Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PSKILL.EXE

Overview

General Information

Sample name:PSKILL.EXE
Analysis ID:1559468
MD5:ec9bc439b375bd787ab0d6bba1ae76ab
SHA1:98773b3e894e8c167fb2c7e7da24b21e2e7c4656
SHA256:8d6306d1d0aaa65f41e2420d23c2035542511d7d3e9d675edf29e13aa14b9e31
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Found large amount of non-executed APIs
PE file contains executable resources (Code or Archives)
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • PSKILL.EXE (PID: 7444 cmdline: "C:\Users\user\Desktop\PSKILL.EXE" MD5: EC9BC439B375BD787AB0D6BBA1AE76AB)
    • conhost.exe (PID: 7452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PSKILL.EXEReversingLabs: Detection: 24%
Source: PSKILL.EXEStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: PSKILL.EXE, ConDrv.0.drString found in binary or memory: http://www.sysinternals.com
Source: C:\Users\user\Desktop\PSKILL.EXECode function: 0_2_00401EB0 OpenServiceA,DeleteService,CloseServiceHandle,0_2_00401EB0
Source: PSKILL.EXEStatic PE information: Resource name: BINRES type: PE32 executable (console) Intel 80386, for MS Windows
Source: PSKILL.EXE, 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamepkill.exe vs PSKILL.EXE
Source: PSKILL.EXEBinary or memory string: OriginalFilenamepkill.exe vs PSKILL.EXE
Source: PSKILL.EXEStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@2/1@0/0
Source: C:\Users\user\Desktop\PSKILL.EXECode function: 0_2_00401080 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,GetLastError,CloseHandle,AdjustTokenPrivileges,CloseHandle,GetLastError,0_2_00401080
Source: C:\Users\user\Desktop\PSKILL.EXECode function: CreateServiceA,CloseServiceHandle,0_2_00401D40
Source: C:\Users\user\Desktop\PSKILL.EXECode function: 0_2_00401350 FindResourceA,LoadResource,SizeofResource,LockResource,0_2_00401350
Source: C:\Users\user\Desktop\PSKILL.EXECode function: 0_2_00401D80 GetTickCount,GetTickCount,CloseServiceHandle,OpenServiceA,GetLastError,StartServiceA,GetLastError,QueryServiceStatus,QueryServiceStatus,GetTickCount,SetLastError,GetLastError,CloseServiceHandle,SetLastError,0_2_00401D80
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7452:120:WilError_03
Source: PSKILL.EXEStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PSKILL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PSKILL.EXEReversingLabs: Detection: 24%
Source: PSKILL.EXEString found in binary or memory: %s -install to install the service
Source: unknownProcess created: C:\Users\user\Desktop\PSKILL.EXE "C:\Users\user\Desktop\PSKILL.EXE"
Source: C:\Users\user\Desktop\PSKILL.EXEProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PSKILL.EXESection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\PSKILL.EXESection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\PSKILL.EXECode function: 0_2_00405FB0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00405FB0
Source: C:\Users\user\Desktop\PSKILL.EXECode function: 0_2_00405AB0 push eax; ret 0_2_00405ADE
Source: C:\Users\user\Desktop\PSKILL.EXECode function: 0_2_00401D80 GetTickCount,GetTickCount,CloseServiceHandle,OpenServiceA,GetLastError,StartServiceA,GetLastError,QueryServiceStatus,QueryServiceStatus,GetTickCount,SetLastError,GetLastError,CloseServiceHandle,SetLastError,0_2_00401D80
Source: C:\Users\user\Desktop\PSKILL.EXEAPI coverage: 7.7 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\PSKILL.EXEAPI call chain: ExitProcess graph end nodegraph_0-3442
Source: C:\Users\user\Desktop\PSKILL.EXECode function: 0_2_00405FB0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00405FB0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\PSKILL.EXECode function: 0_2_00402678 EntryPoint,GetVersion,GetCommandLineA,0_2_00402678
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
12
Windows Service
1
Access Token Manipulation
1
Access Token Manipulation
OS Credential Dumping2
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts12
Service Execution
1
DLL Side-Loading
12
Windows Service
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Native API
Logon Script (Windows)1
Process Injection
1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1559468 Sample: PSKILL.EXE Startdate: 20/11/2024 Architecture: WINDOWS Score: 48 10 Multi AV Scanner detection for submitted file 2->10 6 PSKILL.EXE 1 2->6         started        process3 process4 8 conhost.exe 6->8         started       
SourceDetectionScannerLabelLink
PSKILL.EXE24%ReversingLabsWin32.PUA.PsKill
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.sysinternals.com0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.sysinternals.comPSKILL.EXE, ConDrv.0.drfalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1559468
Start date and time:2024-11-20 15:22:29 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 53s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:PSKILL.EXE
Detection:MAL
Classification:mal48.winEXE@2/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 6
  • Number of non-executed functions: 22
Cookbook Comments:
  • Found application associated with file extension: .EXE
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: PSKILL.EXE
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\PSKILL.EXE
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):362
Entropy (8bit):4.83093470585073
Encrypted:false
SSDEEP:6:BJ2buOqi4rK8/ic4yIkPyWTbGQQDWwOwv8udwLE915UsmbZNyjbF5QkqCC:BYBO1jIAyibGpywJ9+ENMbzy/Ix
MD5:3C224A146EEC9316A04166F37439E1EA
SHA1:54043C330A1507CB159577002C0C461EADDE30C1
SHA-256:91646E02DD3C29A72229ED5C0A1A420DCB3153219D38FE9DB22D50A1F2CC6BBA
SHA-512:F0163E28C44DF156CFC8785FE8F5F65A120FE6BB4CF1A6D12AC5BDBB0D624617ACF522C3B0D2F58749A4C6CE3E242BB36AAB03C97A0CC9DAD559ADC4B3B88BA6
Malicious:false
Reputation:low
Preview:..PsKill v1.01 - local and remote process killer..Copyright (C) 2000 Mark Russinovich..http://www.sysinternals.com....PsKill terminates processes on a local or remote NT system.....Usage: C:\Users\user\Desktop\PSKILL.EXE [\\RemoteComputer [-u Username]] <process Id or name>.. -u Specifies optional user name for login to.. remote computer.....
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):5.171757012170339
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:PSKILL.EXE
File size:77'824 bytes
MD5:ec9bc439b375bd787ab0d6bba1ae76ab
SHA1:98773b3e894e8c167fb2c7e7da24b21e2e7c4656
SHA256:8d6306d1d0aaa65f41e2420d23c2035542511d7d3e9d675edf29e13aa14b9e31
SHA512:c810c9a9b57833e7d0a3ac95e89550076f2664e7097ccb5db14777d9685c3113de456aefab1dcccd48738f9d2532d8c2c4b0b733df36e0ce414024262f82fea6
SSDEEP:768:UV3QaTJXlYDYQqIowK3vePanV3RRYVKHaSfzgJ1pR7dOXWALR80GQaFzOUuZdAtL:EgaTz3vePSkKt4pR7dOXCFzOskoB
TLSH:A6738D2378E14033D49386F210B64F3AEB3B666103629593DF68DD762E725E0EC3A257
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........H.t.H.t.H.t.3.x.J.t.....I.t...z.E.t.H.u...t...g.A.t...~.v.t...r.I.t.RichH.t.........PE..L...h..8.................`.........
Icon Hash:90cececece8e8eb0
Entrypoint:0x402678
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x3895AC68 [Mon Jan 31 15:38:16 2000 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:aed0ac8b3cd0a7a80c4301c6ae7a3787
Instruction
push ebp
mov ebp, esp
push FFFFFFFFh
push 00407130h
push 00404CE8h
mov eax, dword ptr fs:[00000000h]
push eax
mov dword ptr fs:[00000000h], esp
sub esp, 10h
push ebx
push esi
push edi
mov dword ptr [ebp-18h], esp
call dword ptr [0040705Ch]
xor edx, edx
mov dl, ah
mov dword ptr [004092F8h], edx
mov ecx, eax
and ecx, 000000FFh
mov dword ptr [004092F4h], ecx
shl ecx, 08h
add ecx, edx
mov dword ptr [004092F0h], ecx
shr eax, 10h
mov dword ptr [004092ECh], eax
push 00000000h
call 00007F6DD9487C7Fh
pop ecx
test eax, eax
jne 00007F6DD9487BBAh
push 0000001Ch
call 00007F6DD9487C4Fh
pop ecx
and dword ptr [ebp-04h], 00000000h
call 00007F6DD948987Dh
call dword ptr [00407058h]
mov dword ptr [00409C60h], eax
call 00007F6DD9489F77h
mov dword ptr [0040932Ch], eax
call 00007F6DD9489D20h
call 00007F6DD9489C62h
call 00007F6DD9487A1Bh
mov eax, dword ptr [00409308h]
mov dword ptr [0040930Ch], eax
push eax
push dword ptr [00409300h]
push dword ptr [004092FCh]
call 00007F6DD9486F09h
add esp, 0Ch
mov dword ptr [ebp-1Ch], eax
push eax
call 00007F6DD9487A20h
mov eax, dword ptr [ebp-14h]
mov ecx, dword ptr [eax]
mov ecx, dword ptr [ecx]
Programming Language:
  • [C++] VS98 (6.0) build 8168
  • [ C ] VS98 (6.0) build 8168
  • [RES] VS98 (6.0) cvtres build 1720
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x75100x50.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xb0000x8408.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x70000x12c.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x5ab50x600078361fb1f4a9290963078cfaf684e759False0.5999755859375data6.400659887945573IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x70000xbac0x10000299e48e7c921e8fe2b65abdea7b73d0False0.350341796875data4.330211340371844IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x80000x2c840x2000643b1c1beca3952e3cd025eb3c5a7834False0.2110595703125data2.53857620947545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xb0000x84080x90008743987ba72b1520b808803ccff348d5False0.4131673177083333data4.976241626539072IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
BINRES0xb4080x8000PE32 executable (console) Intel 80386, for MS WindowsEnglishUnited States0.45111083984375
RT_VERSION0xb0c00x348dataEnglishUnited States0.4380952380952381
DLLImport
MPR.dllWNetAddConnection2A, WNetCancelConnection2A
KERNEL32.dllSizeofResource, LoadResource, FindResourceA, ReadFile, WriteFile, LockResource, LocalFree, FormatMessageA, GetComputerNameA, GetFullPathNameA, GetCommandLineA, GetVersion, SetLastError, GetTickCount, OpenProcess, TerminateProcess, GetCurrentProcess, GetLastError, CloseHandle, GetModuleHandleA, GetProcAddress, CreateFileA, DeleteFileA, HeapFree, GetModuleFileNameA, UnhandledExceptionFilter, HeapAlloc, ExitProcess, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, MultiByteToWideChar, GetStringTypeA, GetStringTypeW, FlushFileBuffers, SetHandleCount, GetStdHandle, GetFileType, GetStartupInfoA, GetConsoleMode, GetCPInfo, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, RtlUnwind, SetStdHandle, SetFilePointer, SetEndOfFile, GetACP, GetOEMCP, LoadLibraryA, LCMapStringA, LCMapStringW, ReadConsoleInputA, SetConsoleMode
ADVAPI32.dllOpenServiceA, DeleteService, StartServiceA, QueryServiceStatus, CreateServiceA, CloseServiceHandle, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, OpenSCManagerA, ControlService
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:09:23:19
Start date:20/11/2024
Path:C:\Users\user\Desktop\PSKILL.EXE
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\PSKILL.EXE"
Imagebase:0x400000
File size:77'824 bytes
MD5 hash:EC9BC439B375BD787AB0D6BBA1AE76AB
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:09:23:19
Start date:20/11/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:4.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:6.9%
    Total number of Nodes:691
    Total number of Limit Nodes:5
    execution_graph 3487 404ce0 3489 404ce8 3487->3489 3488 404d7a 3489->3488 3491 404bf0 RtlUnwind 3489->3491 3492 404c08 3491->3492 3492->3489 3493 402562 3499 402447 3493->3499 3495 402575 3496 4020c0 13 API calls 3497 402567 3496->3497 3497->3495 3497->3496 3498 401fec 4 API calls 3497->3498 3498->3497 3500 402450 8 API calls 3499->3500 3501 40244e 3500->3501 3501->3497 2706 4025c5 2707 4025d1 GetCurrentProcess TerminateProcess 2706->2707 2710 4025e2 2706->2710 2707->2710 2708 40265c 2709 40264c ExitProcess 2710->2708 2710->2709 3448 406a88 3449 406aa1 3448->3449 3450 406a99 3448->3450 3452 406ab3 3449->3452 3453 406ab0 CloseHandle 3449->3453 3450->3449 3451 406a9e CloseHandle 3450->3451 3451->3449 3453->3452 3502 404ce8 3503 404d7a 3502->3503 3505 404d06 3502->3505 3504 404bf0 RtlUnwind 3504->3505 3505->3503 3505->3504 3444 4023eb 3445 402401 3444->3445 3447 40241c 3444->3447 3446 403b07 6 API calls 3445->3446 3445->3447 3446->3447 3454 40664b 3455 406659 3454->3455 3456 40665d LCMapStringW 3455->3456 3459 406611 3455->3459 3457 406675 WideCharToMultiByte 3456->3457 3456->3459 3457->3459 3460 40274c 3467 4025b4 3460->3467 3462 402757 3463 402765 3462->3463 3464 404dc0 7 API calls 3462->3464 3465 404df9 7 API calls 3463->3465 3464->3463 3466 40276e 3465->3466 3468 4025c5 3 API calls 3467->3468 3469 4025c1 3468->3469 3469->3462 3470 404311 3471 404318 3470->3471 3472 404320 MultiByteToWideChar 3471->3472 3473 404349 3471->3473 3472->3473 3474 404339 GetStringTypeW 3472->3474 3474->3473 3475 406597 3476 4065a6 3475->3476 3477 406611 3476->3477 3478 4065ab MultiByteToWideChar 3476->3478 3478->3477 3479 4065c4 LCMapStringW 3478->3479 3479->3477 3480 4065df 3479->3480 3481 4065e5 3480->3481 3483 406625 3480->3483 3481->3477 3482 4065f3 LCMapStringW 3481->3482 3482->3477 3483->3477 3484 40665d LCMapStringW 3483->3484 3484->3477 3485 406675 WideCharToMultiByte 3484->3485 3485->3477 2711 402678 GetVersion 2732 4027a0 HeapCreate 2711->2732 2713 4026d6 2714 4026e3 2713->2714 2715 4026db 2713->2715 2739 4043b4 2714->2739 2753 40277c 2715->2753 2719 4026ec GetCommandLineA 2759 404abe 2719->2759 2723 402706 2791 4047b8 2723->2791 2725 40270b 2804 401a80 2725->2804 2727 40272c 2868 4025a3 2727->2868 2733 4027c0 2732->2733 2734 4027d5 2732->2734 2875 4027dc HeapAlloc 2733->2875 2734->2713 2737 4027d8 2737->2713 2738 4027c9 HeapDestroy 2738->2734 2877 40201b 2739->2877 2742 4043d3 GetStartupInfoA 2750 4044e4 2742->2750 2752 40441f 2742->2752 2745 40454b SetHandleCount 2745->2719 2746 40450b GetStdHandle 2748 404519 GetFileType 2746->2748 2746->2750 2747 40201b 6 API calls 2747->2752 2748->2750 2749 404490 2749->2750 2751 4044b2 GetFileType 2749->2751 2750->2745 2750->2746 2751->2749 2752->2747 2752->2749 2752->2750 2754 402785 2753->2754 2755 40278a 2753->2755 2756 404dc0 7 API calls 2754->2756 2757 404df9 7 API calls 2755->2757 2756->2755 2758 402793 ExitProcess 2757->2758 2760 404ad9 GetEnvironmentStringsW 2759->2760 2761 404b0c 2759->2761 2762 404ae1 2760->2762 2763 404aed GetEnvironmentStrings 2760->2763 2761->2762 2764 404afd 2761->2764 2766 404b19 GetEnvironmentStringsW 2762->2766 2769 404b25 WideCharToMultiByte 2762->2769 2763->2764 2765 4026fc 2763->2765 2764->2765 2767 404b9f GetEnvironmentStrings 2764->2767 2773 404bab 2764->2773 2782 404871 2765->2782 2766->2765 2766->2769 2767->2765 2767->2773 2770 404b59 2769->2770 2771 404b8b FreeEnvironmentStringsW 2769->2771 2772 40201b 6 API calls 2770->2772 2771->2765 2775 404b5f 2772->2775 2774 40201b 6 API calls 2773->2774 2780 404bc6 2774->2780 2775->2771 2776 404b68 WideCharToMultiByte 2775->2776 2778 404b82 2776->2778 2779 404b79 2776->2779 2777 404bdc FreeEnvironmentStringsA 2777->2765 2778->2771 2936 401fec 2779->2936 2780->2777 2783 404883 2782->2783 2784 404888 GetModuleFileNameA 2782->2784 2949 405f94 2783->2949 2786 4048ab 2784->2786 2787 40201b 6 API calls 2786->2787 2788 4048cc 2787->2788 2789 4048dc 2788->2789 2790 402757 7 API calls 2788->2790 2789->2723 2790->2789 2792 4047c5 2791->2792 2795 4047ca 2791->2795 2793 405f94 19 API calls 2792->2793 2793->2795 2794 40201b 6 API calls 2796 4047f7 2794->2796 2795->2794 2797 402757 7 API calls 2796->2797 2803 40480b 2796->2803 2797->2803 2798 40484e 2799 401fec 4 API calls 2798->2799 2800 40485a 2799->2800 2800->2725 2801 40201b 6 API calls 2801->2803 2802 402757 7 API calls 2802->2803 2803->2798 2803->2801 2803->2802 3003 40208f 2804->3003 2807 40208f 13 API calls 2808 401a9b 2807->2808 2809 40208f 13 API calls 2808->2809 2810 401aa5 GetVersion 2809->2810 2811 401ab5 2810->2811 2812 401acd GetCommandLineA 2810->2812 2815 40208f 13 API calls 2811->2815 2813 401b02 2812->2813 2814 401b18 GetFullPathNameA 2812->2814 2813->2814 2816 401b37 2814->2816 2817 401abf 2815->2817 3010 401870 2816->3010 2817->2727 2819 401b4f 2820 401b5d 2819->2820 2821 4025a3 3 API calls 2819->2821 2822 401bab GetComputerNameA 2820->2822 2825 40208f 13 API calls 2820->2825 2821->2820 2823 401bd0 2822->2823 2824 401c55 2822->2824 3047 401490 2823->3047 3142 4011e0 2824->3142 2828 401b70 2825->2828 3027 4023b0 2828->3027 2829 401c6c 2832 401c75 2829->2832 2833 401ccb 2829->2833 2830 401bda 2834 401be1 2830->2834 2837 401c33 2830->2837 2838 401bf5 2830->2838 2851 40208f 13 API calls 2832->2851 2835 401cf3 2833->2835 2836 401cd4 2833->2836 2834->2727 2842 401d14 2835->2842 2843 401cfc 2835->2843 2841 40208f 13 API calls 2836->2841 2840 40208f 13 API calls 2837->2840 2844 401c04 2838->2844 2845 401c1c 2838->2845 2848 401c48 2840->2848 2849 401ce6 2841->2849 2852 40208f 13 API calls 2842->2852 2850 40208f 13 API calls 2843->2850 2853 40208f 13 API calls 2844->2853 2847 40208f 13 API calls 2845->2847 2846 401b7a 2854 401b97 2846->2854 3037 40680d 2846->3037 2855 401c26 2847->2855 2848->2727 2849->2727 2856 401d07 2850->2856 2857 401c97 2851->2857 2858 401d24 2852->2858 2859 401c0f 2853->2859 2860 40208f 13 API calls 2854->2860 2855->2727 2856->2727 2861 401cb7 2857->2861 2862 401c9f 2857->2862 2858->2727 2859->2727 2865 401ba8 2860->2865 3155 401300 FormatMessageA 2861->3155 2863 40208f 13 API calls 2862->2863 2866 401ca9 2863->2866 2865->2822 2866->2727 2867 401cbd 2867->2727 3439 4025c5 2868->3439 2871 404634 2872 404640 2871->2872 2873 404769 UnhandledExceptionFilter 2872->2873 2874 402749 2872->2874 2873->2874 2876 4027c5 2875->2876 2876->2737 2876->2738 2886 40202d 2877->2886 2880 402757 2881 402760 2880->2881 2882 402765 2880->2882 2916 404dc0 2881->2916 2922 404df9 2882->2922 2887 40202a 2886->2887 2889 402034 2886->2889 2887->2742 2887->2880 2889->2887 2890 402059 2889->2890 2891 40206c 2890->2891 2892 402066 2890->2892 2894 402075 2891->2894 2895 402078 HeapAlloc 2891->2895 2896 40208d 2891->2896 2897 402b70 2892->2897 2894->2895 2895->2896 2896->2889 2898 402ba2 2897->2898 2899 402c4a 2898->2899 2903 402c5e 2898->2903 2905 402e79 2898->2905 2912 402f2a 2899->2912 2903->2891 2906 402ebc HeapAlloc 2905->2906 2907 402e8c HeapReAlloc 2905->2907 2909 402c41 2906->2909 2910 402ee2 VirtualAlloc 2906->2910 2908 402eab 2907->2908 2907->2909 2908->2906 2909->2899 2909->2903 2910->2909 2911 402efc HeapFree 2910->2911 2911->2909 2913 402f3c VirtualAlloc 2912->2913 2915 402c50 2913->2915 2915->2903 2917 404dca 2916->2917 2918 404df7 2917->2918 2919 404df9 7 API calls 2917->2919 2918->2882 2920 404de1 2919->2920 2921 404df9 7 API calls 2920->2921 2921->2918 2926 404e0c 2922->2926 2923 40276e 2923->2742 2924 404f23 2927 404f36 GetStdHandle WriteFile 2924->2927 2925 404e4c 2925->2923 2928 404e58 GetModuleFileNameA 2925->2928 2926->2923 2926->2924 2926->2925 2927->2923 2929 404e70 2928->2929 2931 405fb0 2929->2931 2932 405fbd LoadLibraryA 2931->2932 2933 405fff 2931->2933 2932->2933 2934 405fce GetProcAddress 2932->2934 2933->2923 2934->2933 2935 405fe5 GetProcAddress GetProcAddress 2934->2935 2935->2933 2937 401ff5 2936->2937 2938 402019 2936->2938 2939 402001 2937->2939 2940 40200b HeapFree 2937->2940 2938->2778 2943 402845 2939->2943 2940->2938 2942 402007 2942->2778 2945 40288c 2943->2945 2944 402a7e VirtualFree 2946 402ae2 2944->2946 2945->2944 2948 402b38 2945->2948 2947 402af1 VirtualFree HeapFree 2946->2947 2946->2948 2947->2948 2948->2942 2950 405f9d 2949->2950 2951 405fa4 2949->2951 2953 405bd0 2950->2953 2951->2784 2960 405d69 2953->2960 2957 405c13 GetCPInfo 2959 405c27 2957->2959 2958 405d5d 2958->2951 2959->2958 2965 405e0f GetCPInfo 2959->2965 2961 405d89 2960->2961 2962 405d79 GetOEMCP 2960->2962 2963 405be1 2961->2963 2964 405d8e GetACP 2961->2964 2962->2961 2963->2957 2963->2958 2963->2959 2964->2963 2966 405e32 2965->2966 2972 405efa 2965->2972 2973 404214 2966->2973 2971 406483 9 API calls 2971->2972 2972->2958 2974 404245 GetStringTypeW 2973->2974 2977 40425d 2973->2977 2975 404261 GetStringTypeA 2974->2975 2974->2977 2976 404349 2975->2976 2975->2977 2985 406483 2976->2985 2979 404288 GetStringTypeA 2977->2979 2980 4042ac 2977->2980 2979->2976 2980->2976 2981 4042c2 MultiByteToWideChar 2980->2981 2981->2976 2982 4042e6 2981->2982 2982->2976 2983 404320 MultiByteToWideChar 2982->2983 2983->2976 2984 404339 GetStringTypeW 2983->2984 2984->2976 2986 4064b3 LCMapStringW 2985->2986 2987 4064cf 2985->2987 2986->2987 2988 4064d7 LCMapStringA 2986->2988 2989 406535 2987->2989 2990 406518 LCMapStringA 2987->2990 2988->2987 2997 405ed2 2988->2997 2991 40654b MultiByteToWideChar 2989->2991 2989->2997 2990->2997 2992 406575 2991->2992 2991->2997 2993 4065ab MultiByteToWideChar 2992->2993 2992->2997 2994 4065c4 LCMapStringW 2993->2994 2993->2997 2995 4065df 2994->2995 2994->2997 2996 4065e5 2995->2996 2998 406625 2995->2998 2996->2997 2999 4065f3 LCMapStringW 2996->2999 2997->2971 2998->2997 3000 40665d LCMapStringW 2998->3000 2999->2997 3000->2997 3001 406675 WideCharToMultiByte 3000->3001 3001->2997 3158 403040 3003->3158 3009 401a91 3009->2807 3011 40188a 3010->3011 3023 4018a1 3010->3023 3198 401830 3011->3198 3014 401a67 3014->2819 3015 401a17 3015->3014 3016 401830 13 API calls 3015->3016 3020 401a5c 3016->3020 3018 401a19 3022 401830 13 API calls 3018->3022 3019 401a2c 3021 401830 13 API calls 3019->3021 3020->2819 3024 401a34 3021->3024 3025 401a21 3022->3025 3023->3015 3023->3018 3023->3019 3207 40233b 3023->3207 3211 402330 3023->3211 3024->2819 3025->2819 3028 4023c2 3027->3028 3029 4023b9 3027->3029 3030 4023eb 6 API calls 3028->3030 3220 402450 3029->3220 3032 4023c8 3030->3032 3034 4023cd 3032->3034 3224 40435d 3032->3224 3034->2846 3038 40682a 3037->3038 3039 40681f 3037->3039 3040 406833 3038->3040 3041 406841 GetConsoleMode SetConsoleMode 3038->3041 3229 406a69 CreateFileA 3038->3229 3039->2846 3040->2846 3043 40687a ReadConsoleInputA 3041->3043 3044 4068bb 3043->3044 3046 406880 3043->3046 3045 4068cc SetConsoleMode 3044->3045 3045->2846 3046->3043 3046->3044 3046->3045 3048 40208f 13 API calls 3047->3048 3049 4014a8 3048->3049 3230 402253 3049->3230 3053 4014cb 3054 4014d8 GetLastError 3053->3054 3055 40153f 3053->3055 3056 4014df 3054->3056 3057 401340 13 API calls 3055->3057 3062 40150c 3056->3062 3245 401410 3056->3245 3059 401544 3057->3059 3061 40208f 13 API calls 3059->3061 3060 4014f2 3060->3062 3065 401350 34 API calls 3060->3065 3063 401553 3061->3063 3250 401340 3062->3250 3066 402253 13 API calls 3063->3066 3068 401505 3065->3068 3069 401562 3066->3069 3068->3055 3068->3062 3256 401ef0 OpenSCManagerA 3069->3256 3070 40208f 13 API calls 3072 401520 GetLastError 3070->3072 3074 401300 15 API calls 3072->3074 3073 401576 3075 4015a0 3073->3075 3076 40157d GetLastError 3073->3076 3077 40152b 3074->3077 3080 401340 13 API calls 3075->3080 3078 401340 13 API calls 3076->3078 3253 4013d0 3077->3253 3081 401586 3078->3081 3083 4015a5 3080->3083 3085 40208f 13 API calls 3081->3085 3082 401533 3082->2830 3084 40208f 13 API calls 3083->3084 3086 4015b4 3084->3086 3087 401595 3085->3087 3088 402253 13 API calls 3086->3088 3089 401300 15 API calls 3087->3089 3090 4015cb CreateFileA 3088->3090 3114 40159b 3089->3114 3091 4015f2 3090->3091 3092 401663 3090->3092 3093 401340 13 API calls 3091->3093 3094 401340 13 API calls 3092->3094 3096 4015f7 3093->3096 3097 401668 3094->3097 3099 40208f 13 API calls 3096->3099 3100 4016c0 3097->3100 3101 401671 3097->3101 3098 401623 3102 402253 13 API calls 3098->3102 3104 401606 GetLastError 3099->3104 3106 40208f 13 API calls 3100->3106 3105 40208f 13 API calls 3101->3105 3103 401637 DeleteFileA 3102->3103 3107 4013d0 14 API calls 3103->3107 3108 40160b 3104->3108 3109 401688 WriteFile 3105->3109 3106->3109 3110 40164a 3107->3110 3111 401300 15 API calls 3108->3111 3115 401721 ReadFile 3109->3115 3116 40170d 3109->3116 3113 40208f 13 API calls 3110->3113 3111->3114 3118 401654 3113->3118 3271 401fa0 OpenSCManagerA 3114->3271 3119 401740 3115->3119 3120 401745 3115->3120 3117 401340 13 API calls 3116->3117 3121 401712 3117->3121 3118->2830 3122 401340 13 API calls 3119->3122 3123 4017d8 3120->3123 3124 40175f 3120->3124 3121->3115 3122->3120 3125 401340 13 API calls 3123->3125 3126 401340 13 API calls 3124->3126 3127 4017ed 3125->3127 3128 401764 3126->3128 3129 401fa0 8 API calls 3127->3129 3132 40208f 13 API calls 3128->3132 3130 4017fc 3129->3130 3131 402253 13 API calls 3130->3131 3134 401810 DeleteFileA 3131->3134 3133 40178b 3132->3133 3133->3108 3135 40179e 3133->3135 3136 4013d0 14 API calls 3134->3136 3138 4017ac 3135->3138 3139 4017bf 3135->3139 3137 401823 3136->3137 3137->2830 3140 40208f 13 API calls 3138->3140 3141 40208f 13 API calls 3139->3141 3140->3114 3141->3114 3414 401080 GetCurrentProcess OpenProcessToken 3142->3414 3144 4011f4 3145 401213 3144->3145 3146 4012d9 3144->3146 3422 401000 GetModuleHandleA GetProcAddress 3145->3422 3148 401190 6 API calls 3146->3148 3149 4012e6 3148->3149 3149->2829 3150 40121c 3150->2829 3151 401218 3151->3150 3151->3151 3153 4012bd 3151->3153 3430 406760 3151->3430 3434 401190 OpenProcess 3151->3434 3153->2829 3156 40208f 13 API calls 3155->3156 3157 40132f LocalFree 3156->3157 3157->2867 3160 40304d 3158->3160 3159 40209d 3162 40310a 3159->3162 3160->3159 3161 40201b 6 API calls 3160->3161 3161->3159 3163 4020ae 3162->3163 3165 40312f __aulldiv __aullrem 3162->3165 3169 4030cd 3163->3169 3164 40384b 12 API calls 3164->3165 3165->3163 3165->3164 3166 4038b1 12 API calls 3165->3166 3167 40532b WideCharToMultiByte 3165->3167 3168 403880 12 API calls 3165->3168 3166->3165 3167->3165 3168->3165 3170 4030d5 3169->3170 3171 4030f7 3169->3171 3175 403107 3170->3175 3176 4023eb 3170->3176 3173 4023eb 6 API calls 3171->3173 3171->3175 3173->3175 3175->3009 3177 402401 3176->3177 3179 40241c 3176->3179 3177->3179 3180 403b07 3177->3180 3179->3009 3181 403b22 3180->3181 3192 403b51 3180->3192 3182 403b68 3181->3182 3183 403b5c 3181->3183 3181->3192 3185 403c37 WriteFile 3182->3185 3189 403b76 3182->3189 3193 4056af 3183->3193 3187 403c59 GetLastError 3185->3187 3188 403c4e 3185->3188 3186 403b65 3186->3182 3187->3192 3188->3192 3190 403bc2 WriteFile 3189->3190 3189->3192 3190->3189 3191 403c2c GetLastError 3190->3191 3191->3192 3192->3179 3194 4056be 3193->3194 3197 4056e7 3193->3197 3195 4056f3 SetFilePointer 3194->3195 3194->3197 3196 40570b GetLastError 3195->3196 3195->3197 3196->3197 3197->3186 3199 40208f 13 API calls 3198->3199 3200 40183a 3199->3200 3201 40208f 13 API calls 3200->3201 3202 401849 3201->3202 3203 40208f 13 API calls 3202->3203 3204 401853 3203->3204 3205 40208f 13 API calls 3204->3205 3206 40185d 3205->3206 3206->2819 3208 40234d 3207->3208 3209 402359 3207->3209 3208->3023 3210 404214 6 API calls 3209->3210 3210->3208 3214 4022a5 3211->3214 3216 4022ad 3214->3216 3215 40233b 6 API calls 3215->3216 3216->3215 3218 4022db 3216->3218 3217 40233b 6 API calls 3217->3218 3218->3217 3219 402322 3218->3219 3219->3023 3221 4023bf 3220->3221 3222 402461 3220->3222 3221->2846 3222->3221 3223 4023b0 8 API calls 3222->3223 3223->3222 3225 404369 3224->3225 3228 4023e0 3224->3228 3226 404387 FlushFileBuffers 3225->3226 3225->3228 3227 404393 GetLastError 3226->3227 3226->3228 3227->3228 3228->2846 3229->3041 3231 40310a 13 API calls 3230->3231 3232 402281 3231->3232 3234 4014bc 3232->3234 3276 4039f2 3232->3276 3235 401350 FindResourceA 3234->3235 3236 401371 LoadResource SizeofResource LockResource 3235->3236 3237 40136b 3235->3237 3291 402240 3236->3291 3237->3053 3240 4013a8 3240->3053 3246 401428 3245->3246 3247 40141f 3245->3247 3248 402253 13 API calls 3246->3248 3247->3060 3249 40143c WNetAddConnection2A 3248->3249 3249->3060 3251 40208f 13 API calls 3250->3251 3252 40134a 3251->3252 3252->3070 3254 402253 13 API calls 3253->3254 3255 4013ea WNetCancelConnection2A 3254->3255 3255->3082 3257 401f11 3256->3257 3258 401f0c 3256->3258 3393 401eb0 OpenServiceA 3257->3393 3258->3073 3260 401f1c 3396 401d40 CreateServiceA 3260->3396 3262 401f28 3263 401f35 GetLastError GetLastError 3262->3263 3264 401f5e 3262->3264 3263->3264 3265 401f40 GetLastError 3263->3265 3399 401d80 GetTickCount 3264->3399 3265->3264 3266 401f49 CloseServiceHandle SetLastError 3265->3266 3266->3073 3268 401f69 3269 401f74 GetLastError 3268->3269 3270 401f78 CloseServiceHandle SetLastError 3268->3270 3269->3270 3270->3073 3411 401e60 OpenServiceA 3271->3411 3273 401fc1 3274 401eb0 3 API calls 3273->3274 3275 401fc8 CloseServiceHandle 3274->3275 3275->3098 3280 403a08 3276->3280 3284 403a8c 3276->3284 3277 403a63 3278 403ad1 3277->3278 3279 403a6d 3277->3279 3281 403b07 6 API calls 3278->3281 3282 403a84 3279->3282 3286 403a94 3279->3286 3280->3277 3280->3284 3288 405749 3280->3288 3281->3284 3285 403b07 6 API calls 3282->3285 3284->3234 3285->3284 3286->3284 3287 4056af 2 API calls 3286->3287 3287->3284 3289 40201b 6 API calls 3288->3289 3290 405759 3289->3290 3290->3277 3310 402220 3291->3310 3293 40139f 3293->3240 3294 402116 3293->3294 3295 4013b8 3294->3295 3296 40213a 3294->3296 3300 4020c0 3295->3300 3296->3295 3297 4039f2 12 API calls 3296->3297 3298 4023eb 6 API calls 3296->3298 3299 403b07 6 API calls 3296->3299 3297->3296 3298->3296 3299->3296 3301 4013be 3300->3301 3302 4020d5 3300->3302 3301->3053 3302->3301 3303 4023eb 6 API calls 3302->3303 3304 4020df 3303->3304 3389 4039c7 3304->3389 3307 403914 3 API calls 3308 4020ef 3307->3308 3308->3301 3309 401fec 4 API calls 3308->3309 3309->3301 3316 404165 3310->3316 3313 402229 3313->3293 3317 402225 3316->3317 3318 404179 3316->3318 3317->3313 3320 403ff5 3317->3320 3318->3317 3319 40201b 6 API calls 3318->3319 3319->3317 3323 404014 3320->3323 3321 40223c 3321->3293 3323->3321 3324 40578d 3323->3324 3325 4057aa 3324->3325 3326 4057e9 3325->3326 3345 4054ec 3325->3345 3326->3321 3329 405926 CreateFileA 3330 405945 GetFileType 3329->3330 3331 405957 GetLastError 3329->3331 3332 405950 CloseHandle 3330->3332 3333 40596b 3330->3333 3331->3326 3332->3331 3349 405581 3333->3349 3336 4056af 2 API calls 3337 4059c4 3336->3337 3338 4059cf 3337->3338 3353 40628d 3337->3353 3338->3326 3378 403914 3338->3378 3340 4059ed 3342 405a03 3340->3342 3362 406147 3340->3362 3342->3338 3343 4056af 2 API calls 3342->3343 3343->3338 3347 4054fb 3345->3347 3346 40201b 6 API calls 3348 405536 3346->3348 3347->3346 3347->3348 3348->3326 3348->3329 3350 4055d7 3349->3350 3352 40558f 3349->3352 3350->3326 3350->3336 3351 4055d1 SetStdHandle 3351->3350 3352->3350 3352->3351 3354 4062a5 3353->3354 3357 406328 3353->3357 3355 406302 ReadFile 3354->3355 3354->3357 3356 40631b GetLastError 3355->3356 3360 406355 3355->3360 3356->3357 3357->3340 3358 4063ce ReadFile 3359 4063ec GetLastError 3358->3359 3358->3360 3359->3360 3360->3357 3360->3358 3361 4056af 2 API calls 3360->3361 3361->3360 3363 406154 3362->3363 3364 4056af 2 API calls 3363->3364 3372 406274 3363->3372 3365 40618c 3364->3365 3366 4056af 2 API calls 3365->3366 3365->3372 3367 4061a4 3366->3367 3368 406229 3367->3368 3367->3372 3376 4061ba 3367->3376 3370 4056af 2 API calls 3368->3370 3377 406206 3368->3377 3369 4056af 2 API calls 3369->3372 3371 406236 3370->3371 3373 40623c SetEndOfFile 3371->3373 3372->3342 3374 406254 GetLastError 3373->3374 3373->3377 3374->3377 3375 403b07 6 API calls 3375->3376 3376->3375 3376->3377 3377->3369 3379 403928 3378->3379 3384 403995 3378->3384 3380 40398d 3379->3380 3382 403977 CloseHandle 3379->3382 3379->3384 3385 4055f8 3380->3385 3382->3380 3383 403983 GetLastError 3382->3383 3383->3380 3384->3326 3386 405651 3385->3386 3388 405606 3385->3388 3386->3384 3387 40564b SetStdHandle 3387->3386 3388->3386 3388->3387 3390 4020e7 3389->3390 3391 4039d3 3389->3391 3390->3307 3391->3390 3392 401fec 4 API calls 3391->3392 3392->3390 3394 401ecc 3393->3394 3395 401ece DeleteService CloseServiceHandle 3393->3395 3394->3260 3395->3260 3397 401d70 CloseServiceHandle 3396->3397 3398 401d6f 3396->3398 3397->3262 3398->3262 3400 401d98 CloseServiceHandle 3399->3400 3401 401d9f OpenServiceA 3399->3401 3400->3401 3402 401dc3 StartServiceA 3401->3402 3403 401dbd 3401->3403 3404 401dd4 GetLastError 3402->3404 3408 401de1 3402->3408 3403->3268 3405 401e21 3404->3405 3404->3408 3407 401e23 GetLastError CloseServiceHandle SetLastError 3405->3407 3406 401dec QueryServiceStatus 3406->3405 3406->3408 3407->3268 3408->3405 3408->3406 3408->3407 3409 401e0b GetTickCount 3408->3409 3409->3406 3410 401e16 SetLastError 3409->3410 3410->3405 3412 401e84 ControlService CloseServiceHandle 3411->3412 3413 401e7f 3411->3413 3412->3273 3413->3273 3415 4010a5 3414->3415 3416 4010ad LookupPrivilegeValueA 3414->3416 3415->3144 3417 4010c3 3416->3417 3418 4010cb AdjustTokenPrivileges GetLastError 3416->3418 3417->3144 3419 401117 CloseHandle 3418->3419 3420 40112a AdjustTokenPrivileges CloseHandle GetLastError 3418->3420 3419->3144 3420->3144 3423 401021 3422->3423 3424 401023 3422->3424 3423->3151 3425 40201b 6 API calls 3424->3425 3429 401030 3425->3429 3426 401072 3426->3151 3427 401fec 4 API calls 3427->3429 3428 40201b 6 API calls 3428->3429 3429->3426 3429->3427 3429->3428 3431 406771 3430->3431 3432 406783 3430->3432 3431->3432 3433 40699e 15 API calls 3431->3433 3432->3151 3433->3431 3435 4011a6 GetLastError 3434->3435 3436 4011ae TerminateProcess 3434->3436 3435->3151 3437 4011ca CloseHandle 3436->3437 3438 4011bc CloseHandle GetLastError 3436->3438 3437->3151 3438->3151 3440 4025d1 GetCurrentProcess TerminateProcess 3439->3440 3443 4025e2 3439->3443 3440->3443 3441 4025b0 3441->2871 3442 40264c ExitProcess 3443->3441 3443->3442 3506 4024bd 3507 4024ca 3506->3507 3514 40455f 3507->3514 3509 4024e4 3510 40455f 6 API calls 3509->3510 3513 40250f 3509->3513 3511 4024fd 3510->3511 3512 402757 7 API calls 3511->3512 3511->3513 3512->3513 3515 404572 3514->3515 3516 40459b HeapAlloc 3515->3516 3517 402b70 5 API calls 3515->3517 3518 4045c6 3515->3518 3516->3515 3516->3518 3517->3515 3518->3509 3519 40613e 3520 402757 7 API calls 3519->3520 3521 406145 3520->3521

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 4043b4-4043ca call 40201b 3 4043d4-4043e4 0->3 4 4043cc-4043d3 call 402757 0->4 6 4043ea-4043ec 3->6 4->3 7 404408-404419 GetStartupInfoA 6->7 8 4043ee-404406 6->8 10 4044e4 7->10 11 40441f-404425 7->11 8->6 13 4044e6-4044f2 10->13 11->10 12 40442b-40443a 11->12 14 40443c 12->14 15 40443e-404444 12->15 16 404541 13->16 17 4044f4-4044fa 13->17 14->15 19 404446 15->19 20 404498-40449c 15->20 18 404545-404549 16->18 21 404501-404508 17->21 22 4044fc-4044ff 17->22 18->13 24 40454b-40455e SetHandleCount 18->24 25 40444b-404458 call 40201b 19->25 20->10 23 40449e-4044a3 20->23 26 40450b-404517 GetStdHandle 21->26 22->26 27 4044a5-4044ab 23->27 28 4044db-4044e2 23->28 37 404492 25->37 38 40445a-404463 25->38 30 404530-404534 26->30 31 404519-404522 GetFileType 26->31 27->28 32 4044ad-4044b0 27->32 28->10 28->23 30->18 31->30 34 404524-40452e 31->34 35 4044b2-4044bb GetFileType 32->35 36 4044bd-4044d8 32->36 34->30 39 404536-404539 34->39 35->28 35->36 36->28 37->20 41 404469-40446b 38->41 39->18 40 40453b-40453f 39->40 40->18 42 404485-40448e 41->42 43 40446d-404483 41->43 42->25 44 404490 42->44 43->41 44->20
    APIs
    • GetStartupInfoA.KERNEL32(?), ref: 0040440D
    • GetFileType.KERNEL32(00000800), ref: 004044B3
    • GetStdHandle.KERNEL32(-000000F6), ref: 0040450C
    • GetFileType.KERNELBASE(00000000), ref: 0040451A
    • SetHandleCount.KERNEL32 ref: 00404551
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: FileHandleType$CountInfoStartup
    • String ID:
    • API String ID: 1710529072-0
    • Opcode ID: 9532bcf94b3a3487dcd9bade7914c2a715f1a918944354126a47ab1ebd079f94
    • Instruction ID: f8cb05146240ab982249feda2e19ae0a7c9c3d7b4ea2ff931ff9064ad45de291
    • Opcode Fuzzy Hash: 9532bcf94b3a3487dcd9bade7914c2a715f1a918944354126a47ab1ebd079f94
    • Instruction Fuzzy Hash: 485123B1A082508BD720CB28DD847667BA0BB91334F15467AE7A6FB3E1D738AC45C719

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 45 403b07-403b1c 46 403b22-403b3e 45->46 47 403c9b-403ca2 45->47 46->47 48 403b44-403b4f 46->48 49 403cac 47->49 50 403b51-403b53 48->50 51 403b58-403b5a 48->51 52 403caf-403cb3 49->52 50->52 53 403b68-403b70 51->53 54 403b5c-403b65 call 4056af 51->54 56 403b76-403b82 53->56 57 403c37-403c4c WriteFile 53->57 54->53 58 403b88 56->58 59 403c6f-403c76 56->59 61 403c59-403c62 GetLastError 57->61 62 403c4e-403c57 57->62 64 403b8e-403b97 58->64 65 403c84-403c94 59->65 66 403c78-403c7e 59->66 63 403c00-403c05 61->63 62->63 69 403c96-403c99 63->69 70 403c0b-403c0e 63->70 67 403bc2-403be7 WriteFile 64->67 68 403b99-403ba4 64->68 65->49 66->50 66->65 73 403be9-403bf1 67->73 74 403c2c-403c35 GetLastError 67->74 71 403ba6-403bac 68->71 72 403bad-403bc0 68->72 69->52 70->59 75 403c10-403c16 70->75 71->72 72->64 72->67 76 403bf3-403bfc 73->76 77 403bfe 73->77 74->77 78 403c64-403c6d call 405485 75->78 79 403c18-403c27 75->79 76->58 76->77 77->63 78->49 79->49
    APIs
    • WriteFile.KERNELBASE(?,?,?,00000000,00000000,00000001,00000000,?), ref: 00403BDF
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: 20a7e02b5ebda6a6794e64c9d830e791b21c915b23f0b7f9e656bc89dc28ea86
    • Instruction ID: fe02a73a7ca682bde3b3dbe8accce367f8372b5b00b9e3fd7c2c61c28ad06572
    • Opcode Fuzzy Hash: 20a7e02b5ebda6a6794e64c9d830e791b21c915b23f0b7f9e656bc89dc28ea86
    • Instruction Fuzzy Hash: 73519072904248EFDB11CF68D984AA97FB8FB44345F2085BAE915FB291D738DA41CB18

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 82 402e79-402e8a 83 402ebc-402ee0 HeapAlloc 82->83 84 402e8c-402ea9 HeapReAlloc 82->84 86 402f0c-402f0e 83->86 87 402ee2-402efa VirtualAlloc 83->87 85 402eab-402eb7 84->85 84->86 85->83 88 402f27-402f29 86->88 89 402f10-402f25 87->89 90 402efc-402f06 HeapFree 87->90 89->88 90->86
    APIs
    • HeapReAlloc.KERNEL32(00000000,00000060,?,00000000,00402C41,?,?,?,00000100), ref: 00402EA1
    • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,00402C41,?,?,?,00000100), ref: 00402ED5
    • VirtualAlloc.KERNELBASE(00000000,00100000,00002000,00000004,?,00000000,00402C41,?,?,?,00000100), ref: 00402EEF
    • HeapFree.KERNEL32(00000000,?,?,00000000,00402C41,?,?,?,00000100), ref: 00402F06
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: AllocHeap$FreeVirtual
    • String ID:
    • API String ID: 3499195154-0
    • Opcode ID: 9bd1f765bd0a722b208e8cbb61cd147ef60de5ad8d9222b6a674abb743326c8a
    • Instruction ID: bd84e37f63ed880c743b77309c8c0e674533a123c5e6169b6a9ce7a9db56fd81
    • Opcode Fuzzy Hash: 9bd1f765bd0a722b208e8cbb61cd147ef60de5ad8d9222b6a674abb743326c8a
    • Instruction Fuzzy Hash: B6119130A082019FE7629F28EE44A627BF5FB85750720463AF151F21F2CB70AC85CB18

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 91 4025c5-4025cf 92 4025d1-4025dc GetCurrentProcess TerminateProcess 91->92 93 4025e2-4025f8 91->93 92->93 94 402636-40264a call 40265e 93->94 95 4025fa-402601 93->95 103 40265c-40265d 94->103 104 40264c-402656 ExitProcess 94->104 97 402603-40260f 95->97 98 402625-402635 call 40265e 95->98 100 402611-402615 97->100 101 402624 97->101 98->94 105 402617 100->105 106 402619-402622 100->106 101->98 105->106 106->100 106->101
    APIs
    • GetCurrentProcess.KERNEL32(00401B5D,?,004025B0,00000000,00000000,00000000,00401B5D,000000FF), ref: 004025D5
    • TerminateProcess.KERNEL32(00000000,?,004025B0,00000000,00000000,00000000,00401B5D,000000FF), ref: 004025DC
    • ExitProcess.KERNEL32 ref: 00402656
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Process$CurrentExitTerminate
    • String ID:
    • API String ID: 1703294689-0
    • Opcode ID: 1af48c478d806c1296053d176dcc8b38e6707bd9b1221239aab69aa30cdc538c
    • Instruction ID: c0dc18c57e56d6947184c93a01701f0c898da09db24df83412d93209275a6702
    • Opcode Fuzzy Hash: 1af48c478d806c1296053d176dcc8b38e6707bd9b1221239aab69aa30cdc538c
    • Instruction Fuzzy Hash: 250184319043019AEA25AB24FF88A567BA4EB98720F60443FE581731D1DFBA6C45CB2D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 108 4027a0-4027be HeapCreate 109 4027c0-4027c7 call 4027dc 108->109 110 4027d5-4027d7 108->110 113 4027d8-4027db 109->113 114 4027c9-4027cf HeapDestroy 109->114 114->110
    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000,004026D6,00000000), ref: 004027B1
      • Part of subcall function 004027DC: HeapAlloc.KERNEL32(00000000,00000140,004027C5), ref: 004027E9
    • HeapDestroy.KERNEL32 ref: 004027CF
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Heap$AllocCreateDestroy
    • String ID:
    • API String ID: 2236781399-0
    • Opcode ID: 31ac214dfccc306396b9d60130017ad98e558440630a59d8e773d732d413b3b4
    • Instruction ID: c99ee5741e2403eead047afef43af505a6a40b515ae6c5ad15af79f6b13cb4f1
    • Opcode Fuzzy Hash: 31ac214dfccc306396b9d60130017ad98e558440630a59d8e773d732d413b3b4
    • Instruction Fuzzy Hash: 4EE01270A583406EEF511B31AF0D76636E49B44792F00443BB544E55E5EBB888C0DA09

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 115 402059-402064 116 402071-402073 115->116 117 402066-402067 call 402b70 115->117 119 402075-402077 116->119 120 402078-402087 HeapAlloc 116->120 121 40206c-40206f 117->121 119->120 122 40208d-40208e 120->122 121->116 121->122
    APIs
    • HeapAlloc.KERNEL32(00000000,?,?,0040203D,000000E0,0040202A,?,004043C5,00000100), ref: 00402087
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: AllocHeap
    • String ID:
    • API String ID: 4292702814-0
    • Opcode ID: a96218578892976b19cf5e7b0cd4d099e9bbd542817e036616123ff892b00967
    • Instruction ID: d7bfbc84909e456f25a504a36d336de05c35d6d5cb7be11f3da8a42c3989515e
    • Opcode Fuzzy Hash: a96218578892976b19cf5e7b0cd4d099e9bbd542817e036616123ff892b00967
    • Instruction Fuzzy Hash: AAE08C32C4663056EA212B24BF08BCB27549B01364F160232FE88762E1C7B42C8085CC

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 551 401d80-401d96 GetTickCount 552 401d98-401d99 CloseServiceHandle 551->552 553 401d9f-401dbb OpenServiceA 551->553 552->553 554 401dc3-401dd2 StartServiceA 553->554 555 401dbd-401dc2 553->555 556 401de1-401de7 554->556 557 401dd4-401ddf GetLastError 554->557 559 401dec-401dfb QueryServiceStatus 556->559 557->556 558 401e21 557->558 561 401e23-401e52 GetLastError CloseServiceHandle SetLastError 558->561 559->558 560 401dfd-401e04 559->560 560->561 562 401e06-401e09 560->562 562->558 563 401e0b-401e14 GetTickCount 562->563 563->559 564 401e16-401e1b SetLastError 563->564 564->558
    APIs
    • GetTickCount.KERNEL32 ref: 00401D8B
    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,00401F69,00000000,?,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401D99
    • OpenServiceA.ADVAPI32(?,?,000F01FF,?,?,?,?,00401F69,00000000,?,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401DAE
    • StartServiceA.ADVAPI32(00000000,00000000,00000000,?,74DEE010,?,?,?,?,00401F69,00000000,?,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...), ref: 00401DCA
    • GetLastError.KERNEL32(?,?,?,?,00401F69,00000000,?,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401DD4
    • QueryServiceStatus.ADVAPI32(00000000,?,?,?,?,?,00401F69,00000000,?,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401DF7
    • GetTickCount.KERNEL32 ref: 00401E0B
    • SetLastError.KERNEL32(0000041D,?,?,?,?,00401F69,00000000,?,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401E1B
    • GetLastError.KERNEL32(?,?,?,?,00401F69,00000000,?,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401E23
    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,00401F69,00000000,?,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401E32
    • SetLastError.KERNEL32(00000000,?,?,?,?,00401F69,00000000,?,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401E43
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Service$ErrorLast$CloseCountHandleTick$OpenQueryStartStatus
    • String ID:
    • API String ID: 539858797-0
    • Opcode ID: fdc83052fbb82b0cd5723025a366aecc78ff42b88ed861990adca4e8fbc0ccbb
    • Instruction ID: 161ad52be123b544b84dd696de7e5a15792eb8b745542392bb1a94f194e7066b
    • Opcode Fuzzy Hash: fdc83052fbb82b0cd5723025a366aecc78ff42b88ed861990adca4e8fbc0ccbb
    • Instruction Fuzzy Hash: 8C118771B042045BD710AF74ED88B6B37A8EB84315F040A76F900F23B1D638ED448B6A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 565 405fb0-405fbb 566 405fbd-405fcc LoadLibraryA 565->566 567 405fff-406006 565->567 568 406035-406037 566->568 569 405fce-405fe3 GetProcAddress 566->569 570 406008-40600e 567->570 571 40601e-40602a 567->571 572 406031-406034 568->572 569->568 573 405fe5-405ffa GetProcAddress * 2 569->573 570->571 575 406010-406017 570->575 571->572 573->567 575->571 576 406019-40601c 575->576 576->571
    APIs
    • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,00404F1D,?,Microsoft Visual C++ Runtime Library,00012010,?,00407428,?,00407478,?,?,?,Runtime Error!Program: ), ref: 00405FC2
    • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00405FDA
    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00405FEB
    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00405FF8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: AddressProc$LibraryLoad
    • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll$xt@
    • API String ID: 2238633743-2703191366
    • Opcode ID: 8c6ef0bbbd19ce8a6416f8212b514baaee251f74cceeab19c73cc1c2e9407019
    • Instruction ID: 7dc8f2f6f194a856d48f07b33265d68f146d9f98498bf94f69e7010f1b1d1390
    • Opcode Fuzzy Hash: 8c6ef0bbbd19ce8a6416f8212b514baaee251f74cceeab19c73cc1c2e9407019
    • Instruction Fuzzy Hash: DB0175316482126BCB11DFB99D8491F3EAC9AD8791315003BF901F22A2DA789C12AB69

    Control-flow Graph

    APIs
    • GetCurrentProcess.KERNEL32 ref: 00401094
    • OpenProcessToken.ADVAPI32(00000000), ref: 0040109B
    • LookupPrivilegeValueA.ADVAPI32(00000000,?,00000028), ref: 004010B9
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Process$CurrentLookupOpenPrivilegeTokenValue
    • String ID:
    • API String ID: 3639550587-0
    • Opcode ID: 9ef6969e7f26980ce1130020c831bdf636efae3f419ea15fbd092fe52e2bfe0e
    • Instruction ID: 3d8411b7e8788c00387c70f0cafc9e7d011cfc6fd331b0cfe6e35bee53c863b4
    • Opcode Fuzzy Hash: 9ef6969e7f26980ce1130020c831bdf636efae3f419ea15fbd092fe52e2bfe0e
    • Instruction Fuzzy Hash: 00316E75508341AFE700DF64D845F9BB7E8BBC8710F00492DF99893290E374E9498B66
    APIs
    • FindResourceA.KERNEL32(00000000,?,BINRES), ref: 0040135F
    • LoadResource.KERNEL32(00000000,00000000,?,00000000,?,004014CB,KILLSVC,?,?,\\%s\ADMIN$\System32\PSKLLSVC.EXE,004091CC,Connecting to %s...,004091CC,00000000), ref: 00401374
    • SizeofResource.KERNEL32(00000000,00000000,?,00000000,?,004014CB,KILLSVC,?,?,\\%s\ADMIN$\System32\PSKLLSVC.EXE,004091CC,Connecting to %s...,004091CC,00000000), ref: 0040137F
    • LockResource.KERNEL32(00000000,?,00000000,?,004014CB,KILLSVC,?,?,\\%s\ADMIN$\System32\PSKLLSVC.EXE,004091CC,Connecting to %s...,004091CC,00000000), ref: 00401388
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Resource$FindLoadLockSizeof
    • String ID: BINRES
    • API String ID: 3473537107-3442368034
    • Opcode ID: 8c9afdf17df62359db5e1c31e2a7582b9af924682ec850c3e7a91873a7c10f3f
    • Instruction ID: a6051fe255409381f7399beb655ae7156be114feed89da4ab2f1d735083ae689
    • Opcode Fuzzy Hash: 8c9afdf17df62359db5e1c31e2a7582b9af924682ec850c3e7a91873a7c10f3f
    • Instruction Fuzzy Hash: ECF0F973A4222033CA2027A56E49FDB175C9BC17B2F01007AF604B72C1C6784C0592F9
    APIs
    • GetVersion.KERNEL32 ref: 0040269E
      • Part of subcall function 004027A0: HeapCreate.KERNELBASE(00000000,00001000,00000000,004026D6,00000000), ref: 004027B1
      • Part of subcall function 004027A0: HeapDestroy.KERNEL32 ref: 004027CF
    • GetCommandLineA.KERNEL32 ref: 004026EC
      • Part of subcall function 0040277C: ExitProcess.KERNEL32 ref: 00402799
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Heap$CommandCreateDestroyExitLineProcessVersion
    • String ID: H%[
    • API String ID: 1387771204-2508348913
    • Opcode ID: f599766d1b1d44e145219233c036588b7da7360b59692aed88370e296a90610f
    • Instruction ID: 6212388087ae7c7ec767b2b683c18462f54e6a2adac1905c329dd517d4f63046
    • Opcode Fuzzy Hash: f599766d1b1d44e145219233c036588b7da7360b59692aed88370e296a90610f
    • Instruction Fuzzy Hash: 28115EB4944201AFDB08AF66DE56B6A77A4EB88314F10453EF501B62E2DA7858008F5D
    APIs
    • OpenServiceA.ADVAPI32(004091CC,?,000F01FF,00000000,00401F1C,00000000,?,?,00000000,74DEE010,?,00401576,004091CC,PSKLLSVC,?,?), ref: 00401EC0
    • DeleteService.ADVAPI32(00000000,?,?,00000000,74DEE010,?,00401576,004091CC,PSKLLSVC,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401ED0
    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,74DEE010,?,00401576,004091CC,PSKLLSVC,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401ED9
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Service$CloseDeleteHandleOpen
    • String ID:
    • API String ID: 3140641584-0
    • Opcode ID: d6c6173ca6352ddcf4669f07a24198a9892032197e9a880658c1c0678be54dc8
    • Instruction ID: f3b36d7b93a24ebb05923540355f0b221a83f92620fbb64c32fb970104f3ee35
    • Opcode Fuzzy Hash: d6c6173ca6352ddcf4669f07a24198a9892032197e9a880658c1c0678be54dc8
    • Instruction Fuzzy Hash: 2DD0123AB0926167C6215729FE08C9B3B99EFC57727010565FA45E3214CA34DC4196F6
    APIs
    • CreateServiceA.ADVAPI32(?,00401576,00401576,000F01FF,00000010,00000003,00000001,?,00000000,00000000,00000000,00000000,00000000,00401F28,00000000,?), ref: 00401D65
    • CloseServiceHandle.ADVAPI32(00000000,?,00000000,74DEE010,?,00401576,004091CC,PSKLLSVC,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401D71
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Service$CloseCreateHandle
    • String ID:
    • API String ID: 1873643653-0
    • Opcode ID: 67d792fcb824a19280e79a79052f2feb2a4871acb1e38dad7a6bc00777bff288
    • Instruction ID: 9d3963973926d1bb3e6e3dc1b600fae6bd975c82e7f05f5c4027031ae78a8343
    • Opcode Fuzzy Hash: 67d792fcb824a19280e79a79052f2feb2a4871acb1e38dad7a6bc00777bff288
    • Instruction Fuzzy Hash: CBE0E2B43843017BF6308B64CC56F67329CBB88F41F904958B794FA1D0C6F9F840962A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 133 401490-4014d6 call 40208f call 402253 call 401350 140 4014d8-4014dd GetLastError 133->140 141 40153f-40157b call 401340 call 40208f call 402253 call 401ef0 133->141 142 4014ed-4014f4 call 401410 140->142 143 4014df-4014e4 140->143 164 4015a0-4015f0 call 401340 call 40208f call 402253 CreateFileA 141->164 165 40157d-40159e GetLastError call 401340 call 40208f call 401300 141->165 150 40150c-40153e call 401340 call 40208f GetLastError call 401300 call 4013d0 142->150 151 4014f6-40150a call 401350 142->151 143->142 145 4014e6-4014eb 143->145 145->142 145->150 151->141 151->150 181 4015f2-401609 call 401340 call 40208f GetLastError 164->181 182 401663-40166f call 401340 164->182 183 401614-401662 call 401fa0 call 402253 DeleteFileA call 4013d0 call 40208f 165->183 199 40160b-401611 call 401300 181->199 191 4016c0-4016e7 call 40208f 182->191 192 401671-4016be call 40208f 182->192 204 4016ee-40170b WriteFile 191->204 192->204 199->183 207 401721-40173e ReadFile 204->207 208 40170d-401717 call 401340 204->208 211 401740-40174a call 401340 207->211 212 401754-40175d 207->212 208->207 211->212 215 4017d8-40182e call 401340 call 401fa0 call 402253 DeleteFileA call 4013d0 212->215 216 40175f-401770 call 401340 212->216 223 401772-401778 216->223 224 40177a-401781 216->224 226 401786-401798 call 40208f 223->226 224->226 226->199 231 40179e-4017aa 226->231 234 4017ac-4017ba call 40208f 231->234 235 4017bf-4017d3 call 40208f 231->235 234->183 235->183
    APIs
      • Part of subcall function 00401350: FindResourceA.KERNEL32(00000000,?,BINRES), ref: 0040135F
    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 004014D8
    • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00401523
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040157D
    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 004015E5
    • GetLastError.KERNEL32 ref: 00401609
    • DeleteFileA.KERNEL32(?), ref: 0040163F
    • WriteFile.KERNEL32(00000000,?,00000114,?,00000000), ref: 00401703
    • ReadFile.KERNEL32(00000000,?,00000114,?,00000000), ref: 00401736
    • DeleteFileA.KERNEL32(?), ref: 00401818
    Strings
    • Error communicating with pskill service on %s. The process maynot have been killed:, xrefs: 0040174A
    • Process %s does not exist on %s., xrefs: 004017AD
    • PSKLLSVC, xrefs: 00401567, 00401614, 004017ED
    • Starting pskill service on %s..., xrefs: 00401549
    • Error killing process %d on %s:, xrefs: 00401781
    • Connecting with pskill service on %s..., xrefs: 004015AA
    • KILLSVC, xrefs: 004014C1, 004014FB
    • Killing process %d on %s..., xrefs: 0040167E, 004016CC
    • \\%s\ADMIN$\System32\PSKLLSVC.EXE, xrefs: 004014B1, 0040162C, 00401805
    • Error communicating with pskill service on %s:, xrefs: 00401717
    • Could not start pskill service on %s:, xrefs: 0040158B
    • %%SystemRoot%%\System32\PSKLLSVC.EXE, xrefs: 00401557
    • Process %d does not exist on %s., xrefs: 004017C6
    • \\%s\pipe\pskllsvc, xrefs: 004015C0
    • Couldn't access %s:, xrefs: 00401516
    • Error killing process(es) named %s on %s:, xrefs: 00401773
    • Error establishing communication with pskill service on %s:, xrefs: 004015FC
    • Connecting to %s..., xrefs: 0040149E
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: File$ErrorLast$Delete$CreateFindReadResourceWrite
    • String ID: Connecting with pskill service on %s...$Could not start pskill service on %s:$Couldn't access %s:$Error communicating with pskill service on %s. The process maynot have been killed:$Error communicating with pskill service on %s:$Error establishing communication with pskill service on %s:$Error killing process %d on %s:$Error killing process(es) named %s on %s:$Killing process %d on %s...$Starting pskill service on %s...$%%SystemRoot%%\System32\PSKLLSVC.EXE$Connecting to %s...$KILLSVC$PSKLLSVC$Process %d does not exist on %s.$Process %s does not exist on %s.$\\%s\ADMIN$\System32\PSKLLSVC.EXE$\\%s\pipe\pskllsvc
    • API String ID: 15917885-3804626171
    • Opcode ID: eda43568b5c2023f067db8a3e982230301033a574bd49cda946fa1241160c18e
    • Instruction ID: e4bc7313c8ba762c31d6476cf70bb1eebd1929fce830ddc40762d47df717f875
    • Opcode Fuzzy Hash: eda43568b5c2023f067db8a3e982230301033a574bd49cda946fa1241160c18e
    • Instruction Fuzzy Hash: 03711AB074030377E614B7B19E4BFAB32445B81B48F54093FF985761D3E9BDA90482AE

    Control-flow Graph

    APIs
    • GetVersion.KERNEL32 ref: 00401AA8
    • GetCommandLineA.KERNEL32 ref: 00401ACE
    • GetFullPathNameA.KERNEL32(?,00000104,C:\Users\user\Desktop\,?), ref: 00401B28
    • GetComputerNameA.KERNEL32(004096E0,?), ref: 00401BBD
    Strings
    • C:\Users\user\Desktop\, xrefs: 00401B1D
    • Password: , xrefs: 00401B66
    • PsKill requires Windows NT or Windows 2000., xrefs: 00401AB5
    • %d processes named %s killed., xrefs: 00401CDC
    • ", xrefs: 00401AFB
    • Unable to kill process %d:, xrefs: 00401C8D
    • %d processes named %s killed on %s., xrefs: 00401C05
    • http://www.sysinternals.com, xrefs: 00401A9B
    • Process %d killed., xrefs: 00401D1A
    • Copyright (C) 2000 Mark Russinovich, xrefs: 00401A91
    • PsKill v1.01 - local and remote process killer, xrefs: 00401A87
    • Unable to kill process %s:, xrefs: 00401C7F
    • Process %s killed., xrefs: 00401CFD
    • Process %s killed on %s., xrefs: 00401C1C
    • Process %d on %s killed., xrefs: 00401C3E
    • Process does not exist., xrefs: 00401C9F
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Name$CommandComputerFullLinePathVersion
    • String ID: PsKill v1.01 - local and remote process killer$%d processes named %s killed on %s.$Process %d on %s killed.$Process %s killed on %s.$"$%d processes named %s killed.$C:\Users\user\Desktop\$Copyright (C) 2000 Mark Russinovich$Password: $Process %d killed.$Process %s killed.$Process does not exist.$PsKill requires Windows NT or Windows 2000.$Unable to kill process %d:$Unable to kill process %s:$http://www.sysinternals.com
    • API String ID: 4136247486-1660197224
    • Opcode ID: 3a4a6dc2e7669f07904e35246e6886cfc4a5a2e8dfb65ed37f96eaf882920790
    • Instruction ID: be353d0a8527e8a242ba5437562a60b8d0b0ee47f63e22b5570bd3f0e46db53e
    • Opcode Fuzzy Hash: 3a4a6dc2e7669f07904e35246e6886cfc4a5a2e8dfb65ed37f96eaf882920790
    • Instruction Fuzzy Hash: E4512B71A042022BD714B778AE47AEB33905B80714F544A3EFD94763E2FABD990481AE

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 578 406483-4064b1 579 4064b3-4064cd LCMapStringW 578->579 580 4064f9-4064fc 578->580 581 4064d7-4064e9 LCMapStringA 579->581 582 4064cf-4064d5 579->582 583 40650e-406516 580->583 584 4064fe-40650b call 4066a7 580->584 585 406611 581->585 586 4064ef 581->586 582->580 588 406535-406538 583->588 589 406518-406530 LCMapStringA 583->589 584->583 591 406613-406624 585->591 586->580 588->585 592 40653e-406541 588->592 589->591 593 406543-406548 592->593 594 40654b-40656f MultiByteToWideChar 592->594 593->594 594->585 595 406575-4065a9 call 405ab0 594->595 595->585 599 4065ab-4065c2 MultiByteToWideChar 595->599 599->585 600 4065c4-4065dd LCMapStringW 599->600 600->585 601 4065df-4065e3 600->601 602 406625-40665b call 405ab0 601->602 603 4065e5-4065e8 601->603 602->585 610 40665d-406673 LCMapStringW 602->610 604 4066a0-4066a2 603->604 605 4065ee-4065f1 603->605 604->591 605->585 607 4065f3-40660b LCMapStringW 605->607 607->585 607->604 610->585 611 406675-40667a 610->611 612 406680-406683 611->612 613 40667c-40667e 611->613 614 406686-40669a WideCharToMultiByte 612->614 613->614 614->585 614->604
    APIs
    • LCMapStringW.KERNEL32(00000000,00000100,004071B4,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 004064C5
    • LCMapStringA.KERNEL32(00000000,00000100,004071B0,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 004064E1
    • LCMapStringA.KERNEL32(?,00000100,00000020,00000001,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 0040652A
    • MultiByteToWideChar.KERNEL32(00000000,00000101,00000020,00000001,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?,00000000), ref: 00406562
    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000020,00000001,00000100,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 004065BA
    • LCMapStringW.KERNEL32(?,00000100,00000100,00000000,00000000,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 004065D0
    • LCMapStringW.KERNEL32(?,00000100,00000100,00000000,00000000,00000100,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 00406603
    • LCMapStringW.KERNEL32(?,00000100,00000100,00000100,?,00000000,?,00000100,00000000,00000100,00000000,00000001,00000020,00000100,?), ref: 0040666B
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: String$ByteCharMultiWide
    • String ID:
    • API String ID: 352835431-0
    • Opcode ID: 01906f5aca457756e4f8ca91406d0cbddd1c1c33ef3723baf1ae6b1723aba425
    • Instruction ID: a4c6235f0319b0b38398b303cadb930824b71cff345c965d7893b79fa36b334b
    • Opcode Fuzzy Hash: 01906f5aca457756e4f8ca91406d0cbddd1c1c33ef3723baf1ae6b1723aba425
    • Instruction Fuzzy Hash: 0151AC31900209ABCF228F54CD45ADF7FB5FB89740F15452AF912B62A0C33A9D21DFA9

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 625 401ef0-401f0a OpenSCManagerA 626 401f11-401f16 625->626 627 401f0c-401f10 625->627 628 401f17 call 401eb0 626->628 629 401f1c-401f22 628->629 630 401f23 call 401d40 629->630 631 401f28-401f33 630->631 632 401f35-401f3e GetLastError * 2 631->632 633 401f5e 631->633 634 401f40-401f47 GetLastError 632->634 635 401f62-401f63 632->635 633->635 634->635 636 401f49-401f5d CloseServiceHandle SetLastError 634->636 637 401f64 call 401d80 635->637 638 401f69-401f72 637->638 639 401f74-401f76 GetLastError 638->639 640 401f78-401f93 CloseServiceHandle SetLastError 638->640 639->640
    APIs
    • OpenSCManagerA.ADVAPI32(004091CC,00000000,000F003F,?,00000000,74DEE010,?,00401576,004091CC,PSKLLSVC,?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC), ref: 00401F00
    • GetLastError.KERNEL32(?,?,%%SystemRoot%%\System32\PSKLLSVC.EXE,Starting pskill service on %s...,004091CC,?,?,?,?,00000000), ref: 00401F35
    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00401F39
    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00401F40
    • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,00000000), ref: 00401F4A
    • SetLastError.KERNEL32(00000000,?,?,?,?,00000000), ref: 00401F51
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: ErrorLast$CloseHandleManagerOpenService
    • String ID:
    • API String ID: 2833319856-0
    • Opcode ID: 49e1b2d838cd7594b2173aece4b20d1d3edb9545998dd08197dd38278d486891
    • Instruction ID: 10e612b9e5de9478ce74cc651d32d451a386bda6a249d20cce4741c507b34d38
    • Opcode Fuzzy Hash: 49e1b2d838cd7594b2173aece4b20d1d3edb9545998dd08197dd38278d486891
    • Instruction Fuzzy Hash: 3211C27260921567C3206BB5AD89EAF7798DFC5791F000576F701B2262CB39E90192BF

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 641 404df9-404e07 642 404e0c-404e0e 641->642 643 404e10-404e19 642->643 644 404e1b-404e27 642->644 643->642 643->644 645 404f49-404f4b 644->645 646 404e2d-404e35 644->646 647 404f23-404f43 call 4052b0 GetStdHandle WriteFile 646->647 648 404e3b-404e3d 646->648 647->645 650 404e4c-404e52 648->650 651 404e3f-404e46 648->651 650->645 653 404e58-404e6e GetModuleFileNameA 650->653 651->647 651->650 654 404e70-404e82 call 405ae0 653->654 655 404e83-404e9b call 4052b0 653->655 654->655 660 404ec6-404f21 call 405ae0 call 405af0 * 3 call 405fb0 655->660 661 404e9d-404ec3 call 4052b0 call 406040 655->661 660->645 661->660
    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 00404E66
    • GetStdHandle.KERNEL32(000000F4,00407428,00000000,?,00000000,00000000), ref: 00404F3C
    • WriteFile.KERNEL32(00000000), ref: 00404F43
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: File$HandleModuleNameWrite
    • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
    • API String ID: 3784150691-4022980321
    • Opcode ID: 1b17408e59053d0166d107f4de58e47acbf0efc0ed026df7843dabadb7ab04bd
    • Instruction ID: 808cf2034d31d2ea750970088a291b833a9b062823151151e589d97839312f0b
    • Opcode Fuzzy Hash: 1b17408e59053d0166d107f4de58e47acbf0efc0ed026df7843dabadb7ab04bd
    • Instruction Fuzzy Hash: B531A3B2A40208AEDF20E771CD4AF9B776CEB85304F50017BF645B61D1DA78A9418E5D
    APIs
    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,004026FC), ref: 00404AD9
    • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,004026FC), ref: 00404AED
    • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,004026FC), ref: 00404B19
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,004026FC), ref: 00404B51
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,?,?,004026FC), ref: 00404B73
    • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,?,?,004026FC), ref: 00404B8C
    • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,004026FC), ref: 00404B9F
    • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00404BDD
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: EnvironmentStrings$ByteCharFreeMultiWide
    • String ID:
    • API String ID: 1823725401-0
    • Opcode ID: 6635efd4d95cb5cc9f402bf2030600fefb07bf1291b1dfb1398568ba3fb58d12
    • Instruction ID: 8d759bca99f9a425c6819c2fd7fabbe41d994e41607390ef39a6a808310ec736
    • Opcode Fuzzy Hash: 6635efd4d95cb5cc9f402bf2030600fefb07bf1291b1dfb1398568ba3fb58d12
    • Instruction Fuzzy Hash: 6931F2F25082506FD7207FB95C84A3B7AACE6C4358711053BF742F3281EA39FC4182AA
    APIs
    • CreateFileA.KERNEL32(00000001,80000000,004091CC,0000000C,00000001,00000080,00000000,00000001,00000000,00000000), ref: 00405939
    • GetFileType.KERNEL32(00000000), ref: 00405946
    • CloseHandle.KERNEL32(00000000), ref: 00405951
    • GetLastError.KERNEL32 ref: 00405957
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: File$CloseCreateErrorHandleLastType
    • String ID: @$H
    • API String ID: 1809617866-104103126
    • Opcode ID: 7d047f26794a0b81d31a6f3642261894af4da4bcaa3b4b053aa326d547210ee4
    • Instruction ID: bb51585d66876a613aed01af80f2b84899a026a0dac9c2057b0d305241cbd6e5
    • Opcode Fuzzy Hash: 7d047f26794a0b81d31a6f3642261894af4da4bcaa3b4b053aa326d547210ee4
    • Instruction Fuzzy Hash: 0E81E472904A499AEF209F58C8847AF7B64EB01324F24827BED52BA2D1C37C4955DF4E
    APIs
    • GetStringTypeW.KERNEL32(00000001,004071B4,00000001,00000000,?,00000100,00000000,00405EAE,00000001,00000020,00000100,?,00000000), ref: 00404253
    • GetStringTypeA.KERNEL32(00000000,00000001,004071B0,00000001,00000000,?,00000100,00000000,00405EAE,00000001,00000020,00000100,?,00000000), ref: 0040426D
    • GetStringTypeA.KERNEL32(00000000,?,00000100,00000020,00000001,?,00000100,00000000,00405EAE,00000001,00000020,00000100,?,00000000), ref: 004042A1
    • MultiByteToWideChar.KERNEL32(00405EAE,00000101,00000100,00000020,00000000,00000000,?,00000100,00000000,00405EAE,00000001,00000020,00000100,?,00000000), ref: 004042D9
    • MultiByteToWideChar.KERNEL32(00405EAE,00000001,00000100,00000020,?,00000100,?,00000100,00000000,00405EAE,00000001,00000020,00000100,?), ref: 0040432F
    • GetStringTypeW.KERNEL32(?,?,00000000,00000001,?,00000100,?,00000100,00000000,00405EAE,00000001,00000020,00000100,?), ref: 00404341
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: StringType$ByteCharMultiWide
    • String ID:
    • API String ID: 3852931651-0
    • Opcode ID: 7a951d32a7a2b526d0460b374eb5b1fd9d244dbc967786ab82187f797bf24174
    • Instruction ID: e41ae300b624074b21fa627e9f904bce1f251b41cd15d7838ba62e04a315c286
    • Opcode Fuzzy Hash: 7a951d32a7a2b526d0460b374eb5b1fd9d244dbc967786ab82187f797bf24174
    • Instruction Fuzzy Hash: 6A416DB1A04219AFCF109F94DC85EEF7B69EB48750F10453AFA01F6290C338A9518BA9
    APIs
    • OpenProcess.KERNEL32(00000001,00000000,?,?,004012E6,?,00000000), ref: 0040119A
    • GetLastError.KERNEL32 ref: 004011A6
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 004011B1
    • CloseHandle.KERNEL32(00000000), ref: 004011BC
    • GetLastError.KERNEL32 ref: 004011C2
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: ErrorLastProcess$CloseHandleOpenTerminate
    • String ID:
    • API String ID: 83288655-0
    • Opcode ID: 1101300497187de2f6ad2451b3423720d2c233f0acc51507ff07e4f7f7cab5ef
    • Instruction ID: b2f29c15d58b2b73a0811e8bc9e35613d9f078cf30ace9642155996eeb57d2b3
    • Opcode Fuzzy Hash: 1101300497187de2f6ad2451b3423720d2c233f0acc51507ff07e4f7f7cab5ef
    • Instruction Fuzzy Hash: 66E09A31E49620ABE7212B74BE0CBDB3A54EF49761F014261F645F52A0D774AC41C6AA
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f951bbfa181731ee5d66aa2471aa2d129e28a935cc114a0c7a8124ce92a2d519
    • Instruction ID: 3bcc1c8b18dd1474f315497da6552681cc35f693e656a85d161b9515574ab067
    • Opcode Fuzzy Hash: f951bbfa181731ee5d66aa2471aa2d129e28a935cc114a0c7a8124ce92a2d519
    • Instruction Fuzzy Hash: 15213773A04106AAEF00AB91DE45AAA3BB8EB44314F0141BBF502F62F1D335CD54CB68
    APIs
    • GetModuleHandleA.KERNEL32(ntdll.dll,NtQuerySystemInformation,?,00401218,00000000), ref: 0040100B
    • GetProcAddress.KERNEL32(00000000), ref: 00401012
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: NtQuerySystemInformation$ntdll.dll
    • API String ID: 1646373207-3774135904
    • Opcode ID: e44b20361fc8db20989faac4f7552e58629c0f806c54ca1fb41e06f347d70bc7
    • Instruction ID: b3dabb8d5a83590c8b1085bd903674d4daf9b0d230342e7755a82848c5d4ed97
    • Opcode Fuzzy Hash: e44b20361fc8db20989faac4f7552e58629c0f806c54ca1fb41e06f347d70bc7
    • Instruction Fuzzy Hash: 9FF0C8B2B012407BE3101B629D4DFAB3A5CDBD1792B14003EF549F12D1EB789C44D679
    APIs
    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000100,00000000), ref: 00406311
    • GetLastError.KERNEL32 ref: 0040631B
    • ReadFile.KERNEL32(?,?,00000001,00000000,00000000), ref: 004063E2
    • GetLastError.KERNEL32 ref: 004063EC
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: ErrorFileLastRead
    • String ID:
    • API String ID: 1948546556-0
    • Opcode ID: dc20c8354a0b9f077d2e37c7855cd2457ab3a0f67f2cd46815a538230d9e72cf
    • Instruction ID: 594cd5d03c4902bb6504dd042f9b80409b9b2d2fba878b21d4fef55b099255ba
    • Opcode Fuzzy Hash: dc20c8354a0b9f077d2e37c7855cd2457ab3a0f67f2cd46815a538230d9e72cf
    • Instruction Fuzzy Hash: F961D630904286DFDB158F58D844BAA7BB1AF01314F1541BBE853BB3D2C3789966CB5E
    APIs
    • GetCPInfo.KERNEL32(?,00000000), ref: 00405E23
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: Info
    • String ID: $
    • API String ID: 1807457897-3032137957
    • Opcode ID: 9cc35fe217b511eed1e994103731015ee061b8b2b5e5b419c84df181b9037b67
    • Instruction ID: b6d7fb98384146fe23e83d2c47050a47a1010788af2cd72c853b3fc687cf265b
    • Opcode Fuzzy Hash: 9cc35fe217b511eed1e994103731015ee061b8b2b5e5b419c84df181b9037b67
    • Instruction Fuzzy Hash: FD4126311046982EEB158754DD49BFB3BA9DB0A704F1400FAD58AF62D3C23D4E44CFAA
    APIs
    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\PSKILL.EXE,00000104,?,?,?,?,?,?,00402706), ref: 00404894
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: FileModuleName
    • String ID: C:\Users\user\Desktop\PSKILL.EXE$H%[
    • API String ID: 514040917-293701502
    • Opcode ID: 3433186f90cc1688682f1956b98dbd23c632455c5d2e024fc2b7001290256f5f
    • Instruction ID: b130ab54511de8fe3dffe748e45aa3d96d09eed6c06514f2c3feb5f2f9a36a38
    • Opcode Fuzzy Hash: 3433186f90cc1688682f1956b98dbd23c632455c5d2e024fc2b7001290256f5f
    • Instruction Fuzzy Hash: BE114FB6900218BFD711EFA9CDC5C9B77ACEA85358B10007AF605B7282E6745E01CBA4
    APIs
    • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,00401CBD,00000000,00000000,00401CBD,00000000), ref: 0040131A
    • LocalFree.KERNEL32(?), ref: 00401337
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1664120413.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1664092516.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664141988.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664161309.0000000000408000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1664181238.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_PSKILL.jbxd
    Similarity
    • API ID: FormatFreeLocalMessage
    • String ID: %s
    • API String ID: 1427518018-620797490
    • Opcode ID: c3c08edf1868f069a35b8d74fe3e60d3d166318f84caaf4126debfdaf7d31634
    • Instruction ID: 45a0c86f70ab77998a5bf0c638690475f8b3158380a38e58cb444e64f67b6572
    • Opcode Fuzzy Hash: c3c08edf1868f069a35b8d74fe3e60d3d166318f84caaf4126debfdaf7d31634
    • Instruction Fuzzy Hash: 03E012B4A88300BFF600D750CE4AF6B73689B84B01F10C519B784B61C1C6B4B844C77B