Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1568680
MD5:61fe809e805e74c4d6fc33b0e5a3305e
SHA1:3f62636e3d1de3a0346e812cb57d06cea445b789
SHA256:466682a767a27edcb28e3d2ae0ed221836db7d7dcb73fa88879c4b5944ba829d
Tags:exeuser-jstrosch
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Drops executables to the windows directory (C:\Windows) and starts them
Machine Learning detection for dropped file
Machine Learning detection for sample
Moves itself to temp directory
Contains functionality to dynamically determine API calls
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Modifies existing windows services
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 1992 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 61FE809E805E74C4D6FC33B0E5A3305E)
  • jmbnii.exe (PID: 1088 cmdline: C:\Windows\jmbnii.exe MD5: 61FE809E805E74C4D6FC33B0E5A3305E)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549718199.59.243.2278081TCP
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549704202.181.25.10816681TCP
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549773199.59.243.2278081TCP
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549820199.59.243.2278081TCP
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549902202.181.25.10816681TCP
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549724202.181.25.10816681TCP
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549784202.181.25.10816681TCP
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549705199.59.243.2278081TCP
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549845202.181.25.10816681TCP
2024-12-04T20:18:58.916337+010020341931Malware Command and Control Activity Detected192.168.2.549951202.181.25.10816681TCP
2024-12-04T20:19:03.086689+010020341931Malware Command and Control Activity Detected192.168.2.549704202.181.25.10816681TCP
2024-12-04T20:19:04.320762+010020341931Malware Command and Control Activity Detected192.168.2.549705199.59.243.2278081TCP
2024-12-04T20:19:26.340787+010020341931Malware Command and Control Activity Detected192.168.2.549718199.59.243.2278081TCP
2024-12-04T20:19:28.169505+010020341931Malware Command and Control Activity Detected192.168.2.549724202.181.25.10816681TCP
2024-12-04T20:19:48.387474+010020341931Malware Command and Control Activity Detected192.168.2.549773199.59.243.2278081TCP
2024-12-04T20:19:53.210644+010020341931Malware Command and Control Activity Detected192.168.2.549784202.181.25.10816681TCP
2024-12-04T20:20:08.574153+010020341931Malware Command and Control Activity Detected192.168.2.549820199.59.243.2278081TCP
2024-12-04T20:20:18.226457+010020341931Malware Command and Control Activity Detected192.168.2.549845202.181.25.10816681TCP
2024-12-04T20:20:43.259628+010020341931Malware Command and Control Activity Detected192.168.2.549902202.181.25.10816681TCP
2024-12-04T20:21:08.366684+010020341931Malware Command and Control Activity Detected192.168.2.549951202.181.25.10816681TCP
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-04T20:19:04.320762+010028375491Malware Command and Control Activity Detected192.168.2.549705199.59.243.2278081TCP
2024-12-04T20:19:26.340787+010028375491Malware Command and Control Activity Detected192.168.2.549718199.59.243.2278081TCP
2024-12-04T20:19:48.387474+010028375491Malware Command and Control Activity Detected192.168.2.549773199.59.243.2278081TCP
2024-12-04T20:20:08.574153+010028375491Malware Command and Control Activity Detected192.168.2.549820199.59.243.2278081TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: C:\Windows\jmbnii.exeAvira: detection malicious, Label: TR/Downloader.Gen
Source: C:\Windows\jmbnii.exeReversingLabs: Detection: 94%
Source: file.exeReversingLabs: Detection: 94%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: C:\Windows\jmbnii.exeJoe Sandbox ML: detected
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

Networking

barindex
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49705 -> 199.59.243.227:8081
Source: Network trafficSuricata IDS: 2837549 - Severity 1 - ETPRO MALWARE Win32/DDoS.tf CnC Checkin : 192.168.2.5:49705 -> 199.59.243.227:8081
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49704 -> 202.181.25.108:16681
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49718 -> 199.59.243.227:8081
Source: Network trafficSuricata IDS: 2837549 - Severity 1 - ETPRO MALWARE Win32/DDoS.tf CnC Checkin : 192.168.2.5:49718 -> 199.59.243.227:8081
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49724 -> 202.181.25.108:16681
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49773 -> 199.59.243.227:8081
Source: Network trafficSuricata IDS: 2837549 - Severity 1 - ETPRO MALWARE Win32/DDoS.tf CnC Checkin : 192.168.2.5:49773 -> 199.59.243.227:8081
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49820 -> 199.59.243.227:8081
Source: Network trafficSuricata IDS: 2837549 - Severity 1 - ETPRO MALWARE Win32/DDoS.tf CnC Checkin : 192.168.2.5:49820 -> 199.59.243.227:8081
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49784 -> 202.181.25.108:16681
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49845 -> 202.181.25.108:16681
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49902 -> 202.181.25.108:16681
Source: Network trafficSuricata IDS: 2034193 - Severity 1 - ET MALWARE Win32/Agent.RTQ CnC Activity : 192.168.2.5:49951 -> 202.181.25.108:16681
Source: global trafficTCP traffic: 192.168.2.5:49704 -> 202.181.25.108:16681
Source: global trafficTCP traffic: 192.168.2.5:49705 -> 199.59.243.227:8081
Source: Joe Sandbox ViewIP Address: 199.59.243.227 199.59.243.227
Source: Joe Sandbox ViewASN Name: CLOUDIE-AS-APCloudieLimitedHK CLOUDIE-AS-APCloudieLimitedHK
Source: Joe Sandbox ViewASN Name: BODIS-NJUS BODIS-NJUS
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405178 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GetComputerNameA,GetSystemDefaultUILanguage,send,select,__WSAFDIsSet,recv,GetTempPathA,wsprintfA,LoadLibraryA,GetProcAddress,WinExec,closesocket,closesocket,0_2_00405178
Source: global trafficDNS traffic detected: DNS query: souhu.ydns.eu
Source: global trafficDNS traffic detected: DNS query: v8.ter.tf
Source: file.exe, file.exe, 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmp, jmbnii.exe, 00000001.00000002.3286263402.0000000000414000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: http://www.baidu.com
Source: C:\Users\user\Desktop\file.exeFile created: C:\Windows\jmbnii.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeFile created: C:\Windows\jmbnii.exe\:Zone.Identifier:$DATAJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00410C4B0_2_00410C4B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C2070_2_0040C207
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404AA90_2_00404AA9
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00408453 appears 452 times
Source: file.exe, 00000000.00000000.2028357674.000000000041D000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAuthn.exe vs file.exe
Source: file.exe, 00000000.00000002.2029583854.000000000076E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAuthn.exe vs file.exe
Source: file.exe, 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenameAuthn.exe vs file.exe
Source: file.exeBinary or memory string: OriginalFilenameAuthn.exe vs file.exe
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal100.evad.winEXE@2/2@2/2
Source: C:\Users\user\Desktop\file.exeCode function: GetModuleFileNameA,LoadLibraryA,GetProcAddress,wsprintfA,CopyFileA,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,RegOpenKeyA,lstrlen,RegSetValueExA,0_2_00406903
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406903 GetModuleFileNameA,LoadLibraryA,GetProcAddress,wsprintfA,CopyFileA,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,RegOpenKeyA,lstrlen,RegSetValueExA,0_2_00406903
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004066B8 Sleep,StartServiceCtrlDispatcherA,0_2_004066B8
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 94%
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: unknownProcess created: C:\Windows\jmbnii.exe C:\Windows\jmbnii.exe
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\jmbnii.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406903 GetModuleFileNameA,LoadLibraryA,GetProcAddress,wsprintfA,CopyFileA,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,RegOpenKeyA,lstrlen,RegSetValueExA,0_2_00406903
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408490 push eax; ret 0_2_004084BE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408998 push eax; ret 0_2_004089B6
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1

Persistence and Installation Behavior

barindex
Source: unknownExecutable created and started: C:\Windows\jmbnii.exe
Source: C:\Users\user\Desktop\file.exeFile created: C:\Windows\jmbnii.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Windows\jmbnii.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Pqrstua CdefghJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406903 GetModuleFileNameA,LoadLibraryA,GetProcAddress,wsprintfA,CopyFileA,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,RegOpenKeyA,lstrlen,RegSetValueExA,0_2_00406903

Hooking and other Techniques for Hiding and Protection

barindex
Source: c:\users\user\desktop\file.exeFile moved: C:\Users\user\AppData\Local\Temp\41f1168Jump to behavior
Source: C:\Users\user\Desktop\file.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-8106
Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-8615
Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-7082
Source: C:\Users\user\Desktop\file.exeAPI coverage: 8.0 %
Source: C:\Windows\jmbnii.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405178 RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemInfo,GetComputerNameA,GetSystemDefaultUILanguage,send,select,__WSAFDIsSet,recv,GetTempPathA,wsprintfA,LoadLibraryA,GetProcAddress,WinExec,closesocket,closesocket,0_2_00405178
Source: jmbnii.exe, 00000001.00000002.3286491176.000000000071A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-7850
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406903 GetModuleFileNameA,LoadLibraryA,GetProcAddress,wsprintfA,CopyFileA,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,RegOpenKeyA,lstrlen,RegSetValueExA,0_2_00406903
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DE48 SetUnhandledExceptionFilter,0_2_0040DE48
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DE5A SetUnhandledExceptionFilter,0_2_0040DE5A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004089B7 GetLocalTime,GetSystemTime,GetTimeZoneInformation,0_2_004089B7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004089B7 GetLocalTime,GetSystemTime,GetTimeZoneInformation,0_2_004089B7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004090F1 GetVersion,GetCommandLineA,GetStartupInfoA,GetModuleHandleA,0_2_004090F1
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Service Execution
14
Windows Service
14
Windows Service
22
Masquerading
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Native API
1
DLL Side-Loading
1
Process Injection
1
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
Security Account Manager4
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook21
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA SecretsInternet Connection DiscoverySSHKeylogging1
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe95%ReversingLabsWin32.Trojan.ServStart
file.exe100%AviraTR/Downloader.Gen
file.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Windows\jmbnii.exe100%AviraTR/Downloader.Gen
C:\Windows\jmbnii.exe100%Joe Sandbox ML
C:\Windows\jmbnii.exe95%ReversingLabsWin32.Trojan.ServStart
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
souhu.ydns.eu
202.181.25.108
truetrue
    unknown
    74202.bodis.com
    199.59.243.227
    truetrue
      unknown
      v8.ter.tf
      unknown
      unknowntrue
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.baidu.comfile.exe, file.exe, 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmp, jmbnii.exe, 00000001.00000002.3286263402.0000000000414000.00000040.00000001.01000000.00000004.sdmpfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          202.181.25.108
          souhu.ydns.euHong Kong
          55933CLOUDIE-AS-APCloudieLimitedHKtrue
          199.59.243.227
          74202.bodis.comUnited States
          395082BODIS-NJUStrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1568680
          Start date and time:2024-12-04 20:18:12 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 11s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:4
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:file.exe
          Detection:MAL
          Classification:mal100.evad.winEXE@2/2@2/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 93%
          • Number of executed functions: 8
          • Number of non-executed functions: 52
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • VT rate limit hit for: file.exe
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          199.59.243.227ek8LkB2Cgo.exeGet hashmaliciousFormBookBrowse
          • www.dating-ml-es.xyz/pvrm/
          bestimylover.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
          • www.sql.dance/9p84/
          SW_5724.exeGet hashmaliciousFormBookBrowse
          • www.whisperart.net/27s6/
          Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
          • ww7.przvgke.biz/widfafwxfswrij?usid=26&utid=9204703590
          1k24tbb-00241346.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • www.honk.city/c8xp/
          CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
          • www.bcg.services/xz45/
          W3MzrFzSF0.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • www.acond-22-mvr.click/w9z4/
          FATURA.exeGet hashmaliciousFormBookBrowse
          • www.timetime.store/wxr5/
          Quotation sheet.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • www.acond-22-mvr.click/w9z4/
          file.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • www.honk.city/c8xp/
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          74202.bodis.comARM6LinuxTF.elfGet hashmaliciousUnknownBrowse
          • 199.59.243.227
          LinuxTF.elfGet hashmaliciousUnknownBrowse
          • 199.59.243.227
          LinuxTF.elfGet hashmaliciousUnknownBrowse
          • 199.59.243.226
          RR.exeGet hashmaliciousUnknownBrowse
          • 199.59.243.226
          8N1lJF2fNX.elfGet hashmaliciousUnknownBrowse
          • 199.59.243.225
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          BODIS-NJUSek8LkB2Cgo.exeGet hashmaliciousFormBookBrowse
          • 199.59.243.227
          bestimylover.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
          • 199.59.243.227
          http://divisioninfo.net/Get hashmaliciousUnknownBrowse
          • 199.59.243.205
          SW_5724.exeGet hashmaliciousFormBookBrowse
          • 199.59.243.227
          Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
          • 199.59.243.227
          1k24tbb-00241346.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • 199.59.243.227
          CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
          • 199.59.243.227
          W3MzrFzSF0.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • 199.59.243.227
          FATURA.exeGet hashmaliciousFormBookBrowse
          • 199.59.243.227
          Quotation sheet.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • 199.59.243.227
          CLOUDIE-AS-APCloudieLimitedHKla.bot.powerpc.elfGet hashmaliciousMiraiBrowse
          • 45.192.33.233
          botnet.m68k.elfGet hashmaliciousMirai, MoobotBrowse
          • 122.10.88.94
          sora.mpsl.elfGet hashmaliciousMiraiBrowse
          • 144.48.249.121
          la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
          • 103.118.226.120
          bot.mpsl.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 191.96.235.60
          bot.arm5.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 191.96.235.60
          bot.x86.elfGet hashmaliciousMirai, OkiruBrowse
          • 191.96.235.60
          bot.arm.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 191.96.235.60
          bot.ppc.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 191.96.235.60
          bot.m68k.elfGet hashmaliciousMirai, Gafgyt, OkiruBrowse
          • 191.96.235.60
          No context
          No context
          Process:C:\Users\user\Desktop\file.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
          Category:dropped
          Size (bytes):46592
          Entropy (8bit):7.770319978556949
          Encrypted:false
          SSDEEP:768:fI0+FNeQT1ok/ILtq2FV5AY6t+ayph/bAUn26wriTJogrIyP85P85jaZV9VYnsxx:fI0eMCoHFVet+phX7lBF85EAa0GDit3
          MD5:61FE809E805E74C4D6FC33B0E5A3305E
          SHA1:3F62636E3D1DE3A0346E812CB57D06CEA445B789
          SHA-256:466682A767A27EDCB28E3D2AE0ED221836DB7D7DCB73FA88879C4B5944BA829D
          SHA-512:773B1F451617523B5481632AC3F347265230DF418CBC95F687556CFC278753745A5A4F08E327088DDD25FD7FFEFD6BDEE06973B653E60BB0C62AB526CCB16D41
          Malicious:true
          Antivirus:
          • Antivirus: Avira, Detection: 100%
          • Antivirus: Joe Sandbox ML, Detection: 100%
          • Antivirus: ReversingLabs, Detection: 95%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........5...[..[..[..P..[.8.U..[..Q...[.x....[..Z...[.S.P..[.|.]..[.Rich..[.........PE..L......X............................0.... ........@.................................................................................................................................................................................................UPX0....................................UPX1......... ......................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................................................................................3.07.UPX!....
          Process:C:\Users\user\Desktop\file.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):26
          Entropy (8bit):3.95006375643621
          Encrypted:false
          SSDEEP:3:ggPYV:rPYV
          MD5:187F488E27DB4AF347237FE461A079AD
          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
          Malicious:true
          Reputation:high, very likely benign file
          Preview:[ZoneTransfer]....ZoneId=0
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
          Entropy (8bit):7.770319978556949
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.39%
          • UPX compressed Win32 Executable (30571/9) 0.30%
          • Win32 EXE Yoda's Crypter (26571/9) 0.26%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          File name:file.exe
          File size:46'592 bytes
          MD5:61fe809e805e74c4d6fc33b0e5a3305e
          SHA1:3f62636e3d1de3a0346e812cb57d06cea445b789
          SHA256:466682a767a27edcb28e3d2ae0ed221836db7d7dcb73fa88879c4b5944ba829d
          SHA512:773b1f451617523b5481632ac3f347265230df418cbc95f687556cfc278753745a5a4f08e327088ddd25fd7ffefd6bdee06973b653e60bb0c62ab526ccb16d41
          SSDEEP:768:fI0+FNeQT1ok/ILtq2FV5AY6t+ayph/bAUn26wriTJogrIyP85P85jaZV9VYnsxx:fI0eMCoHFVet+phX7lBF85EAa0GDit3
          TLSH:4823F1993BF5494FF09F507479FB0AEA549AB43C5AC463EA82E723591834734DC06A33
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........5...[...[...[...P...[.8.U...[...Q...[.x.....[...Z...[.S.P...[.|.]...[.Rich..[.........PE..L......X...........................
          Icon Hash:4d0b1b0d4d33336c
          Entrypoint:0x41c630
          Entrypoint Section:UPX1
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:
          Time Stamp:0x58F5D015 [Tue Apr 18 08:36:37 2017 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:5a757cedf03930b945cf2435af0c6f5b
          Instruction
          pushad
          mov esi, 00412000h
          lea edi, dword ptr [esi-00011000h]
          push edi
          or ebp, FFFFFFFFh
          jmp 00007FE5DCADEBB2h
          nop
          nop
          nop
          nop
          nop
          nop
          mov al, byte ptr [esi]
          inc esi
          mov byte ptr [edi], al
          inc edi
          add ebx, ebx
          jne 00007FE5DCADEBA9h
          mov ebx, dword ptr [esi]
          sub esi, FFFFFFFCh
          adc ebx, ebx
          jc 00007FE5DCADEB8Fh
          mov eax, 00000001h
          add ebx, ebx
          jne 00007FE5DCADEBA9h
          mov ebx, dword ptr [esi]
          sub esi, FFFFFFFCh
          adc ebx, ebx
          adc eax, eax
          add ebx, ebx
          jnc 00007FE5DCADEB91h
          jne 00007FE5DCADEBABh
          mov ebx, dword ptr [esi]
          sub esi, FFFFFFFCh
          adc ebx, ebx
          jnc 00007FE5DCADEB86h
          xor ecx, ecx
          sub eax, 03h
          jc 00007FE5DCADEBAFh
          shl eax, 08h
          mov al, byte ptr [esi]
          inc esi
          xor eax, FFFFFFFFh
          je 00007FE5DCADEC16h
          mov ebp, eax
          add ebx, ebx
          jne 00007FE5DCADEBA9h
          mov ebx, dword ptr [esi]
          sub esi, FFFFFFFCh
          adc ebx, ebx
          adc ecx, ecx
          add ebx, ebx
          jne 00007FE5DCADEBA9h
          mov ebx, dword ptr [esi]
          sub esi, FFFFFFFCh
          adc ebx, ebx
          adc ecx, ecx
          jne 00007FE5DCADEBC2h
          inc ecx
          add ebx, ebx
          jne 00007FE5DCADEBA9h
          mov ebx, dword ptr [esi]
          sub esi, FFFFFFFCh
          adc ebx, ebx
          adc ecx, ecx
          add ebx, ebx
          jnc 00007FE5DCADEB91h
          jne 00007FE5DCADEBABh
          mov ebx, dword ptr [esi]
          sub esi, FFFFFFFCh
          adc ebx, ebx
          jnc 00007FE5DCADEB86h
          add ecx, 02h
          cmp ebp, FFFFF300h
          adc ecx, 01h
          lea edx, dword ptr [edi+ebp]
          cmp ebp, FFFFFFFCh
          jbe 00007FE5DCADEBB1h
          mov al, byte ptr [edx]
          inc edx
          mov byte ptr [edi], al
          inc edi
          dec ecx
          jne 00007FE5DCADEB99h
          jmp 00007FE5DCADEB08h
          nop
          mov eax, dword ptr [edx]
          add edx, 04h
          mov dword ptr [edi], eax
          add edi, 04h
          sub ecx, 00000000h
          Programming Language:
          • [C++] VS98 (6.0) SP6 build 8804
          • [ C ] VS98 (6.0) SP6 build 8804
          • [C++] VS98 (6.0) build 8168
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x1d8140x1a8.rsrc
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x814.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          UPX00x10000x110000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          UPX10x120000xb0000xa800719447f4bb2136ad7bbe75d28f6c5fd9False0.9826311383928571data7.9143336638399555IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x1d0000x10000xa006765547ceb833e0403086a2054af70edFalse0.41484375data3.4953830391223066IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x1d0ec0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishCanada0.353494623655914
          RT_GROUP_ICON0x1d3d80x14dataEnglishCanada1.2
          RT_VERSION0x1d3f00x424dataEnglishCanada0.46132075471698114
          DLLImport
          KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
          ADVAPI32.dllRegOpenKeyA
          iphlpapi.dllGetIfTable
          USER32.dllwsprintfA
          WININET.dllInternetOpenA
          WS2_32.dllWSAGetLastError
          Language of compilation systemCountry where language is spokenMap
          EnglishCanada
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549718199.59.243.2278081TCP
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549704202.181.25.10816681TCP
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549773199.59.243.2278081TCP
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549820199.59.243.2278081TCP
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549902202.181.25.10816681TCP
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549724202.181.25.10816681TCP
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549784202.181.25.10816681TCP
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549705199.59.243.2278081TCP
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549845202.181.25.10816681TCP
          2024-12-04T20:18:58.916337+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549951202.181.25.10816681TCP
          2024-12-04T20:19:03.086689+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549704202.181.25.10816681TCP
          2024-12-04T20:19:04.320762+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549705199.59.243.2278081TCP
          2024-12-04T20:19:04.320762+01002837549ETPRO MALWARE Win32/DDoS.tf CnC Checkin1192.168.2.549705199.59.243.2278081TCP
          2024-12-04T20:19:26.340787+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549718199.59.243.2278081TCP
          2024-12-04T20:19:26.340787+01002837549ETPRO MALWARE Win32/DDoS.tf CnC Checkin1192.168.2.549718199.59.243.2278081TCP
          2024-12-04T20:19:28.169505+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549724202.181.25.10816681TCP
          2024-12-04T20:19:48.387474+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549773199.59.243.2278081TCP
          2024-12-04T20:19:48.387474+01002837549ETPRO MALWARE Win32/DDoS.tf CnC Checkin1192.168.2.549773199.59.243.2278081TCP
          2024-12-04T20:19:53.210644+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549784202.181.25.10816681TCP
          2024-12-04T20:20:08.574153+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549820199.59.243.2278081TCP
          2024-12-04T20:20:08.574153+01002837549ETPRO MALWARE Win32/DDoS.tf CnC Checkin1192.168.2.549820199.59.243.2278081TCP
          2024-12-04T20:20:18.226457+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549845202.181.25.10816681TCP
          2024-12-04T20:20:43.259628+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549902202.181.25.10816681TCP
          2024-12-04T20:21:08.366684+01002034193ET MALWARE Win32/Agent.RTQ CnC Activity1192.168.2.549951202.181.25.10816681TCP
          TimestampSource PortDest PortSource IPDest IP
          Dec 4, 2024 20:19:02.965996981 CET4970416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:03.086112976 CET1668149704202.181.25.108192.168.2.5
          Dec 4, 2024 20:19:03.086199999 CET4970416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:03.086688995 CET4970416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:03.206892014 CET1668149704202.181.25.108192.168.2.5
          Dec 4, 2024 20:19:04.176970959 CET497058081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:04.298290968 CET808149705199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:04.298502922 CET497058081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:04.320761919 CET497058081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:04.447319031 CET808149705199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:24.980290890 CET1668149704202.181.25.108192.168.2.5
          Dec 4, 2024 20:19:24.980396032 CET4970416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:24.980525970 CET4970416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:25.111680984 CET1668149704202.181.25.108192.168.2.5
          Dec 4, 2024 20:19:26.217444897 CET808149705199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:26.217519999 CET497058081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:26.217622042 CET497058081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:26.220510006 CET497188081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:26.337948084 CET808149705199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:26.340260983 CET808149718199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:26.340363979 CET497188081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:26.340786934 CET497188081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:26.460576057 CET808149718199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:28.047995090 CET4972416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:28.168807030 CET1668149724202.181.25.108192.168.2.5
          Dec 4, 2024 20:19:28.168888092 CET4972416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:28.169504881 CET4972416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:28.294447899 CET1668149724202.181.25.108192.168.2.5
          Dec 4, 2024 20:19:48.262083054 CET808149718199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:48.262144089 CET497188081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:48.262243032 CET497188081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:48.264874935 CET497738081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:48.383882999 CET808149718199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:48.386919022 CET808149773199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:48.387026072 CET497738081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:48.387474060 CET497738081192.168.2.5199.59.243.227
          Dec 4, 2024 20:19:48.512140989 CET808149773199.59.243.227192.168.2.5
          Dec 4, 2024 20:19:50.074551105 CET1668149724202.181.25.108192.168.2.5
          Dec 4, 2024 20:19:50.077202082 CET4972416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:50.077284098 CET4972416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:50.197066069 CET1668149724202.181.25.108192.168.2.5
          Dec 4, 2024 20:19:53.090223074 CET4978416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:53.210038900 CET1668149784202.181.25.108192.168.2.5
          Dec 4, 2024 20:19:53.210127115 CET4978416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:53.210644007 CET4978416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:19:53.330368042 CET1668149784202.181.25.108192.168.2.5
          Dec 4, 2024 20:20:08.451108932 CET808149773199.59.243.227192.168.2.5
          Dec 4, 2024 20:20:08.451220989 CET497738081192.168.2.5199.59.243.227
          Dec 4, 2024 20:20:08.451318026 CET497738081192.168.2.5199.59.243.227
          Dec 4, 2024 20:20:08.453783989 CET498208081192.168.2.5199.59.243.227
          Dec 4, 2024 20:20:08.571106911 CET808149773199.59.243.227192.168.2.5
          Dec 4, 2024 20:20:08.573683977 CET808149820199.59.243.227192.168.2.5
          Dec 4, 2024 20:20:08.573743105 CET498208081192.168.2.5199.59.243.227
          Dec 4, 2024 20:20:08.574152946 CET498208081192.168.2.5199.59.243.227
          Dec 4, 2024 20:20:08.693994999 CET808149820199.59.243.227192.168.2.5
          Dec 4, 2024 20:20:15.090574026 CET1668149784202.181.25.108192.168.2.5
          Dec 4, 2024 20:20:15.090651989 CET4978416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:15.090756893 CET4978416681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:15.215420961 CET1668149784202.181.25.108192.168.2.5
          Dec 4, 2024 20:20:18.105941057 CET4984516681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:18.225908041 CET1668149845202.181.25.108192.168.2.5
          Dec 4, 2024 20:20:18.226048946 CET4984516681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:18.226457119 CET4984516681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:18.346147060 CET1668149845202.181.25.108192.168.2.5
          Dec 4, 2024 20:20:40.122111082 CET1668149845202.181.25.108192.168.2.5
          Dec 4, 2024 20:20:40.122210979 CET4984516681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:40.122366905 CET4984516681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:40.244112968 CET1668149845202.181.25.108192.168.2.5
          Dec 4, 2024 20:20:43.137010098 CET4990216681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:43.259037971 CET1668149902202.181.25.108192.168.2.5
          Dec 4, 2024 20:20:43.259217978 CET4990216681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:43.259628057 CET4990216681192.168.2.5202.181.25.108
          Dec 4, 2024 20:20:43.379383087 CET1668149902202.181.25.108192.168.2.5
          Dec 4, 2024 20:21:05.169507980 CET1668149902202.181.25.108192.168.2.5
          Dec 4, 2024 20:21:05.173269033 CET4990216681192.168.2.5202.181.25.108
          Dec 4, 2024 20:21:05.173404932 CET4990216681192.168.2.5202.181.25.108
          Dec 4, 2024 20:21:05.296973944 CET1668149902202.181.25.108192.168.2.5
          Dec 4, 2024 20:21:08.245239019 CET4995116681192.168.2.5202.181.25.108
          Dec 4, 2024 20:21:08.366035938 CET1668149951202.181.25.108192.168.2.5
          Dec 4, 2024 20:21:08.366215944 CET4995116681192.168.2.5202.181.25.108
          Dec 4, 2024 20:21:08.366683960 CET4995116681192.168.2.5202.181.25.108
          Dec 4, 2024 20:21:08.488729000 CET1668149951202.181.25.108192.168.2.5
          TimestampSource PortDest PortSource IPDest IP
          Dec 4, 2024 20:19:02.618626118 CET6301153192.168.2.51.1.1.1
          Dec 4, 2024 20:19:02.961721897 CET53630111.1.1.1192.168.2.5
          Dec 4, 2024 20:19:03.215176105 CET5000653192.168.2.51.1.1.1
          Dec 4, 2024 20:19:04.162785053 CET53500061.1.1.1192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Dec 4, 2024 20:19:02.618626118 CET192.168.2.51.1.1.10x91faStandard query (0)souhu.ydns.euA (IP address)IN (0x0001)false
          Dec 4, 2024 20:19:03.215176105 CET192.168.2.51.1.1.10x107dStandard query (0)v8.ter.tfA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Dec 4, 2024 20:19:02.961721897 CET1.1.1.1192.168.2.50x91faNo error (0)souhu.ydns.eu202.181.25.108A (IP address)IN (0x0001)false
          Dec 4, 2024 20:19:04.162785053 CET1.1.1.1192.168.2.50x107dNo error (0)v8.ter.tfpltraffic30.comCNAME (Canonical name)IN (0x0001)false
          Dec 4, 2024 20:19:04.162785053 CET1.1.1.1192.168.2.50x107dNo error (0)pltraffic30.com74202.bodis.comCNAME (Canonical name)IN (0x0001)false
          Dec 4, 2024 20:19:04.162785053 CET1.1.1.1192.168.2.50x107dNo error (0)74202.bodis.com199.59.243.227A (IP address)IN (0x0001)false

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:14:19:01
          Start date:04/12/2024
          Path:C:\Users\user\Desktop\file.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\file.exe"
          Imagebase:0x400000
          File size:46'592 bytes
          MD5 hash:61FE809E805E74C4D6FC33B0E5A3305E
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:14:19:01
          Start date:04/12/2024
          Path:C:\Windows\jmbnii.exe
          Wow64 process (32bit):true
          Commandline:C:\Windows\jmbnii.exe
          Imagebase:0x400000
          File size:46'592 bytes
          MD5 hash:61FE809E805E74C4D6FC33B0E5A3305E
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Antivirus matches:
          • Detection: 100%, Avira
          • Detection: 100%, Joe Sandbox ML
          • Detection: 95%, ReversingLabs
          Reputation:low
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:6.5%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:16.2%
            Total number of Nodes:1943
            Total number of Limit Nodes:5
            execution_graph 7856 411641 7857 41164f 7856->7857 7858 411680 7857->7858 7859 411653 MultiByteToWideChar 7857->7859 7859->7858 7860 41166a CompareStringW 7859->7860 7860->7858 8695 40f0c4 8696 4091e7 7 API calls 8695->8696 8697 40f0cb 8696->8697 8698 404fc5 8699 40768f 8698->8699 8700 408205 ctype 7 API calls 8699->8700 8701 4076a5 8699->8701 8700->8701 8702 4076b7 8701->8702 8703 408fc8 ctype 7 API calls 8701->8703 8704 4076c9 8702->8704 8705 408205 ctype 7 API calls 8702->8705 8703->8702 8706 4076db 8704->8706 8707 408205 ctype 7 API calls 8704->8707 8705->8704 8707->8706 7861 407d47 7866 40768f 7861->7866 7864 407d5c 7867 40769f 7866->7867 7869 4076a5 7866->7869 7868 408205 ctype 7 API calls 7867->7868 7868->7869 7870 4076b7 7869->7870 7871 408fc8 ctype 7 API calls 7869->7871 7872 4076c9 7870->7872 7873 408205 ctype 7 API calls 7870->7873 7871->7870 7874 4076db 7872->7874 7875 408205 ctype 7 API calls 7872->7875 7873->7872 7874->7864 7876 408205 7874->7876 7875->7874 7877 408fc8 ctype 7 API calls 7876->7877 7878 40820e 7877->7878 7878->7864 7879 40de48 SetUnhandledExceptionFilter 8708 4056c8 WSAStartup Sleep 8709 4056ec CreateThread WaitForSingleObject CloseHandle closesocket 8708->8709 8709->8709 7880 41064d 7883 4105c2 7880->7883 7885 4105ca 7883->7885 7884 40e957 6 API calls 7884->7885 7885->7884 7887 4105f8 7885->7887 7886 40e957 6 API calls 7886->7887 7887->7886 7888 41063f 7887->7888 8710 4087cc 8711 40a05a 4 API calls 8710->8711 8712 4087ec 8711->8712 8713 40c5ce IsBadWritePtr 8714 40c5f6 8713->8714 8715 40c5fe 8713->8715 8715->8714 8716 40c61c IsBadWritePtr 8715->8716 8717 40c67d IsBadWritePtr 8715->8717 8716->8714 8716->8715 8717->8714 8717->8715 8718 4115d2 8719 4115e4 8718->8719 8720 4115ed MultiByteToWideChar 8719->8720 8721 411680 8719->8721 8720->8721 8722 411607 MultiByteToWideChar 8720->8722 8722->8721 8723 41161f 8722->8723 8723->8721 8724 411653 MultiByteToWideChar 8723->8724 8724->8721 8725 41166a CompareStringW 8724->8725 8725->8721 7891 405156 RtlExitUserThread 7892 405166 Sleep 7891->7892 7895 404fcf 7892->7895 7894 405176 7894->7892 7896 404fe6 7895->7896 7897 404fde RtlExitUserThread 7895->7897 7898 408453 26 API calls 7896->7898 7897->7896 7899 404ffb 7898->7899 7900 408453 26 API calls 7899->7900 7901 405009 7900->7901 7902 408453 26 API calls 7901->7902 7903 405017 7902->7903 7904 408453 26 API calls 7903->7904 7905 405020 7904->7905 7940 407c20 GetIfTable 7905->7940 7908 408453 26 API calls 7909 40503b 7908->7909 7910 408453 26 API calls 7909->7910 7911 405044 7910->7911 7912 408453 26 API calls 7911->7912 7913 40505d 7912->7913 7914 408453 26 API calls 7913->7914 7915 405066 7914->7915 7951 407773 7915->7951 7917 40507a 7918 408453 26 API calls 7917->7918 7919 405082 7918->7919 7920 408453 26 API calls 7919->7920 7921 40508b __ftol 7920->7921 7958 4082b3 7921->7958 7924 408453 26 API calls 7925 4050ce 7924->7925 7926 408453 26 API calls 7925->7926 7927 4050d7 7926->7927 7928 408453 26 API calls 7927->7928 7929 4050df 7928->7929 7930 408453 26 API calls 7929->7930 7931 4050e8 7930->7931 7932 408453 26 API calls 7931->7932 7933 4050fb 7932->7933 7934 408453 26 API calls 7933->7934 7935 405104 7934->7935 7936 408453 26 API calls 7935->7936 7937 40511e 7936->7937 7938 408453 26 API calls 7937->7938 7939 405127 send Sleep 7938->7939 7939->7894 7941 407c4c 7940->7941 7950 405032 7940->7950 7942 407c5f GetIfTable 7941->7942 7963 409031 7941->7963 7945 407c76 7942->7945 7942->7950 7946 407d15 7945->7946 7947 407d1b GetTickCount 7945->7947 7948 407d30 GetTickCount 7946->7948 7947->7948 7949 408205 ctype 7 API calls 7948->7949 7949->7950 7950->7908 7952 407789 GetModuleHandleA GetProcAddress 7951->7952 7953 4077ad 7951->7953 7952->7953 7957 40780c 7952->7957 7954 409031 12 API calls 7953->7954 7955 4077df 7953->7955 7953->7957 7954->7955 7956 409031 12 API calls 7955->7956 7955->7957 7956->7957 7957->7917 7959 409345 26 API calls 7958->7959 7960 4082e1 7959->7960 7961 4050c6 7960->7961 7966 409230 7960->7966 7961->7924 7964 409051 12 API calls 7963->7964 7965 407c59 7964->7965 7965->7942 7970 409246 7966->7970 7975 4092ca 7966->7975 7967 4092a1 7968 4092ab 7967->7968 7969 40930f 7967->7969 7971 4092c2 7968->7971 7976 4092d2 7968->7976 7972 40d9e6 6 API calls 7969->7972 7970->7967 7970->7975 7978 40db93 7970->7978 7973 40d9e6 6 API calls 7971->7973 7972->7975 7973->7975 7975->7961 7976->7975 7977 40d94c 2 API calls 7976->7977 7977->7975 7979 40903f 12 API calls 7978->7979 7980 40dba3 7979->7980 7980->7967 8726 40eed8 8727 410c4b 6 API calls 8726->8727 8728 40eef5 8727->8728 7981 410658 7983 410661 7981->7983 7982 40e957 6 API calls 7982->7983 7983->7982 7986 41068f 7983->7986 7984 40e957 6 API calls 7984->7986 7985 4106f6 7986->7984 7986->7985 8729 4091dc 8730 408d7e 3 API calls 8729->8730 8731 4091e7 8730->8731 8732 4091f5 8731->8732 8733 40d78f 7 API calls 8731->8733 8734 40d7c8 7 API calls 8732->8734 8733->8732 8735 4091fe 8734->8735 8736 4076e2 GlobalMemoryStatus 8737 407707 8736->8737 7988 40ab63 7989 40ab71 7988->7989 7990 40ab8c 7988->7990 7995 40eeab 7989->7995 7998 40ef06 7990->7998 7993 40ab7a 7994 40ab95 8001 410c4b 7995->8001 7997 40eec7 7997->7993 7999 410c4b 6 API calls 7998->7999 8000 40ef22 7999->8000 8000->7994 8003 410c86 8001->8003 8002 40e957 6 API calls 8002->8003 8003->8002 8005 410f3b 8003->8005 8008 410f33 8003->8008 8004 40e957 6 API calls 8004->8005 8005->8004 8007 410f86 8005->8007 8006 40e957 6 API calls 8006->8007 8007->8006 8007->8008 8008->7997 8738 4034e4 8739 403504 8738->8739 8740 408453 26 API calls 8739->8740 8741 403513 8740->8741 8742 408453 26 API calls 8741->8742 8743 403522 8742->8743 8744 402673 GetTickCount 8743->8744 8745 403542 8744->8745 8746 402673 GetTickCount 8745->8746 8747 403552 8746->8747 8748 402673 GetTickCount 8747->8748 8749 40355b 8748->8749 8750 408453 26 API calls 8749->8750 8751 403578 8750->8751 8752 408453 26 API calls 8751->8752 8753 403581 8752->8753 8754 408453 26 API calls 8753->8754 8755 403590 8754->8755 8756 408453 26 API calls 8755->8756 8757 403599 8756->8757 8758 4024ff 2 API calls 8757->8758 8759 4035a5 htons 8758->8759 8760 408453 26 API calls 8759->8760 8761 4035c4 8760->8761 8762 408453 26 API calls 8761->8762 8763 4035cd WSASocketA 8762->8763 8764 4035f1 8763->8764 8765 4037a2 8763->8765 8766 408453 26 API calls 8764->8766 8767 4035fa 8766->8767 8768 408453 26 API calls 8767->8768 8769 403603 8768->8769 8770 408453 26 API calls 8769->8770 8771 40361d 8770->8771 8772 408453 26 API calls 8771->8772 8773 403627 8772->8773 8773->8765 8774 40366c wsprintfA htons inet_addr 8773->8774 8775 4024ff 2 API calls 8774->8775 8778 4036cb 8775->8778 8776 4036ea htons htons htons 8776->8778 8777 408453 26 API calls 8777->8778 8778->8776 8778->8777 8779 408453 26 API calls 8778->8779 8780 40376c sendto 8779->8780 8780->8773 8781 403795 Sleep 8780->8781 8781->8773 8782 4047e7 8783 4047f4 8782->8783 8784 404934 8783->8784 8785 4024ff 2 API calls 8783->8785 8786 402524 4 API calls 8783->8786 8787 40493d RtlExitUserThread 8783->8787 8788 404888 wsprintfA GetCurrentProcess SetProcessWorkingSetSize 8783->8788 8789 4048ce send recv 8783->8789 8785->8783 8786->8783 8788->8783 8790 402673 GetTickCount 8789->8790 8791 4048fa send send closesocket Sleep 8790->8791 8791->8783 8791->8784 8792 4057e8 8835 40578b htons 8792->8835 8795 405aa9 8796 402fd5 28 API calls 8797 40580e 8796->8797 8798 4037ab 29 API calls 8797->8798 8799 405869 GetSystemInfo 8798->8799 8800 408453 26 API calls 8799->8800 8801 405887 8800->8801 8802 408453 26 API calls 8801->8802 8803 405895 8802->8803 8804 408453 26 API calls 8803->8804 8805 4058a4 8804->8805 8806 408453 26 API calls 8805->8806 8807 4058ad GetComputerNameA 8806->8807 8808 408453 26 API calls 8807->8808 8809 4058c7 8808->8809 8810 408453 26 API calls 8809->8810 8811 4058d0 GetSystemDefaultUILanguage 8810->8811 8812 408453 26 API calls 8811->8812 8813 4058e8 8812->8813 8814 408453 26 API calls 8813->8814 8815 4058f1 8814->8815 8816 408453 26 API calls 8815->8816 8817 40594e 8816->8817 8818 408453 26 API calls 8817->8818 8819 405957 8818->8819 8820 408453 26 API calls 8819->8820 8821 405960 8820->8821 8822 408453 26 API calls 8821->8822 8823 40596c 8822->8823 8824 408453 26 API calls 8823->8824 8825 405997 8824->8825 8826 408453 26 API calls 8825->8826 8827 4059a0 send 8826->8827 8828 405a9d closesocket 8827->8828 8833 4059c8 8827->8833 8828->8795 8829 4059cd select 8829->8828 8829->8833 8830 405a01 __WSAFDIsSet 8830->8829 8831 405a17 recv 8830->8831 8832 405a91 closesocket 8831->8832 8831->8833 8832->8828 8833->8829 8833->8830 8833->8832 8834 404aa9 92 API calls 8833->8834 8834->8833 8836 40260a 2 API calls 8835->8836 8837 4057b3 socket connect 8836->8837 8838 4057e3 8837->8838 8839 4057d7 closesocket 8837->8839 8838->8795 8838->8796 8839->8838 8840 4061ea RegisterServiceCtrlHandlerA 8841 408453 26 API calls 8840->8841 8842 40621a 8841->8842 8843 408453 26 API calls 8842->8843 8844 40622a 8843->8844 8845 408453 26 API calls 8844->8845 8846 40623d 8845->8846 8847 408453 26 API calls 8846->8847 8848 406245 8847->8848 8849 408453 26 API calls 8848->8849 8850 406258 8849->8850 8851 408453 26 API calls 8850->8851 8852 406260 8851->8852 8853 408453 26 API calls 8852->8853 8854 406273 8853->8854 8855 408453 26 API calls 8854->8855 8856 40627b 8855->8856 8857 408453 26 API calls 8856->8857 8858 40628e 8857->8858 8859 408453 26 API calls 8858->8859 8860 406296 8859->8860 8861 408453 26 API calls 8860->8861 8862 4062a9 8861->8862 8863 408453 26 API calls 8862->8863 8864 4062b1 8863->8864 8865 408453 26 API calls 8864->8865 8866 4062c7 8865->8866 8867 408453 26 API calls 8866->8867 8868 4062cf SetServiceStatus 8867->8868 8869 408453 26 API calls 8868->8869 8870 4062f3 8869->8870 8871 408453 26 API calls 8870->8871 8872 4062fb Sleep 8871->8872 8873 408453 26 API calls 8872->8873 8874 40631c 8873->8874 8875 408453 26 API calls 8874->8875 8876 406324 SetServiceStatus 8875->8876 8877 408453 26 API calls 8876->8877 8878 406341 8877->8878 8879 408453 26 API calls 8878->8879 8880 406349 WSAStartup 8879->8880 8881 408453 26 API calls 8880->8881 8882 406365 8881->8882 8883 408453 26 API calls 8882->8883 8884 40636d CreateThread 8883->8884 8885 406382 CreateThread 8884->8885 8886 408453 26 API calls 8885->8886 8887 4063a2 8886->8887 8888 408453 26 API calls 8887->8888 8889 4063aa WaitForSingleObject 8888->8889 8890 408453 26 API calls 8889->8890 8891 4063c4 8890->8891 8892 408453 26 API calls 8891->8892 8893 4063cc CloseHandle closesocket 8892->8893 8894 408453 26 API calls 8893->8894 8895 4063f7 8894->8895 8896 408453 26 API calls 8895->8896 8897 4063ff Sleep 8896->8897 8897->8885 8009 40406c 8023 407ed0 8009->8023 8012 4041a0 8013 4040c5 setsockopt 8013->8012 8014 4040e5 8013->8014 8015 408453 26 API calls 8014->8015 8016 4040f3 8015->8016 8017 408453 26 API calls 8016->8017 8018 404101 8017->8018 8025 40260a inet_addr 8018->8025 8021 40414f 8021->8012 8022 40417b sendto 8021->8022 8022->8021 8024 40408c WSAStartup WSASocketA 8023->8024 8024->8012 8024->8013 8026 402618 gethostbyname 8025->8026 8027 402626 GetCurrentProcessId GetTickCount 8025->8027 8026->8027 8027->8021 8028 41096f 8029 41097e 8028->8029 8030 410983 MultiByteToWideChar 8029->8030 8031 4109e9 8029->8031 8030->8031 8032 41099c LCMapStringW 8030->8032 8032->8031 8033 4109b7 8032->8033 8034 4109fd 8033->8034 8035 4109bd 8033->8035 8034->8031 8037 410a35 LCMapStringW 8034->8037 8035->8031 8036 4109cb LCMapStringW 8035->8036 8036->8031 8037->8031 8038 410a4d WideCharToMultiByte 8037->8038 8038->8031 8040 407b6e 8041 407b98 GetIfTable 8040->8041 8042 407b7d GetIfTable 8040->8042 8044 407ba9 8041->8044 8042->8041 8043 407b8d 8042->8043 8045 40903f 12 API calls 8043->8045 8046 407b94 8045->8046 8046->8041 7065 4090f1 GetVersion 7090 40b7df HeapCreate 7065->7090 7067 409150 7068 409155 7067->7068 7069 40915d 7067->7069 7196 40920c 7068->7196 7102 409c76 7069->7102 7073 409165 GetCommandLineA 7116 40d65d 7073->7116 7077 40917f 7148 40d357 7077->7148 7079 409184 7080 409189 GetStartupInfoA 7079->7080 7161 40d2ff 7080->7161 7082 40919b GetModuleHandleA 7165 4066b8 7082->7165 7091 40b835 7090->7091 7092 40b7ff 7090->7092 7091->7067 7209 40b697 7092->7209 7095 40b81b 7098 40b838 7095->7098 7223 40c91f 7095->7223 7096 40b80e 7221 40b9b6 RtlAllocateHeap 7096->7221 7098->7067 7099 40b818 7099->7098 7101 40b829 HeapDestroy 7099->7101 7101->7091 7286 40903f 7102->7286 7106 409c95 GetStartupInfoA 7112 409da6 7106->7112 7115 409ce1 7106->7115 7108 409dcd GetStdHandle 7110 409ddb GetFileType 7108->7110 7108->7112 7109 409e0d SetHandleCount 7109->7073 7110->7112 7111 40903f 12 API calls 7111->7115 7112->7108 7112->7109 7113 409d52 7113->7112 7114 409d74 GetFileType 7113->7114 7114->7113 7115->7111 7115->7112 7115->7113 7117 40d678 GetEnvironmentStringsW 7116->7117 7118 40d6ab 7116->7118 7119 40d680 7117->7119 7121 40d68c GetEnvironmentStrings 7117->7121 7118->7119 7120 40d69c 7118->7120 7123 40d6c4 WideCharToMultiByte 7119->7123 7124 40d6b8 GetEnvironmentStringsW 7119->7124 7122 409175 7120->7122 7125 40d74a 7120->7125 7126 40d73e GetEnvironmentStrings 7120->7126 7121->7120 7121->7122 7139 40d410 7122->7139 7128 40d6f8 7123->7128 7129 40d72a FreeEnvironmentStringsW 7123->7129 7124->7122 7124->7123 7130 40903f 12 API calls 7125->7130 7126->7122 7126->7125 7131 40903f 12 API calls 7128->7131 7129->7122 7137 40d765 7130->7137 7132 40d6fe 7131->7132 7132->7129 7133 40d707 WideCharToMultiByte 7132->7133 7135 40d721 7133->7135 7136 40d718 7133->7136 7134 40d77b FreeEnvironmentStringsA 7134->7122 7135->7129 7352 408fc8 7136->7352 7137->7134 7140 40d422 7139->7140 7141 40d427 GetModuleFileNameA 7139->7141 7382 40fe23 7140->7382 7143 40d44a 7141->7143 7144 40903f 12 API calls 7143->7144 7145 40d46b 7144->7145 7146 40d47b 7145->7146 7147 4091e7 7 API calls 7145->7147 7146->7077 7147->7146 7149 40d364 7148->7149 7151 40d369 7148->7151 7150 40fe23 19 API calls 7149->7150 7150->7151 7152 40903f 12 API calls 7151->7152 7153 40d396 7152->7153 7155 4091e7 7 API calls 7153->7155 7160 40d3aa 7153->7160 7154 40d3ed 7156 408fc8 ctype 7 API calls 7154->7156 7155->7160 7157 40d3f9 7156->7157 7157->7079 7158 40903f 12 API calls 7158->7160 7159 4091e7 7 API calls 7159->7160 7160->7154 7160->7158 7160->7159 7162 40d308 7161->7162 7164 40d30d 7161->7164 7163 40fe23 19 API calls 7162->7163 7163->7164 7164->7082 7166 4066cd 7165->7166 7167 4066f1 7166->7167 7168 4066d4 Sleep 7166->7168 7406 40679f 7167->7406 7602 408e60 7168->7602 7173 406753 7424 408453 7173->7424 7174 406706 7176 408453 26 API calls 7174->7176 7175 408d6d 3 API calls 7175->7167 7178 40670b 7176->7178 7180 408453 26 API calls 7178->7180 7182 40671a 7180->7182 7181 408453 26 API calls 7183 406767 7181->7183 7184 408453 26 API calls 7182->7184 7431 406903 7183->7431 7187 40673a 7184->7187 7189 408453 26 API calls 7187->7189 7188 408453 26 API calls 7190 406785 7188->7190 7191 406744 StartServiceCtrlDispatcherA 7189->7191 7192 408453 26 API calls 7190->7192 7193 406797 7191->7193 7194 40678f 7192->7194 7202 408d6d 7193->7202 7570 4046a2 7194->7570 7197 409215 7196->7197 7198 40921a 7196->7198 7199 40d78f 7 API calls 7197->7199 7200 40d7c8 7 API calls 7198->7200 7199->7198 7201 409223 ExitProcess 7200->7201 7203 408dad 3 API calls 7202->7203 7204 408d7a 7203->7204 7205 40d17b 7204->7205 7206 40d187 7205->7206 7207 40d2b0 UnhandledExceptionFilter 7206->7207 7208 4091d9 7206->7208 7207->7208 7232 408490 7209->7232 7212 40b6c0 7213 40b6da GetEnvironmentVariableA 7212->7213 7215 40b6d2 7212->7215 7214 40b7b7 7213->7214 7217 40b6f9 7213->7217 7214->7215 7237 40b66a GetModuleHandleA 7214->7237 7215->7095 7215->7096 7218 40b73e GetModuleFileNameA 7217->7218 7219 40b736 7217->7219 7218->7219 7219->7214 7234 40f70b 7219->7234 7222 40b9d2 7221->7222 7222->7099 7224 40c933 RtlAllocateHeap 7223->7224 7225 40c92c 7223->7225 7226 40c950 VirtualAlloc 7224->7226 7231 40c988 7224->7231 7225->7226 7227 40c970 VirtualAlloc 7226->7227 7228 40ca45 7226->7228 7229 40ca37 VirtualFree 7227->7229 7227->7231 7230 40ca4d HeapFree 7228->7230 7228->7231 7229->7228 7230->7231 7231->7099 7233 40849c GetVersionExA 7232->7233 7233->7212 7233->7213 7239 40f722 7234->7239 7238 40b681 7237->7238 7238->7215 7241 40f73a 7239->7241 7243 40f76a 7241->7243 7246 40e957 7241->7246 7242 40e957 6 API calls 7242->7243 7243->7242 7245 40f71e 7243->7245 7250 41190d 7243->7250 7245->7214 7247 40e975 7246->7247 7249 40e969 7246->7249 7256 410712 7247->7256 7249->7241 7251 411938 7250->7251 7255 41191b 7250->7255 7252 411954 7251->7252 7253 40e957 6 API calls 7251->7253 7252->7255 7268 41085b 7252->7268 7253->7252 7255->7243 7257 41075b 7256->7257 7258 410743 GetStringTypeW 7256->7258 7261 410786 GetStringTypeA 7257->7261 7262 4107aa 7257->7262 7258->7257 7259 41075f GetStringTypeA 7258->7259 7259->7257 7264 410847 7259->7264 7261->7264 7263 4107c0 MultiByteToWideChar 7262->7263 7262->7264 7263->7264 7265 4107e4 7263->7265 7264->7249 7265->7264 7266 41081e MultiByteToWideChar 7265->7266 7266->7264 7267 410837 GetStringTypeW 7266->7267 7267->7264 7269 4108a7 7268->7269 7270 41088b LCMapStringW 7268->7270 7272 4108f0 LCMapStringA 7269->7272 7273 41090d 7269->7273 7270->7269 7271 4108af LCMapStringA 7270->7271 7271->7269 7280 4109e9 7271->7280 7272->7280 7274 410923 MultiByteToWideChar 7273->7274 7273->7280 7275 41094d 7274->7275 7274->7280 7276 410983 MultiByteToWideChar 7275->7276 7275->7280 7277 41099c LCMapStringW 7276->7277 7276->7280 7278 4109b7 7277->7278 7277->7280 7279 4109bd 7278->7279 7282 4109fd 7278->7282 7279->7280 7281 4109cb LCMapStringW 7279->7281 7280->7255 7281->7280 7282->7280 7283 410a35 LCMapStringW 7282->7283 7283->7280 7284 410a4d WideCharToMultiByte 7283->7284 7284->7280 7295 409051 7286->7295 7289 4091e7 7290 4091f0 7289->7290 7291 4091f5 7289->7291 7332 40d78f 7290->7332 7338 40d7c8 7291->7338 7297 40904e 7295->7297 7298 409058 7295->7298 7297->7106 7297->7289 7298->7297 7299 40907d 7298->7299 7300 40908c 7299->7300 7302 4090a1 7299->7302 7307 40909a 7300->7307 7308 40bd52 7300->7308 7303 4090e0 RtlAllocateHeap 7302->7303 7302->7307 7314 40cc17 7302->7314 7304 4090ef 7303->7304 7304->7298 7305 40909f 7305->7298 7307->7303 7307->7304 7307->7305 7311 40bd84 7308->7311 7309 40be23 7313 40be32 7309->7313 7328 40c10c 7309->7328 7311->7309 7311->7313 7321 40c05b 7311->7321 7313->7307 7319 40cc25 7314->7319 7315 40cd11 VirtualAlloc 7320 40cce2 7315->7320 7316 40cde6 7317 40c91f 5 API calls 7316->7317 7317->7320 7319->7315 7319->7316 7319->7320 7320->7307 7322 40c09e RtlAllocateHeap 7321->7322 7323 40c06e RtlReAllocateHeap 7321->7323 7325 40c0ee 7322->7325 7326 40c0c4 VirtualAlloc 7322->7326 7324 40c08d 7323->7324 7323->7325 7324->7322 7325->7309 7326->7325 7327 40c0de HeapFree 7326->7327 7327->7325 7329 40c11e VirtualAlloc 7328->7329 7331 40c167 7329->7331 7331->7313 7333 40d799 7332->7333 7334 40d7c8 7 API calls 7333->7334 7337 40d7c6 7333->7337 7335 40d7b0 7334->7335 7336 40d7c8 7 API calls 7335->7336 7336->7337 7337->7291 7341 40d7db 7338->7341 7339 4091fe 7339->7106 7340 40d8f2 7344 40d905 GetStdHandle WriteFile 7340->7344 7341->7339 7341->7340 7342 40d81b 7341->7342 7342->7339 7343 40d827 GetModuleFileNameA 7342->7343 7345 40d83f 7343->7345 7344->7339 7347 40fe3f 7345->7347 7348 40fe4c LoadLibraryA 7347->7348 7349 40fe8e 7347->7349 7348->7349 7350 40fe5d GetProcAddress 7348->7350 7349->7339 7350->7349 7351 40fe74 GetProcAddress GetProcAddress 7350->7351 7351->7349 7353 408fd4 7352->7353 7361 408ff0 7352->7361 7354 408ff4 ctype 7353->7354 7355 408fde ctype 7353->7355 7356 40901f 7354->7356 7360 40900e 7354->7360 7357 409020 HeapFree 7355->7357 7358 408fea 7355->7358 7356->7357 7357->7361 7363 40ba29 7358->7363 7369 40cbd2 7360->7369 7361->7135 7364 40ba67 7363->7364 7368 40bd1d ctype 7363->7368 7365 40bc63 VirtualFree 7364->7365 7364->7368 7366 40bcc7 7365->7366 7367 40bcd6 VirtualFree HeapFree 7366->7367 7366->7368 7367->7368 7368->7361 7370 40cc15 7369->7370 7371 40cbff 7369->7371 7370->7361 7371->7370 7373 40cab9 7371->7373 7376 40cac6 7373->7376 7374 40cb76 7374->7370 7375 40cae7 VirtualFree 7375->7376 7376->7374 7376->7375 7378 40ca63 VirtualFree 7376->7378 7379 40ca80 7378->7379 7380 40cab0 7379->7380 7381 40ca90 HeapFree 7379->7381 7380->7376 7381->7376 7383 40fe2c 7382->7383 7384 40fe33 7382->7384 7386 40fa4f 7383->7386 7384->7141 7393 40fbe8 7386->7393 7388 40fbdc 7388->7384 7391 40fa92 GetCPInfo 7392 40faa6 7391->7392 7392->7388 7398 40fc8e GetCPInfo 7392->7398 7394 40fc08 7393->7394 7395 40fbf8 GetOEMCP 7393->7395 7396 40fa60 7394->7396 7397 40fc0d GetACP 7394->7397 7395->7394 7396->7388 7396->7391 7396->7392 7397->7396 7401 40fcb1 7398->7401 7405 40fd79 7398->7405 7399 410712 6 API calls 7400 40fd2d 7399->7400 7402 41085b 9 API calls 7400->7402 7401->7399 7403 40fd51 7402->7403 7404 41085b 9 API calls 7403->7404 7404->7405 7405->7388 7407 408453 26 API calls 7406->7407 7408 4067d3 7407->7408 7409 408453 26 API calls 7408->7409 7410 4067e1 7409->7410 7411 408453 26 API calls 7410->7411 7412 406886 7411->7412 7413 408453 26 API calls 7412->7413 7414 40688f 7413->7414 7415 408453 26 API calls 7414->7415 7416 4068ac 7415->7416 7417 408453 26 API calls 7416->7417 7418 4068b5 RegOpenKeyExA 7417->7418 7419 4068d9 RegCloseKey 7418->7419 7420 4066f8 7418->7420 7421 408453 26 API calls 7419->7421 7420->7173 7420->7174 7422 4068eb 7421->7422 7423 408453 26 API calls 7422->7423 7423->7420 7612 409bac 7424->7612 7430 406758 7430->7181 7432 408453 26 API calls 7431->7432 7433 40693a 7432->7433 7434 408453 26 API calls 7433->7434 7435 406948 GetModuleFileNameA 7434->7435 7436 408453 26 API calls 7435->7436 7437 406968 7436->7437 7438 408453 26 API calls 7437->7438 7439 406971 7438->7439 7440 408453 26 API calls 7439->7440 7441 40697a 7440->7441 7442 408453 26 API calls 7441->7442 7443 406983 7442->7443 7444 408453 26 API calls 7443->7444 7445 406a1f 7444->7445 7446 408453 26 API calls 7445->7446 7447 406a28 LoadLibraryA GetProcAddress 7446->7447 7448 408453 26 API calls 7447->7448 7449 406a53 7448->7449 7450 408453 26 API calls 7449->7450 7451 406a5c 7450->7451 7452 408453 26 API calls 7451->7452 7453 406a7a 7452->7453 7454 408453 26 API calls 7453->7454 7455 406a83 7454->7455 7456 406bb7 7455->7456 7457 408453 26 API calls 7455->7457 7458 408453 26 API calls 7456->7458 7459 406ab7 7457->7459 7460 406bdd 7458->7460 7461 408453 26 API calls 7459->7461 7462 408453 26 API calls 7460->7462 7463 406ac0 7461->7463 7464 406be6 OpenSCManagerA 7462->7464 7651 402673 GetTickCount 7463->7651 7466 406c17 CreateServiceA 7464->7466 7552 4075bf 7464->7552 7469 408453 26 API calls 7466->7469 7467 406ac7 7470 402673 GetTickCount 7467->7470 7472 406c7c 7469->7472 7474 406ad5 7470->7474 7473 408453 26 API calls 7472->7473 7475 406cad LockServiceDatabase 7473->7475 7476 402673 GetTickCount 7474->7476 7477 408453 26 API calls 7475->7477 7478 406ae1 7476->7478 7479 406cf7 7477->7479 7480 402673 GetTickCount 7478->7480 7481 408453 26 API calls 7479->7481 7482 406aed 7480->7482 7483 406d28 7481->7483 7484 402673 GetTickCount 7482->7484 7485 408453 26 API calls 7483->7485 7486 406af9 7484->7486 7487 406d67 7485->7487 7488 402673 GetTickCount 7486->7488 7489 408453 26 API calls 7487->7489 7490 406b05 wsprintfA 7488->7490 7492 406d98 ChangeServiceConfig2A 7489->7492 7491 406b2d 7490->7491 7494 408453 26 API calls 7491->7494 7493 408453 26 API calls 7492->7493 7495 406de5 7493->7495 7496 406b36 7494->7496 7497 408453 26 API calls 7495->7497 7498 408453 26 API calls 7496->7498 7499 406e16 7497->7499 7500 406b3f 7498->7500 7501 408453 26 API calls 7499->7501 7505 408453 26 API calls 7500->7505 7502 406e64 7501->7502 7503 408453 26 API calls 7502->7503 7504 406e95 7503->7504 7506 408453 26 API calls 7504->7506 7507 406b5e 7505->7507 7508 406ed0 7506->7508 7509 408453 26 API calls 7507->7509 7510 408453 26 API calls 7508->7510 7511 406b67 CopyFileA 7509->7511 7512 406f01 7510->7512 7513 408453 26 API calls 7511->7513 7514 408453 26 API calls 7512->7514 7515 406b89 7513->7515 7516 406f35 7514->7516 7517 408453 26 API calls 7515->7517 7518 408453 26 API calls 7516->7518 7519 406b92 7517->7519 7520 406f66 7518->7520 7522 408453 26 API calls 7519->7522 7521 408453 26 API calls 7520->7521 7523 406fab 7521->7523 7524 406bae 7522->7524 7525 408453 26 API calls 7523->7525 7526 408453 26 API calls 7524->7526 7527 406fdc 7525->7527 7526->7456 7528 408453 26 API calls 7527->7528 7529 40701e 7528->7529 7530 408453 26 API calls 7529->7530 7531 40704f 7530->7531 7532 408453 26 API calls 7531->7532 7533 407094 7532->7533 7534 408453 26 API calls 7533->7534 7535 4070c5 7534->7535 7536 408453 26 API calls 7535->7536 7537 40710f 7536->7537 7538 408453 26 API calls 7537->7538 7539 407140 ChangeServiceConfig2A 7538->7539 7540 408453 26 API calls 7539->7540 7541 407189 7540->7541 7542 408453 26 API calls 7541->7542 7543 4071ba UnlockServiceDatabase 7542->7543 7544 408453 26 API calls 7543->7544 7545 4071fa 7544->7545 7546 408453 26 API calls 7545->7546 7547 40722b 7546->7547 7548 407271 StartServiceA 7547->7548 7549 407237 GetLastError 7547->7549 7551 407289 7548->7551 7548->7552 7549->7548 7550 407244 OpenServiceA 7549->7550 7550->7552 7553 407266 StartServiceA 7550->7553 7554 408453 26 API calls 7551->7554 7653 4075ee 7552->7653 7553->7548 7555 4073c2 7554->7555 7556 408453 26 API calls 7555->7556 7557 4073f3 7556->7557 7558 408453 26 API calls 7557->7558 7559 407433 7558->7559 7560 408453 26 API calls 7559->7560 7561 407464 RegOpenKeyA 7560->7561 7562 408453 26 API calls 7561->7562 7563 4074b1 7562->7563 7564 408453 26 API calls 7563->7564 7565 4074e2 7564->7565 7566 408453 26 API calls 7565->7566 7567 407567 7566->7567 7568 408453 26 API calls 7567->7568 7569 407598 lstrlen RegSetValueExA 7568->7569 7569->7552 7571 408453 26 API calls 7570->7571 7572 4046bd 7571->7572 7573 408453 26 API calls 7572->7573 7574 4046cb 7573->7574 7575 408453 26 API calls 7574->7575 7576 4046e6 7575->7576 7577 408453 26 API calls 7576->7577 7578 4046ef GetModuleFileNameA 7577->7578 7579 408453 26 API calls 7578->7579 7580 404709 7579->7580 7581 408453 26 API calls 7580->7581 7582 404712 7581->7582 7583 408453 26 API calls 7582->7583 7584 40471b 7583->7584 7585 408453 26 API calls 7584->7585 7586 404724 GetTempPathA 7585->7586 7587 408453 26 API calls 7586->7587 7588 40473f 7587->7588 7589 408453 26 API calls 7588->7589 7590 404748 GetTickCount wsprintfA 7589->7590 7591 408453 26 API calls 7590->7591 7592 40477c 7591->7592 7593 408453 26 API calls 7592->7593 7594 404785 MoveFileA 7593->7594 7595 4047cb MoveFileExA 7594->7595 7596 40479f 7594->7596 7598 4047dc 7595->7598 7597 408453 26 API calls 7596->7597 7599 4047a8 7597->7599 7598->7193 7600 408453 26 API calls 7599->7600 7601 4047b1 MoveFileExA 7600->7601 7601->7598 7668 40b5ed 7602->7668 7605 408e96 7608 408eb3 7605->7608 7677 40b40f 7605->7677 7606 408e7e 7607 4066e9 7606->7607 7674 40b5a9 GetFileAttributesA 7606->7674 7607->7175 7608->7607 7696 40b2ac 7608->7696 7614 409bb9 7612->7614 7613 408461 7616 409345 7613->7616 7614->7613 7615 40903f 12 API calls 7614->7615 7615->7613 7617 408472 7616->7617 7619 40936d __aulldiv __aullrem 7616->7619 7625 409c39 7617->7625 7618 409ae3 18 API calls 7618->7619 7619->7617 7619->7618 7620 40903f 12 API calls 7619->7620 7621 40dbfd WideCharToMultiByte 7619->7621 7622 408fc8 ctype 7 API calls 7619->7622 7623 409b18 18 API calls 7619->7623 7624 409b49 18 API calls 7619->7624 7620->7619 7621->7619 7622->7619 7623->7619 7624->7619 7626 409c41 7625->7626 7627 409c63 7625->7627 7628 409c73 7626->7628 7632 409f88 7626->7632 7627->7628 7630 409f88 6 API calls 7627->7630 7628->7430 7630->7628 7633 409f9e 7632->7633 7635 409c51 7632->7635 7633->7635 7636 40d9e6 7633->7636 7635->7430 7637 40da30 7636->7637 7639 40da01 7636->7639 7637->7635 7638 40da44 7641 40db16 WriteFile 7638->7641 7645 40da55 7638->7645 7639->7637 7639->7638 7646 40d94c 7639->7646 7641->7637 7642 40db38 GetLastError 7641->7642 7642->7637 7643 40daa1 WriteFile 7644 40db0b GetLastError 7643->7644 7643->7645 7644->7637 7645->7637 7645->7643 7647 40d95b 7646->7647 7650 40d984 7646->7650 7648 40d990 SetFilePointer 7647->7648 7647->7650 7649 40d9a8 GetLastError 7648->7649 7648->7650 7649->7650 7650->7638 7652 402681 7651->7652 7652->7467 7654 407603 7653->7654 7655 4075f7 CloseServiceHandle 7653->7655 7656 408453 26 API calls 7654->7656 7655->7654 7657 40760c 7656->7657 7658 408453 26 API calls 7657->7658 7659 407615 7658->7659 7660 407621 CloseServiceHandle 7659->7660 7661 40762d 7659->7661 7660->7661 7662 408453 26 API calls 7661->7662 7663 407636 7662->7663 7664 408453 26 API calls 7663->7664 7665 40763f 7664->7665 7666 40677b 7665->7666 7667 40764b RegCloseKey 7665->7667 7666->7188 7667->7666 7669 40b5ff 7668->7669 7673 408e71 7668->7673 7671 40b610 7669->7671 7669->7673 7707 40f69d 7669->7707 7671->7673 7714 40f65e 7671->7714 7673->7605 7673->7606 7675 40b5b8 GetLastError 7674->7675 7676 40b5c4 7674->7676 7675->7676 7676->7607 7681 40b424 7677->7681 7678 40b4c3 7683 40903f 12 API calls 7678->7683 7679 40b496 7680 40b5a9 2 API calls 7679->7680 7682 40b49e 7680->7682 7685 40903f 12 API calls 7681->7685 7689 40b458 7681->7689 7684 40b4b8 7682->7684 7798 40b558 7682->7798 7690 40b4d2 7683->7690 7686 40b4dd 7684->7686 7688 408fc8 ctype 7 API calls 7684->7688 7685->7689 7686->7608 7688->7686 7689->7678 7689->7679 7689->7686 7690->7686 7691 40b5a9 2 API calls 7690->7691 7692 40b522 7690->7692 7694 40b520 7690->7694 7691->7690 7693 40b558 38 API calls 7692->7693 7693->7694 7695 408fc8 ctype 7 API calls 7694->7695 7695->7684 7697 40b40f 40 API calls 7696->7697 7698 40b2c4 7697->7698 7699 40b5ed 43 API calls 7698->7699 7704 40b406 7698->7704 7700 40b2fe 7699->7700 7701 40903f 12 API calls 7700->7701 7700->7704 7705 40b313 7701->7705 7702 40b400 7703 408fc8 ctype 7 API calls 7702->7703 7703->7704 7704->7607 7705->7702 7705->7704 7706 40b40f 40 API calls 7705->7706 7706->7705 7708 40f6fe 7707->7708 7713 40f6b0 7707->7713 7708->7671 7709 40f6b6 WideCharToMultiByte 7709->7708 7709->7713 7710 40903f 12 API calls 7710->7713 7711 40f6d7 WideCharToMultiByte 7711->7708 7711->7713 7713->7708 7713->7709 7713->7710 7713->7711 7719 4116bf 7713->7719 7715 40f667 7714->7715 7716 40f66b 7714->7716 7715->7671 7782 411417 7716->7782 7720 4116ce 7719->7720 7743 411723 7719->7743 7721 411703 7720->7721 7720->7743 7744 41189e 7720->7744 7723 41171f 7721->7723 7725 41172b 7721->7725 7727 41171a 7721->7727 7723->7743 7753 411846 7723->7753 7728 40903f 12 API calls 7725->7728 7725->7743 7730 40f69d 42 API calls 7727->7730 7731 41173a 7728->7731 7729 4117c1 7733 40aede 24 API calls 7729->7733 7729->7743 7730->7723 7731->7723 7735 40903f 12 API calls 7731->7735 7731->7743 7732 411783 7734 408fc8 ctype 7 API calls 7732->7734 7737 4117b1 7732->7737 7733->7737 7736 411792 7734->7736 7735->7723 7757 40aede 7736->7757 7739 40903f 12 API calls 7737->7739 7737->7743 7740 411809 7739->7740 7741 41181a SetEnvironmentVariableA 7740->7741 7740->7743 7742 408fc8 ctype 7 API calls 7741->7742 7742->7743 7743->7713 7745 4118a9 7744->7745 7746 4118ad 7744->7746 7745->7721 7747 40903f 12 API calls 7746->7747 7748 4118cf 7747->7748 7749 4118df 7748->7749 7750 4091e7 7 API calls 7748->7750 7751 4118fb 7749->7751 7778 411cb0 7749->7778 7750->7749 7751->7721 7754 411776 7753->7754 7756 411854 7753->7756 7754->7729 7754->7732 7755 40f65e 9 API calls 7755->7756 7756->7754 7756->7755 7758 40aef9 7757->7758 7759 40aeeb 7757->7759 7760 40af00 7758->7760 7761 40af0e 7758->7761 7762 40903f 12 API calls 7759->7762 7763 408fc8 ctype 7 API calls 7760->7763 7764 40b01e 7761->7764 7767 40af1c ctype 7761->7767 7766 40aef3 7762->7766 7763->7766 7765 40b139 7764->7765 7776 40b027 ctype 7764->7776 7765->7766 7768 40b147 RtlReAllocateHeap 7765->7768 7766->7737 7767->7766 7769 40afdc RtlReAllocateHeap 7767->7769 7771 40af95 RtlAllocateHeap 7767->7771 7773 40bd52 5 API calls 7767->7773 7774 40ba29 VirtualFree VirtualFree HeapFree ctype 7767->7774 7768->7765 7768->7766 7769->7767 7770 40b0ff RtlReAllocateHeap 7770->7776 7771->7767 7772 40b0c3 RtlAllocateHeap 7772->7776 7773->7767 7774->7767 7775 40cc17 6 API calls 7775->7776 7776->7766 7776->7770 7776->7772 7776->7775 7777 40cbd2 VirtualFree HeapFree VirtualFree ctype 7776->7777 7777->7776 7779 411cb9 7778->7779 7781 411cc6 7778->7781 7780 40903f 12 API calls 7779->7780 7780->7781 7781->7749 7783 41144a CompareStringW 7782->7783 7785 41145f 7782->7785 7784 411467 CompareStringA 7783->7784 7783->7785 7784->7785 7794 40f68a 7784->7794 7786 4114c0 CompareStringA 7785->7786 7787 4114db 7785->7787 7786->7794 7788 411595 MultiByteToWideChar 7787->7788 7789 41151a GetCPInfo 7787->7789 7787->7794 7791 4115b1 7788->7791 7788->7794 7790 41152f 7789->7790 7789->7794 7790->7788 7790->7794 7792 4115ed MultiByteToWideChar 7791->7792 7791->7794 7793 411607 MultiByteToWideChar 7792->7793 7792->7794 7793->7794 7795 41161f 7793->7795 7794->7671 7795->7794 7796 411653 MultiByteToWideChar 7795->7796 7796->7794 7797 41166a CompareStringW 7796->7797 7797->7794 7808 40f3f3 7798->7808 7800 40b579 7800->7684 7801 40b571 7801->7800 7822 40f214 7801->7822 7803 40b58f 7804 408fc8 ctype 7 API calls 7803->7804 7805 40b599 7804->7805 7806 408fc8 ctype 7 API calls 7805->7806 7807 40b5a1 7806->7807 7807->7684 7809 40f401 7808->7809 7810 40903f 12 API calls 7809->7810 7811 40f41d 7810->7811 7812 40d65d 27 API calls 7811->7812 7814 40f484 7811->7814 7815 40f44f 7811->7815 7821 40f427 7811->7821 7812->7814 7813 40f558 7813->7801 7816 40903f 12 API calls 7814->7816 7814->7821 7815->7813 7817 408fc8 ctype 7 API calls 7815->7817 7818 40f4f8 7816->7818 7817->7821 7818->7815 7819 40f506 7818->7819 7820 408fc8 ctype 7 API calls 7819->7820 7820->7821 7821->7801 7824 40f22d 7822->7824 7828 40f264 7824->7828 7837 409e44 7824->7837 7826 408fc8 ctype 7 API calls 7827 40f389 7826->7827 7827->7828 7829 40f3a6 7827->7829 7843 408d7e 7827->7843 7828->7803 7832 40f3d0 7829->7832 7833 40f3b1 WaitForSingleObject GetExitCodeProcess CloseHandle 7829->7833 7830 40f2cb CreateProcessA GetLastError 7830->7826 7835 40f3e0 7832->7835 7836 40f3d6 CloseHandle 7832->7836 7834 40f3e6 CloseHandle 7833->7834 7834->7828 7835->7834 7836->7834 7840 409e58 7837->7840 7838 409eaf RtlAllocateHeap 7838->7840 7842 409eda 7838->7842 7839 40bd52 5 API calls 7839->7840 7840->7838 7840->7839 7841 40cc17 6 API calls 7840->7841 7840->7842 7841->7840 7842->7830 7846 408dad 7843->7846 7847 408db9 GetCurrentProcess TerminateProcess 7846->7847 7848 408dca 7846->7848 7847->7848 7849 408d8b 7848->7849 7850 408e34 ExitProcess 7848->7850 7849->7829 8047 403471 8048 408453 26 API calls 8047->8048 8049 40348b 8048->8049 8050 408453 26 API calls 8049->8050 8051 40349a 8050->8051 8052 408453 26 API calls 8051->8052 8053 4034b8 8052->8053 8054 408453 26 API calls 8053->8054 8055 4034c2 Sleep 8054->8055 8898 40e1f5 8899 40d7c8 7 API calls 8898->8899 8900 40e1fc 8899->8900 8907 410450 8900->8907 8903 408d7e 3 API calls 8904 40e20c 8903->8904 8905 40e21a 8904->8905 8906 40e221 52 API calls 8904->8906 8906->8905 8908 41045e 8907->8908 8909 408d7e 3 API calls 8908->8909 8910 40e203 8908->8910 8909->8910 8910->8903 8056 407977 8057 4079a3 GetIfTable 8056->8057 8058 407988 GetIfTable 8056->8058 8062 4079b4 8057->8062 8064 4079e6 8057->8064 8058->8057 8059 407998 8058->8059 8060 40903f 12 API calls 8059->8060 8061 40799f 8060->8061 8061->8057 8063 409031 12 API calls 8062->8063 8062->8064 8063->8064 8065 405178 8132 402e73 8065->8132 8067 405189 8068 4056c3 8067->8068 8158 402fd5 setsockopt 8067->8158 8070 4051a0 8071 4051b7 RegOpenKeyExA 8070->8071 8072 405201 8071->8072 8073 4051da RegQueryValueExA RegCloseKey 8071->8073 8181 4037ab 8072->8181 8073->8072 8075 40533d GetSystemInfo 8076 408453 26 API calls 8075->8076 8077 40535e 8076->8077 8078 408453 26 API calls 8077->8078 8079 40536c 8078->8079 8080 408453 26 API calls 8079->8080 8081 40537e 8080->8081 8082 408453 26 API calls 8081->8082 8083 405387 GetComputerNameA 8082->8083 8084 408453 26 API calls 8083->8084 8085 4053a1 8084->8085 8086 408453 26 API calls 8085->8086 8087 4053aa GetSystemDefaultUILanguage 8086->8087 8088 408453 26 API calls 8087->8088 8089 4053c2 8088->8089 8090 408453 26 API calls 8089->8090 8091 4053cb 8090->8091 8092 408453 26 API calls 8091->8092 8093 4053e5 8092->8093 8094 408453 26 API calls 8093->8094 8095 4053ee 8094->8095 8096 408453 26 API calls 8095->8096 8097 4053f7 8096->8097 8098 408453 26 API calls 8097->8098 8099 405403 8098->8099 8100 408453 26 API calls 8099->8100 8101 40542e 8100->8101 8102 408453 26 API calls 8101->8102 8103 405437 send 8102->8103 8104 4056b7 closesocket 8103->8104 8105 40545e select 8103->8105 8104->8068 8105->8104 8111 40548e 8105->8111 8106 405492 __WSAFDIsSet 8106->8105 8107 4054a8 recv 8106->8107 8108 4056ab closesocket 8107->8108 8107->8111 8108->8104 8110 408453 26 API calls 8110->8111 8111->8105 8111->8106 8111->8108 8111->8110 8112 408453 26 API calls 8111->8112 8206 404aa9 8111->8206 8113 40554d GetTempPathA 8112->8113 8114 408453 26 API calls 8113->8114 8117 40556b 8114->8117 8115 408453 26 API calls 8115->8117 8116 402673 GetTickCount 8116->8117 8117->8115 8117->8116 8118 402673 GetTickCount 8117->8118 8119 4055ad wsprintfA 8118->8119 8121 4055d7 8119->8121 8120 408453 26 API calls 8120->8121 8121->8120 8122 408453 26 API calls 8121->8122 8123 4055fe LoadLibraryA 8122->8123 8124 408453 26 API calls 8123->8124 8125 405618 8124->8125 8126 408453 26 API calls 8125->8126 8127 405621 GetProcAddress 8126->8127 8128 408453 26 API calls 8127->8128 8129 40563e 8128->8129 8130 408453 26 API calls 8129->8130 8131 405661 WinExec 8129->8131 8130->8129 8131->8105 8133 402e7d __EH_prolog 8132->8133 8134 408453 26 API calls 8133->8134 8135 402f04 8134->8135 8136 408453 26 API calls 8135->8136 8137 402f12 htons 8136->8137 8138 408453 26 API calls 8137->8138 8139 402f2d 8138->8139 8140 408453 26 API calls 8139->8140 8141 402f36 8140->8141 8270 4024ff inet_addr 8141->8270 8144 408453 26 API calls 8145 402f4b 8144->8145 8146 408453 26 API calls 8145->8146 8147 402f54 socket 8146->8147 8148 408453 26 API calls 8147->8148 8149 402f6f 8148->8149 8150 408453 26 API calls 8149->8150 8151 402f78 connect 8150->8151 8152 402f9d 8151->8152 8153 402f8f closesocket 8151->8153 8155 408453 26 API calls 8152->8155 8154 402faf ctype 8153->8154 8154->8067 8156 402fa6 8155->8156 8157 408453 26 API calls 8156->8157 8157->8154 8159 402ff9 8158->8159 8160 40309f 8158->8160 8161 408453 26 API calls 8159->8161 8160->8070 8162 40300d 8161->8162 8163 408453 26 API calls 8162->8163 8164 40301b 8163->8164 8165 408453 26 API calls 8164->8165 8166 403024 8165->8166 8167 408453 26 API calls 8166->8167 8168 40302d 8167->8168 8169 408453 26 API calls 8168->8169 8170 40303d 8169->8170 8171 408453 26 API calls 8170->8171 8172 403046 8171->8172 8173 408453 26 API calls 8172->8173 8174 403059 8173->8174 8175 408453 26 API calls 8174->8175 8176 403062 8175->8176 8177 408453 26 API calls 8176->8177 8178 403072 8177->8178 8179 408453 26 API calls 8178->8179 8180 40307b WSAIoctl 8179->8180 8180->8160 8182 408453 26 API calls 8181->8182 8183 4037c3 8182->8183 8184 408453 26 API calls 8183->8184 8185 4037d1 8184->8185 8186 408453 26 API calls 8185->8186 8187 4037da 8186->8187 8188 408453 26 API calls 8187->8188 8189 4037e3 8188->8189 8190 408453 26 API calls 8189->8190 8191 4037f3 8190->8191 8192 408453 26 API calls 8191->8192 8193 4037fc 8192->8193 8194 408453 26 API calls 8193->8194 8195 40380c 8194->8195 8196 408453 26 API calls 8195->8196 8197 403815 RegOpenKeyA 8196->8197 8198 408453 26 API calls 8197->8198 8199 403836 8198->8199 8200 408453 26 API calls 8199->8200 8201 40383f RegQueryValueExA 8200->8201 8202 408453 26 API calls 8201->8202 8203 40386b 8202->8203 8204 408453 26 API calls 8203->8204 8205 403874 RegCloseKey 8204->8205 8205->8075 8207 408453 26 API calls 8206->8207 8208 404abf 8207->8208 8209 408453 26 API calls 8208->8209 8210 404acd 8209->8210 8211 408453 26 API calls 8210->8211 8255 404b70 8210->8255 8212 404aee 8211->8212 8213 408453 26 API calls 8212->8213 8214 404af7 8213->8214 8215 404b11 8214->8215 8216 404d42 8214->8216 8217 404ed3 8214->8217 8218 404b75 8214->8218 8219 404c16 8214->8219 8220 404dc6 8214->8220 8221 404bd9 8214->8221 8222 404c7a 8214->8222 8223 404cde 8214->8223 8224 404d7e 8214->8224 8225 404e4e 8214->8225 8214->8255 8227 404b20 CreateThread CloseHandle 8215->8227 8215->8255 8231 404d51 CreateThread CloseHandle 8216->8231 8241 404d79 8216->8241 8250 404ee6 CreateThread CloseHandle CreateThread 8217->8250 8217->8255 8232 404b84 CreateThread CloseHandle 8218->8232 8218->8255 8228 404c25 CreateThread CloseHandle 8219->8228 8219->8255 8234 404e12 8220->8234 8235 404dce 8220->8235 8236 404c05 CreateThread 8221->8236 8237 404be8 CreateThread CloseHandle 8221->8237 8233 404c89 CreateThread CloseHandle 8222->8233 8222->8255 8226 404ced CreateThread CloseHandle 8223->8226 8223->8255 8243 404d91 CreateThread CloseHandle CreateThread 8224->8243 8224->8255 8229 404e56 8225->8229 8230 404e9a 8225->8230 8239 408453 26 API calls 8226->8239 8240 408453 26 API calls 8227->8240 8273 4030a1 8227->8273 8246 408453 26 API calls 8228->8246 8229->8241 8247 404e6a CreateThread CloseHandle 8229->8247 8230->8241 8248 404ea9 CreateThread CloseHandle 8230->8248 8231->8231 8231->8241 8242 408453 26 API calls 8232->8242 8249 408453 26 API calls 8233->8249 8234->8241 8245 404e21 CreateThread CloseHandle 8234->8245 8235->8241 8244 404de2 CreateThread CloseHandle 8235->8244 8236->8255 8237->8236 8237->8237 8238 408453 26 API calls 8251 404f50 8238->8251 8252 404d0d 8239->8252 8253 404b40 8240->8253 8241->8238 8254 404ba4 8242->8254 8243->8243 8243->8255 8244->8241 8244->8244 8245->8241 8245->8245 8256 404c45 8246->8256 8247->8241 8247->8247 8248->8241 8248->8248 8257 404ca9 8249->8257 8250->8250 8250->8255 8258 408453 26 API calls 8251->8258 8259 408453 26 API calls 8252->8259 8260 408453 26 API calls 8253->8260 8261 408453 26 API calls 8254->8261 8255->8111 8262 408453 26 API calls 8256->8262 8263 408453 26 API calls 8257->8263 8264 404f59 CreateThread 8258->8264 8265 404d16 CreateThread 8259->8265 8266 404b49 CreateThread 8260->8266 8267 404bad CreateThread 8261->8267 8268 404c4e CreateThread 8262->8268 8269 404cb2 CreateThread 8263->8269 8264->8255 8265->8226 8265->8255 8266->8227 8266->8255 8267->8232 8267->8255 8268->8228 8268->8255 8269->8233 8269->8255 8271 40250d gethostbyname 8270->8271 8272 40251b 8270->8272 8271->8272 8272->8144 8274 4030c1 8273->8274 8275 408453 26 API calls 8274->8275 8276 4030d2 8275->8276 8277 408453 26 API calls 8276->8277 8278 4030e2 WSAStartup 8277->8278 8279 408453 26 API calls 8278->8279 8280 403101 8279->8280 8281 408453 26 API calls 8280->8281 8282 403109 8281->8282 8283 408453 26 API calls 8282->8283 8284 403127 8283->8284 8285 408453 26 API calls 8284->8285 8286 40312f htons 8285->8286 8287 408453 26 API calls 8286->8287 8288 40314a 8287->8288 8289 408453 26 API calls 8288->8289 8290 403152 8289->8290 8291 4024ff 2 API calls 8290->8291 8292 40315c 8291->8292 8293 408453 26 API calls 8292->8293 8294 403169 8293->8294 8295 408453 26 API calls 8294->8295 8296 403171 socket connect 8295->8296 8297 403196 closesocket 8296->8297 8298 4031af socket setsockopt 8296->8298 8299 408453 26 API calls 8298->8299 8300 4031e1 8299->8300 8301 408453 26 API calls 8300->8301 8302 4031e9 8301->8302 8303 408453 26 API calls 8302->8303 8304 4031f2 8303->8304 8305 408453 26 API calls 8304->8305 8307 4031fa 8305->8307 8306 4024ff 2 API calls 8306->8307 8307->8306 8309 40323e GetCurrentProcess SetProcessWorkingSetSize 8307->8309 8310 4032bf closesocket RtlExitUserThread 8307->8310 8355 402524 socket 8307->8355 8312 408453 26 API calls 8309->8312 8311 4032f1 8310->8311 8314 408453 26 API calls 8311->8314 8313 403258 8312->8313 8315 408453 26 API calls 8313->8315 8317 403302 8314->8317 8316 403260 sendto 8315->8316 8318 408453 26 API calls 8316->8318 8319 408453 26 API calls 8317->8319 8320 40328b 8318->8320 8321 403310 WSAStartup 8319->8321 8322 408453 26 API calls 8320->8322 8323 408453 26 API calls 8321->8323 8324 403293 closesocket Sleep 8322->8324 8325 40332f 8323->8325 8324->8307 8326 408453 26 API calls 8325->8326 8327 403338 8326->8327 8328 402673 GetTickCount 8327->8328 8329 40333f 8328->8329 8330 402673 GetTickCount 8329->8330 8331 40334f 8330->8331 8332 402673 GetTickCount 8331->8332 8333 403358 8332->8333 8334 408453 26 API calls 8333->8334 8335 403373 8334->8335 8336 408453 26 API calls 8335->8336 8337 40337c 8336->8337 8338 408453 26 API calls 8337->8338 8339 403393 8338->8339 8340 408453 26 API calls 8339->8340 8341 40339c htons 8340->8341 8342 408453 26 API calls 8341->8342 8343 4033bf 8342->8343 8344 408453 26 API calls 8343->8344 8345 4033c8 8344->8345 8346 40260a 2 API calls 8345->8346 8347 4033d2 8346->8347 8348 408453 26 API calls 8347->8348 8349 4033df 8348->8349 8350 408453 26 API calls 8349->8350 8351 4033e8 socket connect socket setsockopt 8350->8351 8352 40342a 8351->8352 8353 403462 8352->8353 8354 403434 sendto Sleep 8352->8354 8354->8352 8356 402570 8355->8356 8357 40253e htons connect 8355->8357 8356->8307 8357->8356 8358 402569 closesocket 8357->8358 8358->8356 8911 40c4fd 8912 40c50a VirtualFree 8911->8912 8915 40c5bd ctype 8911->8915 8913 40c56b 8912->8913 8914 40c583 HeapFree 8913->8914 8913->8915 8914->8915 8359 40de02 8360 40de11 8359->8360 8361 40de34 8360->8361 8363 40de9e IsBadCodePtr 8360->8363 8364 40deb0 8363->8364 8364->8361 8365 40b903 8366 40b929 8365->8366 8373 40b911 8365->8373 8367 40b66a GetModuleHandleA 8366->8367 8366->8373 8368 40b959 8367->8368 8369 40b960 8368->8369 8370 40b985 8368->8370 8372 40b9b6 RtlAllocateHeap 8369->8372 8369->8373 8371 40c91f 5 API calls 8370->8371 8370->8373 8371->8373 8372->8373 8374 41030c 8376 41031d 8374->8376 8378 41033d 8374->8378 8375 410395 SetConsoleCtrlHandler 8377 4103cb GetLastError 8375->8377 8375->8378 8376->8375 8376->8378 8377->8378 8916 40388d 8917 408453 26 API calls 8916->8917 8918 4038aa 8917->8918 8919 408453 26 API calls 8918->8919 8920 4038b8 8919->8920 8921 408453 26 API calls 8920->8921 8922 4038d5 8921->8922 8923 408453 26 API calls 8922->8923 8924 4038de 8923->8924 8925 408453 26 API calls 8924->8925 8926 4038e7 8925->8926 8927 408453 26 API calls 8926->8927 8928 4038f3 8927->8928 8929 408453 26 API calls 8928->8929 8930 403919 8929->8930 8931 408453 26 API calls 8930->8931 8932 403922 WSASocketA 8931->8932 8933 403c25 8932->8933 8934 403946 8932->8934 8935 408453 26 API calls 8934->8935 8936 40394f 8935->8936 8937 408453 26 API calls 8936->8937 8938 403958 setsockopt 8937->8938 8938->8933 8939 40397e 8938->8939 8940 408453 26 API calls 8939->8940 8941 403987 8940->8941 8942 408453 26 API calls 8941->8942 8943 403990 setsockopt 8942->8943 8943->8933 8944 4039bc 8943->8944 8945 408453 26 API calls 8944->8945 8946 4039c5 8945->8946 8947 408453 26 API calls 8946->8947 8948 4039ce inet_addr 8947->8948 8949 408453 26 API calls 8948->8949 8950 4039fb 8949->8950 8951 408453 26 API calls 8950->8951 8952 403a04 htons 8951->8952 8979 408295 8952->8979 8954 403a2e inet_addr inet_addr 8955 408453 26 API calls 8954->8955 8956 403a69 8955->8956 8957 408453 26 API calls 8956->8957 8958 403a73 8957->8958 8959 403a7b htons htons 8958->8959 8980 408295 8959->8980 8961 403a9c htonl htons 8962 408453 26 API calls 8961->8962 8963 403ada 8962->8963 8964 408453 26 API calls 8963->8964 8965 403ae4 htons 8964->8965 8966 408453 26 API calls 8965->8966 8967 403b0f 8966->8967 8968 408453 26 API calls 8967->8968 8969 403b18 8968->8969 8970 408453 26 API calls 8969->8970 8971 403b57 8970->8971 8972 408453 26 API calls 8971->8972 8973 403b63 8972->8973 8974 408453 26 API calls 8973->8974 8975 403bb2 8974->8975 8976 408453 26 API calls 8975->8976 8977 403bbe 8976->8977 8977->8933 8978 403bf9 sendto Sleep 8977->8978 8978->8977 8979->8954 8980->8961 8379 41080f 8380 410816 8379->8380 8381 410847 8380->8381 8382 41081e MultiByteToWideChar 8380->8382 8382->8381 8383 410837 GetStringTypeW 8382->8383 8383->8381 8981 408d8f 8982 408dad 3 API calls 8981->8982 8983 408d9a 8982->8983 8984 410191 8985 41019e GetFileType 8984->8985 8987 4101c0 GetLastError 8985->8987 8988 4101d2 8985->8988 8991 4101cc 8987->8991 8993 40ffce 8988->8993 8995 40ffdd 8993->8995 8994 40903f 12 API calls 8996 410018 8994->8996 8995->8994 8995->8996 8996->8991 8997 410063 8996->8997 8998 4100b9 8997->8998 8999 410071 8997->8999 8998->8991 8999->8998 9000 4100b3 SetStdHandle 8999->9000 9000->8998 8384 407711 GetSystemInfo 8385 407739 8384->8385 8387 407745 8384->8387 8386 409031 12 API calls 8385->8386 8386->8387 8388 406412 8389 406601 8388->8389 8390 406434 8388->8390 8391 408453 26 API calls 8389->8391 8392 406575 8390->8392 8393 40643b 8390->8393 8395 406614 8391->8395 8394 408453 26 API calls 8392->8394 8396 4064d0 8393->8396 8397 406442 8393->8397 8398 40657e 8394->8398 8399 408453 26 API calls 8395->8399 8400 408453 26 API calls 8396->8400 8404 408453 26 API calls 8397->8404 8465 406563 8397->8465 8401 408453 26 API calls 8398->8401 8403 40661d SetServiceStatus 8399->8403 8405 4064d9 8400->8405 8406 406587 8401->8406 8402 408453 26 API calls 8407 406698 8402->8407 8408 408453 26 API calls 8403->8408 8409 406453 8404->8409 8410 408453 26 API calls 8405->8410 8411 408453 26 API calls 8406->8411 8412 408453 26 API calls 8407->8412 8413 406640 8408->8413 8414 408453 26 API calls 8409->8414 8415 4064e2 8410->8415 8417 40659a 8411->8417 8418 4066a1 SetServiceStatus 8412->8418 8419 408453 26 API calls 8413->8419 8420 40645c 8414->8420 8416 408453 26 API calls 8415->8416 8421 4064f5 8416->8421 8422 408453 26 API calls 8417->8422 8423 406649 Sleep 8419->8423 8424 408453 26 API calls 8420->8424 8426 408453 26 API calls 8421->8426 8427 4065a3 8422->8427 8428 408453 26 API calls 8423->8428 8425 40646f 8424->8425 8429 408453 26 API calls 8425->8429 8430 4064fe SetServiceStatus 8426->8430 8431 408453 26 API calls 8427->8431 8432 406660 8428->8432 8433 406478 8429->8433 8434 408453 26 API calls 8430->8434 8435 4065b2 8431->8435 8436 408453 26 API calls 8432->8436 8437 408453 26 API calls 8433->8437 8438 406521 8434->8438 8439 408453 26 API calls 8435->8439 8440 406669 8436->8440 8441 40648b 8437->8441 8442 408453 26 API calls 8438->8442 8443 4065bb SetServiceStatus 8439->8443 8444 408453 26 API calls 8440->8444 8445 408453 26 API calls 8441->8445 8446 40652a Sleep 8442->8446 8447 408453 26 API calls 8443->8447 8448 406679 8444->8448 8450 406494 SetServiceStatus 8445->8450 8451 408453 26 API calls 8446->8451 8452 4065d4 8447->8452 8449 408453 26 API calls 8448->8449 8449->8465 8453 408453 26 API calls 8450->8453 8454 406541 8451->8454 8455 408453 26 API calls 8452->8455 8457 4064ad 8453->8457 8458 408453 26 API calls 8454->8458 8456 4065dd Sleep 8455->8456 8456->8465 8459 408453 26 API calls 8457->8459 8460 40654a 8458->8460 8461 4064b6 Sleep 8459->8461 8462 408453 26 API calls 8460->8462 8461->8465 8463 40655a 8462->8463 8464 408453 26 API calls 8463->8464 8464->8465 8465->8402 9003 408a93 9004 408a98 9003->9004 9007 40aa7a GetModuleHandleA 9004->9007 9006 408a9d 9008 40aa89 GetProcAddress 9007->9008 9009 40aa99 9007->9009 9008->9009 9009->9006 8466 404f14 8467 404f47 8466->8467 8468 404f1f CreateThread CloseHandle 8466->8468 8469 408453 26 API calls 8467->8469 8468->8467 8468->8468 8470 404f50 8469->8470 8471 408453 26 API calls 8470->8471 8472 404f59 CreateThread 8471->8472 8473 404f6f 8472->8473 9010 402496 9011 40249e ctype 9010->9011 9012 4024ab 9011->9012 9013 408205 ctype 7 API calls 9011->9013 9013->9012 9014 40839a 9015 4083a7 9014->9015 9016 409e44 12 API calls 9015->9016 9017 4083c1 9016->9017 9018 409e44 12 API calls 9017->9018 9020 4083ec 9017->9020 9019 4083da 9018->9019 9019->9020 9021 4091e7 7 API calls 9019->9021 9021->9020 9022 408b9a 9023 40903f 12 API calls 9022->9023 9025 408ba4 9023->9025 9024 408bb5 9025->9024 9026 4091e7 7 API calls 9025->9026 9026->9024 8477 409e21 8478 409e27 8477->8478 8479 408fc8 ctype 7 API calls 8478->8479 8480 409e42 8478->8480 8479->8478 8481 410a23 8482 410a31 8481->8482 8483 410a35 LCMapStringW 8482->8483 8484 4109e9 8482->8484 8483->8484 8485 410a4d WideCharToMultiByte 8483->8485 8485->8484 8487 405724 8488 405750 closesocket 8487->8488 8489 405738 Sleep 8487->8489 8490 40576b 8488->8490 8489->8490 8491 40574b 8489->8491 8491->8488 8491->8489 9030 40aaa4 9035 40e9d4 9030->9035 9032 40aae3 9033 40e957 6 API calls 9034 40aab1 9033->9034 9034->9032 9034->9033 9037 40ea01 9035->9037 9040 40e9e4 9035->9040 9036 40ea1f 9039 41085b 9 API calls 9036->9039 9036->9040 9037->9036 9038 40e957 6 API calls 9037->9038 9038->9036 9039->9040 9040->9034 9041 4088a5 9042 4088c8 9041->9042 9043 4088b9 9041->9043 9044 40a05a 4 API calls 9042->9044 9045 4088ef 9044->9045 9045->9043 9047 4086d9 RtlUnwind 9045->9047 9047->9043 8492 408728 8495 40a05a 8492->8495 8494 40874e 8496 40a06b ___CxxLongjmpUnwind@4 8495->8496 8498 40a079 ___CxxLongjmpUnwind@4 8496->8498 8499 40a0f5 8496->8499 8498->8494 8502 40a10d ___CxxLongjmpUnwind@4 8499->8502 8500 40a271 8503 40a297 8500->8503 8517 40a29c 8500->8517 8502->8500 8505 40a165 ___CxxLongjmpUnwind@4 8502->8505 8506 40a25c 8502->8506 8509 40de66 IsBadReadPtr 8502->8509 8505->8500 8507 40a1a9 8505->8507 8506->8498 8507->8506 8511 40a455 8507->8511 8510 40de7c 8509->8510 8510->8505 8512 40a467 8511->8512 8514 40a474 8511->8514 8521 40a606 8512->8521 8544 4086d9 RtlUnwind 8514->8544 8516 40a48b ___CxxLongjmpUnwind@4 8516->8507 8519 40a2ac 8517->8519 8518 40a340 8518->8506 8519->8518 8520 40a455 4 API calls 8519->8520 8520->8519 8522 40a63a 8521->8522 8543 40a67e ___CxxLongjmpUnwind@4 ctype 8521->8543 8523 40a6a3 8522->8523 8524 40a65f 8522->8524 8522->8543 8526 40a6ab 8523->8526 8527 40a6fd 8523->8527 8525 40de66 IsBadReadPtr 8524->8525 8532 40a66c 8525->8532 8530 40de66 IsBadReadPtr 8526->8530 8528 40a745 8527->8528 8529 40a70b 8527->8529 8533 40de66 IsBadReadPtr 8528->8533 8534 40de66 IsBadReadPtr 8529->8534 8531 40a6b8 8530->8531 8538 40de82 IsBadWritePtr 8531->8538 8531->8543 8532->8543 8545 40de82 IsBadWritePtr 8532->8545 8536 40a74a 8533->8536 8537 40a710 8534->8537 8539 40de82 IsBadWritePtr 8536->8539 8536->8543 8540 40de82 IsBadWritePtr 8537->8540 8537->8543 8538->8543 8541 40a758 8539->8541 8540->8543 8542 40de9e IsBadCodePtr 8541->8542 8541->8543 8542->8543 8543->8514 8544->8516 8546 40de98 8545->8546 8546->8543 9048 4041a9 9052 4041c9 9048->9052 9049 4042a3 9050 4024ff 2 API calls 9050->9052 9051 402524 4 API calls 9051->9052 9052->9049 9052->9050 9052->9051 9053 4042ac RtlExitUserThread 9052->9053 9054 40421e wsprintfA GetCurrentProcess SetProcessWorkingSetSize 9052->9054 9055 40425d send 9052->9055 9063 4042d3 9053->9063 9054->9052 9057 402673 GetTickCount 9055->9057 9056 4043c0 9058 404277 send closesocket Sleep 9057->9058 9058->9049 9058->9052 9059 4024ff 2 API calls 9059->9063 9060 402524 4 API calls 9060->9063 9061 4043c9 RtlExitUserThread 9071 4043dd 9061->9071 9062 404335 wsprintfA GetCurrentProcess SetProcessWorkingSetSize 9062->9063 9063->9056 9063->9059 9063->9060 9063->9061 9063->9062 9064 40437a send 9063->9064 9065 402673 GetTickCount 9064->9065 9067 404394 send closesocket Sleep 9065->9067 9066 4024ff 2 API calls 9066->9071 9067->9056 9067->9063 9068 402524 4 API calls 9068->9071 9069 40445b wsprintfA GetCurrentProcess SetProcessWorkingSetSize 9069->9071 9070 4044fd RtlExitUserThread 9073 404511 9070->9073 9071->9066 9071->9068 9071->9069 9071->9070 9072 402673 GetTickCount 9071->9072 9074 40449f send recv 9072->9074 9077 408453 26 API calls 9073->9077 9075 402673 GetTickCount 9074->9075 9076 4044cb send send closesocket Sleep 9075->9076 9076->9071 9078 404564 9077->9078 9079 408453 26 API calls 9078->9079 9080 404572 9079->9080 9081 408453 26 API calls 9080->9081 9082 40457b 9081->9082 9083 408453 26 API calls 9082->9083 9084 404584 9083->9084 9085 408453 26 API calls 9084->9085 9086 404594 9085->9086 9087 408453 26 API calls 9086->9087 9095 40459d 9087->9095 9088 40468d 9089 4045e0 InternetOpenA 9091 40465f InternetCloseHandle 9089->9091 9089->9095 9090 40469c RtlExitUserThread 9092 408453 26 API calls 9091->9092 9094 40466e 9092->9094 9093 408453 26 API calls 9093->9095 9096 408453 26 API calls 9094->9096 9095->9088 9095->9089 9095->9090 9095->9093 9097 408453 26 API calls 9095->9097 9099 404677 InternetCloseHandle 9096->9099 9098 404608 InternetOpenUrlA 9097->9098 9100 404631 InternetReadFile 9098->9100 9099->9088 9099->9095 9100->9091 9100->9100 8547 40f92a 8548 40f722 15 API calls 8547->8548 8549 40f93d 8548->8549 7851 408dad 7852 408db9 GetCurrentProcess TerminateProcess 7851->7852 7853 408dca 7851->7853 7852->7853 7854 408e44 7853->7854 7855 408e34 ExitProcess 7853->7855 8550 403c2e 8551 403c4e 8550->8551 8552 408453 26 API calls 8551->8552 8553 403c5f 8552->8553 8554 408453 26 API calls 8553->8554 8555 403c6d WSAStartup 8554->8555 8556 403c90 8555->8556 8581 403c86 8555->8581 8557 408453 26 API calls 8556->8557 8558 403c99 8557->8558 8560 408453 26 API calls 8558->8560 8559 408453 26 API calls 8561 404062 8559->8561 8562 403ca2 8560->8562 8615 4089b7 GetLocalTime GetSystemTime 8562->8615 8564 403ca9 __ftol 8565 408453 26 API calls 8564->8565 8566 403cdd 8565->8566 8567 408453 26 API calls 8566->8567 8568 403ce6 8567->8568 8569 408453 26 API calls 8568->8569 8570 403cef 8569->8570 8571 408453 26 API calls 8570->8571 8572 403cfb 8571->8572 8573 408453 26 API calls 8572->8573 8574 403d04 8573->8574 8575 408453 26 API calls 8574->8575 8576 403d0d 8575->8576 8577 408453 26 API calls 8576->8577 8578 403d30 8577->8578 8579 408453 26 API calls 8578->8579 8580 403d39 socket 8579->8580 8580->8581 8582 403d5a 8580->8582 8581->8559 8583 408453 26 API calls 8582->8583 8584 403d63 8583->8584 8585 408453 26 API calls 8584->8585 8586 403d6c setsockopt 8585->8586 8586->8581 8587 403d99 8586->8587 8588 408453 26 API calls 8587->8588 8589 403daa 8588->8589 8590 408453 26 API calls 8589->8590 8591 403db4 setsockopt 8590->8591 8591->8581 8592 403ddb lstrcpy 8591->8592 8593 408453 26 API calls 8592->8593 8594 403e02 8593->8594 8595 408453 26 API calls 8594->8595 8596 403e0c htons inet_addr 8595->8596 8597 408453 26 API calls 8596->8597 8598 403e3c 8597->8598 8599 408453 26 API calls 8598->8599 8614 403e46 8599->8614 8600 403e5a htons inet_addr inet_addr 8601 408453 26 API calls 8600->8601 8602 403eaa 8601->8602 8603 408453 26 API calls 8602->8603 8604 403eb4 htons htons htonl htons 8603->8604 8605 408453 26 API calls 8604->8605 8606 403f06 8605->8606 8607 408453 26 API calls 8606->8607 8608 403f10 htons 8607->8608 8609 408453 26 API calls 8608->8609 8611 403f39 8609->8611 8610 408453 26 API calls 8610->8611 8611->8610 8612 408453 26 API calls 8611->8612 8613 404021 sendto 8612->8613 8613->8581 8613->8614 8614->8561 8614->8600 8616 4089e1 8615->8616 8617 408a1c GetTimeZoneInformation 8615->8617 8616->8617 8618 408a15 8616->8618 8617->8618 8621 40a968 8618->8621 8620 408a85 8620->8564 8623 40a981 8621->8623 8624 40a9ac 8621->8624 8623->8624 8625 40e20c 8623->8625 8624->8620 8626 40e215 8625->8626 8628 40e21a 8625->8628 8629 40e221 8626->8629 8628->8624 8630 40b5ed 43 API calls 8629->8630 8631 40e249 8630->8631 8632 40e254 GetTimeZoneInformation 8631->8632 8633 40e34a 8631->8633 8636 40e267 WideCharToMultiByte 8632->8636 8644 40e332 8632->8644 8634 408fc8 ctype 7 API calls 8633->8634 8633->8644 8635 40e378 8634->8635 8640 40903f 12 API calls 8635->8640 8638 40e2f4 WideCharToMultiByte 8636->8638 8638->8644 8641 40e385 8640->8641 8642 4105c2 6 API calls 8641->8642 8641->8644 8643 40e3c8 8642->8643 8643->8644 8645 4105c2 6 API calls 8643->8645 8644->8628 8646 40e3f6 8645->8646 8646->8644 8647 4105c2 6 API calls 8646->8647 8647->8644 8648 40262f 8649 402634 LoadLibraryA GetProcAddress 8648->8649 9101 4085b0 9102 4085b8 9101->9102 9103 40864a 9102->9103 9105 4084c0 RtlUnwind 9102->9105 9105->9102 9106 4026b3 9107 4026dc 9106->9107 9108 4026f3 WSAStartup 9107->9108 9109 408453 26 API calls 9108->9109 9110 402741 9109->9110 9111 408453 26 API calls 9110->9111 9112 40274f 9111->9112 9113 408453 26 API calls 9112->9113 9114 402758 9113->9114 9115 408453 26 API calls 9114->9115 9116 402761 WSAStartup 9115->9116 9117 40277a 9116->9117 9118 40278a 9116->9118 9168 408368 9117->9168 9120 408453 26 API calls 9118->9120 9121 402796 9120->9121 9122 408453 26 API calls 9121->9122 9123 40279f WSASocketA 9122->9123 9124 408453 26 API calls 9123->9124 9125 4027c3 9124->9125 9126 408453 26 API calls 9125->9126 9127 4027cc 9126->9127 9128 4027d5 WSAGetLastError 9127->9128 9129 4027ee setsockopt 9127->9129 9130 408368 26 API calls 9128->9130 9131 402814 9129->9131 9132 40281f setsockopt 9129->9132 9133 4027eb 9130->9133 9134 408453 26 API calls 9131->9134 9135 402e33 9132->9135 9136 402849 9132->9136 9133->9129 9138 40281e 9134->9138 9175 402e53 9135->9175 9139 40260a 2 API calls 9136->9139 9138->9132 9140 402884 9139->9140 9141 408453 26 API calls 9140->9141 9142 4028be 9141->9142 9143 408453 26 API calls 9142->9143 9144 4028ef 9143->9144 9145 408453 26 API calls 9144->9145 9146 402924 9145->9146 9147 408453 26 API calls 9146->9147 9148 402955 htons inet_addr 9147->9148 9149 408453 26 API calls 9148->9149 9150 4029c5 9149->9150 9151 408453 26 API calls 9150->9151 9152 4029f6 9151->9152 9153 4029fe htons htons htonl htons 9152->9153 9154 408453 26 API calls 9153->9154 9155 402aa0 9154->9155 9156 408453 26 API calls 9155->9156 9157 402ad1 htons 9156->9157 9158 408453 26 API calls 9157->9158 9159 402b33 9158->9159 9160 408453 26 API calls 9159->9160 9162 402b64 9160->9162 9161 402b83 9162->9161 9163 4082b3 26 API calls 9162->9163 9166 408453 26 API calls 9162->9166 9167 402dfe sendto 9162->9167 9164 402c55 inet_addr htonl 9163->9164 9165 408453 26 API calls 9164->9165 9165->9162 9166->9162 9167->9162 9169 409bac 12 API calls 9168->9169 9170 408375 9169->9170 9171 409345 26 API calls 9170->9171 9172 408386 9171->9172 9173 409c39 6 API calls 9172->9173 9174 408391 9173->9174 9174->9118 9176 402e62 WSACleanup Sleep 9175->9176 9177 402e59 closesocket 9175->9177 9176->9161 9177->9176 9178 4085b8 9179 40864a 9178->9179 9181 4085d6 9178->9181 9181->9179 9182 4084c0 RtlUnwind 9181->9182 9182->9181 9183 404fb9 9186 408b88 9183->9186 9189 408b1b 9186->9189 9196 40b17e 9189->9196 9192 40b17e RtlSizeHeap 9193 408b46 9192->9193 9194 40aede 24 API calls 9193->9194 9195 404fc3 9194->9195 9198 40b18e ctype 9196->9198 9197 40b1ce RtlSizeHeap 9199 408b27 9197->9199 9198->9197 9198->9199 9199->9192 9199->9195 8650 40b83c 8651 40b848 8650->8651 8654 40b8ae 8650->8654 8653 40b89a HeapFree 8651->8653 8655 40b868 VirtualFree VirtualFree HeapFree 8651->8655 8652 40b8d5 HeapDestroy 8653->8652 8654->8652 8656 40b8c1 VirtualFree 8654->8656 8655->8653 8655->8655 8656->8654 8657 40843f 8663 409fe4 8657->8663 8659 408452 8661 408444 8661->8659 8662 408fc8 ctype 7 API calls 8661->8662 8666 40dd55 8661->8666 8662->8661 8676 409fed 8663->8676 8667 40dd65 8666->8667 8668 40dd6a 8666->8668 8667->8661 8668->8667 8669 409f88 6 API calls 8668->8669 8670 40dd74 8669->8670 8680 4102e1 8670->8680 8674 40dd84 8674->8667 8675 408fc8 ctype 7 API calls 8674->8675 8675->8667 8677 409feb 8676->8677 8678 409ffe 8676->8678 8677->8661 8678->8677 8679 409f4d 8 API calls 8678->8679 8679->8678 8681 4102ed 8680->8681 8683 40dd7c 8680->8683 8682 408fc8 ctype 7 API calls 8681->8682 8681->8683 8682->8683 8684 41022e 8683->8684 8687 410242 8684->8687 8688 4102af 8684->8688 8685 4102a7 8691 4100da 8685->8691 8687->8685 8687->8688 8689 410291 CloseHandle 8687->8689 8688->8674 8689->8685 8690 41029d GetLastError 8689->8690 8690->8685 8692 410133 8691->8692 8694 4100e8 8691->8694 8692->8688 8693 41012d SetStdHandle 8693->8692 8694->8692 8694->8693

            Control-flow Graph

            APIs
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,i=%d, j=%d,x=%d, y=%d), ref: 00406959
            • LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA), ref: 00406A37
            • GetProcAddress.KERNEL32(00000000), ref: 00406A3E
            • wsprintfA.USER32 ref: 00406B16
            • CopyFileA.KERNEL32(?,?,00000000), ref: 00406B7A
            • OpenSCManagerA.ADVAPI32(00000000,00000000,000F003F), ref: 00406C01
            • CreateServiceA.ADVAPI32(00000000,?,00000009,000F01FF,00000110,00000002,00000001,?,00000000,00000000,00000000,00000000,00000000), ref: 00406C38
            • LockServiceDatabase.ADVAPI32(?), ref: 00406CB6
              • Part of subcall function 00402673: GetTickCount.KERNEL32 ref: 00402674
            • ChangeServiceConfig2A.ADVAPI32(?,00000001,Pqrstu Bcdefgh Jklmnop Rstu), ref: 00406DAA
            • ChangeServiceConfig2A.ADVAPI32(?,00000002,00015180), ref: 00407152
            • UnlockServiceDatabase.ADVAPI32(?), ref: 004071C3
            • GetLastError.KERNEL32 ref: 00407237
            • OpenServiceA.ADVAPI32(?,?,000F01FF), ref: 00407252
            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 0040726B
            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 0040727B
            • RegOpenKeyA.ADVAPI32(80000002,?,00000000), ref: 0040747A
            • lstrlen.KERNEL32(00000006), ref: 0040759E
            • RegSetValueExA.KERNELBASE(00000000,Description,00000000,00000001,00000006,00000000), ref: 004075B9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Service$Open$ChangeConfig2DatabaseFileStart$AddressCopyCountCreateErrorLastLibraryLoadLockManagerModuleNameProcTickUnlockValuelstrlenwsprintf
            • String ID: i=%d, j=%d$x=%d, y=%d$%c%c%c%c%c%c.exe$Description$GetWindowsDirectoryA$KERNEL32.dll$Pqrstu Bcdefgh Jklmnop Rstu$SYSTEM\CurrentControlSet\Services\
            • API String ID: 832154477-2699205238
            • Opcode ID: bedf644c4407e06064571c2419833b12b365bcd373c45df744f87781990351bf
            • Instruction ID: cba1d5e8264335582ecc211d4592ab60c630dd2d1c7fc02c3ed6fc99ef73f386
            • Opcode Fuzzy Hash: bedf644c4407e06064571c2419833b12b365bcd373c45df744f87781990351bf
            • Instruction Fuzzy Hash: EA7264B0C45768AEEB309F158D45BDFBE78AF05755F0040DEE24CAA282D7B90A84CF59

            Control-flow Graph

            APIs
            • Sleep.KERNEL32(00000BB8), ref: 004066D9
              • Part of subcall function 00406903: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,i=%d, j=%d,x=%d, y=%d), ref: 00406959
              • Part of subcall function 00406903: LoadLibraryA.KERNEL32(KERNEL32.dll,GetWindowsDirectoryA), ref: 00406A37
              • Part of subcall function 00406903: GetProcAddress.KERNEL32(00000000), ref: 00406A3E
              • Part of subcall function 004046A2: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,?,?,?,?,?,?,?,?,i=%d, j=%d,x=%d, y=%d), ref: 004046FA
              • Part of subcall function 004046A2: GetTempPathA.KERNEL32(00000104,?), ref: 00404730
              • Part of subcall function 004046A2: GetTickCount.KERNEL32 ref: 0040474B
              • Part of subcall function 004046A2: wsprintfA.USER32 ref: 0040476D
              • Part of subcall function 004046A2: MoveFileA.KERNEL32(?,?), ref: 00404795
            • StartServiceCtrlDispatcherA.ADVAPI32(~BAa@), ref: 0040674B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: File$ModuleName$AddressCountCtrlDispatcherLibraryLoadMovePathProcServiceSleepStartTempTickwsprintf
            • String ID: i=%d, j=%d$x=%d, y=%d$5A9F769FF57B7E1E994A964B211C5F1980FC12$5A9F769FF57B7E1E994A964B211C5F1980FC12$Pqrs Uabcdef Hijklmnopq S$Pqrstu Bcdefgh Jklmnop Rstu$Pqrstua Cdefgh$shutdown -s -t 5$~BAa@
            • API String ID: 795464177-2033290253
            • Opcode ID: 8fa4525055084a4db11bd278fa1b536cd7e5afc69807efa38a517af081efe3e7
            • Instruction ID: e391362c1d2b32bd6534a3dd0d8ed186557fca575c08b26e38e2494118734c25
            • Opcode Fuzzy Hash: 8fa4525055084a4db11bd278fa1b536cd7e5afc69807efa38a517af081efe3e7
            • Instruction Fuzzy Hash: 7911B131A8031975E6203AA25D03FDE22154B92B9CF11846FB641B91C3EEFD02A055AD

            Control-flow Graph

            APIs
            • GetVersion.KERNEL32 ref: 00409117
              • Part of subcall function 0040B7DF: HeapCreate.KERNELBASE(00000000,00001000,00000000,00409150,00000000), ref: 0040B7F0
              • Part of subcall function 0040B7DF: HeapDestroy.KERNEL32 ref: 0040B82F
            • GetCommandLineA.KERNEL32 ref: 00409165
            • GetStartupInfoA.KERNEL32(?), ref: 00409190
            • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 004091B3
              • Part of subcall function 0040920C: ExitProcess.KERNEL32 ref: 00409229
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
            • String ID:
            • API String ID: 2057626494-0
            • Opcode ID: 0ddbcbb17f5e0b16f3d1c96c9be448b476264f1ec36428be21afa5781b835fac
            • Instruction ID: a914df47906715faddd06c7dbbc696d45a55d543718c1a19795018abbbfeac38
            • Opcode Fuzzy Hash: 0ddbcbb17f5e0b16f3d1c96c9be448b476264f1ec36428be21afa5781b835fac
            • Instruction Fuzzy Hash: 5821A1B0D00615AEDB08AFA5DD09AAE7BB9EF45714F10413EF501AB2D1DB384840CB99

            Control-flow Graph

            APIs
            • RegOpenKeyExA.KERNELBASE(80000002,00000000,00000000,000F003F,?), ref: 004068CF
            • RegCloseKey.ADVAPI32(?), ref: 004068DC
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: CloseOpen
            • String ID: i=%d, j=%d$x=%d, y=%d$C$C$E$M$Pqrstua Cdefgh$S$S$S$S$T$Y$\$\$\$c$e$e$e$e$i$l$n$n$o$o$r$r$r$r$s$t$t$t$u$v
            • API String ID: 47109696-855131241
            • Opcode ID: 68e20c3ea576ced47e659c1a445a72db15dd5ff4a55ac3331c2defc46e261548
            • Instruction ID: 5a8b8ad81cc7a7b9cd09d9ce3aa0b9a317c818165233db944bcc23f09ba61b28
            • Opcode Fuzzy Hash: 68e20c3ea576ced47e659c1a445a72db15dd5ff4a55ac3331c2defc46e261548
            • Instruction Fuzzy Hash: 4F415851D082CDACFB0292A48D45BEF7EA94F16748F0480D9E284792C3D7FE1B1897B6

            Control-flow Graph

            APIs
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,?,?,?,?,?,?,?,?,i=%d, j=%d,x=%d, y=%d), ref: 004046FA
            • GetTempPathA.KERNEL32(00000104,?), ref: 00404730
            • GetTickCount.KERNEL32 ref: 0040474B
            • wsprintfA.USER32 ref: 0040476D
            • MoveFileA.KERNEL32(?,?), ref: 00404795
            • MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 004047C0
            • MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 004047D4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: File$Move$CountModuleNamePathTempTickwsprintf
            • String ID: i=%d, j=%d$x=%d, y=%d$%s\%x
            • API String ID: 783850295-864343398
            • Opcode ID: 047ce07ff64e95f53e9becf3953f32f345bbbeaacd8470d4296a00e82092a1c7
            • Instruction ID: 079ca399ce9cbf441655caa0228a602bde5066c2d4a8c7b84bd90b7f71a4834e
            • Opcode Fuzzy Hash: 047ce07ff64e95f53e9becf3953f32f345bbbeaacd8470d4296a00e82092a1c7
            • Instruction Fuzzy Hash: D331CAB154020D7AF1207B519E87FFF365CDB46B88F40882EB344F51C3EAB95A1552BA

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 248 4075ee-4075f5 249 407603-40761f call 408453 * 2 248->249 250 4075f7-4075fd CloseServiceHandle 248->250 255 407621-407627 CloseServiceHandle 249->255 256 40762d-407649 call 408453 * 2 249->256 250->249 255->256 261 407657 256->261 262 40764b-407651 RegCloseKey 256->262 262->261
            APIs
            • CloseServiceHandle.ADVAPI32(00000000,004075D2), ref: 004075FD
            • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,004075D2), ref: 00407627
            • RegCloseKey.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,004075D2), ref: 00407651
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Close$HandleService
            • String ID: i=%d, j=%d$x=%d, y=%d
            • API String ID: 907781861-1211302626
            • Opcode ID: 220bacaeea4a704c0ccd3b3204518a5997c4cd4c74b43616beae75fa1ada9aa5
            • Instruction ID: 19c14899926468918d6cef8270e39b205b1c46aa1ad6c9d8733eb82b87f3f4eb
            • Opcode Fuzzy Hash: 220bacaeea4a704c0ccd3b3204518a5997c4cd4c74b43616beae75fa1ada9aa5
            • Instruction Fuzzy Hash: DBF03030801214ABDB323B15DE0DBDE3A389F05755F0084BAB20D741E3DB791B90EA69

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 291 408dad-408db7 292 408db9-408dc4 GetCurrentProcess TerminateProcess 291->292 293 408dca-408de0 291->293 292->293 294 408de2-408de9 293->294 295 408e1e-408e32 call 408e46 293->295 296 408deb-408df7 294->296 297 408e0d-408e1d call 408e46 294->297 306 408e44-408e45 295->306 307 408e34-408e3e ExitProcess 295->307 299 408df9-408dfd 296->299 300 408e0c 296->300 297->295 303 408e01-408e0a 299->303 304 408dff 299->304 300->297 303->299 303->300 304->303
            APIs
            • GetCurrentProcess.KERNEL32(?,00000000,00408D8B,?,00000001,00000000,0040F3A6,00000000), ref: 00408DBD
            • TerminateProcess.KERNEL32(00000000), ref: 00408DC4
            • ExitProcess.KERNEL32 ref: 00408E3E
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Process$CurrentExitTerminate
            • String ID:
            • API String ID: 1703294689-0
            • Opcode ID: 31f37dfd5c0ec7c6e0c1d3b4dbd6f8f7ff1d3ae5e6f1a23487f9610a48c834a6
            • Instruction ID: a1b80df7e12d7ecd6f869aa964610264992441ecb268049dbeb61c048f6a3229
            • Opcode Fuzzy Hash: 31f37dfd5c0ec7c6e0c1d3b4dbd6f8f7ff1d3ae5e6f1a23487f9610a48c834a6
            • Instruction Fuzzy Hash: FB0196722042019EDA219B55FE8469A7FA4EB94350B10453FF5C4E21E0DF789880CBAD

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 308 40b7df-40b7fd HeapCreate 309 40b835-40b837 308->309 310 40b7ff-40b80c call 40b697 308->310 313 40b81b-40b81e 310->313 314 40b80e-40b819 call 40b9b6 310->314 316 40b820 call 40c91f 313->316 317 40b838-40b83b 313->317 320 40b825-40b827 314->320 316->320 320->317 321 40b829-40b82f HeapDestroy 320->321 321->309
            APIs
            • HeapCreate.KERNELBASE(00000000,00001000,00000000,00409150,00000000), ref: 0040B7F0
              • Part of subcall function 0040B697: GetVersionExA.KERNEL32 ref: 0040B6B6
            • HeapDestroy.KERNEL32 ref: 0040B82F
              • Part of subcall function 0040B9B6: RtlAllocateHeap.NTDLL(00000000,00000140,0040B818), ref: 0040B9C3
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Heap$AllocateCreateDestroyVersion
            • String ID:
            • API String ID: 760317429-0
            • Opcode ID: eb125955d52d05ad980d36befe066e2454155b5d6e385255e3d49973fef2bc15
            • Instruction ID: bd24e9e70ad1b74e5f26fe1da03c64620d16eea188c42344ac3c43ce54a7c62e
            • Opcode Fuzzy Hash: eb125955d52d05ad980d36befe066e2454155b5d6e385255e3d49973fef2bc15
            • Instruction Fuzzy Hash: 0AF065B265830199DB206B715D457AA269DD754B95F10C83BF500E82F0EFB89980D64D

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 664 405178-405192 call 402e73 667 4056c3-4056c7 664->667 668 405198-4051d8 call 402fd5 call 408bd0 RegOpenKeyExA 664->668 673 405201-405213 call 408cc0 668->673 674 4051da-4051fb RegQueryValueExA RegCloseKey 668->674 677 405215-405224 673->677 678 405229-40523b call 408cc0 673->678 674->673 680 40532a-405458 call 408bd0 call 4037ab GetSystemInfo call 408453 * 4 GetComputerNameA call 408453 * 2 GetSystemDefaultUILanguage call 408453 * 2 call 408bd0 call 408453 * 4 call 407ed0 call 408453 * 2 send 677->680 683 40524d-40525f call 408cc0 678->683 684 40523d-405248 678->684 744 4056b7-4056bd closesocket 680->744 745 40545e-405488 select 680->745 691 405261-405270 683->691 692 405275-405287 call 408cc0 683->692 684->680 691->680 698 405299-4052ab call 408cc0 692->698 699 405289-405294 692->699 705 4052ad-4052bc 698->705 706 4052be-4052d0 call 408cc0 698->706 699->680 705->680 711 4052d2-4052dd 706->711 712 4052df-4052f1 call 408cc0 706->712 711->680 718 405300-40531c call 408cc0 712->718 719 4052f3-4052fe 712->719 726 405325 718->726 727 40531e-405323 718->727 719->680 726->680 727->680 744->667 745->744 746 40548e-405490 745->746 746->745 747 405492-4054a6 __WSAFDIsSet 746->747 747->745 748 4054a8-4054c3 recv 747->748 749 4054c9-4054cc 748->749 750 4056ab-4056b1 closesocket 748->750 749->750 751 4054d2-4054f6 call 407ed0 749->751 750->744 754 4054fc-4054fd 751->754 755 40567f-4056a6 call 407ed0 call 404aa9 751->755 757 405503-405504 754->757 758 405674-40567a 754->758 755->745 757->745 760 40550a-40566f call 408453 * 2 GetTempPathA call 408453 * 2 call 402673 * 5 wsprintfA call 408be0 call 408453 * 4 LoadLibraryA call 408453 * 2 GetProcAddress call 408453 * 2 WinExec 757->760 758->745 760->745
            APIs
              • Part of subcall function 00402E73: __EH_prolog.LIBCMT ref: 00402E78
              • Part of subcall function 00402E73: htons.WS2_32(00001F91), ref: 00402F1A
              • Part of subcall function 00402E73: socket.WS2_32(00000002,00000001,00000000), ref: 00402F5D
              • Part of subcall function 00402E73: connect.WS2_32(?,00000002,00000010), ref: 00402F84
              • Part of subcall function 00402E73: closesocket.WS2_32(?), ref: 00402F92
              • Part of subcall function 00402FD5: setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 00402FEB
              • Part of subcall function 00402FD5: WSAIoctl.WS2_32(0002BF20,98000004,00000001,0000000C,00000000,00000000,00000001,00000000,00000000), ref: 00403096
            • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,000F003F,?), ref: 004051D0
            • RegQueryValueExA.ADVAPI32(?,ProductName,00000000,?,?,?), ref: 004051F2
            • RegCloseKey.ADVAPI32(?), ref: 004051FB
            • GetSystemInfo.KERNEL32(?), ref: 00405347
            • GetComputerNameA.KERNEL32(?,?), ref: 00405392
            • GetSystemDefaultUILanguage.KERNEL32 ref: 004053AD
            • send.WS2_32(0000000B,000000CC,00000000), ref: 0040544F
            • select.WS2_32(00000001,?,00000000,00000000,00000000), ref: 0040547F
            • __WSAFDIsSet.WS2_32(00000001), ref: 0040549F
            • recv.WS2_32(?,000000C4,00000000), ref: 004054BB
            • GetTempPathA.KERNEL32(00000104,00000000), ref: 0040555C
              • Part of subcall function 00402673: GetTickCount.KERNEL32 ref: 00402674
            • wsprintfA.USER32 ref: 004055BE
            • LoadLibraryA.KERNEL32(urlmon.dll), ref: 00405606
            • GetProcAddress.KERNEL32(?,URLDownloadToFileA), ref: 0040562C
            • WinExec.KERNEL32(00000000,00000000), ref: 00405669
            • closesocket.WS2_32 ref: 004056B1
            • closesocket.WS2_32 ref: 004056BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: closesocket$System$AddressCloseComputerCountDefaultExecH_prologInfoIoctlLanguageLibraryLoadNameOpenPathProcQueryTempTickValueconnecthtonsrecvselectsendsetsockoptsocketwsprintf
            • String ID: i=%d, j=%d$x=%d, y=%d$2000$2003$2008$2012$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion$URLDownloadToFileA$Vista$Windows 2000$Windows 2003$Windows 2008$Windows 2012$Windows 7$Windows 8$Windows NT$Windows Vista$Windows XP$\%c%c%c%c%c.exe$urlmon.dll
            • API String ID: 751268950-642500358
            • Opcode ID: a1b77f8743cf1b6ba5d24b315b7035596dff294fb74dde3c8d6d1611df5642d0
            • Instruction ID: a0c1be54b30e8db57778a8a6b5ef723af4a18605db769770b3d3167f59080fce
            • Opcode Fuzzy Hash: a1b77f8743cf1b6ba5d24b315b7035596dff294fb74dde3c8d6d1611df5642d0
            • Instruction Fuzzy Hash: 81D19171940609BAEB20ABA1DD4AFDF377CEB85704F50847FB604F51C2EABC46508A6D

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 800 404aa9-404ad9 call 408453 * 2 805 404f6f-404f74 800->805 806 404adf-404b04 call 408453 * 2 800->806 806->805 811 404b0a 806->811 812 404b11-404b1a 811->812 813 404d42-404d4b 811->813 814 404ed3-404eda 811->814 815 404b75-404b7e 811->815 816 404c16-404c1f 811->816 817 404dc6-404dcc 811->817 818 404bd9-404be6 811->818 819 404c7a-404c83 811->819 820 404cde-404ce7 811->820 821 404d7e-404d85 811->821 822 404e4e-404e54 811->822 812->805 824 404b20-404b6e CreateThread CloseHandle call 408453 * 2 CreateThread 812->824 828 404d51-404d77 CreateThread CloseHandle 813->828 829 404f47-404f69 call 408453 * 2 CreateThread 813->829 814->805 833 404ee0 814->833 815->805 830 404b84-404bd2 CreateThread CloseHandle call 408453 * 2 CreateThread 815->830 816->805 825 404c25-404c73 CreateThread CloseHandle call 408453 * 2 CreateThread 816->825 834 404e12-404e1b 817->834 835 404dce-404ddc 817->835 836 404c05-404c11 CreateThread 818->836 837 404be8-404c03 CreateThread CloseHandle 818->837 819->805 831 404c89-404cd7 CreateThread CloseHandle call 408453 * 2 CreateThread 819->831 820->805 823 404ced-404d3b CreateThread CloseHandle call 408453 * 2 CreateThread 820->823 821->805 832 404d8b 821->832 826 404e56-404e64 822->826 827 404e9a-404ea3 822->827 875 404d3d 823->875 876 404b70 824->876 878 404c75 825->878 826->829 847 404e6a-404e93 CreateThread CloseHandle 826->847 827->829 848 404ea9-404ecf CreateThread CloseHandle 827->848 828->828 841 404d79 828->841 829->805 877 404bd4 830->877 879 404cd9 831->879 843 404d91-404dbf CreateThread CloseHandle CreateThread 832->843 850 404ee6-404f10 CreateThread CloseHandle CreateThread 833->850 834->829 845 404e21-404e47 CreateThread CloseHandle 834->845 835->829 844 404de2-404e0b CreateThread CloseHandle 835->844 836->805 837->836 837->837 841->829 843->843 855 404dc1 843->855 844->844 856 404e0d 844->856 845->845 857 404e49 845->857 847->847 859 404e95 847->859 848->848 860 404ed1 848->860 850->850 862 404f12 850->862 855->805 856->829 857->829 859->829 860->829 862->805 875->805 876->805 877->805 878->805 879->805
            APIs
            • CreateThread.KERNEL32(00000000,00000000,004030A1,?,00000000,00000000), ref: 00404B2A
            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,004056A3,?,?,?,000000C4), ref: 00404B31
            • CreateThread.KERNEL32(00000000,00000000,Function_00003471,?,00000000,00000000), ref: 00404B59
            • CreateThread.KERNEL32(00000000,00000000,Function_0000406C,?,00000000,00000000), ref: 00404B8E
            • CloseHandle.KERNEL32(00000000), ref: 00404B95
            • CreateThread.KERNEL32(00000000,00000000,Function_00003471,?,00000000,00000000), ref: 00404BBD
            • CreateThread.KERNEL32(00000000,00000000,Function_000047E7,?,00000000,00000000), ref: 00404BF2
            • CloseHandle.KERNEL32(00000000), ref: 00404BF5
            • CreateThread.KERNEL32(00000000,00000000,Function_00003471,?,00000000,00000000), ref: 00404C0F
            • CreateThread.KERNEL32(00000000,00000000,Function_000041A9,00000000,00000000,00000000), ref: 00404C2F
            • CloseHandle.KERNEL32(00000000), ref: 00404C36
            • CreateThread.KERNEL32(00000000,00000000,Function_00003471,?,00000000,00000000), ref: 00404C5E
            • CreateThread.KERNEL32(00000000,00000000,004032D1,?,00000000,00000000), ref: 00404C93
            • CloseHandle.KERNEL32(00000000), ref: 00404C9A
            • CreateThread.KERNEL32(00000000,00000000,Function_00003471,?,00000000,00000000), ref: 00404CC2
            • CreateThread.KERNEL32(00000000,00000000,Function_000026B3,?,00000000,00000000), ref: 00404CF7
            • CloseHandle.KERNEL32(00000000), ref: 00404CFE
            • CreateThread.KERNEL32(00000000,00000000,Function_00003471,?,00000000,00000000), ref: 00404D26
            • CreateThread.KERNEL32(00000000,00000000,004042B3,?,00000000,00000000), ref: 00404D5B
            • CloseHandle.KERNEL32(00000000), ref: 00404D62
            • CreateThread.KERNEL32(00000000,00000000,004043D0,?,00000000,00000000), ref: 00404D9F
            • CloseHandle.KERNEL32(00000000), ref: 00404DA2
            • CreateThread.KERNEL32(00000000,00000000,Function_00003471,?,00000000,00000000), ref: 00404DB5
            • CreateThread.KERNEL32(00000000,00000000,Function_000034E4,?,00000000,00000000), ref: 00404DEC
            • CloseHandle.KERNEL32(00000000), ref: 00404DF3
            • CreateThread.KERNEL32(00000000,00000000,Function_0000388D,?,00000000,00000000), ref: 00404E74
            • CloseHandle.KERNEL32(00000000), ref: 00404E7B
            • CreateThread.KERNEL32(00000000,00000000,Function_00003C2E,?,00000000,00000000), ref: 00404EF0
            • CloseHandle.KERNEL32(00000000), ref: 00404EF3
            • CreateThread.KERNEL32(00000000,00000000,Function_00003471,?,00000000,00000000), ref: 00404F06
            • CreateThread.KERNEL32(00000000,00000000,Function_00003471,?,00000000,00000000), ref: 00404F69
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: CreateThread$CloseHandle
            • String ID: i=%d, j=%d$x=%d, y=%d
            • API String ID: 738052048-1211302626
            • Opcode ID: be642960a439718b2bafd4ac865a2f717ca2561d504fee6b9b7bb2f7fbe7b8f4
            • Instruction ID: e06d2d7120ba2e540d0e41e5c008bd2057b7b57b1409691ba357ba26cc2fe2ff
            • Opcode Fuzzy Hash: be642960a439718b2bafd4ac865a2f717ca2561d504fee6b9b7bb2f7fbe7b8f4
            • Instruction Fuzzy Hash: E2D1B3B0105321BBC251DF22DC48DAB7E6CFF8A755F01492EF685A6192C7B89501CBF9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID:
            • String ID: +$+$-$-$0$0$0$0$0$1$1$9$9$9$9$9$9$C$E$c$e$r|A
            • API String ID: 0-3344251444
            • Opcode ID: bd0280880e8b8614f0578669a074afa243fbadc4ab0f276e24eacb07daba97d6
            • Instruction ID: f07466c33bc34597f4b172c9d266fd16fddb83ba62844f31d110c87da69269e0
            • Opcode Fuzzy Hash: bd0280880e8b8614f0578669a074afa243fbadc4ab0f276e24eacb07daba97d6
            • Instruction Fuzzy Hash: 2BE1E231E55259CEEB24CFA5D9567FE7BB1AB04304F28402BE401A6292D7FC99C2CB4D
            APIs
            • GetLocalTime.KERNEL32(00000012), ref: 004089C4
            • GetSystemTime.KERNEL32(00403CA9), ref: 004089CE
            • GetTimeZoneInformation.KERNEL32(?), ref: 00408A23
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Time$InformationLocalSystemZone
            • String ID: x=%d, y=%d
            • API String ID: 2475273158-4063873591
            • Opcode ID: 259c1c831e97d5fbf72845641751fb639a20b83e99d6f7100b0044629b6d94b9
            • Instruction ID: a26e291306a1e87c9fb69ece29d7d7f305d7548aa12b92bf268cc408a1335f90
            • Opcode Fuzzy Hash: 259c1c831e97d5fbf72845641751fb639a20b83e99d6f7100b0044629b6d94b9
            • Instruction Fuzzy Hash: A1216565A00116A5CF20AB94D9046FF77B9EB44720F44452BF991F69D0EB7C8D82CB7C
            APIs
            • SetUnhandledExceptionFilter.KERNEL32(Function_0000DE02), ref: 0040DE4D
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 480c36a6514f97d2a7d3d76f4c4892470a88d5a5cbb8308d7cc4f184d53d5b63
            • Instruction ID: 72987f4640873295066061d75ed557a05586d1895af15d0c133338de6dae84eb
            • Opcode Fuzzy Hash: 480c36a6514f97d2a7d3d76f4c4892470a88d5a5cbb8308d7cc4f184d53d5b63
            • Instruction Fuzzy Hash: 10A011B8A022008AC2800BA0AE0A0803EA0EA08202328803BA302882A0CBB00080CA8C
            APIs
            • SetUnhandledExceptionFilter.KERNEL32 ref: 0040DE5F
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: b3adc0f5ebc27224124c0d2694f8cda5947711cb90795d0216039d65cface39d
            • Instruction ID: b31e3ff5334811a3db2c6f49b3437fa79dfce3f4ef5acba7b70111df48861498
            • Opcode Fuzzy Hash: b3adc0f5ebc27224124c0d2694f8cda5947711cb90795d0216039d65cface39d
            • Instruction Fuzzy Hash:
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
            • Instruction ID: 417fec514f0ba7c62701d36feb5f632bd3e399edcb00eb6118dea4034da0ba6a
            • Opcode Fuzzy Hash: fc60ecf50bd115ca0c6ea2745a91e2bccda0b72c85d336beea95e2ba67d1c3a9
            • Instruction Fuzzy Hash: 45B16E35910206DFDB15CF14C5D0AA9BBA1FF58318F24C2AEDC1A6B386C735EA46CB94

            Control-flow Graph

            APIs
              • Part of subcall function 0040578B: htons.WS2_32(00000000), ref: 0040579F
              • Part of subcall function 0040578B: socket.WS2_32(00000002,00000001,00000000), ref: 004057BD
              • Part of subcall function 0040578B: connect.WS2_32(00000000,00000002,00000010), ref: 004057CC
              • Part of subcall function 0040578B: closesocket.WS2_32(00000000), ref: 004057D8
              • Part of subcall function 00402FD5: setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 00402FEB
              • Part of subcall function 00402FD5: WSAIoctl.WS2_32(0002BF20,98000004,00000001,0000000C,00000000,00000000,00000001,00000000,00000000), ref: 00403096
              • Part of subcall function 004037AB: RegOpenKeyA.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,?), ref: 00403827
              • Part of subcall function 004037AB: RegQueryValueExA.ADVAPI32(?,~MHz,00000000,?,?,?), ref: 0040385C
              • Part of subcall function 004037AB: RegCloseKey.ADVAPI32(?), ref: 0040387B
            • GetSystemInfo.KERNEL32(?), ref: 00405870
            • GetComputerNameA.KERNEL32(?,00000020), ref: 004058B8
            • GetSystemDefaultUILanguage.KERNEL32 ref: 004058D3
            • send.WS2_32(0000000B,000000CC,00000000), ref: 004059B9
            • select.WS2_32(00000001,?,00000000,00000000,00000000), ref: 004059EE
            • __WSAFDIsSet.WS2_32(00000001), ref: 00405A0E
            • recv.WS2_32(?,000000C4,00000000,00000001), ref: 00405A26
            • closesocket.WS2_32 ref: 00405A97
            • closesocket.WS2_32 ref: 00405AA3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: closesocket$System$CloseComputerDefaultInfoIoctlLanguageNameOpenQueryValueconnecthtonsrecvselectsendsetsockoptsocket
            • String ID: i=%d, j=%d$x=%d, y=%d$ $ $ $ TWoR$-$F$O$R$R$S$W$W$d$d$e$e$i$i$n$n$n$n$o$o$s$s$t$t$w$w
            • API String ID: 2744665894-2183175534
            • Opcode ID: e924cf13e24849bade1f5ebd2fb7acf6814aab7920ae7f62073911bc8cee8411
            • Instruction ID: 5ef4ab80f4d6165f337ada50ec1a5e623477f2f7d67182f73196e52a3888a14c
            • Opcode Fuzzy Hash: e924cf13e24849bade1f5ebd2fb7acf6814aab7920ae7f62073911bc8cee8411
            • Instruction Fuzzy Hash: 3781A871C04288ADEB11E7A4CD45FEF7ABD9B02348F0481AAF144B61C2E7B94A54CB79

            Control-flow Graph

            APIs
              • Part of subcall function 004024FF: inet_addr.WS2_32(-000003F6), ref: 00402503
              • Part of subcall function 004024FF: gethostbyname.WS2_32(?), ref: 00402511
              • Part of subcall function 00402524: socket.WS2_32(00000002,00000001,00000000), ref: 00402531
              • Part of subcall function 00402524: htons.WS2_32(?), ref: 0040254D
              • Part of subcall function 00402524: connect.WS2_32(00000000,00000002,00000010), ref: 0040255E
              • Part of subcall function 00402524: closesocket.WS2_32(00000000), ref: 0040256A
            • wsprintfA.USER32 ref: 00404236
            • GetCurrentProcess.KERNEL32(000000FF,000000FF), ref: 00404243
            • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 0040424A
            • send.WS2_32(00000000,?,-00000800,00000000), ref: 00404286
            • closesocket.WS2_32(00000000), ref: 00404289
            • Sleep.KERNEL32(00000005), ref: 00404291
            • RtlExitUserThread.NTDLL(00000000,00000000,76A958A0,00000000), ref: 004043CA
            • wsprintfA.USER32 ref: 0040446F
            • GetCurrentProcess.KERNEL32(000000FF,000000FF), ref: 0040447C
            • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 00404483
            • send.WS2_32(00000000,?,?,00000000), ref: 0040426D
              • Part of subcall function 00402673: GetTickCount.KERNEL32 ref: 00402674
            • RtlExitUserThread.NTDLL(00000000), ref: 004042AD
            • wsprintfA.USER32 ref: 00404353
            • GetCurrentProcess.KERNEL32(000000FF,000000FF), ref: 00404360
            • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 00404367
            • send.WS2_32(00000000,?,?,00000000), ref: 0040438A
            • send.WS2_32(00000000,?,-00000800,00000000), ref: 004043A3
            • closesocket.WS2_32(00000000), ref: 004043A6
            • Sleep.KERNEL32(00000005), ref: 004043AE
            • send.WS2_32(?,?,00000000,00000000), ref: 004044AF
            • recv.WS2_32(?,?,00007FF8,00000000), ref: 004044BC
            • send.WS2_32(?,?,-00000800,00000000), ref: 004044DA
            • send.WS2_32(?,?,00007FF8,00000000), ref: 004044E7
            • closesocket.WS2_32(?), ref: 004044EA
            • Sleep.KERNEL32(00000005), ref: 004044F2
            • RtlExitUserThread.NTDLL(00000000,000000C4,000000C4,00000000,76A958A0,00000000), ref: 004044FE
            • InternetOpenA.WININET(User-Agent:Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0),00000000,00000000,00000000,00000000), ref: 004045E8
            • InternetOpenUrlA.WININET(?,?,?,?,84000100,00000000), ref: 00404627
            • InternetReadFile.WININET(?,?,00001000,?), ref: 00404647
            • InternetCloseHandle.WININET(?), ref: 00404663
            • InternetCloseHandle.WININET(?), ref: 0040467E
            • RtlExitUserThread.NTDLL(00000000), ref: 0040469C
            Strings
            • Cache-Control: no-cacheReferer: http://www.baidu.com, xrefs: 004045A3
            • x=%d, y=%d, xrefs: 00404566, 0040456C, 0040457E, 00404597, 00404602, 00404671
            • Head %s HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: zh-CNUser-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50Range: bytes=0-18446744073709551615Referer: , xrefs: 00404230
            • i=%d, j=%d, xrefs: 00404558, 0040455E, 00404575, 0040458E, 004045F9, 00404668
            • User-Agent:Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0), xrefs: 004045E3
            • POST %s HTTP/1.1Accept: */*Accept-Language: zh-CNAccept-Encoding: gzip, deflateUser-Agent:Opera/9.80 (Windows NT 6.1; U; en) Presto/2.8.131 Version/11.11Host: %s, xrefs: 00404469
            • GET %s HTTP/1.1Connection: Keep-AliveAccept: text/html, */*Accept-Language: zh-CNUser-Agent: %sReferer: %sHost: %s, xrefs: 0040434D
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: send$Process$Internet$ExitThreadUserclosesocket$CurrentSizeSleepWorkingwsprintf$CloseHandleOpen$CountFileReadTickconnectgethostbynamehtonsinet_addrrecvsocket
            • String ID: i=%d, j=%d$x=%d, y=%d$Cache-Control: no-cacheReferer: http://www.baidu.com$GET %s HTTP/1.1Connection: Keep-AliveAccept: text/html, */*Accept-Language: zh-CNUser-Agent: %sReferer: %sHost: %s$Head %s HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: zh-CNUser-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML, like Gecko) Version/5.1 Safari/534.50Range: bytes=0-18446744073709551615Referer: $POST %s HTTP/1.1Accept: */*Accept-Language: zh-CNAccept-Encoding: gzip, deflateUser-Agent:Opera/9.80 (Windows NT 6.1; U; en) Presto/2.8.131 Version/11.11Host: %s$User-Agent:Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0)
            • API String ID: 3872357285-2120180902
            • Opcode ID: 37876d8b08dfe017e4c0d06899240cc4571484ec18f537bc37ade032d386be3b
            • Instruction ID: e6a72a96232520c85c5ba0d2c9ae1978a39496664e9286b5dadd943091728e1f
            • Opcode Fuzzy Hash: 37876d8b08dfe017e4c0d06899240cc4571484ec18f537bc37ade032d386be3b
            • Instruction Fuzzy Hash: 53D1E472900218BBEB10ABA1DD45FDB7BBCEB45314F10457EF344E21C1DE789A948BA9

            Control-flow Graph

            APIs
            • WSAStartup.WS2_32(00000202,?), ref: 00402702
            • WSAStartup.WS2_32(00000102,?), ref: 00402770
            • WSASocketA.WS2_32(00000002,00000003,000000FF,00000000,00000000,00000001), ref: 004027B1
            • WSAGetLastError.WS2_32 ref: 004027D5
            • setsockopt.WS2_32(000000FF,00000000,00000002,00000001,00000004), ref: 0040280D
            • setsockopt.WS2_32(000000FF,0000FFFF,00001005,?,00000004), ref: 00402838
            • htons.WS2_32(00000028), ref: 0040295A
            • inet_addr.WS2_32(?), ref: 00402982
            • htons.WS2_32 ref: 00402A07
            • htons.WS2_32(?), ref: 00402A1A
            • htonl.WS2_32(28376839), ref: 00402A2C
            • htons.WS2_32(00004000), ref: 00402A52
            • htons.WS2_32(00000014), ref: 00402AF5
            • inet_addr.WS2_32(?), ref: 00402C64
            • htonl.WS2_32(?), ref: 00402C79
            • sendto.WS2_32(000000FF,?,?,00000000,?,00000010), ref: 00402E1C
              • Part of subcall function 00402E53: closesocket.WS2_32(000000FF), ref: 00402E5C
              • Part of subcall function 00402E53: WSACleanup.WS2_32 ref: 00402E62
              • Part of subcall function 00402E53: Sleep.KERNEL32(00000000), ref: 00402E70
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: htons$Startuphtonlinet_addrsetsockopt$CleanupErrorLastSleepSocketclosesocketsendto
            • String ID: i=%d, j=%d$x=%d, y=%d$%$%$%$%$.$.$.$E$P$Set IP_HDRINCL Error!$WSASocket() failed: %d$WSAStartup failed: %d$d$d$d$d
            • API String ID: 1145750529-1422214691
            • Opcode ID: eec8bb190fa8ad50a1ae3856e13a6145ed26624f05fcc6f9a9b466bc7aab50e5
            • Instruction ID: 122587cfeeed4bfb32f6449c2658a1ac5cc9d53b7ccd8847bfbb94d4e5865164
            • Opcode Fuzzy Hash: eec8bb190fa8ad50a1ae3856e13a6145ed26624f05fcc6f9a9b466bc7aab50e5
            • Instruction Fuzzy Hash: E4123FB1D40618AEEB209F55DD45FEEBAB9AB44704F1041EAF688F62C1D7F40AC08F65
            APIs
            • WSAStartup.WS2_32(00000202,?), ref: 00403C7C
            • __ftol.LIBCMT ref: 00403CCC
            • socket.WS2_32(00000002,00000003,00000000), ref: 00403D42
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Startup__ftolsocket
            • String ID: i=%d, j=%d$x=%d, y=%d$192.168.1.32$E$InitWSAStartup Error!$P$Send err!$opt err!$sock err!$time err!
            • API String ID: 883726353-868327508
            • Opcode ID: 0bdaadff49c560ab287577ed21e3645730c3b2ddf8d5989770a0f03fe2a47b13
            • Instruction ID: 609296a8d170a5903be276590d814d28a62098b7731c51efac33e534418bfd0a
            • Opcode Fuzzy Hash: 0bdaadff49c560ab287577ed21e3645730c3b2ddf8d5989770a0f03fe2a47b13
            • Instruction Fuzzy Hash: 16C18471E40309B5EB20BBA1DD46FCF767CAF46748F00846BB704B91C3EAB8465497A9
            APIs
            • WSAStartup.WS2_32(00000202,?), ref: 004030F2
            • htons.WS2_32(?), ref: 00403136
              • Part of subcall function 004024FF: inet_addr.WS2_32(-000003F6), ref: 00402503
              • Part of subcall function 004024FF: gethostbyname.WS2_32(?), ref: 00402511
            • socket.WS2_32(00000002,00000001,00000006), ref: 00403179
            • connect.WS2_32(00000000,?,00000010), ref: 0040318B
            • closesocket.WS2_32(?), ref: 0040319A
            • socket.WS2_32(00000002,00000001,00000000), ref: 004031B5
            • setsockopt.WS2_32(00000000,0000FFFF,00001001,00000000,00000004), ref: 004031D2
            • GetCurrentProcess.KERNEL32(000000FF,000000FF), ref: 00403242
            • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 00403249
            • sendto.WS2_32(?,?,?,00000000,?,00000010), ref: 0040327C
            • closesocket.WS2_32(?), ref: 0040329A
            • Sleep.KERNEL32(00000032), ref: 004032A2
            • closesocket.WS2_32(?), ref: 004032C3
            • RtlExitUserThread.NTDLL(00000000), ref: 004032CB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: closesocket$Processsocket$CurrentExitSizeSleepStartupThreadUserWorkingconnectgethostbynamehtonsinet_addrsendtosetsockopt
            • String ID: i=%d, j=%d$x=%d, y=%d
            • API String ID: 935443681-1211302626
            • Opcode ID: ea722d465ac30998e37fa1903b4a8698177763ad164399321eaacc8903076aa2
            • Instruction ID: 5ff41e15fb5514619c84d1fa372a95beef608028e0ea2f82b17d9a5e752177af
            • Opcode Fuzzy Hash: ea722d465ac30998e37fa1903b4a8698177763ad164399321eaacc8903076aa2
            • Instruction Fuzzy Hash: 22A1E6715443087EE210BB61DD86FAF76ACDF4678CF00883EF344B51D2EAB94A14567A
            APIs
            • WSASocketA.WS2_32(00000002,00000003,000000FF,00000000,00000000,00000001), ref: 00403934
            • setsockopt.WS2_32(?,00000000,00000002,?,00000004), ref: 0040396F
            • setsockopt.WS2_32(?,0000FFFF,00001005,?,00000004), ref: 004039AD
            • inet_addr.WS2_32(?), ref: 004039E9
            • htons.WS2_32(00000028), ref: 00403A17
            • inet_addr.WS2_32(?), ref: 00403A46
            • inet_addr.WS2_32(?), ref: 00403A56
            • htons.WS2_32 ref: 00403A85
            • htons.WS2_32(?), ref: 00403A91
            • htonl.WS2_32 ref: 00403AA6
            • htons.WS2_32(00000200), ref: 00403AC0
            • htons.WS2_32(00000014), ref: 00403AFD
            • sendto.WS2_32(?,?,00000028,00000000,00000002,00000010), ref: 00403C0C
            • Sleep.KERNEL32(00000005), ref: 00403C14
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: htons$inet_addr$setsockopt$SleepSockethtonlsendto
            • String ID: i=%d, j=%d$x=%d, y=%d$192.168.1.244$@$E$P
            • API String ID: 36144736-1487764589
            • Opcode ID: 46a231499d66145d66ed821992d9e5af34a12e45b2211e1b07509bededb92242
            • Instruction ID: 00aa11e259d23037aba279591c3284fd8a326c31415f7970f7d253e3be644c7e
            • Opcode Fuzzy Hash: 46a231499d66145d66ed821992d9e5af34a12e45b2211e1b07509bededb92242
            • Instruction Fuzzy Hash: 9AA18371D40348B5EB21EBA1CD4AFDF767C9F46704F00846EB705BA1C3EAB84A5487A9
            APIs
              • Part of subcall function 00402673: GetTickCount.KERNEL32 ref: 00402674
              • Part of subcall function 004024FF: inet_addr.WS2_32(-000003F6), ref: 00402503
              • Part of subcall function 004024FF: gethostbyname.WS2_32(?), ref: 00402511
            • htons.WS2_32(?), ref: 004035B1
            • WSASocketA.WS2_32(00000002,00000003,000000FF,00000000,00000000,00000001), ref: 004035DF
            • wsprintfA.USER32 ref: 0040367C
            • htons.WS2_32(0000041C), ref: 00403692
            • inet_addr.WS2_32(00000000), ref: 004036B6
            • htons.WS2_32 ref: 004036F4
            • htons.WS2_32(?), ref: 00403704
            • htons.WS2_32(00000408), ref: 00403713
            • sendto.WS2_32(?,00000000,0000041C,00000000,00000002,00000010), ref: 00403786
            • Sleep.KERNEL32(0000000A), ref: 00403797
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: htons$inet_addr$CountSleepSocketTickgethostbynamesendtowsprintf
            • String ID: i=%d, j=%d$x=%d, y=%d$%d.%d.%d.%d$E
            • API String ID: 2874787628-3460710964
            • Opcode ID: 8e9391ae41fa05df511794d0f028da3b2820d6fe1642b09b896ad6e47e87aa21
            • Instruction ID: ff3fab104711aeb6231fa6f38e4c13636c2264ce283ade5ee7ce96aa1f58c3ae
            • Opcode Fuzzy Hash: 8e9391ae41fa05df511794d0f028da3b2820d6fe1642b09b896ad6e47e87aa21
            • Instruction Fuzzy Hash: 0571B675A4020976EB20ABB1CD46FEF76399F85704F00847EB341B91C2EEB84A509769
            APIs
            • RegisterServiceCtrlHandlerA.ADVAPI32(Pqrstua Cdefgh,00406412), ref: 004061FE
            • SetServiceStatus.ADVAPI32(00418508), ref: 004062DD
            • Sleep.KERNEL32(000001F4), ref: 00406303
            • SetServiceStatus.ADVAPI32(00418508), ref: 00406332
            • WSAStartup.WS2_32(00000202,?), ref: 00406356
            • CreateThread.KERNEL32(00000000,00000000,Function_000056C8,00000000,00000000,00000000), ref: 0040637C
            • CreateThread.KERNEL32(00000000,00000000,00405B0E,00000000,00000000,00000000), ref: 0040638E
            • WaitForSingleObject.KERNEL32(000000FF), ref: 004063B5
            • CloseHandle.KERNEL32 ref: 004063D5
            • closesocket.WS2_32 ref: 004063E1
            • Sleep.KERNEL32(00000BB8), ref: 00406407
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Service$CreateSleepStatusThread$CloseCtrlHandleHandlerObjectRegisterSingleStartupWaitclosesocket
            • String ID: i=%d, j=%d$x=%d, y=%d$Pqrstua Cdefgh
            • API String ID: 2296132945-2841422515
            • Opcode ID: 3492d6bbd68280e26ae5ed08855f20f88fa0e78dee612d5d7f4a7ce09bdbfaf8
            • Instruction ID: a99f8aabad0be4ff45e753892dd9d25af12037b68c92d2ce4d89189b7607c7d3
            • Opcode Fuzzy Hash: 3492d6bbd68280e26ae5ed08855f20f88fa0e78dee612d5d7f4a7ce09bdbfaf8
            • Instruction Fuzzy Hash: 7D51DBB15402097EE2013B22AE46FBF3A6DDB1678DF01C52EB644B42D3EEB91E1145BD
            APIs
            • __EH_prolog.LIBCMT ref: 0040494A
            • htons.WS2_32(00004129), ref: 004049EE
              • Part of subcall function 004024FF: inet_addr.WS2_32(-000003F6), ref: 00402503
              • Part of subcall function 004024FF: gethostbyname.WS2_32(?), ref: 00402511
            • socket.WS2_32(00000002,00000001,00000000), ref: 00404A31
            • connect.WS2_32(?,00000002,00000010), ref: 00404A58
            • closesocket.WS2_32(?), ref: 00404A66
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: H_prologclosesocketconnectgethostbynamehtonsinet_addrsocket
            • String ID: i=%d, j=%d$x=%d, y=%d$($+$6CA26E9A8ACEE7A9B937983B193CAA6A$<$O$~
            • API String ID: 3150497368-2680386479
            • Opcode ID: 4b012d22926e35a2a64fd35ee53fd38b5aea9da97c5693f4783a8255bfdfa46b
            • Instruction ID: efc398db915a4811f6cbee3194b71a852a5cebab8de0b1a7b577a4a55ce8fa8d
            • Opcode Fuzzy Hash: 4b012d22926e35a2a64fd35ee53fd38b5aea9da97c5693f4783a8255bfdfa46b
            • Instruction Fuzzy Hash: F3410B70D0024DA9EB11A7A99D4AFEEBB3C9F12358F00426EF150762D3D7B80A0197B9
            APIs
            • __EH_prolog.LIBCMT ref: 00402E78
            • htons.WS2_32(00001F91), ref: 00402F1A
              • Part of subcall function 004024FF: inet_addr.WS2_32(-000003F6), ref: 00402503
              • Part of subcall function 004024FF: gethostbyname.WS2_32(?), ref: 00402511
            • socket.WS2_32(00000002,00000001,00000000), ref: 00402F5D
            • connect.WS2_32(?,00000002,00000010), ref: 00402F84
            • closesocket.WS2_32(?), ref: 00402F92
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: H_prologclosesocketconnectgethostbynamehtonsinet_addrsocket
            • String ID: i=%d, j=%d$x=%d, y=%d$($+$5A9F769FF57B7E1E994A964B211C5F1980FC12$<$O$~
            • API String ID: 3150497368-1907008454
            • Opcode ID: 2c8e05d61d474977845eadf3a6ac738190a3e7e4f66d435699b0b2a917198aa9
            • Instruction ID: a4b5eaa42d208ed5cb154f17fbedc59bd05dc571b201ff25960e750dbf8f8340
            • Opcode Fuzzy Hash: 2c8e05d61d474977845eadf3a6ac738190a3e7e4f66d435699b0b2a917198aa9
            • Instruction Fuzzy Hash: E241FD30D0424DB9EB11B7A99D45FEEBB385F12358F00426EF150761D3D7B80A0197B9
            APIs
            • SetServiceStatus.ADVAPI32(00418508), ref: 004064A2
            • Sleep.KERNEL32(000001F4), ref: 004064BE
            • SetServiceStatus.ADVAPI32(00418508), ref: 00406516
            • Sleep.KERNEL32(000001F4), ref: 00406532
            • SetServiceStatus.ADVAPI32(00418508), ref: 004065C9
            • Sleep.KERNEL32(000001F4), ref: 004065E5
            • SetServiceStatus.ADVAPI32(00418508), ref: 00406635
            • Sleep.KERNEL32(000001F4), ref: 00406651
            • SetServiceStatus.ADVAPI32(00418508), ref: 004066AF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: ServiceStatus$Sleep
            • String ID: i=%d, j=%d$x=%d, y=%d
            • API String ID: 4108286180-1211302626
            • Opcode ID: d4917e07c9ea4d00a99fdc1bd992a337d36b1d803616f317da748a5cdbd78b86
            • Instruction ID: 6ec6f814e4218cb82c6a6af5bb67cd6d81b18e39341711e23d75ced4529739d1
            • Opcode Fuzzy Hash: d4917e07c9ea4d00a99fdc1bd992a337d36b1d803616f317da748a5cdbd78b86
            • Instruction Fuzzy Hash: CC51DAB05802097AF2113B129E47FBF261DDB12B8DF41C42EB244342D3EEBD0E1169AE
            APIs
              • Part of subcall function 004024FF: inet_addr.WS2_32(-000003F6), ref: 00402503
              • Part of subcall function 004024FF: gethostbyname.WS2_32(?), ref: 00402511
              • Part of subcall function 00402524: socket.WS2_32(00000002,00000001,00000000), ref: 00402531
              • Part of subcall function 00402524: htons.WS2_32(?), ref: 0040254D
              • Part of subcall function 00402524: connect.WS2_32(00000000,00000002,00000010), ref: 0040255E
              • Part of subcall function 00402524: closesocket.WS2_32(00000000), ref: 0040256A
            • wsprintfA.USER32 ref: 004048A6
            • GetCurrentProcess.KERNEL32(000000FF,000000FF), ref: 004048B3
            • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 004048BA
            • send.WS2_32(00000000,?,?,00000000), ref: 004048DE
            • recv.WS2_32(00000000,?,00007FF8,00000000), ref: 004048EB
              • Part of subcall function 00402673: GetTickCount.KERNEL32 ref: 00402674
            • send.WS2_32(00000000,?,-00000800,00000000), ref: 00404909
            • send.WS2_32(00000000,?,00007FF8,00000000), ref: 00404916
            • closesocket.WS2_32(00000000), ref: 00404919
            • Sleep.KERNEL32(00000005), ref: 00404921
            • RtlExitUserThread.NTDLL(00000000), ref: 0040493F
            Strings
            • GET %s HTTP/1.1Accept: */*Accept-Language: zh-CNAccept-Encoding: gzip, deflateUser-Agent: %sHost: %s, xrefs: 004048A0
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: send$Processclosesocket$CountCurrentExitSizeSleepThreadTickUserWorkingconnectgethostbynamehtonsinet_addrrecvsocketwsprintf
            • String ID: GET %s HTTP/1.1Accept: */*Accept-Language: zh-CNAccept-Encoding: gzip, deflateUser-Agent: %sHost: %s
            • API String ID: 2798269228-2160938302
            • Opcode ID: 9aa690ae6986a2b34c22f1b89080174cededd6eb31737ced7f75f3164fcca912
            • Instruction ID: f51822f240692a8053a50dfcca2b5274b2881f1df9f2e502570dc293d19dfa8c
            • Opcode Fuzzy Hash: 9aa690ae6986a2b34c22f1b89080174cededd6eb31737ced7f75f3164fcca912
            • Instruction Fuzzy Hash: AA31C772900218BAEB1097A0DD09FDB3BBCEB44315F1484BAF349E21D1DEB85994CB68
            APIs
            • RtlExitUserThread.NTDLL(00000000), ref: 00404FE0
            • __ftol.LIBCMT ref: 00405092
            • send.WS2_32(?,00000018,00000000), ref: 00405139
            • Sleep.KERNEL32(000007D0), ref: 00405144
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: ExitSleepThreadUser__ftolsend
            • String ID: i=%d, j=%d$x=%d, y=%d$%.fKb/bps|%d%%$<"A
            • API String ID: 3795447664-4135614110
            • Opcode ID: def9b406ce94f3547b86fee9e8351b54c03e5989298be342786e6876818ce93c
            • Instruction ID: fce1e63cbed6aa965e48371db96df29c319fb4f61bdf8efcd5726da3c26e7147
            • Opcode Fuzzy Hash: def9b406ce94f3547b86fee9e8351b54c03e5989298be342786e6876818ce93c
            • Instruction Fuzzy Hash: 65418F7154430977D2207A22DE46F9F7A5CDB8678CF01882EB284741C3EE7DA614557E
            APIs
            • RtlAllocateHeap.NTDLL(00000000,00002020,([A), ref: 0040C940
            • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,00000006,0040CDEB,?,00000010,00001000,?,?,?,004090CC,00000010,00000006), ref: 0040C964
            • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,00000006,0040CDEB,?,00000010,00001000,?,?,?,004090CC,00000010,00000006), ref: 0040C97E
            • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00000006,0040CDEB,?,00000010,00001000,?,?,?,004090CC,00000010,00000006,00409061), ref: 0040CA3F
            • HeapFree.KERNEL32(00000000,00000000,?,00000006,0040CDEB,?,00000010,00001000,?,?,?,004090CC,00000010,00000006,00409061,000000E0), ref: 0040CA56
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Virtual$AllocFreeHeap$Allocate
            • String ID: ([A$([A$([A
            • API String ID: 3000792370-485227959
            • Opcode ID: 252b16199caaf8274c0e25629e63689a58a963f495be8733396297ec650dcf69
            • Instruction ID: 7b0a2b5b307234bdbadda4f9c2d3330fd6d99f44db996a2e4a864c51ef13add5
            • Opcode Fuzzy Hash: 252b16199caaf8274c0e25629e63689a58a963f495be8733396297ec650dcf69
            • Instruction Fuzzy Hash: B03190B1644B05EBD320DF28EC85BA6B7E4EB88764F10863AF155A72D0D778B841CB5C
            APIs
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000), ref: 0040D835
            • GetStdHandle.KERNEL32(000000F4,00412680,00000000,?,00000000,00000000), ref: 0040D90B
            • WriteFile.KERNEL32(00000000), ref: 0040D912
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: File$HandleModuleNameWrite
            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program: $h|A
            • API String ID: 3784150691-368981224
            • Opcode ID: ccd0fe01459f5b1dd4ebe9b5a8f9e6c50729a013afc6f5346dda6e99f3b91060
            • Instruction ID: ac55a3e8249a1377cf40e28000151495e3142391508d49b7d01a91de537b8c2b
            • Opcode Fuzzy Hash: ccd0fe01459f5b1dd4ebe9b5a8f9e6c50729a013afc6f5346dda6e99f3b91060
            • Instruction Fuzzy Hash: FE31B672A402186FDF24A6A0CD45FDA737CEB45304F10447BF584F61C0EAB8A9958B5D
            APIs
            • WSAStartup.WS2_32(00000202,?), ref: 0040409B
            • WSASocketA.WS2_32(00000002,00000003,00000001,00000000,00000000,00000001), ref: 004040B4
            • setsockopt.WS2_32(00000000,0000FFFF,00001005,000007D0,00000004), ref: 004040D6
              • Part of subcall function 0040260A: inet_addr.WS2_32(?), ref: 0040260E
              • Part of subcall function 0040260A: gethostbyname.WS2_32(?), ref: 0040261C
            • GetCurrentProcessId.KERNEL32 ref: 0040411C
            • GetTickCount.KERNEL32 ref: 00404134
            • sendto.WS2_32(00000000,?,00000A0C,00000000,00000002,00000010), ref: 0040418F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: CountCurrentProcessSocketStartupTickgethostbynameinet_addrsendtosetsockopt
            • String ID: i=%d, j=%d$x=%d, y=%d
            • API String ID: 4249112871-1211302626
            • Opcode ID: 71166620b8b2b3b2ecf5e1185ce500726798df821d8ee257901f96bcb555e8e5
            • Instruction ID: 7a4882cfce9c5744c9e02238466cac80428c1bbd5b5c6985cd86dd2067699eab
            • Opcode Fuzzy Hash: 71166620b8b2b3b2ecf5e1185ce500726798df821d8ee257901f96bcb555e8e5
            • Instruction Fuzzy Hash: F731A871D40308BAEB109BA0DC8AFDE777CAF44704F04827AB704FA1D1E6B84A958B59
            APIs
            • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,0040D8EC,?,Microsoft Visual C++ Runtime Library,00012010,?,00412680,?,004126D0,?,?,?,Runtime Error!Program: ), ref: 0040FE51
            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0040FE69
            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0040FE7A
            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0040FE87
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: AddressProc$LibraryLoad
            • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
            • API String ID: 2238633743-4044615076
            • Opcode ID: d150db50f78dfc102a092fe40f8293f28b5d5c76099d9b9d1354dc74e3cc7e44
            • Instruction ID: 8d721dd4b18d8c0ca37389efd140cfbf6b9c78442df3676d4f790523ac0be05e
            • Opcode Fuzzy Hash: d150db50f78dfc102a092fe40f8293f28b5d5c76099d9b9d1354dc74e3cc7e44
            • Instruction Fuzzy Hash: 76017531700301AFC721AFB9DD80AA77AE99B88751344443FF208D25E1DB788856CB98
            APIs
            • CompareStringW.KERNEL32(00000000,00000000,00412790,00000001,00412790,00000001,00000000,022F0C5C,0040A9AC,0040E249,0041274C,?,00000006,?,-00000763), ref: 00411455
            • CompareStringA.KERNEL32(00000000,00000000,0041278C,00000001,0041278C,00000001,?,-00000763,?,0040E21A), ref: 00411472
            • CompareStringA.KERNEL32(?,00000006,00000000,0040E21A,?,-00000763,00000000,022F0C5C,0040A9AC,0040E249,0041274C,?,00000006,?,-00000763), ref: 004114D0
            • GetCPInfo.KERNEL32(?,00000000,00000000,022F0C5C,0040A9AC,0040E249,0041274C,?,00000006,?,-00000763,?,0040E21A), ref: 00411521
            • MultiByteToWideChar.KERNEL32(?,00000009,00000000,-00000763,00000000,00000000,?,-00000763,?,0040E21A), ref: 004115A0
            • MultiByteToWideChar.KERNEL32(?,00000001,00000000,-00000763,-00000763,-00000763,?,-00000763,?,0040E21A), ref: 00411601
            • MultiByteToWideChar.KERNEL32(?,00000009,?,-00000763,00000000,00000000,?,-00000763,?,0040E21A), ref: 00411614
            • MultiByteToWideChar.KERNEL32(?,00000001,?,-00000763,?,00000000,?,-00000763,?,0040E21A), ref: 00411660
            • CompareStringW.KERNEL32(?,00000006,00000000,-00000763,?,00000000,?,00000000,?,-00000763,?,0040E21A), ref: 00411678
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: ByteCharCompareMultiStringWide$Info
            • String ID:
            • API String ID: 1651298574-0
            • Opcode ID: 397cf858c76ae87a9a7cdfd633a7a1cb99afb3ab274040c32c7cae97fcb58827
            • Instruction ID: 4d2159ab60f9fe132ad55b696941b9c0592fc9716a7839075d275dfc0cb19f96
            • Opcode Fuzzy Hash: 397cf858c76ae87a9a7cdfd633a7a1cb99afb3ab274040c32c7cae97fcb58827
            • Instruction Fuzzy Hash: EC719F71900249BFCF219F948D85AEF7FB6EB45354F14412BF652A2270C33A8C91DB99
            APIs
            • LCMapStringW.KERNEL32(00000000,00000100,00412790,00000001,00000000,00000000,00000103,00000001,00000000,?,0040F852,00200020,00000000,?,00000000,00000000), ref: 0041089D
            • LCMapStringA.KERNEL32(00000000,00000100,0041278C,00000001,00000000,00000000,?,0040F852,00200020,00000000,?,00000000,00000000,00000001), ref: 004108B9
            • LCMapStringA.KERNEL32(00000000,?,00000000,00200020,0040F852,?,00000103,00000001,00000000,?,0040F852,00200020,00000000,?,00000000,00000000), ref: 00410902
            • MultiByteToWideChar.KERNEL32(00000000,00000002,00000000,00200020,00000000,00000000,00000103,00000001,00000000,?,0040F852,00200020,00000000,?,00000000,00000000), ref: 0041093A
            • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00200020,?,00000000,?,0040F852,00200020,00000000,?,00000000), ref: 00410992
            • LCMapStringW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,?,0040F852,00200020,00000000,?,00000000), ref: 004109A8
            • LCMapStringW.KERNEL32(00000000,?,0040F852,00000000,0040F852,?,?,0040F852,00200020,00000000,?,00000000), ref: 004109DB
            • LCMapStringW.KERNEL32(00000000,?,?,?,?,00000000,?,0040F852,00200020,00000000,?,00000000), ref: 00410A43
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: String$ByteCharMultiWide
            • String ID:
            • API String ID: 352835431-0
            • Opcode ID: 514ab8969e687360577d9c632c158a04f3703579f891091b295ca71342501e57
            • Instruction ID: acbc3e326724620e619a247532405582c45e597d0560062ee2bc9d9a6f078926
            • Opcode Fuzzy Hash: 514ab8969e687360577d9c632c158a04f3703579f891091b295ca71342501e57
            • Instruction Fuzzy Hash: C5518C71500209EFDF219F95CD45AEF7FB5FB48750F10822AF910A1260C3BA8CA1DBA9
            APIs
            • RegOpenKeyA.ADVAPI32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,?), ref: 00403827
            • RegQueryValueExA.ADVAPI32(?,~MHz,00000000,?,?,?), ref: 0040385C
            • RegCloseKey.ADVAPI32(?), ref: 0040387B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: CloseOpenQueryValue
            • String ID: i=%d, j=%d$x=%d, y=%d$HARDWARE\DESCRIPTION\System\CentralProcessor\0$~MHz
            • API String ID: 3677997916-717590390
            • Opcode ID: 9c1e94914a298c8fc2e59db7628cf6b5080351b6bc991fc10c597983900a373c
            • Instruction ID: 6248b6fe4c840e67728a5158146573ba63f7b5f3eda635fa0af03f38cddcf772
            • Opcode Fuzzy Hash: 9c1e94914a298c8fc2e59db7628cf6b5080351b6bc991fc10c597983900a373c
            • Instruction Fuzzy Hash: AA2187715402097EE2117A119E83FBF765CDB46B8CF41882EF744742C3EA794E1155BA
            APIs
            • VirtualFree.KERNEL32(0000000C,00100000,00004000), ref: 0040B874
            • VirtualFree.KERNEL32(0000000C,00000000,00008000), ref: 0040B87F
            • HeapFree.KERNEL32(00000000,?), ref: 0040B88C
            • HeapFree.KERNEL32(00000000), ref: 0040B8A8
            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0040B8C9
            • HeapDestroy.KERNEL32 ref: 0040B8DB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Free$HeapVirtual$Destroy
            • String ID: ([A
            • API String ID: 716807051-2441821139
            • Opcode ID: 0c9e8be2edc154952d1187430e402ab99a23677b4116cdad8579b256f4497231
            • Instruction ID: a0b8d0e88e1421d253f55143f88fc14a6dd29fdf93324dcaf3ecdd87cd13e49e
            • Opcode Fuzzy Hash: 0c9e8be2edc154952d1187430e402ab99a23677b4116cdad8579b256f4497231
            • Instruction Fuzzy Hash: 63115E76644204ABDA21AF10EC41F967766F744720F22C43AF640B61B0CBB5BC56CB5C
            APIs
            • GetEnvironmentStringsW.KERNEL32(?,00000002,?,?,000000FF,000000FF,0040F484,?,00000000,00415B1C,?,0040B571,000000FF,0040B533,0040B533,000000FF), ref: 0040D678
            • GetEnvironmentStrings.KERNEL32(?,?,000000FF,000000FF,0040F484,?,00000000,00415B1C,?,0040B571,000000FF,0040B533,0040B533,000000FF,?), ref: 0040D68C
            • GetEnvironmentStringsW.KERNEL32(?,00000002,?,?,000000FF,000000FF,0040F484,?,00000000,00415B1C,?,0040B571,000000FF,0040B533,0040B533,000000FF), ref: 0040D6B8
            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000002,?,?,000000FF,000000FF,0040F484,?), ref: 0040D6F0
            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,0040B533,00000000,00000000,00000000,00000000,?,?,000000FF,000000FF,0040F484,?,00000000,00415B1C), ref: 0040D712
            • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,000000FF,000000FF,0040F484,?,00000000,00415B1C,?,0040B571,000000FF,0040B533,0040B533,000000FF,?), ref: 0040D72B
            • GetEnvironmentStrings.KERNEL32(?,00000002,?,?,000000FF,000000FF,0040F484,?,00000000,00415B1C,?,0040B571,000000FF,0040B533,0040B533,000000FF), ref: 0040D73E
            • FreeEnvironmentStringsA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,h"At"Af@,h"At"Af@), ref: 0040D77C
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: EnvironmentStrings$ByteCharFreeMultiWide
            • String ID:
            • API String ID: 1823725401-0
            • Opcode ID: 50b140cde47cff86ad8c481e88d4ae70377ff255c38b7fb93295efd68066054f
            • Instruction ID: d78e90559a26e7fe2a89aa07eb90442a15f1fdbe27aaca1957aa72be6b288592
            • Opcode Fuzzy Hash: 50b140cde47cff86ad8c481e88d4ae70377ff255c38b7fb93295efd68066054f
            • Instruction Fuzzy Hash: 7D3138B2C042216FD7207FF85CC487B769CE759354711093FFA56E3281EA798C49866D
            APIs
            • CreateProcessA.KERNEL32(0040B533,0040B533,00000000,00000000,00000001,000000FF,?,00000000,?,?,?,00000000,00415B1C), ref: 0040F371
            • GetLastError.KERNEL32 ref: 0040F379
            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0040F3B6
            • GetExitCodeProcess.KERNEL32(?,?), ref: 0040F3C3
            • CloseHandle.KERNEL32(?), ref: 0040F3CC
            • CloseHandle.KERNEL32(?), ref: 0040F3D9
            • CloseHandle.KERNEL32(0040B58F), ref: 0040F3E9
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: CloseHandle$Process$CodeCreateErrorExitLastObjectSingleWait
            • String ID:
            • API String ID: 966596688-0
            • Opcode ID: b3d840c42763ea4b3ee14dee9b13034aadaf3e790924aa5161f74e93b214ebf1
            • Instruction ID: 03c52d897a38bb243cfe801abb8f653e57caf12c65ccad77bd82a9114246bbf7
            • Opcode Fuzzy Hash: b3d840c42763ea4b3ee14dee9b13034aadaf3e790924aa5161f74e93b214ebf1
            • Instruction Fuzzy Hash: 045113358042489FDB21CF64DC44AEEBBB5EB45324F2481BFE811BB6D1C779984ACB58
            APIs
            • GetStringTypeW.KERNEL32(00000001,00412790,00000001,-00000033,00000000,-00000003,-00000033,00000000,-00000003,00000000,-00000763,0040E3C8,-00000003), ref: 00410751
            • GetStringTypeA.KERNEL32(00000000,00000001,0041278C,00000001,?,?,?,?,?,?,?,x=%d, y=%d,i=%d, j=%d,?,00408A85,00000012), ref: 0041076B
            • GetStringTypeA.KERNEL32(-00000033,0040E3C8,-00000763,00000000,-00000003,00000000,-00000003,-00000033,00000000,-00000003,00000000,-00000763,0040E3C8,-00000003), ref: 0041079F
            • MultiByteToWideChar.KERNEL32(00000000,-00000002,-00000763,00000000,00000000,00000000,00000000,-00000003,-00000033,00000000,-00000003,00000000,-00000763,0040E3C8,-00000003), ref: 004107D7
            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?), ref: 0041082D
            • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?), ref: 0041083F
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: StringType$ByteCharMultiWide
            • String ID:
            • API String ID: 3852931651-0
            • Opcode ID: 5df8b774d4c9a77128eb69b42eaa16e8f95b31859df70daefe0bb3efdc7e9ecc
            • Instruction ID: 0818c690c863ed52bb56e0714856270074b564441908bcb3747cf3633a37e43a
            • Opcode Fuzzy Hash: 5df8b774d4c9a77128eb69b42eaa16e8f95b31859df70daefe0bb3efdc7e9ecc
            • Instruction Fuzzy Hash: 0A418E75500219EFCF21AF54CD85AEF3F69FB08750F10452AFA15D2290C3B899A0CB99
            APIs
            • WSAStartup.WS2_32(00000202), ref: 004056D9
            • Sleep.KERNEL32(00000258), ref: 004056E4
            • CreateThread.KERNEL32(00000000,00000000,Function_00005178,00000000,00000000,00000000), ref: 004056F6
            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00405704
            • CloseHandle.KERNEL32 ref: 00405710
            • closesocket.WS2_32 ref: 0040571C
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: CloseCreateHandleObjectSingleSleepStartupThreadWaitclosesocket
            • String ID:
            • API String ID: 964154963-0
            • Opcode ID: 44e354964dafaec4c441969297343f4a91da4b72d6f8363810dc476b72c76803
            • Instruction ID: 47045389ab8bcf369b36685f210a0f8d0bc80c17753468178bfb8b28848da1d0
            • Opcode Fuzzy Hash: 44e354964dafaec4c441969297343f4a91da4b72d6f8363810dc476b72c76803
            • Instruction Fuzzy Hash: 26E0C971401520BBD7115BA5ED0DEDB3E69FB0E361B108739B31DD00B1CAB50424CFA9
            APIs
            • GetVersionExA.KERNEL32 ref: 0040B6B6
            • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 0040B6EB
            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040B74B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: EnvironmentFileModuleNameVariableVersion
            • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
            • API String ID: 1385375860-4131005785
            • Opcode ID: 55799f3d705b688186e6e658e07e1f7f58d3042459e26192c68e257bd960546e
            • Instruction ID: baefc899298e8724c898a9a08758f68ce54187c9717e35e01e5415b500a5e724
            • Opcode Fuzzy Hash: 55799f3d705b688186e6e658e07e1f7f58d3042459e26192c68e257bd960546e
            • Instruction Fuzzy Hash: 563113719412486EEB3286745C85BDA3768DB42704F2404FBD284F72C2E77D8E89CBAD
            APIs
            • IsBadWritePtr.KERNEL32(00000000), ref: 0040C5EC
            • IsBadWritePtr.KERNEL32(?,000041C4), ref: 0040C625
            • IsBadWritePtr.KERNEL32(?,00008000), ref: 0040C685
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Write
            • String ID: $@
            • API String ID: 3165279579-1077428164
            • Opcode ID: 2adcf420c7e45416a2e3f72929e20141f464f3192860ced93f91c0fbac91ddad
            • Instruction ID: 57b7ac05fb46af663c2f481ef697e4288759fd8fa5f4a5c276f9f78e2c3e2a99
            • Opcode Fuzzy Hash: 2adcf420c7e45416a2e3f72929e20141f464f3192860ced93f91c0fbac91ddad
            • Instruction Fuzzy Hash: 35A14A32D00216DBDB24DB58C8C06AEB3B1BB54326F20877BD527B62D1D7789942EB49
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 93fa223ca1964b84b87052129f914800067fdc7a2f1009c5141d2c206aebff9d
            • Instruction ID: c4ed90b157d624312e02addc358cc1ab3ceeb2061e4556225d55c93fc279ea98
            • Opcode Fuzzy Hash: 93fa223ca1964b84b87052129f914800067fdc7a2f1009c5141d2c206aebff9d
            • Instruction Fuzzy Hash: 69714772500215BADB226B25CC40BAB3A2ADB407E4F15413BFC64BB3E1DB38DD50A6CD
            APIs
            • GetStartupInfoA.KERNEL32(?), ref: 00409CCF
            • GetFileType.KERNEL32(00000800), ref: 00409D75
            • GetStdHandle.KERNEL32(-000000F6), ref: 00409DCE
            • GetFileType.KERNEL32(00000000), ref: 00409DDC
            • SetHandleCount.KERNEL32 ref: 00409E13
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: FileHandleType$CountInfoStartup
            • String ID:
            • API String ID: 1710529072-0
            • Opcode ID: 8d2cf682e8aae9f12f99a58e5b40a267fbf19067efbc43b15841da555f83dc55
            • Instruction ID: 629a5f445d47fb485e5b92b97776912fed3ad4079e60577beb6fc872dcdc357d
            • Opcode Fuzzy Hash: 8d2cf682e8aae9f12f99a58e5b40a267fbf19067efbc43b15841da555f83dc55
            • Instruction Fuzzy Hash: 055136719442518BD7218F28CC48B967B90EF52320F19873EE5A6EB3E2DB38DC85C759
            APIs
            • VirtualFree.KERNEL32(?,00000000,00008000,([A,0040CB63,([A,00000000,0000000A,-00000030,00000000,?,0040CC15,00000010,0040901A,00000000,0000000A), ref: 0040CA72
            • HeapFree.KERNEL32(00000000,0000000A,?,0040CC15,00000010,0040901A,00000000,0000000A), ref: 0040CAA8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Free$HeapVirtual
            • String ID: ([A$([A$([A
            • API String ID: 3783212868-485227959
            • Opcode ID: 4c49a968bc0b0e1f8829033817525829fee88987ac3366273c73e1a64aff2a9b
            • Instruction ID: db7307649e4f681218e297089eed455a3f41b52a4525a67e4ad9fa26a558860b
            • Opcode Fuzzy Hash: 4c49a968bc0b0e1f8829033817525829fee88987ac3366273c73e1a64aff2a9b
            • Instruction Fuzzy Hash: 7DF0DA71548610DFC725DF18ED84BC6BBB1EB49720B11852AF696977A0C770BC80CF88
            APIs
            • GetModuleHandleA.KERNEL32(ntdll,NtQuerySystemInformation), ref: 00407793
            • GetProcAddress.KERNEL32(00000000), ref: 0040779A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: NtQuerySystemInformation$ntdll
            • API String ID: 1646373207-3593917365
            • Opcode ID: 16e619bb711fb1b5b349aa6f6823970c37b1f66631ee66875d4f6a06ae15c941
            • Instruction ID: 3aac871426265193e534f7263ec0f2979e53ea9c302f7b19d4dee45939947f14
            • Opcode Fuzzy Hash: 16e619bb711fb1b5b349aa6f6823970c37b1f66631ee66875d4f6a06ae15c941
            • Instruction Fuzzy Hash: BA71C3B1E00605EFD724DF55D88499ABBB4FF48304F2185AED045A7262EB30EA55CBA0
            APIs
            • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 00402FEB
            • WSAIoctl.WS2_32(0002BF20,98000004,00000001,0000000C,00000000,00000000,00000001,00000000,00000000), ref: 00403096
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Ioctlsetsockopt
            • String ID: i=%d, j=%d$x=%d, y=%d
            • API String ID: 1903391676-1211302626
            • Opcode ID: 2e8fb80135a8fd15338480637f8e5c14dfce9db7cdbeef607db4f8490a63513c
            • Instruction ID: e5c3403da9ceab19e5fb53ddc8ca521e08dbcd3b3870f2f7ca2bc3b5502f9d06
            • Opcode Fuzzy Hash: 2e8fb80135a8fd15338480637f8e5c14dfce9db7cdbeef607db4f8490a63513c
            • Instruction Fuzzy Hash: 04111FB16402097DF6117A519D46FFF775CDB42B8CF00C42AB744B92C3EAB84E1156B9
            APIs
            • SetFilePointer.KERNEL32(00000000,A'@,00000000,@XA,00000000,00415840,?,0040DA44,00415840,00000000,00000002,00000001,00000000,?), ref: 0040D99B
            • GetLastError.KERNEL32 ref: 0040D9A8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: ErrorFileLastPointer
            • String ID: @XA$A'@
            • API String ID: 2976181284-2922937615
            • Opcode ID: d12fc55695f935a445e30db32e21ef12d82db6491b8fb8bac7924328bba55fe0
            • Instruction ID: cfe283e067ac49183c2045b2ecda98058100b9d52128cc8452dabc1f3c7e7db9
            • Opcode Fuzzy Hash: d12fc55695f935a445e30db32e21ef12d82db6491b8fb8bac7924328bba55fe0
            • Instruction Fuzzy Hash: 2D11C4B19082019BC710CBB8DD987563794AB05338F21873EF522E72D1DB78C849D74C
            APIs
            • GetModuleHandleA.KERNEL32(KERNEL32,00408A9D), ref: 0040AA7F
            • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0040AA8F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: IsProcessorFeaturePresent$KERNEL32
            • API String ID: 1646373207-3105848591
            • Opcode ID: afd57e2ac2808bb1d871420b97466693a6b2bf49d46f7bee87e48af1d80616e7
            • Instruction ID: 538ef96528a9605923bab4d0de7bf5319326fd66ae5a0ea854de2d285d4baee8
            • Opcode Fuzzy Hash: afd57e2ac2808bb1d871420b97466693a6b2bf49d46f7bee87e48af1d80616e7
            • Instruction Fuzzy Hash: CFC012203C030BBADA209BB11F19B962A485B04B02F2442367A1DF41C0CAECC070D92F
            APIs
            • LoadLibraryA.KERNEL32(WS2_32.dll,WSASocketA), ref: 00402660
            • GetProcAddress.KERNEL32(00000000), ref: 00402667
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: WS2_32.dll$WSASocketA
            • API String ID: 2574300362-2240758815
            • Opcode ID: ae28e519a7b6e80e91a8529fa1c04e09e90698f9997b49527fef2b1e638b0183
            • Instruction ID: 7a3db4533e7f13413eacb98dcc8fdfd7c6e783eaaf2c3a3aa3856f6d00b56da8
            • Opcode Fuzzy Hash: ae28e519a7b6e80e91a8529fa1c04e09e90698f9997b49527fef2b1e638b0183
            • Instruction Fuzzy Hash: 09C04CB0D40600BBC6015B609D0D7D43E55A6887417A085677609E1190CAF80151DE1D
            APIs
            • LoadLibraryA.KERNEL32(WS2_32.dll,htons), ref: 0040263E
            • GetProcAddress.KERNEL32(00000000), ref: 00402645
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: WS2_32.dll$htons
            • API String ID: 2574300362-178149120
            • Opcode ID: 309fed516b4dbc28cfdc9ffdf2a72f8a02d4db1a691d998ba347698543ff4364
            • Instruction ID: e6de2dc05ed5847a78ddefc3f2a9c4cc886c0d13785a7aa472f3717d4e4717a5
            • Opcode Fuzzy Hash: 309fed516b4dbc28cfdc9ffdf2a72f8a02d4db1a691d998ba347698543ff4364
            • Instruction Fuzzy Hash: 47C09B74541304BFC7005BA15D0D6D53D55B65D701354C537B705E1190DFF90191D61D
            APIs
            • LoadLibraryA.KERNEL32(KERNEL32.dll,SetProcessWorkingSetSize), ref: 004026A0
            • GetProcAddress.KERNEL32(00000000), ref: 004026A7
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID: KERNEL32.dll$SetProcessWorkingSetSize
            • API String ID: 2574300362-3706258605
            • Opcode ID: 07db207d0140fc3224ad6132a95ba6a79a327df64de8e12d1b43bad5bd330965
            • Instruction ID: 0015a468a98a0ffe5f7f3df7b353b68da85e8202853dfc7b528b9042ea931de4
            • Opcode Fuzzy Hash: 07db207d0140fc3224ad6132a95ba6a79a327df64de8e12d1b43bad5bd330965
            • Instruction Fuzzy Hash: 3EC04C71941700BAD7105B609D0DBD43959A6487423E08566B10AD1190CAB80094DA1D
            APIs
            • WriteFile.KERNEL32(?,?,?,00000000,00000000,00000001,00000000,?), ref: 0040DABE
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: FileWrite
            • String ID:
            • API String ID: 3934441357-0
            • Opcode ID: 8c91f5432ddeee5293cf55af43f09b8f848b0256b885b5908f837f6952682f42
            • Instruction ID: afc7b15f90409d4cce33868b2a7bd211e48c26d4a2c2ca80f35d74857d62724a
            • Opcode Fuzzy Hash: 8c91f5432ddeee5293cf55af43f09b8f848b0256b885b5908f837f6952682f42
            • Instruction Fuzzy Hash: 2651A371E04208EFCB11CFA8C984ADD7BB4FB45350F21817AE916AB290D7749A49CF58
            APIs
            • GetIfTable.IPHLPAPI(00000000,?,00000001), ref: 00407C42
            • GetIfTable.IPHLPAPI(00000000,?,00000001), ref: 00407C66
            • GetTickCount.KERNEL32 ref: 00407D1B
            • GetTickCount.KERNEL32 ref: 00407D30
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: CountTableTick
            • String ID:
            • API String ID: 316864735-0
            • Opcode ID: 446bbcad1c79a80f54a11c1d6b38d3c725f923def6967b3bb684b8115a896fd6
            • Instruction ID: fde055a7c582602a073f59b3a9c2983dd07b33d48f8a6fbf85bfd16946571020
            • Opcode Fuzzy Hash: 446bbcad1c79a80f54a11c1d6b38d3c725f923def6967b3bb684b8115a896fd6
            • Instruction Fuzzy Hash: CD316E71E08215AFDB14DF68D98069ABBF6FB48310F10847ED949E3390DB74AE41CB98
            APIs
            • MultiByteToWideChar.KERNEL32(?,00000001,00000000,-00000763,-00000763,-00000763,?,-00000763,?,0040E21A), ref: 00411601
            • MultiByteToWideChar.KERNEL32(?,00000009,?,-00000763,00000000,00000000,?,-00000763,?,0040E21A), ref: 00411614
            • MultiByteToWideChar.KERNEL32(?,00000001,?,-00000763,?,00000000,?,-00000763,?,0040E21A), ref: 00411660
            • CompareStringW.KERNEL32(?,00000006,00000000,-00000763,?,00000000,?,00000000,?,-00000763,?,0040E21A), ref: 00411678
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: ByteCharMultiWide$CompareString
            • String ID:
            • API String ID: 376665442-0
            • Opcode ID: 628d27e1d9cd974a96493e08d4972d5a420bd1ed413e27db758fe659bf7e9604
            • Instruction ID: f0c3647fc61c5939d7cbe72e16721f875ba5624940e9c3ef6c7f71f348a9962b
            • Opcode Fuzzy Hash: 628d27e1d9cd974a96493e08d4972d5a420bd1ed413e27db758fe659bf7e9604
            • Instruction Fuzzy Hash: 28213B32900249EFCF218F94CD41ADEBFB6FF48350F15462AFA1072160C3369961DBA8
            APIs
            • RtlReAllocateHeap.NTDLL(00000000,00000050,?,00000000), ref: 0040C083
            • RtlAllocateHeap.NTDLL(00000008,000041C4,?), ref: 0040C0B7
            • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 0040C0D1
            • HeapFree.KERNEL32(00000000,?), ref: 0040C0E8
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Heap$Allocate$AllocFreeVirtual
            • String ID:
            • API String ID: 94566200-0
            • Opcode ID: abaa32a9d15426d2a43737c6ce3b68e869d4898ab25d8fb3cb65aaf4b96b63ac
            • Instruction ID: 4e544f0637167c1653db0c9f56540a45586026c683dedc9bdf5ed5bd1dd5f3ad
            • Opcode Fuzzy Hash: abaa32a9d15426d2a43737c6ce3b68e869d4898ab25d8fb3cb65aaf4b96b63ac
            • Instruction Fuzzy Hash: 2C11D7B1204601EBC721CF59EC85DA67BB6FB49720710C63EF262D61B0DBB1A852DB18
            APIs
            • htons.WS2_32(00000000), ref: 0040579F
              • Part of subcall function 0040260A: inet_addr.WS2_32(?), ref: 0040260E
              • Part of subcall function 0040260A: gethostbyname.WS2_32(?), ref: 0040261C
            • socket.WS2_32(00000002,00000001,00000000), ref: 004057BD
            • connect.WS2_32(00000000,00000002,00000010), ref: 004057CC
            • closesocket.WS2_32(00000000), ref: 004057D8
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: closesocketconnectgethostbynamehtonsinet_addrsocket
            • String ID:
            • API String ID: 1954806591-0
            • Opcode ID: 499af27a99b3e525cc66e43c47cf20a4ae9057e883845d3aca84c50d48299515
            • Instruction ID: 53579a3fc73d097e04c0fa872a5a3e1c249cfc766e889caa4f4839dd50c45134
            • Opcode Fuzzy Hash: 499af27a99b3e525cc66e43c47cf20a4ae9057e883845d3aca84c50d48299515
            • Instruction Fuzzy Hash: 16F08935500214B6D710A7A4AD4ABEE7678EF05724F10462AF625E61D0DBF445508BAD
            APIs
            • socket.WS2_32(00000002,00000001,00000000), ref: 00402531
            • htons.WS2_32(?), ref: 0040254D
            • connect.WS2_32(00000000,00000002,00000010), ref: 0040255E
            • closesocket.WS2_32(00000000), ref: 0040256A
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: closesocketconnecthtonssocket
            • String ID:
            • API String ID: 3817148366-0
            • Opcode ID: 4346206fa24754252258424c22c40528ad3b5498cdcfe0a6f553be412d6145c0
            • Instruction ID: e660f6890c169c9fca879cbd32495503f69ba39a1545db4ef8690b4adf1fc059
            • Opcode Fuzzy Hash: 4346206fa24754252258424c22c40528ad3b5498cdcfe0a6f553be412d6145c0
            • Instruction Fuzzy Hash: C9F030349401247AD710AB68AD0DBEDB678AF05774F004725FA35E62E0E7F59620879D
            APIs
            • GetCPInfo.KERNEL32(?,00000000), ref: 0040FCA2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: Info
            • String ID: $
            • API String ID: 1807457897-3032137957
            • Opcode ID: c2ac7f20b7043a8bcec9c8c25ad4611a8cee618e414e3d98af1ccb4bb841b7c7
            • Instruction ID: f1f7576c511da1a47cd10b917c746b033a0cd605e75fc9adc3bcd54ead21d5e9
            • Opcode Fuzzy Hash: c2ac7f20b7043a8bcec9c8c25ad4611a8cee618e414e3d98af1ccb4bb841b7c7
            • Instruction Fuzzy Hash: 074149310142981AEB229714DD49BFB3FA8EF02704F1400FBD546E75D3C679498CDBAA
            APIs
            • GetFileType.KERNEL32(?), ref: 004101B6
            • GetLastError.KERNEL32 ref: 004101C0
              • Part of subcall function 00410063: SetStdHandle.KERNEL32(000000F6,?,00000000,?,00000000,0041020E,00000000,?), ref: 004100B3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2029313538.0000000000401000.00000040.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.2029300514.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000414000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.0000000000417000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029313538.000000000041B000.00000040.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029405054.000000000041C000.00000080.00000001.01000000.00000005.sdmpDownload File
            • Associated: 00000000.00000002.2029416922.000000000041D000.00000004.00000001.01000000.00000005.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_file.jbxd
            Similarity
            • API ID: ErrorFileHandleLastType
            • String ID: @
            • API String ID: 1910029465-2766056989
            • Opcode ID: 74444cf0a481934128c07e172aa453b4f973fe814d57b8e3706283b9d1a20cd0
            • Instruction ID: 144c9a55f287517bd9041dea95d608578f3341bc5e2bb24f645e30baf87da6d2
            • Opcode Fuzzy Hash: 74444cf0a481934128c07e172aa453b4f973fe814d57b8e3706283b9d1a20cd0
            • Instruction Fuzzy Hash: D911043224224477DB305A68EC087DA7B449B06375F18C62BF964962D2DFBD89C4AB4D