fuzzy Hash: 8f6010bd01fc55410a588afeb82d4736cb3e88d09d33c926a748f7f23b714659
    • Instruction Fuzzy Hash: 2D41A162B1866246E7689A2D980067966A1EF80BA4F54C335DF8CCF6C5FE3DE445CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: _errno
    • String ID:
    • API String ID: 2918714741-0
    • Opcode ID: 909c1372ab14b6a71416b492c74b6a6203f2a409b4f7504a691434fc22b79b3b
    • Instruction ID: 3e1b8c721c3adec81875a6c22498e3b209393f6f796cf6772b52f52dd5ae9e4e
    • Opcode Fuzzy Hash: 909c1372ab14b6a71416b492c74b6a6203f2a409b4f7504a691434fc22b79b3b
    • Instruction Fuzzy Hash: AD41F262E4D17745FB6C9A29644027E2585EF52BA4F4A4B31DFADCE2C1FE6CF8414310
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: EngineFwpm$Close0Open0
    • String ID:
    • API String ID: 431531443-0
    • Opcode ID: 23963c6e1ceab36a91c4e0780c7f23d270fd552aa5a9d020ed4792f4a6e72049
    • Instruction ID: bccf3afe73215d40f543d7930f15d2e3d4bd8c1536d76981f67e8a6acdbd0a14
    • Opcode Fuzzy Hash: 23963c6e1ceab36a91c4e0780c7f23d270fd552aa5a9d020ed4792f4a6e72049
    • Instruction Fuzzy Hash: D341D7B2F04B1599EB08DBA9D4453AD27B0F749B88F108535DF4DAB798EE38D540C750
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID:
    • String ID: %*.*s$%-*.*s$%.*s
    • API String ID: 0-4054516066
    • Opcode ID: 9a2473fad39f57d63a0765dbd41b26620c007b0df2ca1b1e8c962e3d4ed68ac3
    • Instruction ID: f0acb442c2e05026d0e54328e3856d9525ade6d05a7ed9293eb72851503e0821
    • Opcode Fuzzy Hash: 9a2473fad39f57d63a0765dbd41b26620c007b0df2ca1b1e8c962e3d4ed68ac3
    • Instruction Fuzzy Hash: 4D418F72E1827286E7649F6DD400679A691EB44BA8F44C335DF88CF6C5FE2DE4448B40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: signal
    • String ID: CCG
    • API String ID: 1946981877-1584390748
    • Opcode ID: 71339bac849ff795efb7dad8ad0ba29a631eac14b50d2440d44dd8416b36b288
    • Instruction ID: 9ae1325dadf2041cf0963c1a5640f5a1b6080e3b01f0bc5473e9b66f9e6fc834
    • Opcode Fuzzy Hash: 71339bac849ff795efb7dad8ad0ba29a631eac14b50d2440d44dd8416b36b288
    • Instruction Fuzzy Hash: E0218C60E0C96646FA7C566D894133A2182DF4A764F294B36D7ADCE3D5FE2CF8C58302
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: Byte$CharLeadMultiWide
    • String ID:
    • API String ID: 2561704868-0
    • Opcode ID: 719a1811eea54039a073c7f1979f7e0563c35b4499fffa9b358b1604118e1c60
    • Instruction ID: 019be41c580c169d73bcea6e1e99a254e3d78fe6a8fbf79167e089544ccafb0b
    • Opcode Fuzzy Hash: 719a1811eea54039a073c7f1979f7e0563c35b4499fffa9b358b1604118e1c60
    • Instruction Fuzzy Hash: 3431D072B0C69186E3648F28B80036976A4FB96B84F548335EBD8CB7C5EE3DD481CB00
    APIs
    • Sleep.KERNEL32(?,?,00000000,Infinity,00007FF6BDD1AADF,?,?,?,?,00000000,Infinity,00007FF6BDD18F84,?,00000000,00000003,00007FF6BDD19498), ref: 00007FF6BDD1A9CD
    • InitializeCriticalSection.KERNEL32(?,?,00000000,Infinity,00007FF6BDD1AADF,?,?,?,?,00000000,Infinity,00007FF6BDD18F84,?,00000000,00000003,00007FF6BDD19498), ref: 00007FF6BDD1AA0D
    • InitializeCriticalSection.KERNEL32(?,?,00000000,Infinity,00007FF6BDD1AADF,?,?,?,?,00000000,Infinity,00007FF6BDD18F84,?,00000000,00000003,00007FF6BDD19498), ref: 00007FF6BDD1AA16
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: CriticalInitializeSection$Sleep
    • String ID: Infinity
    • API String ID: 1960909292-1015270809
    • Opcode ID: fe68115341655507fac7a5e65c84e8d05918a00e25df231b9126952d901fa10b
    • Instruction ID: b287729242fbaa6cb935e1989d9e1ebc88fc711376c3b86b5b73b32ca6da89c5
    • Opcode Fuzzy Hash: fe68115341655507fac7a5e65c84e8d05918a00e25df231b9126952d901fa10b
    • Instruction Fuzzy Hash: 27117F30D4851396EA3E8B0CE8912742650EF54318F851732D78ECE6A4FE6DE886D344
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID:
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
    • API String ID: 0-395989641
    • Opcode ID: ab1b1461c1574895d2ef1156bf81071586de4da46f9f2b1bd83f5815ecde538a
    • Instruction ID: 6ba41235a9b811100349416c9176d499a4c756f42da4c82104c13f4401e3c2f1
    • Opcode Fuzzy Hash: ab1b1461c1574895d2ef1156bf81071586de4da46f9f2b1bd83f5815ecde538a
    • Instruction Fuzzy Hash: 7B71C366F18AA686EB289B68E8007696761FF44BA4F544335DF8C8F794FE3CE440C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-3474627141
    • Opcode ID: 90e88a1994a8f56d1943ba1a015a7a35234d3b3ad551aa24c19f31a31182a9cf
    • Instruction ID: 6e0199c88cb6d39c3bcb72864a6452127f47cb537cab191d8f1513e0597a066e
    • Opcode Fuzzy Hash: 90e88a1994a8f56d1943ba1a015a7a35234d3b3ad551aa24c19f31a31182a9cf
    • Instruction Fuzzy Hash: 11013063D0CF9482E6058F1CE8001BA7321FB5E749F259325EBCD6A555EF28E592C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2187435201
    • Opcode ID: 95f7cd6b8717c6c260e518c2d3a1e79c173d45bc2a5dc27e434b5e21a29e404d
    • Instruction ID: 8f790d5d5ef151e1ded296b431a57114ddb465f9887632163f22ace3cc3aa158
    • Opcode Fuzzy Hash: 95f7cd6b8717c6c260e518c2d3a1e79c173d45bc2a5dc27e434b5e21a29e404d
    • Instruction Fuzzy Hash: FDF06256D0CE9882D2068F2CA8000BB7331FF9EB88F155325EFCD6A155EF28E582D700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4273532761
    • Opcode ID: e74b8f9372f4c907cf8708f922d89ae43dd751588af47c5d2918d3a6693e446c
    • Instruction ID: 0535e257e4b58c23e7817a0ed4ec2f729aa8cc3ee0c06fba08cfc989c991bc93
    • Opcode Fuzzy Hash: e74b8f9372f4c907cf8708f922d89ae43dd751588af47c5d2918d3a6693e446c
    • Instruction Fuzzy Hash: 68F06252D08E9882D2068F2CA8000BB7331FF9EB88F155325EFCD6A515EF28E5828700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4283191376
    • Opcode ID: 9748ff417ba001e94c17b93b011cec9efba528c82cf32164129251f4d645d3cd
    • Instruction ID: dbbbab96204bd08bdadfc26ea9a024bf9470f376936c9c53ca88f9c336419edc
    • Opcode Fuzzy Hash: 9748ff417ba001e94c17b93b011cec9efba528c82cf32164129251f4d645d3cd
    • Instruction Fuzzy Hash: 47F06856D08E5482D2068F2CA8000BB7331FF5E788F155325EFCD6A555DF18E5828700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4064033741
    • Opcode ID: 7ddcb7567db3766a8d64565dc4b8ba1e2b9ddb24f8c809585b501ce0173cbcd2
    • Instruction ID: 6a6cbfb57f25a27d81a0ddc60a53d8f321352212f55b0d3d50b656268aa54bb3
    • Opcode Fuzzy Hash: 7ddcb7567db3766a8d64565dc4b8ba1e2b9ddb24f8c809585b501ce0173cbcd2
    • Instruction Fuzzy Hash: 1FF06256D08E9882D2068F2CA8000BB7331FF9EB88F155325EFCD6A155EF28E5828700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2713391170
    • Opcode ID: c6b21b1e3a6d3837ff740fa96d0214551b81b147243a76b771e3c52cbede429d
    • Instruction ID: 81dcfab8f8026b2eae5547a53a83f40f8088de2d256de1fc3f3bf1882538fa6b
    • Opcode Fuzzy Hash: c6b21b1e3a6d3837ff740fa96d0214551b81b147243a76b771e3c52cbede429d
    • Instruction Fuzzy Hash: 3CF06256D08E9882D2068F2CA8000BB7331FF9EB88F155325EFCD6E155EF28E5828700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2036628316.00007FF6BDD11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BDD10000, based on PE: true
    • Associated: 00000000.00000002.2036615117.00007FF6BDD10000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036643572.00007FF6BDD1C000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036658852.00007FF6BDD1D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036676610.00007FF6BDD23000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2036691586.00007FF6BDD26000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6bdd10000_yoyo.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2468659920
    • Opcode ID: 2aa678699bbd0232d1878c2e39d5425d08b44f71664612745e3759cc57e195dc
    • Instruction ID: 233b9e484c3a737a1acc4dd0c53c8dc84e6e454701254b8c87775d5fa515e5dc
    • Opcode Fuzzy Hash: 2aa678699bbd0232d1878c2e39d5425d08b44f71664612745e3759cc57e195dc
    • Instruction Fuzzy Hash: 84F03056D08E9882D616DF2CA8001AB7331FF9EB99F155326EFCD6A515EF28E582C700