Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6xQ8CMUaES.exe

Overview

General Information

Sample name:6xQ8CMUaES.exe
renamed because original name is a hash value
Original sample name:d7435ea8af6b94669b990fe5f90a7d9199075a0500d2503a07dd5986bf502099.exe
Analysis ID:1561584
MD5:613883afab4a605d1da8e9bff4083377
SHA1:4dfbff41712cd507d22fd0b17f3c089791ee6298
SHA256:d7435ea8af6b94669b990fe5f90a7d9199075a0500d2503a07dd5986bf502099
Tags:exeuser-Chainskilabs
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Sigma detected: Disable power options
Yara detected Xmrig cryptocurrency miner
DNS related to crypt mining pools
Found strings related to Crypto-Mining
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Suspect Svchost Activity
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses powercfg.exe to modify the power settings
AV process strings found (often used to terminate AV products)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Creates driver files
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 6xQ8CMUaES.exe (PID: 4592 cmdline: "C:\Users\user\Desktop\6xQ8CMUaES.exe" MD5: 613883AFAB4A605D1DA8E9BFF4083377)
    • powercfg.exe (PID: 5544 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 2656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 1704 cmdline: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 6096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 4460 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 4144 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 5780 cmdline: C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
      • conhost.exe (PID: 4296 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • svchost.exe (PID: 5232 cmdline: svchost.exe MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000003.1703123097.00000235E8A6A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      00000009.00000002.2956202377.00000235E8A69000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            9.2.svchost.exe.140000000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              9.2.svchost.exe.140000000.0.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
              • 0x370008:$a1: mining.set_target
              • 0x362230:$a2: XMRIG_HOSTNAME
              • 0x364ba8:$a3: Usage: xmrig [OPTIONS]
              • 0x362208:$a4: XMRIG_VERSION
              9.2.svchost.exe.140000000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
              • 0x3b5761:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
              9.2.svchost.exe.140000000.0.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
              • 0x3b5fd8:$s1: %s/%s (Windows NT %lu.%lu
              • 0x3b9600:$s3: \\.\WinRing0_
              • 0x3671a8:$s4: pool_wallet
              • 0x3615d8:$s5: cryptonight
              • 0x3615e8:$s5: cryptonight
              • 0x3615f8:$s5: cryptonight
              • 0x361608:$s5: cryptonight
              • 0x361620:$s5: cryptonight
              • 0x361630:$s5: cryptonight
              • 0x361640:$s5: cryptonight
              • 0x361658:$s5: cryptonight
              • 0x361668:$s5: cryptonight
              • 0x361680:$s5: cryptonight
              • 0x361698:$s5: cryptonight
              • 0x3616a8:$s5: cryptonight
              • 0x3616b8:$s5: cryptonight
              • 0x3616c8:$s5: cryptonight
              • 0x3616e0:$s5: cryptonight
              • 0x3616f8:$s5: cryptonight
              • 0x361708:$s5: cryptonight
              • 0x361718:$s5: cryptonight

              Change of critical system settings

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, CommandLine|base64offset|contains: , Image: C:\Windows\System32\powercfg.exe, NewProcessName: C:\Windows\System32\powercfg.exe, OriginalFileName: C:\Windows\System32\powercfg.exe, ParentCommandLine: "C:\Users\user\Desktop\6xQ8CMUaES.exe", ParentImage: C:\Users\user\Desktop\6xQ8CMUaES.exe, ParentProcessId: 4592, ParentProcessName: 6xQ8CMUaES.exe, ProcessCommandLine: C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0, ProcessId: 5544, ProcessName: powercfg.exe

              System Summary

              barindex
              Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\6xQ8CMUaES.exe", ParentImage: C:\Users\user\Desktop\6xQ8CMUaES.exe, ParentProcessId: 4592, ParentProcessName: 6xQ8CMUaES.exe, ProcessCommandLine: svchost.exe, ProcessId: 5232, ProcessName: svchost.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\6xQ8CMUaES.exe", ParentImage: C:\Users\user\Desktop\6xQ8CMUaES.exe, ParentProcessId: 4592, ParentProcessName: 6xQ8CMUaES.exe, ProcessCommandLine: svchost.exe, ProcessId: 5232, ProcessName: svchost.exe
              Source: Process startedAuthor: vburov: Data: Command: svchost.exe, CommandLine: svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\6xQ8CMUaES.exe", ParentImage: C:\Users\user\Desktop\6xQ8CMUaES.exe, ParentProcessId: 4592, ParentProcessName: 6xQ8CMUaES.exe, ProcessCommandLine: svchost.exe, ProcessId: 5232, ProcessName: svchost.exe
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              Bitcoin Miner

              barindex
              Source: Yara matchFile source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000003.1703123097.00000235E8A6A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2956202377.00000235E8A69000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 5232, type: MEMORYSTR
              Source: unknownDNS query: name: xmr-eu1.nanopool.org
              Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
              Source: svchost.exeString found in binary or memory: cryptonight/0
              Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: -o, --url=URL URL of mining server
              Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
              Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
              Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
              Source: 6xQ8CMUaES.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.dr
              Source: global trafficTCP traffic: 192.168.2.4:49730 -> 51.89.23.91:10343
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: xmr-eu1.nanopool.org
              Source: svchost.exe, 00000009.00000002.2956312421.00000235E8AAB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl
              Source: svchost.exe, 00000009.00000003.1725941987.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1728289922.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crl0
              Source: svchost.exe, 00000009.00000002.2956356312.00000235E8AC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.cloudflare.com/origin_ca.crlCd
              Source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
              Source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
              Source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.drString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
              Source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0
              Source: svchost.exe, 00000009.00000002.2956356312.00000235E8AC6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca
              Source: svchost.exe, 00000009.00000002.2956286324.00000235E8A9A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1725941987.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1728289922.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.cloudflare.com/origin_ca0
              Source: svchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmpString found in binary or memory: https://xmrig.com/docs/algorithms

              System Summary

              barindex
              Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
              Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
              Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
              Source: 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
              Source: Process Memory Space: svchost.exe PID: 5232, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeCode function: 0_2_00007FF713141394 NtReplyWaitReceivePort,0_2_00007FF713141394
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeFile created: C:\Users\user\AppData\Local\Temp\lqlvnipszdia.sysJump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeCode function: 0_2_00007FF7131433600_2_00007FF713143360
              Source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinRing0.sys2 vs 6xQ8CMUaES.exe
              Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
              Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
              Source: 9.2.svchost.exe.140000000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
              Source: 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
              Source: Process Memory Space: svchost.exe PID: 5232, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
              Source: lqlvnipszdia.sys.0.drBinary string: \Device\WinRing0_1_2_0
              Source: classification engineClassification label: mal100.spyw.evad.mine.winEXE@15/1@1/1
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4296:120:WilError_03
              Source: C:\Windows\System32\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Global\dxxyofmyycmmxpna
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4144:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2656:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6096:120:WilError_03
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeFile created: C:\Users\user\AppData\Local\Temp\lqlvnipszdia.sysJump to behavior
              Source: 6xQ8CMUaES.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_process where name="csrss.exe"
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\6xQ8CMUaES.exe "C:\Users\user\Desktop\6xQ8CMUaES.exe"
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
              Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
              Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
              Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\powercfg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\svchost.exe svchost.exe
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0Jump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0Jump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\svchost.exe svchost.exeJump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wbemcomn.dllJump to behavior
              Source: 6xQ8CMUaES.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: 6xQ8CMUaES.exeStatic file information: File size 2576896 > 1048576
              Source: 6xQ8CMUaES.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x26e000
              Source: 6xQ8CMUaES.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: 6xQ8CMUaES.exe, 00000000.00000003.1700268144.0000021EDDB00000.00000004.00000001.00020000.00000000.sdmp, lqlvnipszdia.sys.0.dr
              Source: 6xQ8CMUaES.exeStatic PE information: section name: .00cfg
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeCode function: 0_2_00007FF713141394 push qword ptr [00007FF713148004h]; ret 0_2_00007FF713141403

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeFile created: C:\Users\user\AppData\Local\Temp\lqlvnipszdia.sysJump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeFile created: C:\Users\user\AppData\Local\Temp\lqlvnipszdia.sysJump to dropped file
              Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\System32\svchost.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: svchost.exe, 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
              Source: svchost.exe, 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SVCHOST.EXE--ALGO=RX/0--URL=XMR-EU1.NANOPOOL.ORG:10343--USER=82EVY9NPK5MQDJNLWQ85GDMHJTIPD496WCCTFYTQVSBXTJC2BBRZSB46XQ9QQ7JLKS8EITZHW6MAXACGXPGVKJXR9DFJPPQ--PASS=--CPU-MAX-THREADS-HINT=40--CINIT-WINRING=LQLVNIPSZDIA.SYS--RANDOMX-NO-RDMSR--CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE--CINIT-STEALTH-FULLSCREEN--CINIT-VERSION=3.4.1--TLS--CINIT-IDLE-WAIT=5--CINIT-IDLE-CPU=80--CINIT-ID=DXXYOFMYYCMMXPNA
              Source: svchost.exe, 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: --CINIT-STEALTH-TARGETS=TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
              Source: svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: INTEL(R) CORE(TM)2 CPU 6600 @ 2.40 GHZ, INTEL(R) CORE(TM)2 CPU 6600 @ 2.40 GHZTASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
              Source: svchost.exe, 00000009.00000003.1703123097.00000235E8A6A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXEDXXYOFMYYCMMXPNA
              Source: svchost.exe, 00000009.00000003.1703123097.00000235E8A6A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956202377.00000235E8A69000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE
              Source: svchost.exe, 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X/0 --URL=XMR-EU1.NANOPOOL.ORG:10343 --USER="82EVY9NPK5MQDJNLWQ85GDMHJTIPD496WCCTFYTQVSBXTJC2BBRZSB46XQ9QQ7JLKS8EITZHW6MAXACGXPGVKJXR9DFJPPQ" --PASS="" --CPU-MAX-THREADS-HINT=40 --CINIT-WINRING="LQLVNIPSZDIA.SYS" --RANDOMX-NO-RDMSR --CINIT-STEALTH-TARGETS="TASKMGR.EXE,PROCESSHACKER.EXE,PERFMON.EXE,PROCEXP.EXE,PROCEXP64.EXE" --CINIT-STEALTH-FULLSCREEN --CINIT-VERSION="3.4.1" --TLS --CINIT-IDLE-WAIT=5 --CINIT-IDLE-CPU=80 --CINIT-ID="DXXYOFMYYCMMXPNA"
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\lqlvnipszdia.sysJump to dropped file
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeAPI coverage: 5.0 %
              Source: C:\Windows\System32\powercfg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
              Source: C:\Windows\System32\powercfg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
              Source: C:\Windows\System32\powercfg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
              Source: C:\Windows\System32\powercfg.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_ComputerSystem
              Source: C:\Windows\System32\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
              Source: svchost.exe, 00000009.00000002.2956202377.00000235E8A69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWMSAFD RfComm [Bluetooth]RSVP TCPv6 Service Provider
              Source: svchost.exe, 00000009.00000002.2956152933.00000235E8A5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: svchost.exe, 00000009.00000002.2956125158.00000235E8A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
              Source: C:\Windows\System32\svchost.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeCode function: 0_2_00007FF713141160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,0_2_00007FF713141160

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeThread register set: target process: 5232Jump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\svchost.exe svchost.exeJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0Jump to behavior
              Source: C:\Users\user\Desktop\6xQ8CMUaES.exeProcess created: C:\Windows\System32\powercfg.exe C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0Jump to behavior
              Source: svchost.exe, 00000009.00000002.2956312421.00000235E8AAB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts31
              Windows Management Instrumentation
              1
              Windows Service
              1
              Windows Service
              12
              Virtualization/Sandbox Evasion
              OS Credential Dumping231
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              111
              Process Injection
              111
              Process Injection
              LSASS Memory12
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              1
              Obfuscated Files or Information
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              NTDS22
              System Information Discovery
              Distributed Component Object ModelInput Capture1
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1561584 Sample: 6xQ8CMUaES.exe Startdate: 23/11/2024 Architecture: WINDOWS Score: 100 32 xmr-eu1.nanopool.org 2->32 34 bg.microsoft.map.fastly.net 2->34 38 Malicious sample detected (through community Yara rule) 2->38 40 Yara detected Xmrig cryptocurrency miner 2->40 42 Sigma detected: Disable power options 2->42 46 2 other signatures 2->46 8 6xQ8CMUaES.exe 1 2->8         started        signatures3 44 DNS related to crypt mining pools 32->44 process4 file5 30 C:\Users\user\AppData\...\lqlvnipszdia.sys, Unknown 8->30 dropped 48 Uses powercfg.exe to modify the power settings 8->48 50 Modifies the context of a thread in another process (thread injection) 8->50 52 Sample is not signed and drops a device driver 8->52 54 Modifies power options to not sleep / hibernate 8->54 12 svchost.exe 8->12         started        16 powercfg.exe 1 8->16         started        18 powercfg.exe 1 8->18         started        20 2 other processes 8->20 signatures6 process7 dnsIp8 36 xmr-eu1.nanopool.org 51.89.23.91, 10343, 49730 OVHFR France 12->36 56 Query firmware table information (likely to detect VMs) 12->56 58 Found strings related to Crypto-Mining 12->58 60 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 12->60 22 conhost.exe 16->22         started        24 conhost.exe 18->24         started        26 conhost.exe 20->26         started        28 conhost.exe 20->28         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crl.cloudflare.com/origin_ca.crlCd0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              bg.microsoft.map.fastly.net
              199.232.210.172
              truefalse
                high
                xmr-eu1.nanopool.org
                51.89.23.91
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crl.cloudflare.com/origin_ca.crl0svchost.exe, 00000009.00000003.1725941987.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1728289922.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://ocsp.cloudflare.com/origin_casvchost.exe, 00000009.00000002.2956356312.00000235E8AC6000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://crl.cloudflare.com/origin_ca.crlCdsvchost.exe, 00000009.00000002.2956356312.00000235E8AC6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.cloudflare.com/origin_ca0svchost.exe, 00000009.00000002.2956286324.00000235E8A9A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1725941987.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.1728289922.00000235E8A8E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://crl.cloudflare.com/origin_ca.crlsvchost.exe, 00000009.00000002.2956312421.00000235E8AAB000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://xmrig.com/docs/algorithmssvchost.exe, 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            51.89.23.91
                            xmr-eu1.nanopool.orgFrance
                            16276OVHFRfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1561584
                            Start date and time:2024-11-23 20:59:05 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 18s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:14
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:6xQ8CMUaES.exe
                            renamed because original name is a hash value
                            Original Sample Name:d7435ea8af6b94669b990fe5f90a7d9199075a0500d2503a07dd5986bf502099.exe
                            Detection:MAL
                            Classification:mal100.spyw.evad.mine.winEXE@15/1@1/1
                            EGA Information:
                            • Successful, ratio: 50%
                            HCA Information:Failed
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 20.12.23.50, 52.165.164.15
                            • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target svchost.exe, PID 5232 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • VT rate limit hit for: 6xQ8CMUaES.exe
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            51.89.23.914o8Tgrb384.exeGet hashmaliciousXmrigBrowse
                              file.exeGet hashmaliciousXmrigBrowse
                                SecuriteInfo.com.Trojan.Siggen29.54948.7115.19193.exeGet hashmaliciousXmrigBrowse
                                  eqkh9g37Yb.exeGet hashmaliciousXmrigBrowse
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    bg.microsoft.map.fastly.net1732382826559c62d8b84c02e95636f46212b9f803082b7868187644fff4926ca8a53349c1874.dat-decoded.exeGet hashmaliciousLummaCBrowse
                                    • 199.232.214.172
                                    17323828261cfef277a3375a886445bf7f5a834ebb1cc85e533e9ac93595cd0e56ebd12426132.dat-decoded.exeGet hashmaliciousXWormBrowse
                                    • 199.232.214.172
                                    file.exeGet hashmaliciousClipboard Hijacker, CryptbotBrowse
                                    • 199.232.210.172
                                    download.ps1Get hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    download.ps1Get hashmaliciousUnknownBrowse
                                    • 146.75.30.172
                                    download.ps1Get hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    download.ps1Get hashmaliciousUnknownBrowse
                                    • 199.232.214.172
                                    download.ps1Get hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                    • 199.232.214.172
                                    LRkZCtzQ3.ps1Get hashmaliciousUnknownBrowse
                                    • 199.232.210.172
                                    xmr-eu1.nanopool.org4o8Tgrb384.exeGet hashmaliciousXmrigBrowse
                                    • 51.15.65.182
                                    rtYpMDeKUq.exeGet hashmaliciousXmrigBrowse
                                    • 51.89.23.91
                                    NH95Vhokye.exeGet hashmaliciousXmrigBrowse
                                    • 54.37.137.114
                                    ahlntQUj2t.exeGet hashmaliciousXmrigBrowse
                                    • 54.37.232.103
                                    file.exeGet hashmaliciousXmrigBrowse
                                    • 163.172.154.142
                                    HmA7s2gaa5.exeGet hashmaliciousXmrigBrowse
                                    • 162.19.224.121
                                    12Jh49DCAj.exeGet hashmaliciousXmrigBrowse
                                    • 51.15.65.182
                                    Ky4J8k89A7.exeGet hashmaliciousStealc, Vidar, XmrigBrowse
                                    • 51.15.58.224
                                    boooba.exeGet hashmaliciousXmrigBrowse
                                    • 51.15.58.224
                                    2HUgVjrn3O.exeGet hashmaliciousXmrigBrowse
                                    • 51.15.58.224
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    OVHFRhttps://sendbot.me/seuemprestimogarantidoGet hashmaliciousUnknownBrowse
                                    • 46.105.222.162
                                    https://sendbot.me/seuemprestimogarantidoGet hashmaliciousUnknownBrowse
                                    • 46.105.222.82
                                    sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                    • 51.222.237.238
                                    file.exeGet hashmaliciousAmadey, XWormBrowse
                                    • 188.165.52.14
                                    RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.batGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                    • 51.195.88.199
                                    https://1drv.ms/o/c/1ba8fd2bd98c98a8/EmMMbLWVyqxBh9Z6zxri2ZUBVkwUpSiY2KbvhupkdaFzGA?e=F6pNlDGet hashmaliciousUnknownBrowse
                                    • 54.36.91.62
                                    Kellyb Timesheet Report.pdfGet hashmaliciousHTMLPhisherBrowse
                                    • 164.132.95.123
                                    ngPebbPhbp.exeGet hashmaliciousRHADAMANTHYSBrowse
                                    • 51.75.171.9
                                    https://voyages-moinschers.fr/request/index.html?userid=viviane.beigbeder@idcom-france.comGet hashmaliciousUnknownBrowse
                                    • 213.186.33.5
                                    https://voyages-moinschers.fr/request/index.html?userid=viviane.beigbeder@idcom-france.comGet hashmaliciousUnknownBrowse
                                    • 213.186.33.5
                                    No context
                                    No context
                                    Process:C:\Users\user\Desktop\6xQ8CMUaES.exe
                                    File Type:Unknown
                                    Category:dropped
                                    Size (bytes):14544
                                    Entropy (8bit):6.2660301556221185
                                    Encrypted:false
                                    SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                    MD5:0C0195C48B6B8582FA6F6373032118DA
                                    SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                    SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                    SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                    Malicious:true
                                    Reputation:high, very likely benign file
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                    File type:PE32+ executable (GUI) x86-64, for MS Windows
                                    Entropy (8bit):6.526571003831098
                                    TrID:
                                    • Win64 Executable GUI (202006/5) 92.65%
                                    • Win64 Executable (generic) (12005/4) 5.51%
                                    • Generic Win/DOS Executable (2004/3) 0.92%
                                    • DOS Executable Generic (2002/1) 0.92%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:6xQ8CMUaES.exe
                                    File size:2'576'896 bytes
                                    MD5:613883afab4a605d1da8e9bff4083377
                                    SHA1:4dfbff41712cd507d22fd0b17f3c089791ee6298
                                    SHA256:d7435ea8af6b94669b990fe5f90a7d9199075a0500d2503a07dd5986bf502099
                                    SHA512:44382944ceb7a7c0ca5f98cae6055062fbeeaad771cb2a920322d948459c2a082da637c1c3552f9c333e93e5f2e036278e3f93e18d95f5a7c8f7d1003f76db2a
                                    SSDEEP:49152:UsNdJ9uYiI92IqWMHiZYFy5mM4s3XTOthKB6LBdJbvGTz76:FNdJ9P9f+989Hy5NdJbuTf
                                    TLSH:87C533C57CA48655D09825B7CA7B628C01E6FD40B7E3F3D37FA81A18A7AA7C427B8414
                                    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...wv:g.........."......N....'.....@..........@..............................'...........`........................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x140001140
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x140000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x673A7677 [Sun Nov 17 23:04:23 2024 UTC]
                                    TLS Callbacks:0x40001760, 0x1, 0x400017e0, 0x1
                                    CLR (.Net) Version:
                                    OS Version Major:6
                                    OS Version Minor:0
                                    File Version Major:6
                                    File Version Minor:0
                                    Subsystem Version Major:6
                                    Subsystem Version Minor:0
                                    Import Hash:5d68de0544abec4f6be91e05245b348d
                                    Instruction
                                    dec eax
                                    sub esp, 28h
                                    dec eax
                                    mov eax, dword ptr [00004ED5h]
                                    mov dword ptr [eax], 00000001h
                                    call 00007FCA90C6182Fh
                                    nop
                                    nop
                                    nop
                                    dec eax
                                    add esp, 28h
                                    ret
                                    nop
                                    inc ecx
                                    push edi
                                    inc ecx
                                    push esi
                                    push esi
                                    push edi
                                    push ebx
                                    dec eax
                                    sub esp, 20h
                                    dec eax
                                    mov eax, dword ptr [00000030h]
                                    dec eax
                                    mov edi, dword ptr [eax+08h]
                                    dec eax
                                    mov esi, dword ptr [00004EC9h]
                                    xor eax, eax
                                    dec eax
                                    cmpxchg dword ptr [esi], edi
                                    sete bl
                                    je 00007FCA90C61850h
                                    dec eax
                                    cmp edi, eax
                                    je 00007FCA90C6184Bh
                                    dec esp
                                    mov esi, dword ptr [000060A1h]
                                    nop word ptr [eax+eax+00000000h]
                                    mov ecx, 000003E8h
                                    inc ecx
                                    call esi
                                    xor eax, eax
                                    dec eax
                                    cmpxchg dword ptr [esi], edi
                                    sete bl
                                    je 00007FCA90C61827h
                                    dec eax
                                    cmp edi, eax
                                    jne 00007FCA90C61809h
                                    dec eax
                                    mov edi, dword ptr [00004E90h]
                                    mov eax, dword ptr [edi]
                                    cmp eax, 01h
                                    jne 00007FCA90C6182Eh
                                    mov ecx, 0000001Fh
                                    call 00007FCA90C661B4h
                                    jmp 00007FCA90C61849h
                                    cmp dword ptr [edi], 00000000h
                                    je 00007FCA90C6182Bh
                                    mov byte ptr [00274D19h], 00000001h
                                    jmp 00007FCA90C6183Bh
                                    mov dword ptr [edi], 00000001h
                                    dec eax
                                    mov ecx, dword ptr [00004E7Ah]
                                    dec eax
                                    mov edx, dword ptr [00004E7Bh]
                                    call 00007FCA90C661ABh
                                    mov eax, dword ptr [edi]
                                    cmp eax, 01h
                                    jne 00007FCA90C6183Bh
                                    dec eax
                                    mov ecx, dword ptr [00004E50h]
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x6f800x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2770000x168.pdata
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x27a0000x70.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x60a00x28.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x64100x138.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x71100x150.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x4cd60x4e000d6da9dd8a3f6ddec82971f07857424eFalse0.549979967948718data6.203566688585323IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x60000x16740x18004cc395e9976141d99f41341d5e221826False0.4280598958333333data4.412971971173315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x80000x26e8c00x26e0004ffb3319d02209b8b1769167be1f8854unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .pdata0x2770000x1680x200cc6dc7f45e4dcf13ccffc0084ecc49daFalse0.470703125data2.900048058583562IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .00cfg0x2780000x100x200b18c7380298e104adf73576fa46bccc1False0.04296875data0.15127132530476972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .tls0x2790000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .reloc0x27a0000x700x200eb1e8676c9f211ca3f75d9e172f1c709False0.216796875data1.4016165013246953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    DLLImport
                                    msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, _wcsnicmp, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, memset, signal, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp
                                    KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetLastError, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 23, 2024 21:00:01.826101065 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:00:01.945823908 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:01.945985079 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:00:01.946413040 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:00:02.072089911 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:03.255606890 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:03.255695105 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:03.255745888 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:00:03.257649899 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:00:03.377228975 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:03.662831068 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:03.711306095 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:00:03.897552967 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:03.945732117 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:00:16.584781885 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:16.773854971 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:00:41.182941914 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:41.273917913 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:00:48.355993986 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:00:48.423362017 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:01:00.395699024 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:01:00.477205992 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:01:10.595422029 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:01:10.773999929 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:01:13.245287895 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:01:13.474608898 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:01:26.302828074 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:01:26.477201939 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:01:29.251893997 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:01:29.392534018 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:01:39.280320883 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:01:39.477279902 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:01:49.314886093 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:01:49.477292061 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:01:52.278477907 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:01:52.477329016 CET4973010343192.168.2.451.89.23.91
                                    Nov 23, 2024 21:02:02.419121981 CET103434973051.89.23.91192.168.2.4
                                    Nov 23, 2024 21:02:02.477369070 CET4973010343192.168.2.451.89.23.91
                                    TimestampSource PortDest PortSource IPDest IP
                                    Nov 23, 2024 21:00:01.477467060 CET6311153192.168.2.41.1.1.1
                                    Nov 23, 2024 21:00:01.821293116 CET53631111.1.1.1192.168.2.4
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Nov 23, 2024 21:00:01.477467060 CET192.168.2.41.1.1.10x26ebStandard query (0)xmr-eu1.nanopool.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org51.89.23.91A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org51.15.193.130A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org54.37.232.103A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org51.15.65.182A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org146.59.154.106A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org163.172.154.142A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org162.19.224.121A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org54.37.137.114A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org212.47.253.124A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org141.94.23.83A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:01.821293116 CET1.1.1.1192.168.2.40x26ebNo error (0)xmr-eu1.nanopool.org51.15.58.224A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:18.379367113 CET1.1.1.1192.168.2.40x675fNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                    Nov 23, 2024 21:00:18.379367113 CET1.1.1.1192.168.2.40x675fNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                                    Click to jump to process

                                    Click to jump to process

                                    Click to jump to process

                                    Target ID:0
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Users\user\Desktop\6xQ8CMUaES.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\6xQ8CMUaES.exe"
                                    Imagebase:0x7ff713140000
                                    File size:2'576'896 bytes
                                    MD5 hash:613883AFAB4A605D1DA8E9BFF4083377
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:1
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Windows\System32\powercfg.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                    Imagebase:0x7ff756be0000
                                    File size:96'256 bytes
                                    MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:2
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Windows\System32\powercfg.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                    Imagebase:0x7ff756be0000
                                    File size:96'256 bytes
                                    MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:3
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:4
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Windows\System32\powercfg.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                    Imagebase:0x7ff756be0000
                                    File size:96'256 bytes
                                    MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:5
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Windows\System32\powercfg.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                    Imagebase:0x7ff756be0000
                                    File size:96'256 bytes
                                    MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Target ID:7
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:8
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7699e0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:9
                                    Start time:15:00:00
                                    Start date:23/11/2024
                                    Path:C:\Windows\System32\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:svchost.exe
                                    Imagebase:0x7ff6eef20000
                                    File size:55'320 bytes
                                    MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000009.00000003.1703123097.00000235E8A6A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000009.00000002.2956152933.00000235E8A2F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000009.00000002.2956202377.00000235E8A69000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000009.00000002.2956228077.00000235E8A7E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000009.00000002.2954937666.0000000140001000.00000040.00000001.00020000.00000000.sdmp, Author: unknown
                                    Reputation:high
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:7.4%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:10.1%
                                      Total number of Nodes:1185
                                      Total number of Limit Nodes:2
                                      execution_graph 3154 7ff71314219e 3155 7ff7131421ab EnterCriticalSection 3154->3155 3156 7ff713142272 3154->3156 3157 7ff713142265 LeaveCriticalSection 3155->3157 3159 7ff7131421c8 3155->3159 3157->3156 3158 7ff7131421e9 TlsGetValue GetLastError 3158->3159 3159->3157 3159->3158 2063 7ff713141140 2066 7ff713141160 2063->2066 2065 7ff713141156 2067 7ff7131411b9 2066->2067 2068 7ff71314118b 2066->2068 2070 7ff7131411c7 _amsg_exit 2067->2070 2071 7ff7131411d3 2067->2071 2068->2067 2069 7ff713141190 2068->2069 2069->2067 2072 7ff7131411a0 Sleep 2069->2072 2070->2071 2073 7ff71314121a 2071->2073 2074 7ff713141201 _initterm 2071->2074 2072->2067 2072->2069 2091 7ff713141880 2073->2091 2074->2073 2076 7ff713141247 SetUnhandledExceptionFilter 2077 7ff71314126a 2076->2077 2078 7ff71314126f malloc 2077->2078 2079 7ff71314128b 2078->2079 2082 7ff7131412d2 2078->2082 2080 7ff7131412a0 strlen malloc memcpy 2079->2080 2080->2080 2081 7ff7131412d0 2080->2081 2081->2082 2098 7ff713143360 2082->2098 2085 7ff713141344 2089 7ff713141160 66 API calls 2085->2089 2086 7ff713141324 2087 7ff713141338 2086->2087 2088 7ff71314132d _cexit 2086->2088 2087->2065 2088->2087 2090 7ff713141366 2089->2090 2090->2065 2092 7ff7131418a2 2091->2092 2097 7ff713141a0f 2091->2097 2093 7ff713141956 2092->2093 2094 7ff71314199e 2092->2094 2092->2097 2093->2094 2211 7ff713141ba0 2093->2211 2096 7ff7131419e9 VirtualProtect 2094->2096 2094->2097 2096->2094 2097->2076 2101 7ff713143376 2098->2101 2099 7ff713143481 wcslen 2221 7ff71314153f 2099->2221 2101->2099 2103 7ff713141315 2103->2085 2103->2086 2106 7ff713143581 2108 7ff71314358b memset wcscat memset 2106->2108 2110 7ff7131435e1 2108->2110 2111 7ff713143631 wcslen 2110->2111 2113 7ff713143643 2111->2113 2117 7ff71314368c 2111->2117 2114 7ff713143660 _wcsnicmp 2113->2114 2115 7ff713143676 wcslen 2114->2115 2114->2117 2115->2114 2115->2117 2116 7ff7131436ed wcscpy wcscat memset 2119 7ff71314372f 2116->2119 2117->2116 2118 7ff713143837 wcscpy wcscat memset 2121 7ff71314387d 2118->2121 2119->2118 2120 7ff7131438c2 wcscpy wcscat memset 2123 7ff713143908 2120->2123 2121->2120 2122 7ff71314396b wcscpy wcscat memset 2124 7ff7131439b1 2122->2124 2123->2122 2125 7ff7131439e1 wcscpy wcscat memset 2124->2125 2126 7ff713143a27 2125->2126 2127 7ff713143a97 wcscpy wcscat 2126->2127 2128 7ff713143ac9 2127->2128 2395 7ff713142df0 2128->2395 2130 7ff713142df0 11 API calls 2133 7ff713143ce2 2130->2133 2131 7ff713143bd1 2131->2130 2132 7ff713142df0 11 API calls 2134 7ff713143dcc 2132->2134 2133->2132 2135 7ff713142df0 11 API calls 2134->2135 2138 7ff713143eb6 2135->2138 2136 7ff713143f13 wcslen 2137 7ff713143f25 2136->2137 2143 7ff713143f6c 2136->2143 2139 7ff713143f40 _wcsnicmp 2137->2139 2138->2136 2140 7ff713143f56 wcslen 2139->2140 2139->2143 2140->2139 2140->2143 2141 7ff713143fe9 memset wcscpy wcscat 2405 7ff713142f40 2141->2405 2143->2141 2144 7ff71314403d memset 2145 7ff71314428d memset 2144->2145 2156 7ff71314408b 2144->2156 2147 7ff7131442b1 2145->2147 2146 7ff7131440ed memset 2146->2156 2148 7ff7131442f6 wcscpy wcscat wcslen 2147->2148 2149 7ff713141422 2 API calls 2148->2149 2151 7ff7131443ed 2149->2151 2150 7ff71314414a wcscpy wcscat wcslen 2409 7ff713141422 2150->2409 2153 7ff713144433 2151->2153 2498 7ff713141431 2151->2498 2583 7ff7131414c7 2153->2583 2156->2145 2156->2146 2156->2150 2159 7ff71314145e 2 API calls 2156->2159 2161 7ff713144245 2156->2161 2159->2156 2160 7ff71314145e 2 API calls 2160->2153 2161->2145 2162 7ff7131444d2 wcslen 2164 7ff71314451b wcscat memset 2162->2164 2165 7ff7131444e4 2162->2165 2163 7ff713144482 2163->2162 2169 7ff713144617 2164->2169 2166 7ff7131444f0 _wcsnicmp 2165->2166 2166->2164 2168 7ff713144506 wcslen 2166->2168 2168->2164 2168->2166 2170 7ff71314467a wcscpy wcscat 2169->2170 2171 7ff7131446ac 2170->2171 2172 7ff7131453c9 memcpy 2171->2172 2174 7ff7131447d4 2171->2174 2172->2174 2173 7ff713144997 wcslen 2175 7ff71314153f 2 API calls 2173->2175 2174->2173 2176 7ff713144a22 2175->2176 2177 7ff71314145e 2 API calls 2176->2177 2178 7ff713144a33 2177->2178 2179 7ff713144d6f 2178->2179 2181 7ff713142f40 2 API calls 2178->2181 2180 7ff71314145e 2 API calls 2179->2180 2180->2103 2182 7ff713144a60 2181->2182 2634 7ff713142690 2182->2634 2186 7ff7131414c7 2 API calls 2188 7ff713144d61 2186->2188 2188->2179 2193 7ff71314145e 2 API calls 2188->2193 2189 7ff713144afa 2726 7ff7131414b8 2189->2726 2190 7ff713144d00 2987 7ff7131415c6 2190->2987 2193->2179 2194 7ff713144c3a memset 2786 7ff71314148b 2194->2786 2196 7ff7131414b8 2 API calls 2198 7ff713144b17 2196->2198 2198->2194 2198->2196 2781 7ff7131415d5 2198->2781 2199 7ff713144d10 2202 7ff7131415c6 2 API calls 2199->2202 2204 7ff713144cee 2202->2204 2204->2186 2205 7ff7131414b8 2 API calls 2206 7ff713144cd0 2205->2206 2206->2199 2207 7ff713144cd4 2206->2207 2916 7ff71314147c 2207->2916 2210 7ff71314145e 2 API calls 2210->2204 2213 7ff713141bc2 2211->2213 2214 7ff713141cf4 2213->2214 2215 7ff713141c45 VirtualQuery 2213->2215 2219 7ff713141c04 memcpy 2213->2219 2216 7ff713141d23 GetLastError 2214->2216 2215->2214 2220 7ff713141c72 2215->2220 2218 7ff713141d37 2216->2218 2217 7ff713141ca4 VirtualProtect 2217->2216 2217->2219 2219->2093 2220->2217 2220->2219 2996 7ff713141394 2221->2996 2223 7ff71314154e 2224 7ff713141394 2 API calls 2223->2224 2225 7ff713141558 2224->2225 2226 7ff71314155d 2225->2226 2227 7ff713141394 2 API calls 2225->2227 2228 7ff713141394 2 API calls 2226->2228 2227->2226 2229 7ff713141567 2228->2229 2230 7ff71314156c 2229->2230 2231 7ff713141394 2 API calls 2229->2231 2232 7ff713141394 2 API calls 2230->2232 2231->2230 2233 7ff71314157b 2232->2233 2234 7ff713141394 2 API calls 2233->2234 2235 7ff71314158a 2234->2235 2236 7ff713141394 2 API calls 2235->2236 2237 7ff713141599 2236->2237 2238 7ff713141394 2 API calls 2237->2238 2239 7ff7131415a8 2238->2239 2240 7ff713141394 2 API calls 2239->2240 2241 7ff7131415b7 2240->2241 2242 7ff713141394 2 API calls 2241->2242 2243 7ff7131415c1 2242->2243 2244 7ff7131415c6 2243->2244 2245 7ff713141394 2 API calls 2243->2245 2246 7ff713141394 2 API calls 2244->2246 2245->2244 2247 7ff7131415d0 2246->2247 2248 7ff7131415d5 2247->2248 2249 7ff713141394 2 API calls 2247->2249 2250 7ff713141394 2 API calls 2248->2250 2249->2248 2251 7ff7131415e4 2250->2251 2252 7ff713141394 2 API calls 2251->2252 2253 7ff7131415f3 2252->2253 2253->2103 2254 7ff713141503 2253->2254 2255 7ff713141394 2 API calls 2254->2255 2256 7ff713141512 2255->2256 2257 7ff713141394 2 API calls 2256->2257 2258 7ff713141521 2257->2258 2259 7ff713141394 2 API calls 2258->2259 2260 7ff713141530 2259->2260 2261 7ff71314153f 2260->2261 2262 7ff713141394 2 API calls 2260->2262 2263 7ff713141394 2 API calls 2261->2263 2262->2261 2264 7ff71314154e 2263->2264 2265 7ff713141394 2 API calls 2264->2265 2266 7ff713141558 2265->2266 2267 7ff71314155d 2266->2267 2268 7ff713141394 2 API calls 2266->2268 2269 7ff713141394 2 API calls 2267->2269 2268->2267 2270 7ff713141567 2269->2270 2271 7ff71314156c 2270->2271 2272 7ff713141394 2 API calls 2270->2272 2273 7ff713141394 2 API calls 2271->2273 2272->2271 2274 7ff71314157b 2273->2274 2275 7ff713141394 2 API calls 2274->2275 2276 7ff71314158a 2275->2276 2277 7ff713141394 2 API calls 2276->2277 2278 7ff713141599 2277->2278 2279 7ff713141394 2 API calls 2278->2279 2280 7ff7131415a8 2279->2280 2281 7ff713141394 2 API calls 2280->2281 2282 7ff7131415b7 2281->2282 2283 7ff713141394 2 API calls 2282->2283 2284 7ff7131415c1 2283->2284 2285 7ff7131415c6 2284->2285 2286 7ff713141394 2 API calls 2284->2286 2287 7ff713141394 2 API calls 2285->2287 2286->2285 2288 7ff7131415d0 2287->2288 2289 7ff7131415d5 2288->2289 2290 7ff713141394 2 API calls 2288->2290 2291 7ff713141394 2 API calls 2289->2291 2290->2289 2292 7ff7131415e4 2291->2292 2293 7ff713141394 2 API calls 2292->2293 2294 7ff7131415f3 2293->2294 2294->2106 2295 7ff71314156c 2294->2295 2296 7ff713141394 2 API calls 2295->2296 2297 7ff71314157b 2296->2297 2298 7ff713141394 2 API calls 2297->2298 2299 7ff71314158a 2298->2299 2300 7ff713141394 2 API calls 2299->2300 2301 7ff713141599 2300->2301 2302 7ff713141394 2 API calls 2301->2302 2303 7ff7131415a8 2302->2303 2304 7ff713141394 2 API calls 2303->2304 2305 7ff7131415b7 2304->2305 2306 7ff713141394 2 API calls 2305->2306 2307 7ff7131415c1 2306->2307 2308 7ff7131415c6 2307->2308 2309 7ff713141394 2 API calls 2307->2309 2310 7ff713141394 2 API calls 2308->2310 2309->2308 2311 7ff7131415d0 2310->2311 2312 7ff7131415d5 2311->2312 2313 7ff713141394 2 API calls 2311->2313 2314 7ff713141394 2 API calls 2312->2314 2313->2312 2315 7ff7131415e4 2314->2315 2316 7ff713141394 2 API calls 2315->2316 2317 7ff7131415f3 2316->2317 2317->2106 2318 7ff71314145e 2317->2318 2319 7ff713141394 2 API calls 2318->2319 2320 7ff71314146d 2319->2320 2321 7ff713141394 2 API calls 2320->2321 2322 7ff713141477 2321->2322 2323 7ff71314147c 2322->2323 2324 7ff713141394 2 API calls 2322->2324 2325 7ff713141394 2 API calls 2323->2325 2324->2323 2326 7ff713141486 2325->2326 2327 7ff71314148b 2326->2327 2328 7ff713141394 2 API calls 2326->2328 2329 7ff713141394 2 API calls 2327->2329 2328->2327 2330 7ff713141495 2329->2330 2331 7ff71314149a 2330->2331 2332 7ff713141394 2 API calls 2330->2332 2333 7ff713141394 2 API calls 2331->2333 2332->2331 2334 7ff7131414a4 2333->2334 2335 7ff7131414a9 2334->2335 2336 7ff713141394 2 API calls 2334->2336 2337 7ff713141394 2 API calls 2335->2337 2336->2335 2338 7ff7131414b3 2337->2338 2339 7ff7131414b8 2338->2339 2340 7ff713141394 2 API calls 2338->2340 2341 7ff713141394 2 API calls 2339->2341 2340->2339 2342 7ff7131414c2 2341->2342 2343 7ff7131414c7 2342->2343 2344 7ff713141394 2 API calls 2342->2344 2345 7ff713141394 2 API calls 2343->2345 2344->2343 2346 7ff7131414d6 2345->2346 2347 7ff713141394 2 API calls 2346->2347 2348 7ff7131414e0 2347->2348 2349 7ff713141394 2 API calls 2348->2349 2350 7ff7131414e5 2349->2350 2351 7ff713141394 2 API calls 2350->2351 2352 7ff7131414f4 2351->2352 2353 7ff713141394 2 API calls 2352->2353 2354 7ff713141503 2353->2354 2355 7ff713141394 2 API calls 2354->2355 2356 7ff713141512 2355->2356 2357 7ff713141394 2 API calls 2356->2357 2358 7ff713141521 2357->2358 2359 7ff713141394 2 API calls 2358->2359 2360 7ff713141530 2359->2360 2361 7ff71314153f 2360->2361 2362 7ff713141394 2 API calls 2360->2362 2363 7ff713141394 2 API calls 2361->2363 2362->2361 2364 7ff71314154e 2363->2364 2365 7ff713141394 2 API calls 2364->2365 2366 7ff713141558 2365->2366 2367 7ff71314155d 2366->2367 2368 7ff713141394 2 API calls 2366->2368 2369 7ff713141394 2 API calls 2367->2369 2368->2367 2370 7ff713141567 2369->2370 2371 7ff71314156c 2370->2371 2372 7ff713141394 2 API calls 2370->2372 2373 7ff713141394 2 API calls 2371->2373 2372->2371 2374 7ff71314157b 2373->2374 2375 7ff713141394 2 API calls 2374->2375 2376 7ff71314158a 2375->2376 2377 7ff713141394 2 API calls 2376->2377 2378 7ff713141599 2377->2378 2379 7ff713141394 2 API calls 2378->2379 2380 7ff7131415a8 2379->2380 2381 7ff713141394 2 API calls 2380->2381 2382 7ff7131415b7 2381->2382 2383 7ff713141394 2 API calls 2382->2383 2384 7ff7131415c1 2383->2384 2385 7ff7131415c6 2384->2385 2386 7ff713141394 2 API calls 2384->2386 2387 7ff713141394 2 API calls 2385->2387 2386->2385 2388 7ff7131415d0 2387->2388 2389 7ff7131415d5 2388->2389 2390 7ff713141394 2 API calls 2388->2390 2391 7ff713141394 2 API calls 2389->2391 2390->2389 2392 7ff7131415e4 2391->2392 2393 7ff713141394 2 API calls 2392->2393 2394 7ff7131415f3 2393->2394 2394->2106 3006 7ff713142660 2395->3006 2398 7ff713142690 10 API calls 2399 7ff713142f1b 2398->2399 2400 7ff71314145e 2 API calls 2399->2400 2401 7ff713142f25 2400->2401 2403 7ff71314145e 2 API calls 2401->2403 2402 7ff713142e37 2402->2398 2404 7ff713142f2f 2403->2404 2404->2131 2406 7ff713142f58 2405->2406 2407 7ff7131414a9 2 API calls 2406->2407 2408 7ff713142fa0 2407->2408 2408->2144 2410 7ff713141394 2 API calls 2409->2410 2411 7ff71314142c 2410->2411 2412 7ff713141431 2411->2412 2413 7ff713141394 2 API calls 2411->2413 2414 7ff713141394 2 API calls 2412->2414 2413->2412 2415 7ff713141440 2414->2415 2416 7ff713141394 2 API calls 2415->2416 2417 7ff71314144f 2416->2417 2418 7ff713141394 2 API calls 2417->2418 2419 7ff713141459 2418->2419 2420 7ff71314145e 2419->2420 2421 7ff713141394 2 API calls 2419->2421 2422 7ff713141394 2 API calls 2420->2422 2421->2420 2423 7ff71314146d 2422->2423 2424 7ff713141394 2 API calls 2423->2424 2425 7ff713141477 2424->2425 2426 7ff71314147c 2425->2426 2427 7ff713141394 2 API calls 2425->2427 2428 7ff713141394 2 API calls 2426->2428 2427->2426 2429 7ff713141486 2428->2429 2430 7ff71314148b 2429->2430 2431 7ff713141394 2 API calls 2429->2431 2432 7ff713141394 2 API calls 2430->2432 2431->2430 2433 7ff713141495 2432->2433 2434 7ff71314149a 2433->2434 2435 7ff713141394 2 API calls 2433->2435 2436 7ff713141394 2 API calls 2434->2436 2435->2434 2437 7ff7131414a4 2436->2437 2438 7ff7131414a9 2437->2438 2439 7ff713141394 2 API calls 2437->2439 2440 7ff713141394 2 API calls 2438->2440 2439->2438 2441 7ff7131414b3 2440->2441 2442 7ff7131414b8 2441->2442 2443 7ff713141394 2 API calls 2441->2443 2444 7ff713141394 2 API calls 2442->2444 2443->2442 2445 7ff7131414c2 2444->2445 2446 7ff7131414c7 2445->2446 2447 7ff713141394 2 API calls 2445->2447 2448 7ff713141394 2 API calls 2446->2448 2447->2446 2449 7ff7131414d6 2448->2449 2450 7ff713141394 2 API calls 2449->2450 2451 7ff7131414e0 2450->2451 2452 7ff713141394 2 API calls 2451->2452 2453 7ff7131414e5 2452->2453 2454 7ff713141394 2 API calls 2453->2454 2455 7ff7131414f4 2454->2455 2456 7ff713141394 2 API calls 2455->2456 2457 7ff713141503 2456->2457 2458 7ff713141394 2 API calls 2457->2458 2459 7ff713141512 2458->2459 2460 7ff713141394 2 API calls 2459->2460 2461 7ff713141521 2460->2461 2462 7ff713141394 2 API calls 2461->2462 2463 7ff713141530 2462->2463 2464 7ff71314153f 2463->2464 2465 7ff713141394 2 API calls 2463->2465 2466 7ff713141394 2 API calls 2464->2466 2465->2464 2467 7ff71314154e 2466->2467 2468 7ff713141394 2 API calls 2467->2468 2469 7ff713141558 2468->2469 2470 7ff71314155d 2469->2470 2471 7ff713141394 2 API calls 2469->2471 2472 7ff713141394 2 API calls 2470->2472 2471->2470 2473 7ff713141567 2472->2473 2474 7ff71314156c 2473->2474 2475 7ff713141394 2 API calls 2473->2475 2476 7ff713141394 2 API calls 2474->2476 2475->2474 2477 7ff71314157b 2476->2477 2478 7ff713141394 2 API calls 2477->2478 2479 7ff71314158a 2478->2479 2480 7ff713141394 2 API calls 2479->2480 2481 7ff713141599 2480->2481 2482 7ff713141394 2 API calls 2481->2482 2483 7ff7131415a8 2482->2483 2484 7ff713141394 2 API calls 2483->2484 2485 7ff7131415b7 2484->2485 2486 7ff713141394 2 API calls 2485->2486 2487 7ff7131415c1 2486->2487 2488 7ff7131415c6 2487->2488 2489 7ff713141394 2 API calls 2487->2489 2490 7ff713141394 2 API calls 2488->2490 2489->2488 2491 7ff7131415d0 2490->2491 2492 7ff7131415d5 2491->2492 2493 7ff713141394 2 API calls 2491->2493 2494 7ff713141394 2 API calls 2492->2494 2493->2492 2495 7ff7131415e4 2494->2495 2496 7ff713141394 2 API calls 2495->2496 2497 7ff7131415f3 2496->2497 2497->2156 2499 7ff713141394 2 API calls 2498->2499 2500 7ff713141440 2499->2500 2501 7ff713141394 2 API calls 2500->2501 2502 7ff71314144f 2501->2502 2503 7ff713141394 2 API calls 2502->2503 2504 7ff713141459 2503->2504 2505 7ff71314145e 2504->2505 2506 7ff713141394 2 API calls 2504->2506 2507 7ff713141394 2 API calls 2505->2507 2506->2505 2508 7ff71314146d 2507->2508 2509 7ff713141394 2 API calls 2508->2509 2510 7ff713141477 2509->2510 2511 7ff71314147c 2510->2511 2512 7ff713141394 2 API calls 2510->2512 2513 7ff713141394 2 API calls 2511->2513 2512->2511 2514 7ff713141486 2513->2514 2515 7ff71314148b 2514->2515 2516 7ff713141394 2 API calls 2514->2516 2517 7ff713141394 2 API calls 2515->2517 2516->2515 2518 7ff713141495 2517->2518 2519 7ff71314149a 2518->2519 2520 7ff713141394 2 API calls 2518->2520 2521 7ff713141394 2 API calls 2519->2521 2520->2519 2522 7ff7131414a4 2521->2522 2523 7ff7131414a9 2522->2523 2524 7ff713141394 2 API calls 2522->2524 2525 7ff713141394 2 API calls 2523->2525 2524->2523 2526 7ff7131414b3 2525->2526 2527 7ff7131414b8 2526->2527 2528 7ff713141394 2 API calls 2526->2528 2529 7ff713141394 2 API calls 2527->2529 2528->2527 2530 7ff7131414c2 2529->2530 2531 7ff7131414c7 2530->2531 2532 7ff713141394 2 API calls 2530->2532 2533 7ff713141394 2 API calls 2531->2533 2532->2531 2534 7ff7131414d6 2533->2534 2535 7ff713141394 2 API calls 2534->2535 2536 7ff7131414e0 2535->2536 2537 7ff713141394 2 API calls 2536->2537 2538 7ff7131414e5 2537->2538 2539 7ff713141394 2 API calls 2538->2539 2540 7ff7131414f4 2539->2540 2541 7ff713141394 2 API calls 2540->2541 2542 7ff713141503 2541->2542 2543 7ff713141394 2 API calls 2542->2543 2544 7ff713141512 2543->2544 2545 7ff713141394 2 API calls 2544->2545 2546 7ff713141521 2545->2546 2547 7ff713141394 2 API calls 2546->2547 2548 7ff713141530 2547->2548 2549 7ff71314153f 2548->2549 2550 7ff713141394 2 API calls 2548->2550 2551 7ff713141394 2 API calls 2549->2551 2550->2549 2552 7ff71314154e 2551->2552 2553 7ff713141394 2 API calls 2552->2553 2554 7ff713141558 2553->2554 2555 7ff71314155d 2554->2555 2556 7ff713141394 2 API calls 2554->2556 2557 7ff713141394 2 API calls 2555->2557 2556->2555 2558 7ff713141567 2557->2558 2559 7ff71314156c 2558->2559 2560 7ff713141394 2 API calls 2558->2560 2561 7ff713141394 2 API calls 2559->2561 2560->2559 2562 7ff71314157b 2561->2562 2563 7ff713141394 2 API calls 2562->2563 2564 7ff71314158a 2563->2564 2565 7ff713141394 2 API calls 2564->2565 2566 7ff713141599 2565->2566 2567 7ff713141394 2 API calls 2566->2567 2568 7ff7131415a8 2567->2568 2569 7ff713141394 2 API calls 2568->2569 2570 7ff7131415b7 2569->2570 2571 7ff713141394 2 API calls 2570->2571 2572 7ff7131415c1 2571->2572 2573 7ff7131415c6 2572->2573 2574 7ff713141394 2 API calls 2572->2574 2575 7ff713141394 2 API calls 2573->2575 2574->2573 2576 7ff7131415d0 2575->2576 2577 7ff7131415d5 2576->2577 2578 7ff713141394 2 API calls 2576->2578 2579 7ff713141394 2 API calls 2577->2579 2578->2577 2580 7ff7131415e4 2579->2580 2581 7ff713141394 2 API calls 2580->2581 2582 7ff7131415f3 2581->2582 2582->2160 2584 7ff713141394 2 API calls 2583->2584 2585 7ff7131414d6 2584->2585 2586 7ff713141394 2 API calls 2585->2586 2587 7ff7131414e0 2586->2587 2588 7ff713141394 2 API calls 2587->2588 2589 7ff7131414e5 2588->2589 2590 7ff713141394 2 API calls 2589->2590 2591 7ff7131414f4 2590->2591 2592 7ff713141394 2 API calls 2591->2592 2593 7ff713141503 2592->2593 2594 7ff713141394 2 API calls 2593->2594 2595 7ff713141512 2594->2595 2596 7ff713141394 2 API calls 2595->2596 2597 7ff713141521 2596->2597 2598 7ff713141394 2 API calls 2597->2598 2599 7ff713141530 2598->2599 2600 7ff71314153f 2599->2600 2601 7ff713141394 2 API calls 2599->2601 2602 7ff713141394 2 API calls 2600->2602 2601->2600 2603 7ff71314154e 2602->2603 2604 7ff713141394 2 API calls 2603->2604 2605 7ff713141558 2604->2605 2606 7ff71314155d 2605->2606 2607 7ff713141394 2 API calls 2605->2607 2608 7ff713141394 2 API calls 2606->2608 2607->2606 2609 7ff713141567 2608->2609 2610 7ff71314156c 2609->2610 2611 7ff713141394 2 API calls 2609->2611 2612 7ff713141394 2 API calls 2610->2612 2611->2610 2613 7ff71314157b 2612->2613 2614 7ff713141394 2 API calls 2613->2614 2615 7ff71314158a 2614->2615 2616 7ff713141394 2 API calls 2615->2616 2617 7ff713141599 2616->2617 2618 7ff713141394 2 API calls 2617->2618 2619 7ff7131415a8 2618->2619 2620 7ff713141394 2 API calls 2619->2620 2621 7ff7131415b7 2620->2621 2622 7ff713141394 2 API calls 2621->2622 2623 7ff7131415c1 2622->2623 2624 7ff7131415c6 2623->2624 2625 7ff713141394 2 API calls 2623->2625 2626 7ff713141394 2 API calls 2624->2626 2625->2624 2627 7ff7131415d0 2626->2627 2628 7ff7131415d5 2627->2628 2629 7ff713141394 2 API calls 2627->2629 2630 7ff713141394 2 API calls 2628->2630 2629->2628 2631 7ff7131415e4 2630->2631 2632 7ff713141394 2 API calls 2631->2632 2633 7ff7131415f3 memset 2632->2633 2633->2163 3008 7ff71314155d 2634->3008 2636 7ff7131427f4 2638 7ff7131414c7 2 API calls 2636->2638 2637 7ff713142d27 2641 7ff713142816 2638->2641 2640 7ff713142785 wcsncmp 3035 7ff7131414e5 2640->3035 2643 7ff713141503 2 API calls 2641->2643 2644 7ff71314283d 2643->2644 2645 7ff713142847 memset 2644->2645 2647 7ff713142877 2645->2647 2646 7ff7131428bc wcscpy wcscat wcslen 2648 7ff71314291a 2646->2648 2649 7ff7131428ee wcslen 2646->2649 2647->2646 2650 7ff713142967 wcslen 2648->2650 2652 7ff713142985 2648->2652 2649->2648 2650->2652 2651 7ff7131429d9 wcslen 2653 7ff7131414a9 2 API calls 2651->2653 2652->2637 2652->2651 2654 7ff713142a73 2653->2654 2655 7ff7131414a9 2 API calls 2654->2655 2656 7ff713142bd2 2655->2656 3080 7ff7131414f4 2656->3080 2659 7ff7131414c7 2 API calls 2660 7ff713142c99 2659->2660 2661 7ff7131414c7 2 API calls 2660->2661 2662 7ff713142cb1 2661->2662 2663 7ff71314145e 2 API calls 2662->2663 2664 7ff713142cbb 2663->2664 2665 7ff71314145e 2 API calls 2664->2665 2666 7ff713142cc5 2665->2666 2666->2204 2667 7ff7131414a9 2666->2667 2668 7ff713141394 2 API calls 2667->2668 2669 7ff7131414b3 2668->2669 2670 7ff7131414b8 2669->2670 2671 7ff713141394 2 API calls 2669->2671 2672 7ff713141394 2 API calls 2670->2672 2671->2670 2673 7ff7131414c2 2672->2673 2674 7ff7131414c7 2673->2674 2675 7ff713141394 2 API calls 2673->2675 2676 7ff713141394 2 API calls 2674->2676 2675->2674 2677 7ff7131414d6 2676->2677 2678 7ff713141394 2 API calls 2677->2678 2679 7ff7131414e0 2678->2679 2680 7ff713141394 2 API calls 2679->2680 2681 7ff7131414e5 2680->2681 2682 7ff713141394 2 API calls 2681->2682 2683 7ff7131414f4 2682->2683 2684 7ff713141394 2 API calls 2683->2684 2685 7ff713141503 2684->2685 2686 7ff713141394 2 API calls 2685->2686 2687 7ff713141512 2686->2687 2688 7ff713141394 2 API calls 2687->2688 2689 7ff713141521 2688->2689 2690 7ff713141394 2 API calls 2689->2690 2691 7ff713141530 2690->2691 2692 7ff71314153f 2691->2692 2693 7ff713141394 2 API calls 2691->2693 2694 7ff713141394 2 API calls 2692->2694 2693->2692 2695 7ff71314154e 2694->2695 2696 7ff713141394 2 API calls 2695->2696 2697 7ff713141558 2696->2697 2698 7ff71314155d 2697->2698 2699 7ff713141394 2 API calls 2697->2699 2700 7ff713141394 2 API calls 2698->2700 2699->2698 2701 7ff713141567 2700->2701 2702 7ff71314156c 2701->2702 2703 7ff713141394 2 API calls 2701->2703 2704 7ff713141394 2 API calls 2702->2704 2703->2702 2705 7ff71314157b 2704->2705 2706 7ff713141394 2 API calls 2705->2706 2707 7ff71314158a 2706->2707 2708 7ff713141394 2 API calls 2707->2708 2709 7ff713141599 2708->2709 2710 7ff713141394 2 API calls 2709->2710 2711 7ff7131415a8 2710->2711 2712 7ff713141394 2 API calls 2711->2712 2713 7ff7131415b7 2712->2713 2714 7ff713141394 2 API calls 2713->2714 2715 7ff7131415c1 2714->2715 2716 7ff7131415c6 2715->2716 2717 7ff713141394 2 API calls 2715->2717 2718 7ff713141394 2 API calls 2716->2718 2717->2716 2719 7ff7131415d0 2718->2719 2720 7ff7131415d5 2719->2720 2721 7ff713141394 2 API calls 2719->2721 2722 7ff713141394 2 API calls 2720->2722 2721->2720 2723 7ff7131415e4 2722->2723 2724 7ff713141394 2 API calls 2723->2724 2725 7ff7131415f3 2724->2725 2725->2189 2725->2190 2727 7ff713141394 2 API calls 2726->2727 2728 7ff7131414c2 2727->2728 2729 7ff7131414c7 2728->2729 2730 7ff713141394 2 API calls 2728->2730 2731 7ff713141394 2 API calls 2729->2731 2730->2729 2732 7ff7131414d6 2731->2732 2733 7ff713141394 2 API calls 2732->2733 2734 7ff7131414e0 2733->2734 2735 7ff713141394 2 API calls 2734->2735 2736 7ff7131414e5 2735->2736 2737 7ff713141394 2 API calls 2736->2737 2738 7ff7131414f4 2737->2738 2739 7ff713141394 2 API calls 2738->2739 2740 7ff713141503 2739->2740 2741 7ff713141394 2 API calls 2740->2741 2742 7ff713141512 2741->2742 2743 7ff713141394 2 API calls 2742->2743 2744 7ff713141521 2743->2744 2745 7ff713141394 2 API calls 2744->2745 2746 7ff713141530 2745->2746 2747 7ff71314153f 2746->2747 2748 7ff713141394 2 API calls 2746->2748 2749 7ff713141394 2 API calls 2747->2749 2748->2747 2750 7ff71314154e 2749->2750 2751 7ff713141394 2 API calls 2750->2751 2752 7ff713141558 2751->2752 2753 7ff71314155d 2752->2753 2754 7ff713141394 2 API calls 2752->2754 2755 7ff713141394 2 API calls 2753->2755 2754->2753 2756 7ff713141567 2755->2756 2757 7ff71314156c 2756->2757 2758 7ff713141394 2 API calls 2756->2758 2759 7ff713141394 2 API calls 2757->2759 2758->2757 2760 7ff71314157b 2759->2760 2761 7ff713141394 2 API calls 2760->2761 2762 7ff71314158a 2761->2762 2763 7ff713141394 2 API calls 2762->2763 2764 7ff713141599 2763->2764 2765 7ff713141394 2 API calls 2764->2765 2766 7ff7131415a8 2765->2766 2767 7ff713141394 2 API calls 2766->2767 2768 7ff7131415b7 2767->2768 2769 7ff713141394 2 API calls 2768->2769 2770 7ff7131415c1 2769->2770 2771 7ff7131415c6 2770->2771 2772 7ff713141394 2 API calls 2770->2772 2773 7ff713141394 2 API calls 2771->2773 2772->2771 2774 7ff7131415d0 2773->2774 2775 7ff7131415d5 2774->2775 2776 7ff713141394 2 API calls 2774->2776 2777 7ff713141394 2 API calls 2775->2777 2776->2775 2778 7ff7131415e4 2777->2778 2779 7ff713141394 2 API calls 2778->2779 2780 7ff7131415f3 2779->2780 2780->2198 2782 7ff713141394 2 API calls 2781->2782 2783 7ff7131415e4 2782->2783 2784 7ff713141394 2 API calls 2783->2784 2785 7ff7131415f3 2784->2785 2785->2198 2787 7ff713141394 2 API calls 2786->2787 2788 7ff713141495 2787->2788 2789 7ff71314149a 2788->2789 2790 7ff713141394 2 API calls 2788->2790 2791 7ff713141394 2 API calls 2789->2791 2790->2789 2792 7ff7131414a4 2791->2792 2793 7ff7131414a9 2792->2793 2794 7ff713141394 2 API calls 2792->2794 2795 7ff713141394 2 API calls 2793->2795 2794->2793 2796 7ff7131414b3 2795->2796 2797 7ff7131414b8 2796->2797 2798 7ff713141394 2 API calls 2796->2798 2799 7ff713141394 2 API calls 2797->2799 2798->2797 2800 7ff7131414c2 2799->2800 2801 7ff7131414c7 2800->2801 2802 7ff713141394 2 API calls 2800->2802 2803 7ff713141394 2 API calls 2801->2803 2802->2801 2804 7ff7131414d6 2803->2804 2805 7ff713141394 2 API calls 2804->2805 2806 7ff7131414e0 2805->2806 2807 7ff713141394 2 API calls 2806->2807 2808 7ff7131414e5 2807->2808 2809 7ff713141394 2 API calls 2808->2809 2810 7ff7131414f4 2809->2810 2811 7ff713141394 2 API calls 2810->2811 2812 7ff713141503 2811->2812 2813 7ff713141394 2 API calls 2812->2813 2814 7ff713141512 2813->2814 2815 7ff713141394 2 API calls 2814->2815 2816 7ff713141521 2815->2816 2817 7ff713141394 2 API calls 2816->2817 2818 7ff713141530 2817->2818 2819 7ff71314153f 2818->2819 2820 7ff713141394 2 API calls 2818->2820 2821 7ff713141394 2 API calls 2819->2821 2820->2819 2822 7ff71314154e 2821->2822 2823 7ff713141394 2 API calls 2822->2823 2824 7ff713141558 2823->2824 2825 7ff71314155d 2824->2825 2826 7ff713141394 2 API calls 2824->2826 2827 7ff713141394 2 API calls 2825->2827 2826->2825 2828 7ff713141567 2827->2828 2829 7ff71314156c 2828->2829 2830 7ff713141394 2 API calls 2828->2830 2831 7ff713141394 2 API calls 2829->2831 2830->2829 2832 7ff71314157b 2831->2832 2833 7ff713141394 2 API calls 2832->2833 2834 7ff71314158a 2833->2834 2835 7ff713141394 2 API calls 2834->2835 2836 7ff713141599 2835->2836 2837 7ff713141394 2 API calls 2836->2837 2838 7ff7131415a8 2837->2838 2839 7ff713141394 2 API calls 2838->2839 2840 7ff7131415b7 2839->2840 2841 7ff713141394 2 API calls 2840->2841 2842 7ff7131415c1 2841->2842 2843 7ff7131415c6 2842->2843 2844 7ff713141394 2 API calls 2842->2844 2845 7ff713141394 2 API calls 2843->2845 2844->2843 2846 7ff7131415d0 2845->2846 2847 7ff7131415d5 2846->2847 2848 7ff713141394 2 API calls 2846->2848 2849 7ff713141394 2 API calls 2847->2849 2848->2847 2850 7ff7131415e4 2849->2850 2851 7ff713141394 2 API calls 2850->2851 2852 7ff7131415f3 2851->2852 2852->2199 2853 7ff71314149a 2852->2853 2854 7ff713141394 2 API calls 2853->2854 2855 7ff7131414a4 2854->2855 2856 7ff7131414a9 2855->2856 2857 7ff713141394 2 API calls 2855->2857 2858 7ff713141394 2 API calls 2856->2858 2857->2856 2859 7ff7131414b3 2858->2859 2860 7ff7131414b8 2859->2860 2861 7ff713141394 2 API calls 2859->2861 2862 7ff713141394 2 API calls 2860->2862 2861->2860 2863 7ff7131414c2 2862->2863 2864 7ff7131414c7 2863->2864 2865 7ff713141394 2 API calls 2863->2865 2866 7ff713141394 2 API calls 2864->2866 2865->2864 2867 7ff7131414d6 2866->2867 2868 7ff713141394 2 API calls 2867->2868 2869 7ff7131414e0 2868->2869 2870 7ff713141394 2 API calls 2869->2870 2871 7ff7131414e5 2870->2871 2872 7ff713141394 2 API calls 2871->2872 2873 7ff7131414f4 2872->2873 2874 7ff713141394 2 API calls 2873->2874 2875 7ff713141503 2874->2875 2876 7ff713141394 2 API calls 2875->2876 2877 7ff713141512 2876->2877 2878 7ff713141394 2 API calls 2877->2878 2879 7ff713141521 2878->2879 2880 7ff713141394 2 API calls 2879->2880 2881 7ff713141530 2880->2881 2882 7ff71314153f 2881->2882 2883 7ff713141394 2 API calls 2881->2883 2884 7ff713141394 2 API calls 2882->2884 2883->2882 2885 7ff71314154e 2884->2885 2886 7ff713141394 2 API calls 2885->2886 2887 7ff713141558 2886->2887 2888 7ff71314155d 2887->2888 2889 7ff713141394 2 API calls 2887->2889 2890 7ff713141394 2 API calls 2888->2890 2889->2888 2891 7ff713141567 2890->2891 2892 7ff71314156c 2891->2892 2893 7ff713141394 2 API calls 2891->2893 2894 7ff713141394 2 API calls 2892->2894 2893->2892 2895 7ff71314157b 2894->2895 2896 7ff713141394 2 API calls 2895->2896 2897 7ff71314158a 2896->2897 2898 7ff713141394 2 API calls 2897->2898 2899 7ff713141599 2898->2899 2900 7ff713141394 2 API calls 2899->2900 2901 7ff7131415a8 2900->2901 2902 7ff713141394 2 API calls 2901->2902 2903 7ff7131415b7 2902->2903 2904 7ff713141394 2 API calls 2903->2904 2905 7ff7131415c1 2904->2905 2906 7ff7131415c6 2905->2906 2907 7ff713141394 2 API calls 2905->2907 2908 7ff713141394 2 API calls 2906->2908 2907->2906 2909 7ff7131415d0 2908->2909 2910 7ff7131415d5 2909->2910 2911 7ff713141394 2 API calls 2909->2911 2912 7ff713141394 2 API calls 2910->2912 2911->2910 2913 7ff7131415e4 2912->2913 2914 7ff713141394 2 API calls 2913->2914 2915 7ff7131415f3 2914->2915 2915->2199 2915->2205 2917 7ff713141394 2 API calls 2916->2917 2918 7ff713141486 2917->2918 2919 7ff71314148b 2918->2919 2920 7ff713141394 2 API calls 2918->2920 2921 7ff713141394 2 API calls 2919->2921 2920->2919 2922 7ff713141495 2921->2922 2923 7ff71314149a 2922->2923 2924 7ff713141394 2 API calls 2922->2924 2925 7ff713141394 2 API calls 2923->2925 2924->2923 2926 7ff7131414a4 2925->2926 2927 7ff7131414a9 2926->2927 2928 7ff713141394 2 API calls 2926->2928 2929 7ff713141394 2 API calls 2927->2929 2928->2927 2930 7ff7131414b3 2929->2930 2931 7ff7131414b8 2930->2931 2932 7ff713141394 2 API calls 2930->2932 2933 7ff713141394 2 API calls 2931->2933 2932->2931 2934 7ff7131414c2 2933->2934 2935 7ff7131414c7 2934->2935 2936 7ff713141394 2 API calls 2934->2936 2937 7ff713141394 2 API calls 2935->2937 2936->2935 2938 7ff7131414d6 2937->2938 2939 7ff713141394 2 API calls 2938->2939 2940 7ff7131414e0 2939->2940 2941 7ff713141394 2 API calls 2940->2941 2942 7ff7131414e5 2941->2942 2943 7ff713141394 2 API calls 2942->2943 2944 7ff7131414f4 2943->2944 2945 7ff713141394 2 API calls 2944->2945 2946 7ff713141503 2945->2946 2947 7ff713141394 2 API calls 2946->2947 2948 7ff713141512 2947->2948 2949 7ff713141394 2 API calls 2948->2949 2950 7ff713141521 2949->2950 2951 7ff713141394 2 API calls 2950->2951 2952 7ff713141530 2951->2952 2953 7ff71314153f 2952->2953 2954 7ff713141394 2 API calls 2952->2954 2955 7ff713141394 2 API calls 2953->2955 2954->2953 2956 7ff71314154e 2955->2956 2957 7ff713141394 2 API calls 2956->2957 2958 7ff713141558 2957->2958 2959 7ff71314155d 2958->2959 2960 7ff713141394 2 API calls 2958->2960 2961 7ff713141394 2 API calls 2959->2961 2960->2959 2962 7ff713141567 2961->2962 2963 7ff71314156c 2962->2963 2964 7ff713141394 2 API calls 2962->2964 2965 7ff713141394 2 API calls 2963->2965 2964->2963 2966 7ff71314157b 2965->2966 2967 7ff713141394 2 API calls 2966->2967 2968 7ff71314158a 2967->2968 2969 7ff713141394 2 API calls 2968->2969 2970 7ff713141599 2969->2970 2971 7ff713141394 2 API calls 2970->2971 2972 7ff7131415a8 2971->2972 2973 7ff713141394 2 API calls 2972->2973 2974 7ff7131415b7 2973->2974 2975 7ff713141394 2 API calls 2974->2975 2976 7ff7131415c1 2975->2976 2977 7ff7131415c6 2976->2977 2978 7ff713141394 2 API calls 2976->2978 2979 7ff713141394 2 API calls 2977->2979 2978->2977 2980 7ff7131415d0 2979->2980 2981 7ff7131415d5 2980->2981 2982 7ff713141394 2 API calls 2980->2982 2983 7ff713141394 2 API calls 2981->2983 2982->2981 2984 7ff7131415e4 2983->2984 2985 7ff713141394 2 API calls 2984->2985 2986 7ff7131415f3 2985->2986 2986->2210 2988 7ff713141394 2 API calls 2987->2988 2989 7ff7131415d0 2988->2989 2990 7ff7131415d5 2989->2990 2991 7ff713141394 2 API calls 2989->2991 2992 7ff713141394 2 API calls 2990->2992 2991->2990 2993 7ff7131415e4 2992->2993 2994 7ff713141394 2 API calls 2993->2994 2995 7ff7131415f3 2994->2995 2995->2204 3000 7ff7131456d0 2996->3000 2998 7ff7131413b8 2999 7ff7131413c6 NtReplyWaitReceivePort 2998->2999 2999->2223 3001 7ff7131456ee 3000->3001 3004 7ff71314571b 3000->3004 3001->2998 3002 7ff7131457c3 3003 7ff7131457df malloc 3002->3003 3005 7ff713145800 3003->3005 3004->3001 3004->3002 3005->3001 3007 7ff71314266f memset 3006->3007 3007->2402 3009 7ff713141394 2 API calls 3008->3009 3010 7ff713141567 3009->3010 3011 7ff71314156c 3010->3011 3012 7ff713141394 2 API calls 3010->3012 3013 7ff713141394 2 API calls 3011->3013 3012->3011 3014 7ff71314157b 3013->3014 3015 7ff713141394 2 API calls 3014->3015 3016 7ff71314158a 3015->3016 3017 7ff713141394 2 API calls 3016->3017 3018 7ff713141599 3017->3018 3019 7ff713141394 2 API calls 3018->3019 3020 7ff7131415a8 3019->3020 3021 7ff713141394 2 API calls 3020->3021 3022 7ff7131415b7 3021->3022 3023 7ff713141394 2 API calls 3022->3023 3024 7ff7131415c1 3023->3024 3025 7ff7131415c6 3024->3025 3026 7ff713141394 2 API calls 3024->3026 3027 7ff713141394 2 API calls 3025->3027 3026->3025 3028 7ff7131415d0 3027->3028 3029 7ff7131415d5 3028->3029 3030 7ff713141394 2 API calls 3028->3030 3031 7ff713141394 2 API calls 3029->3031 3030->3029 3032 7ff7131415e4 3031->3032 3033 7ff713141394 2 API calls 3032->3033 3034 7ff7131415f3 3033->3034 3034->2636 3034->2637 3034->2640 3036 7ff713141394 2 API calls 3035->3036 3037 7ff7131414f4 3036->3037 3038 7ff713141394 2 API calls 3037->3038 3039 7ff713141503 3038->3039 3040 7ff713141394 2 API calls 3039->3040 3041 7ff713141512 3040->3041 3042 7ff713141394 2 API calls 3041->3042 3043 7ff713141521 3042->3043 3044 7ff713141394 2 API calls 3043->3044 3045 7ff713141530 3044->3045 3046 7ff71314153f 3045->3046 3047 7ff713141394 2 API calls 3045->3047 3048 7ff713141394 2 API calls 3046->3048 3047->3046 3049 7ff71314154e 3048->3049 3050 7ff713141394 2 API calls 3049->3050 3051 7ff713141558 3050->3051 3052 7ff71314155d 3051->3052 3053 7ff713141394 2 API calls 3051->3053 3054 7ff713141394 2 API calls 3052->3054 3053->3052 3055 7ff713141567 3054->3055 3056 7ff71314156c 3055->3056 3057 7ff713141394 2 API calls 3055->3057 3058 7ff713141394 2 API calls 3056->3058 3057->3056 3059 7ff71314157b 3058->3059 3060 7ff713141394 2 API calls 3059->3060 3061 7ff71314158a 3060->3061 3062 7ff713141394 2 API calls 3061->3062 3063 7ff713141599 3062->3063 3064 7ff713141394 2 API calls 3063->3064 3065 7ff7131415a8 3064->3065 3066 7ff713141394 2 API calls 3065->3066 3067 7ff7131415b7 3066->3067 3068 7ff713141394 2 API calls 3067->3068 3069 7ff7131415c1 3068->3069 3070 7ff7131415c6 3069->3070 3071 7ff713141394 2 API calls 3069->3071 3072 7ff713141394 2 API calls 3070->3072 3071->3070 3073 7ff7131415d0 3072->3073 3074 7ff7131415d5 3073->3074 3075 7ff713141394 2 API calls 3073->3075 3076 7ff713141394 2 API calls 3074->3076 3075->3074 3077 7ff7131415e4 3076->3077 3078 7ff713141394 2 API calls 3077->3078 3079 7ff7131415f3 3078->3079 3079->2636 3081 7ff713141394 2 API calls 3080->3081 3082 7ff713141503 3081->3082 3083 7ff713141394 2 API calls 3082->3083 3084 7ff713141512 3083->3084 3085 7ff713141394 2 API calls 3084->3085 3086 7ff713141521 3085->3086 3087 7ff713141394 2 API calls 3086->3087 3088 7ff713141530 3087->3088 3089 7ff71314153f 3088->3089 3090 7ff713141394 2 API calls 3088->3090 3091 7ff713141394 2 API calls 3089->3091 3090->3089 3092 7ff71314154e 3091->3092 3093 7ff713141394 2 API calls 3092->3093 3094 7ff713141558 3093->3094 3095 7ff71314155d 3094->3095 3096 7ff713141394 2 API calls 3094->3096 3097 7ff713141394 2 API calls 3095->3097 3096->3095 3098 7ff713141567 3097->3098 3099 7ff71314156c 3098->3099 3100 7ff713141394 2 API calls 3098->3100 3101 7ff713141394 2 API calls 3099->3101 3100->3099 3102 7ff71314157b 3101->3102 3103 7ff713141394 2 API calls 3102->3103 3104 7ff71314158a 3103->3104 3105 7ff713141394 2 API calls 3104->3105 3106 7ff713141599 3105->3106 3107 7ff713141394 2 API calls 3106->3107 3108 7ff7131415a8 3107->3108 3109 7ff713141394 2 API calls 3108->3109 3110 7ff7131415b7 3109->3110 3111 7ff713141394 2 API calls 3110->3111 3112 7ff7131415c1 3111->3112 3113 7ff7131415c6 3112->3113 3114 7ff713141394 2 API calls 3112->3114 3115 7ff713141394 2 API calls 3113->3115 3114->3113 3116 7ff7131415d0 3115->3116 3117 7ff7131415d5 3116->3117 3118 7ff713141394 2 API calls 3116->3118 3119 7ff713141394 2 API calls 3117->3119 3118->3117 3120 7ff7131415e4 3119->3120 3121 7ff713141394 2 API calls 3120->3121 3122 7ff7131415f3 3121->3122 3122->2659 3160 7ff713142320 strlen 3161 7ff713142337 3160->3161 3170 7ff713141000 3171 7ff71314108b __set_app_type 3170->3171 3172 7ff713141040 3170->3172 3173 7ff7131410b6 3171->3173 3172->3171 3174 7ff7131410e5 3173->3174 3176 7ff713141e00 3173->3176 3177 7ff713145c60 __setusermatherr 3176->3177 3178 7ff713141800 3179 7ff713141812 3178->3179 3180 7ff713141835 fprintf 3179->3180 3292 7ff713141e65 3293 7ff713141e67 signal 3292->3293 3294 7ff713141e7c 3293->3294 3296 7ff713141e99 3293->3296 3295 7ff713141e82 signal 3294->3295 3294->3296 3295->3296 3181 7ff713141404 3182 7ff713141394 2 API calls 3181->3182 3183 7ff713141413 3182->3183 3184 7ff713141422 3183->3184 3185 7ff713141394 2 API calls 3183->3185 3186 7ff713141394 2 API calls 3184->3186 3185->3184 3187 7ff71314142c 3186->3187 3188 7ff713141431 3187->3188 3189 7ff713141394 2 API calls 3187->3189 3190 7ff713141394 2 API calls 3188->3190 3189->3188 3191 7ff713141440 3190->3191 3192 7ff713141394 2 API calls 3191->3192 3193 7ff71314144f 3192->3193 3194 7ff713141394 2 API calls 3193->3194 3195 7ff713141459 3194->3195 3196 7ff71314145e 3195->3196 3197 7ff713141394 2 API calls 3195->3197 3198 7ff713141394 2 API calls 3196->3198 3197->3196 3199 7ff71314146d 3198->3199 3200 7ff713141394 2 API calls 3199->3200 3201 7ff713141477 3200->3201 3202 7ff71314147c 3201->3202 3203 7ff713141394 2 API calls 3201->3203 3204 7ff713141394 2 API calls 3202->3204 3203->3202 3205 7ff713141486 3204->3205 3206 7ff71314148b 3205->3206 3207 7ff713141394 2 API calls 3205->3207 3208 7ff713141394 2 API calls 3206->3208 3207->3206 3209 7ff713141495 3208->3209 3210 7ff71314149a 3209->3210 3211 7ff713141394 2 API calls 3209->3211 3212 7ff713141394 2 API calls 3210->3212 3211->3210 3213 7ff7131414a4 3212->3213 3214 7ff7131414a9 3213->3214 3215 7ff713141394 2 API calls 3213->3215 3216 7ff713141394 2 API calls 3214->3216 3215->3214 3217 7ff7131414b3 3216->3217 3218 7ff7131414b8 3217->3218 3219 7ff713141394 2 API calls 3217->3219 3220 7ff713141394 2 API calls 3218->3220 3219->3218 3221 7ff7131414c2 3220->3221 3222 7ff7131414c7 3221->3222 3223 7ff713141394 2 API calls 3221->3223 3224 7ff713141394 2 API calls 3222->3224 3223->3222 3225 7ff7131414d6 3224->3225 3226 7ff713141394 2 API calls 3225->3226 3227 7ff7131414e0 3226->3227 3228 7ff713141394 2 API calls 3227->3228 3229 7ff7131414e5 3228->3229 3230 7ff713141394 2 API calls 3229->3230 3231 7ff7131414f4 3230->3231 3232 7ff713141394 2 API calls 3231->3232 3233 7ff713141503 3232->3233 3234 7ff713141394 2 API calls 3233->3234 3235 7ff713141512 3234->3235 3236 7ff713141394 2 API calls 3235->3236 3237 7ff713141521 3236->3237 3238 7ff713141394 2 API calls 3237->3238 3239 7ff713141530 3238->3239 3240 7ff71314153f 3239->3240 3241 7ff713141394 2 API calls 3239->3241 3242 7ff713141394 2 API calls 3240->3242 3241->3240 3243 7ff71314154e 3242->3243 3244 7ff713141394 2 API calls 3243->3244 3245 7ff713141558 3244->3245 3246 7ff71314155d 3245->3246 3247 7ff713141394 2 API calls 3245->3247 3248 7ff713141394 2 API calls 3246->3248 3247->3246 3249 7ff713141567 3248->3249 3250 7ff71314156c 3249->3250 3251 7ff713141394 2 API calls 3249->3251 3252 7ff713141394 2 API calls 3250->3252 3251->3250 3253 7ff71314157b 3252->3253 3254 7ff713141394 2 API calls 3253->3254 3255 7ff71314158a 3254->3255 3256 7ff713141394 2 API calls 3255->3256 3257 7ff713141599 3256->3257 3258 7ff713141394 2 API calls 3257->3258 3259 7ff7131415a8 3258->3259 3260 7ff713141394 2 API calls 3259->3260 3261 7ff7131415b7 3260->3261 3262 7ff713141394 2 API calls 3261->3262 3263 7ff7131415c1 3262->3263 3264 7ff7131415c6 3263->3264 3265 7ff713141394 2 API calls 3263->3265 3266 7ff713141394 2 API calls 3264->3266 3265->3264 3267 7ff7131415d0 3266->3267 3268 7ff7131415d5 3267->3268 3269 7ff713141394 2 API calls 3267->3269 3270 7ff713141394 2 API calls 3268->3270 3269->3268 3271 7ff7131415e4 3270->3271 3272 7ff713141394 2 API calls 3271->3272 3273 7ff7131415f3 3272->3273 3274 7ff713142104 3275 7ff713142218 3274->3275 3276 7ff713142111 EnterCriticalSection 3274->3276 3277 7ff713142272 3275->3277 3279 7ff713142241 DeleteCriticalSection 3275->3279 3281 7ff713142230 free 3275->3281 3278 7ff71314220b LeaveCriticalSection 3276->3278 3282 7ff71314212e 3276->3282 3278->3275 3279->3277 3280 7ff71314214d TlsGetValue GetLastError 3280->3282 3281->3279 3281->3281 3282->3278 3282->3280 3297 7ff713141ae4 3298 7ff713141ae7 3297->3298 3299 7ff71314199e 3298->3299 3300 7ff713141b36 3298->3300 3302 7ff713141a0f 3298->3302 3299->3302 3303 7ff7131419e9 VirtualProtect 3299->3303 3301 7ff713141ba0 4 API calls 3300->3301 3304 7ff713141b53 3301->3304 3303->3299 3304->3304 3136 7ff713142050 3137 7ff71314205e EnterCriticalSection 3136->3137 3138 7ff7131420cf 3136->3138 3139 7ff7131420c2 LeaveCriticalSection 3137->3139 3140 7ff713142079 3137->3140 3139->3138 3140->3139 3141 7ff7131420bd free 3140->3141 3141->3139 3142 7ff713141fd0 3143 7ff713142033 3142->3143 3144 7ff713141fe4 3142->3144 3144->3143 3145 7ff713141ffd EnterCriticalSection LeaveCriticalSection 3144->3145 3145->3143 3283 7ff713141e10 3284 7ff713141e2f 3283->3284 3285 7ff713141ecc 3284->3285 3286 7ff713141e55 3284->3286 3290 7ff713141eb5 3284->3290 3287 7ff713141ed3 signal 3285->3287 3285->3290 3286->3290 3291 7ff713141f12 signal 3286->3291 3288 7ff713141ee4 3287->3288 3287->3290 3289 7ff713141eea signal 3288->3289 3288->3290 3289->3290 3291->3290 3305 7ff713141a70 3307 7ff71314199e 3305->3307 3309 7ff713141a7d 3305->3309 3306 7ff713141a0f 3307->3306 3308 7ff7131419e9 VirtualProtect 3307->3308 3308->3307 3310 7ff71314216f 3311 7ff713142178 InitializeCriticalSection 3310->3311 3312 7ff713142185 3310->3312 3311->3312 3162 7ff713141ab3 3163 7ff713141ade 3162->3163 3164 7ff71314199e 3163->3164 3165 7ff713141b36 3163->3165 3167 7ff713141a0f 3163->3167 3164->3167 3169 7ff7131419e9 VirtualProtect 3164->3169 3166 7ff713141ba0 4 API calls 3165->3166 3168 7ff713141b53 3166->3168 3169->3164

                                      Callgraph

                                      • Executed
                                      • Not Executed
                                      • Opacity -> Relevance
                                      • Disassembly available
                                      callgraph 0 Function_00007FF713143340 1 Function_00007FF713142F40 69 Function_00007FF7131414A9 1->69 71 Function_00007FF7131431B0 1->71 2 Function_00007FF713141D40 27 Function_00007FF713142290 2->27 3 Function_00007FF713141140 34 Function_00007FF713141160 3->34 4 Function_00007FF71314153F 29 Function_00007FF713141394 4->29 5 Function_00007FF713141F47 42 Function_00007FF713141870 5->42 6 Function_00007FF713145651 7 Function_00007FF713145551 8 Function_00007FF713145451 9 Function_00007FF713142050 10 Function_00007FF713141750 11 Function_00007FF713141650 12 Function_00007FF713141422 12->29 13 Function_00007FF713142420 14 Function_00007FF713142320 15 Function_00007FF713143320 16 Function_00007FF713141431 16->29 17 Function_00007FF713145531 18 Function_00007FF713145631 19 Function_00007FF71314147C 19->29 20 Function_00007FF713145681 21 Function_00007FF713145980 49 Function_00007FF7131456C0 21->49 22 Function_00007FF713141880 22->2 22->13 35 Function_00007FF713142660 22->35 66 Function_00007FF713141BA0 22->66 23 Function_00007FF71314148B 23->29 24 Function_00007FF713145491 25 Function_00007FF713142690 31 Function_00007FF71314145E 25->31 32 Function_00007FF71314155D 25->32 43 Function_00007FF713141370 25->43 25->49 54 Function_00007FF7131414C7 25->54 25->69 83 Function_00007FF713141503 25->83 93 Function_00007FF7131414E5 25->93 98 Function_00007FF7131414F4 25->98 26 Function_00007FF713141F90 28 Function_00007FF713142590 29->21 57 Function_00007FF7131456D0 29->57 30 Function_00007FF713142194 30->42 31->29 32->29 33 Function_00007FF713143360 33->1 33->4 33->12 33->16 33->19 33->23 33->25 33->31 33->35 39 Function_00007FF71314156C 33->39 33->43 46 Function_00007FF7131414B8 33->46 48 Function_00007FF7131416C0 33->48 33->49 52 Function_00007FF7131415C6 33->52 33->54 60 Function_00007FF7131415D5 33->60 62 Function_00007FF71314149A 33->62 33->69 33->83 96 Function_00007FF713142DF0 33->96 34->22 34->26 34->33 34->34 34->42 34->48 36 Function_00007FF713141760 89 Function_00007FF7131420E0 36->89 37 Function_00007FF713142460 38 Function_00007FF713141E65 38->42 39->29 40 Function_00007FF713145471 41 Function_00007FF713145571 44 Function_00007FF713141A70 44->2 45 Function_00007FF71314216F 46->29 47 Function_00007FF7131454C1 50 Function_00007FF713141FC0 51 Function_00007FF713142DC0 52->29 53 Function_00007FF713141AC3 53->2 53->66 54->29 55 Function_00007FF713141FD0 56 Function_00007FF7131424D0 57->49 58 Function_00007FF7131417D0 59 Function_00007FF7131455D0 60->29 61 Function_00007FF713141AD4 61->2 61->66 62->29 63 Function_00007FF71314219E 64 Function_00007FF713142DA1 65 Function_00007FF7131455A1 66->2 66->56 70 Function_00007FF7131423B0 66->70 67 Function_00007FF713141FA0 68 Function_00007FF7131456A0 69->29 71->43 72 Function_00007FF713141FB0 73 Function_00007FF7131422B0 74 Function_00007FF713141AB3 74->2 74->66 75 Function_00007FF713143301 76 Function_00007FF713145501 77 Function_00007FF713141E00 78 Function_00007FF713141000 78->10 78->50 78->72 78->77 79 Function_00007FF713141800 79->27 80 Function_00007FF713142500 81 Function_00007FF713141404 81->29 82 Function_00007FF713142104 83->29 84 Function_00007FF713145411 85 Function_00007FF713145511 86 Function_00007FF713145611 87 Function_00007FF713141E10 88 Function_00007FF7131454E1 90 Function_00007FF7131417E0 90->89 91 Function_00007FF7131422E0 92 Function_00007FF713142DE0 93->29 94 Function_00007FF713141AE4 94->2 94->66 95 Function_00007FF7131455F1 96->25 96->31 96->35 97 Function_00007FF7131410F0 98->29

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID: malloc$ExceptionFilterSleepUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                      • String ID:
                                      • API String ID: 2643109117-0
                                      • Opcode ID: bebc418685ff0a92bec838d353a27e5a1b5b60a0c22928657a2d21d0ca1b498a
                                      • Instruction ID: 72e0e0644d8d70d38d01c336790011e472c1205e0bbbd26ad9c06698364f4b29
                                      • Opcode Fuzzy Hash: bebc418685ff0a92bec838d353a27e5a1b5b60a0c22928657a2d21d0ca1b498a
                                      • Instruction Fuzzy Hash: 33516B31A19E06C4F7D0BB25F9503B9A3A1BF48BB0FC44435C90DA77A5EF6CA449A324

                                      Control-flow Graph

                                      APIs
                                      • NtReplyWaitReceivePort.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF713141156), ref: 00007FF7131413F7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID: PortReceiveReplyWait
                                      • String ID:
                                      • API String ID: 1070725034-0
                                      • Opcode ID: d1585fc5161d1d6673ba12f08301ed4f61ed1817c29683d53c5c899b1896a1fe
                                      • Instruction ID: 3d9f58921d29f28422898b6573022fe667965b04f1be55ddf67d7a8c0685ebca
                                      • Opcode Fuzzy Hash: d1585fc5161d1d6673ba12f08301ed4f61ed1817c29683d53c5c899b1896a1fe
                                      • Instruction Fuzzy Hash: B5F0EC7191DF41C6F790EB51F84002ABB60FB493A4B804835E98C63725EF3DE055DB60
                                      APIs
                                      Strings
                                      • LzTkYW9qcHppbXJnm4dlcNBicWxnY2J6MWhyZndienBibnRhbGpwem1tcmdkeGVwaGJxbGdjYnpxaHJml2J6cGxxzm9s3nm3TNVzK6lZMRgBEVEcFQwFCBAFUgUWDBQfFk4WBEwYBRRNBBxHIDc2UAUNFQlJbm9wVWhyZndienBXVBqdHTFw1Rw2csgVI2XfGTlwwxo4YtUn9QnJAzl63zTzCc4cMXDVO/AfyBYjZd8+/wDDFzhi1Sf1DskHOXrfNPMM, xrefs: 00007FF713144025
                                      • , xrefs: 00007FF7131443A2
                                      • LzTkYW9qcHppbXJnm4dlcNBicWxnY2J6MWhyZndienBibnRhbGpwem1tcmdkeGVwaGJxbGdjYnpxaHJmR2N6cGxxzm9s3nm3TNVzK6lZMRgBEVEcFQwFCBAFUgUWDBQfFk4WBEwYBRRNBBxHIDc2UAUNFQlJbm9wVWhyZndienBVb7qaHwrQ0h4N0s8XGMXYUHrSxR0DwtJJcNfP1QLa2Fp20MgJCtDSC3IvzxMYxdgOfdXFBwPC0hd3189uAtrYBHHX, xrefs: 00007FF713144A48
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID: memset$wcscatwcscpy$wcslen$_wcsnicmp
                                      • String ID: $LzTkYW9qcHppbXJnm4dlcNBicWxnY2J6MWhyZndienBibnRhbGpwem1tcmdkeGVwaGJxbGdjYnpxaHJmR2N6cGxxzm9s3nm3TNVzK6lZMRgBEVEcFQwFCBAFUgUWDBQfFk4WBEwYBRRNBBxHIDc2UAUNFQlJbm9wVWhyZndienBVb7qaHwrQ0h4N0s8XGMXYUHrSxR0DwtJJcNfP1QLa2Fp20MgJCtDSC3IvzxMYxdgOfdXFBwPC0hd3189uAtrYBHHX$LzTkYW9qcHppbXJnm4dlcNBicWxnY2J6MWhyZndienBibnRhbGpwem1tcmdkeGVwaGJxbGdjYnpxaHJml2J6cGxxzm9s3nm3TNVzK6lZMRgBEVEcFQwFCBAFUgUWDBQfFk4WBEwYBRRNBBxHIDc2UAUNFQlJbm9wVWhyZndienBXVBqdHTFw1Rw2csgVI2XfGTlwwxo4YtUn9QnJAzl63zTzCc4cMXDVO/AfyBYjZd8+/wDDFzhi1Sf1DskHOXrfNPMM
                                      • API String ID: 1988685654-1620403283
                                      • Opcode ID: 00b3fb73d79284be864696143d4ed43b1106f8c925a112bfb98a0e45e26ab95a
                                      • Instruction ID: 636730e4d415b2404992e267586b01ad8ae97f90fe6ea4c3053ba5194b2b02df
                                      • Opcode Fuzzy Hash: 00b3fb73d79284be864696143d4ed43b1106f8c925a112bfb98a0e45e26ab95a
                                      • Instruction Fuzzy Hash: 9A035F31D1CE8284F791AB29A8013F4F760BF55374FC45239D98C765A6EF6CA24DA328

                                      Control-flow Graph

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID: wcslen$memsetwcscatwcscpywcsncmp
                                      • String ID: 0$X$`
                                      • API String ID: 329590056-2527496196
                                      • Opcode ID: a422c0561cbdc233491463dce7cee76a60917532ea6e6c8712a506d372dd7c37
                                      • Instruction ID: 9c8b3ca25633a70143138cd75420dfd6d5c87fb207443e859bd67d286cac5ce4
                                      • Opcode Fuzzy Hash: a422c0561cbdc233491463dce7cee76a60917532ea6e6c8712a506d372dd7c37
                                      • Instruction Fuzzy Hash: AD025D32A08F8181F7A09B15F8043AAB7A0FB857B4F804235DA9D677A5EF7CD189D714

                                      Control-flow Graph

                                      APIs
                                      • VirtualQuery.KERNEL32(?,?,?,?,00007FF713146F00,00007FF713146F00,?,?,00007FF713140000,?,00007FF713141991), ref: 00007FF713141C63
                                      • VirtualProtect.KERNEL32(?,?,?,?,00007FF713146F00,00007FF713146F00,?,?,00007FF713140000,?,00007FF713141991), ref: 00007FF713141CC7
                                      • memcpy.MSVCRT ref: 00007FF713141CE0
                                      • GetLastError.KERNEL32(?,?,?,?,00007FF713146F00,00007FF713146F00,?,?,00007FF713140000,?,00007FF713141991), ref: 00007FF713141D23
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID: Virtual$ErrorLastProtectQuerymemcpy
                                      • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                      • API String ID: 2595394609-2123141913
                                      • Opcode ID: b885c6c3ff0e990206f1d918a340f4a738c9920fd8ce2c2cb7486e8877027f59
                                      • Instruction ID: 2765f6a82126f02dd0cab93a9ad2b8fbc314ef6ead17fb6d52a30fbfbbd03c89
                                      • Opcode Fuzzy Hash: b885c6c3ff0e990206f1d918a340f4a738c9920fd8ce2c2cb7486e8877027f59
                                      • Instruction Fuzzy Hash: 06419271B08E4681FA91AB41F8446B8A760EB85BE4FD44136CE0D677A5EF3CE54AD320

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID: CriticalSection$DeleteEnterErrorLastLeaveValuefree
                                      • String ID:
                                      • API String ID: 3326252324-0
                                      • Opcode ID: 34596cec3fff66ae64a6511ab5c1d2d0e3d88ae54fd79e52441a6861cc9c1675
                                      • Instruction ID: 1f901a438a7d3f5e8c2c62eb194a4b8e24d079968470c634ce36331b0885e7e2
                                      • Opcode Fuzzy Hash: 34596cec3fff66ae64a6511ab5c1d2d0e3d88ae54fd79e52441a6861cc9c1675
                                      • Instruction Fuzzy Hash: D221CC34A09D16C2FAD6AB11F940778E264BF44BB0FC40535C91D676A8EF2CE98E9324

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 425 7ff713141e10-7ff713141e2d 426 7ff713141e3e-7ff713141e48 425->426 427 7ff713141e2f-7ff713141e38 425->427 429 7ff713141e4a-7ff713141e53 426->429 430 7ff713141ea3-7ff713141ea8 426->430 427->426 428 7ff713141f60-7ff713141f69 427->428 431 7ff713141ecc-7ff713141ed1 429->431 432 7ff713141e55-7ff713141e60 429->432 430->428 433 7ff713141eae-7ff713141eb3 430->433 434 7ff713141f23-7ff713141f2d 431->434 435 7ff713141ed3-7ff713141ee2 signal 431->435 432->430 436 7ff713141efb-7ff713141f0a call 7ff713145c70 433->436 437 7ff713141eb5-7ff713141eba 433->437 440 7ff713141f2f-7ff713141f3f 434->440 441 7ff713141f43-7ff713141f45 434->441 435->434 438 7ff713141ee4-7ff713141ee8 435->438 436->434 446 7ff713141f0c-7ff713141f10 436->446 437->428 442 7ff713141ec0 437->442 443 7ff713141eea-7ff713141ef9 signal 438->443 444 7ff713141f4e-7ff713141f53 438->444 447 7ff713141f5a 440->447 441->428 442->434 443->428 444->447 448 7ff713141f12-7ff713141f21 signal 446->448 449 7ff713141f55 446->449 447->428 448->428 448->434 449->447
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: CCG
                                      • API String ID: 0-1584390748
                                      • Opcode ID: e9e9254d2c6377d753b75142ba6f111a2eb609bc6c93327c8270b60ed6d472a7
                                      • Instruction ID: 25cca8cd5d2738308b5d677bd0d87ef779b737f90d08063fdb5db39ac1c381f7
                                      • Opcode Fuzzy Hash: e9e9254d2c6377d753b75142ba6f111a2eb609bc6c93327c8270b60ed6d472a7
                                      • Instruction Fuzzy Hash: 4F21AE31F0DE0681FAE57264B68037991819F847B4FA48535DD0D673DAFF2CA88FA261

                                      Control-flow Graph

                                      APIs
                                      • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF713141247), ref: 00007FF7131419F9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                      • API String ID: 544645111-395989641
                                      • Opcode ID: 95c88189f5f173490d31a59e98a93a0044f8d46076a67b2869be9657c4495275
                                      • Instruction ID: 23ad3ae7a579fa0ec8e57dd0ef6ba7802e735b3338d27205dcb6ff9e457de8bc
                                      • Opcode Fuzzy Hash: 95c88189f5f173490d31a59e98a93a0044f8d46076a67b2869be9657c4495275
                                      • Instruction Fuzzy Hash: AE517E31B08D86D6FB90AB21F8407B8B761AB04BB8F844131D91D27795EF3CE58AD720

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 483 7ff713141800-7ff713141810 484 7ff713141812-7ff713141822 483->484 485 7ff713141824 483->485 486 7ff71314182b-7ff713141867 call 7ff713142290 fprintf 484->486 485->486
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID: fprintf
                                      • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                      • API String ID: 383729395-3474627141
                                      • Opcode ID: 50293704656639cbab34f0eef93bf80ef4024299dd27b09155b32e518a84277d
                                      • Instruction ID: 766f3551c613dc5ea6f8e004d6b4699d2378946a18ece9f4e69fbde981576d28
                                      • Opcode Fuzzy Hash: 50293704656639cbab34f0eef93bf80ef4024299dd27b09155b32e518a84277d
                                      • Instruction Fuzzy Hash: D6F0C831E08D4582F250BB24F9410B9E360EB497E5F809631DE8D73552EF1CE1869310

                                      Control-flow Graph

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1704154719.00007FF713141000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF713140000, based on PE: true
                                      • Associated: 00000000.00000002.1704120966.00007FF713140000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704182573.00007FF713146000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704207494.00007FF713148000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1704445930.00007FF7133B7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff713140000_6xQ8CMUaES.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterErrorLastLeaveValue
                                      • String ID:
                                      • API String ID: 682475483-0
                                      • Opcode ID: 76e1bf665cc7f6d80d874c3e048b383dbb13276ecfae51a0a0494ca46c9aea96
                                      • Instruction ID: e71df3f4da6477a470792127a9d88285dd7ddb61fa3320f9ef4f8ffac2b515fe
                                      • Opcode Fuzzy Hash: 76e1bf665cc7f6d80d874c3e048b383dbb13276ecfae51a0a0494ca46c9aea96
                                      • Instruction Fuzzy Hash: DD01DE35A09D06C1F696AB11BD04674E260BF18BB0FC40535C91D63AA4EF2CE99A9224