Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NLRpif3sEB.exe

Overview

General Information

Sample name:NLRpif3sEB.exe
renamed because original name is a hash value
Original sample name:3bbda4a44d5416394724d568a5cdcedfd7e05d236dd5c0917070bc9795516814.exe
Analysis ID:1575228
MD5:7083f90ec97477ac0dc977324bba3ec8
SHA1:003402d622f48f10c5f3521244be458619e8d49b
SHA256:3bbda4a44d5416394724d568a5cdcedfd7e05d236dd5c0917070bc9795516814
Tags:exeuser-NDA0E
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found evasive API chain (may stop execution after checking mutex)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Self deletion via cmd or bat file
Uses ping.exe to check the status of other devices and networks
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)

Classification

  • System is w10x64
  • NLRpif3sEB.exe (PID: 7052 cmdline: "C:\Users\user\Desktop\NLRpif3sEB.exe" MD5: 7083F90EC97477AC0DC977324BBA3EC8)
    • cmd.exe (PID: 6332 cmdline: "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\user\Desktop\NLRpif3sEB.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6016 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 4076 cmdline: ping 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: NLRpif3sEB.exeAvira: detected
Source: NLRpif3sEB.exeReversingLabs: Detection: 60%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: NLRpif3sEB.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00404911 CryptUnprotectData,LocalFree,0_2_00404911
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00410D22 CryptUnprotectData,LocalFree,0_2_00410D22
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00410ED8 CoCreateInstance,CoTaskMemFree,CoTaskMemFree,CredEnumerateW,CryptUnprotectData,LocalFree,CredFree,0_2_00410ED8
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00411FC7 CryptUnprotectData,LocalFree,0_2_00411FC7
Source: NLRpif3sEB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: NLRpif3sEB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00404CE1 FindFirstFileW,FindNextFileW,FindClose,0_2_00404CE1
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004108E4 FindFirstFileW,FindNextFileW,FindClose,0_2_004108E4
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004118BB FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindNextFileW,FindClose,0_2_004118BB

Networking

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveHost: 213.226.100.197
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveHost: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: unknownTCP traffic detected without corresponding DNS query: 213.226.100.197
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004129A8 InternetOpenW,InternetSetOptionW,InternetConnectW,HttpOpenRequestW,InternetQueryOptionW,InternetSetOptionW,HttpSendRequestW,InternetQueryDataAvailable,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004129A8
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveHost: 213.226.100.197
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveHost: 213.226.100.197
Source: NLRpif3sEB.exe, NLRpif3sEB.exe, 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, NLRpif3sEB.exe, 00000000.00000002.2108183406.000000000322A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://213.226.100.197;
Source: NLRpif3sEB.exe, 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, NLRpif3sEB.exe, 00000000.00000002.2108183406.000000000322A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://213.226.100.197;%s
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004058F2 OpenProcessToken,GetTokenInformation,NtCreateToken,CloseHandle,0_2_004058F2
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00405750 GetTokenInformation,GetTokenInformation,DuplicateTokenEx,AdjustTokenPrivileges,NtSetInformationThread,CloseHandle,0_2_00405750
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_0040A8560_2_0040A856
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004084060_2_00408406
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_0040881D0_2_0040881D
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_0040A4D40_2_0040A4D4
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00407CEF0_2_00407CEF
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004040BB0_2_004040BB
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_0040795E0_2_0040795E
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00403DFA0_2_00403DFA
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_0040D6110_2_0040D611
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_0040821E0_2_0040821E
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00410ED80_2_00410ED8
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_0040A2A00_2_0040A2A0
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00407AA00_2_00407AA0
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00415B500_2_00415B50
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_0040A7590_2_0040A759
Source: NLRpif3sEB.exe, 00000000.00000002.2107804477.00000000017CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej%Q vs NLRpif3sEB.exe
Source: NLRpif3sEB.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal80.troj.spyw.evad.winEXE@6/0@0/2
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00405750 GetTokenInformation,GetTokenInformation,DuplicateTokenEx,AdjustTokenPrivileges,NtSetInformationThread,CloseHandle,0_2_00405750
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00405836 RtlAdjustPrivilege,CreateToolhelp32Snapshot,Process32NextW,OpenProcess,OpenProcessToken,CloseHandle,CloseHandle,Process32NextW,CloseHandle,0_2_00405836
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00407656 CoCreateInstance,SysAllocString,SysAllocString,VariantClear,0_2_00407656
Source: C:\Users\user\Desktop\NLRpif3sEB.exeMutant created: \Sessions\1\BaseNamedObjects\CC1E89063FF11448456937
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6016:120:WilError_03
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCommand line argument: 0rz0_2_007A7180
Source: NLRpif3sEB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\NLRpif3sEB.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: NLRpif3sEB.exeReversingLabs: Detection: 60%
Source: unknownProcess created: C:\Users\user\Desktop\NLRpif3sEB.exe "C:\Users\user\Desktop\NLRpif3sEB.exe"
Source: C:\Users\user\Desktop\NLRpif3sEB.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\user\Desktop\NLRpif3sEB.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1
Source: C:\Users\user\Desktop\NLRpif3sEB.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\user\Desktop\NLRpif3sEB.exe"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: NLRpif3sEB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: NLRpif3sEB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: NLRpif3sEB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: NLRpif3sEB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: NLRpif3sEB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: NLRpif3sEB.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A4B40 LoadLibraryA,GetProcAddress,0_2_007A4B40
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00417AB0 push eax; ret 0_2_00417AC4
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00417AB0 push eax; ret 0_2_00417AEC
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A67D5 push ecx; ret 0_2_007A67E8

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\NLRpif3sEB.exeProcess created: "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\user\Desktop\NLRpif3sEB.exe"
Source: C:\Users\user\Desktop\NLRpif3sEB.exeProcess created: "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\user\Desktop\NLRpif3sEB.exe"Jump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\NLRpif3sEB.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-14560
Source: C:\Users\user\Desktop\NLRpif3sEB.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-14271
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-15363
Source: C:\Users\user\Desktop\NLRpif3sEB.exe TID: 7100Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exe TID: 7100Thread sleep time: -30000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004145B8 GetKeyboardLayoutList followed by cmp: cmp eax, ebx and CTI: jne 00414B0Dh0_2_004145B8
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00404CE1 FindFirstFileW,FindNextFileW,FindClose,0_2_00404CE1
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004108E4 FindFirstFileW,FindNextFileW,FindClose,0_2_004108E4
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004118BB FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindNextFileW,FindClose,0_2_004118BB
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004145B8 GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetComputerNameW,GetUserNameW,GetLocalTime,EnumDisplayDevicesW,GetKeyboardLayoutList,GetKeyboardLayoutList,0_2_004145B8
Source: NLRpif3sEB.exe, 00000000.00000002.2107804477.000000000179B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW9
Source: NLRpif3sEB.exe, 00000000.00000002.2107804477.00000000017CC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}7k
Source: NLRpif3sEB.exe, 00000000.00000002.2107804477.000000000174E000.00000004.00000020.00020000.00000000.sdmp, NLRpif3sEB.exe, 00000000.00000002.2107804477.000000000179B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\NLRpif3sEB.exeAPI call chain: ExitProcess graph end nodegraph_0-14273
Source: C:\Users\user\Desktop\NLRpif3sEB.exeAPI call chain: ExitProcess graph end nodegraph_0-14480
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A50C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_007A50C4
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A4B40 LoadLibraryA,GetProcAddress,0_2_007A4B40
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00405108 mov eax, dword ptr fs:[00000030h]0_2_00405108
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004075F1 mov eax, dword ptr fs:[00000030h]0_2_004075F1
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00407605 mov eax, dword ptr fs:[00000030h]0_2_00407605
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00407621 mov eax, dword ptr fs:[00000030h]0_2_00407621
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A4CC0 mov eax, dword ptr fs:[00000030h]0_2_007A4CC0
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A4960 mov eax, dword ptr fs:[00000030h]0_2_007A4960
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A4F20 mov ecx, dword ptr fs:[00000030h]0_2_007A4F20
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A50C4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_007A50C4
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A6A31 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007A6A31
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_007A5B09 SetUnhandledExceptionFilter,0_2_007A5B09
Source: C:\Users\user\Desktop\NLRpif3sEB.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\user\Desktop\NLRpif3sEB.exe"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1Jump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: GetLocaleInfoA,0_2_00416E6D
Source: C:\Users\user\Desktop\NLRpif3sEB.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00413CAF CreateMutexA,ExitProcess,GetModuleFileNameW,ExitProcess,GetSystemTime,GetSystemTime,CloseHandle,ExitProcess,0_2_00413CAF
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_004145B8 GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetComputerNameW,GetUserNameW,GetLocalTime,EnumDisplayDevicesW,GetKeyboardLayoutList,GetKeyboardLayoutList,0_2_004145B8
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00406418 GetTimeZoneInformation,0_2_00406418
Source: C:\Users\user\Desktop\NLRpif3sEB.exeCode function: 0_2_00416E8E RtlGetVersion,0_2_00416E8E

Stealing of Sensitive Information

barindex
Source: NLRpif3sEB.exeString found in binary or memory: Electrum
Source: NLRpif3sEB.exeString found in binary or memory: com.liberty.jaxx\IndexedDB
Source: NLRpif3sEB.exeString found in binary or memory: Exodus
Source: NLRpif3sEB.exeString found in binary or memory: Ethereum
Source: NLRpif3sEB.exeString found in binary or memory: keystore
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Access Token Manipulation
1
Virtualization/Sandbox Evasion
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts13
Native API
Boot or Logon Initialization Scripts11
Process Injection
1
Access Token Manipulation
LSASS Memory11
Security Software Discovery
Remote Desktop Protocol1
Data from Local System
2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
File Deletion
Cached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
Remote System Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
System Network Configuration Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow2
File and Directory Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing34
System Information Discovery
Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
NLRpif3sEB.exe61%ReversingLabsWin32.Trojan.KpotStealer
NLRpif3sEB.exe100%AviraTR/AD.Khalesi.aeba
NLRpif3sEB.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://213.226.100.197;0%Avira URL Cloudsafe
http://213.226.100.197;%s0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://213.226.100.197;NLRpif3sEB.exe, NLRpif3sEB.exe, 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, NLRpif3sEB.exe, 00000000.00000002.2108183406.000000000322A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://213.226.100.197;%sNLRpif3sEB.exe, 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, NLRpif3sEB.exe, 00000000.00000002.2108183406.000000000322A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
213.226.100.197
unknownRussian Federation
200019ALEXHOSTMDfalse
IP
127.0.0.1
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1575228
Start date and time:2024-12-14 20:04:07 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 16s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:7
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:NLRpif3sEB.exe
renamed because original name is a hash value
Original Sample Name:3bbda4a44d5416394724d568a5cdcedfd7e05d236dd5c0917070bc9795516814.exe
Detection:MAL
Classification:mal80.troj.spyw.evad.winEXE@6/0@0/2
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 35
  • Number of non-executed functions: 69
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
  • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: NLRpif3sEB.exe
TimeTypeDescription
14:05:42API Interceptor2x Sleep call for process: NLRpif3sEB.exe modified
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
ALEXHOSTMDsora.sh4.elfGet hashmaliciousMiraiBrowse
  • 176.123.5.14
http://server.citierupticx.com/specId/product-mje%EF%BC%A0ml.avio.co.jpGet hashmaliciousHTMLPhisherBrowse
  • 91.208.197.216
2024-11 eStmt 5563019.exeGet hashmaliciousScreenConnect ToolBrowse
  • 176.123.1.130
otis.exeGet hashmaliciousUnknownBrowse
  • 91.132.92.231
otis.exeGet hashmaliciousUnknownBrowse
  • 91.132.92.231
armv5l.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 91.208.162.247
mips.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 91.208.162.247
m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 91.208.162.247
powerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 91.208.162.247
armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
  • 91.208.162.247
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):4.913242559455033
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:NLRpif3sEB.exe
File size:544'256 bytes
MD5:7083f90ec97477ac0dc977324bba3ec8
SHA1:003402d622f48f10c5f3521244be458619e8d49b
SHA256:3bbda4a44d5416394724d568a5cdcedfd7e05d236dd5c0917070bc9795516814
SHA512:7ea07933377c2a7651547889decf558dc4243e2b4e4c3e41b374ec2e9bd6d25f2e1109b579b51696cc9f3127ab458f5050917fed1c673df6ccd299fad0089f4c
SSDEEP:6144:jbgH72UMexaE7qzXi41IpGP2Uxf1SOXUqcAgJo6VVTsGP7J2DMABQ7lOMPJ3Q:jbgH72lWaEcXi4GcxzRr7
TLSH:9FC492E7C303660FF70374B0C18CAAB5A4561771BE4A58626A266FFCF36D1D10969B83
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........,...M...M...M...;i..M...;\..M...;h..M...5Q..M...M...M...;m..M...;X..M...;_..M..Rich.M..........PE..L....{{^...................
Icon Hash:90cececece8e8eb0
Entrypoint:0x435414
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x5E7B7BE5 [Wed Mar 25 15:42:29 2020 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:489091380902ae5fab5138a1044fd8fa
Instruction
call 00007F98F09006BBh
jmp 00007F98F08FEFDEh
mov edi, edi
push ebp
mov ebp, esp
sub esp, 00000328h
mov dword ptr [0043DC78h], eax
mov dword ptr [0043DC74h], ecx
mov dword ptr [0043DC70h], edx
mov dword ptr [0043DC6Ch], ebx
mov dword ptr [0043DC68h], esi
mov dword ptr [0043DC64h], edi
mov word ptr [0043DC90h], ss
mov word ptr [0043DC84h], cs
mov word ptr [0043DC60h], ds
mov word ptr [0043DC5Ch], es
mov word ptr [0043DC58h], fs
mov word ptr [0043DC54h], gs
pushfd
pop dword ptr [0043DC88h]
mov eax, dword ptr [ebp+00h]
mov dword ptr [0043DC7Ch], eax
mov eax, dword ptr [ebp+04h]
mov dword ptr [0043DC80h], eax
lea eax, dword ptr [ebp+08h]
mov dword ptr [0043DC8Ch], eax
mov eax, dword ptr [ebp-00000320h]
mov dword ptr [0043DBC8h], 00010001h
mov eax, dword ptr [0043DC80h]
mov dword ptr [0043DB7Ch], eax
mov dword ptr [0043DB70h], C0000409h
mov dword ptr [0043DB74h], 00000001h
mov eax, dword ptr [0043D004h]
mov dword ptr [ebp-00000328h], eax
mov eax, dword ptr [0043D008h]
mov dword ptr [ebp-00000324h], eax
call dword ptr [000000A0h]
Programming Language:
  • [C++] VS2010 build 30319
  • [ASM] VS2010 build 30319
  • [ C ] VS2010 build 30319
  • [IMP] VS2008 SP1 build 30729
  • [RES] VS2010 build 30319
  • [LNK] VS2010 build 30319
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3bd3c0x64.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x3f0000x48464.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x880000x72c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3bb480x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x3a0000x150.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x385820x386002ca1e21247c586cd81cd50ddd8f96bbaFalse0.3514109271064302data5.281420630473987IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x3a0000x24aa0x2600324c6009672f87605820a2907d77065fFalse0.34745065789473684data4.724043806815104IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x3d0000x19400xc00a1e869547c364d560b5be05df1ef49cbFalse0.22265625data2.53160662042428IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x3f0000x484640x48600477999904eacff1380b3c82f67633d0aFalse0.3737721286701209data3.539645845792326IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x880000xa760xc000551b6d0bb13bc88ee9f5875dfe694fdFalse0.5087890625data4.540521816553144IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
AFX_DIALOG_LAYOUT0x3f1cc0x2dataEnglishUnited States5.0
RT_MENU0x3f1d00xa2dataEnglishUnited States0.5679012345679012
RT_DIALOG0x3f2740x144dataEnglishUnited States0.5679012345679012
RT_STRING0x3f3b80x90dataEnglishUnited States0.5972222222222222
RT_RCDATA0x3f4480x48000dataEnglishUnited States0.3737284342447917
RT_RCDATA0x874480x19dataEnglishUnited States1.36
DLLImport
KERNEL32.dllTerminateProcess, GetLastError, VirtualAlloc, LoadLibraryA, SetCalendarInfoA, HeapAlloc, GetProcAddress, CloseHandle, HeapReAlloc, GetStringTypeW, MultiByteToWideChar, LCMapStringW, GetModuleHandleW, RtlUnwind, Sleep, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, LoadLibraryW, EnterCriticalSection, LeaveCriticalSection, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, GetCurrentProcess, HeapSize, InterlockedDecrement, GetCurrentThreadId, HeapFree, GetCommandLineA, HeapSetInformation, GetStartupInfoW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, ExitProcess, DecodePointer, WriteFile, GetStdHandle, GetModuleFileNameW, EncodePointer, GetModuleFileNameA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, IsProcessorFeaturePresent
USER32.dllEndPaint, PostQuitMessage, GetClientRect, BeginPaint, GetDC, ReleaseDC, DefWindowProcW, GetMessageW, LoadCursorW, TranslateMessage, LoadIconW, ShowWindow, CreateWindowExW, MessageBoxW, RegisterClassW, UpdateWindow, DispatchMessageW
GDI32.dllLineTo, GetStockObject, MoveToEx
Normaliz.dllIdnToNameprepUnicode
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Dec 14, 2024 20:04:58.949801922 CET4973080192.168.2.4213.226.100.197
Dec 14, 2024 20:04:59.073381901 CET8049730213.226.100.197192.168.2.4
Dec 14, 2024 20:04:59.073631048 CET4973080192.168.2.4213.226.100.197
Dec 14, 2024 20:04:59.073776960 CET4973080192.168.2.4213.226.100.197
Dec 14, 2024 20:04:59.200999975 CET8049730213.226.100.197192.168.2.4
Dec 14, 2024 20:05:21.003298044 CET8049730213.226.100.197192.168.2.4
Dec 14, 2024 20:05:21.003520012 CET4973080192.168.2.4213.226.100.197
Dec 14, 2024 20:05:21.003964901 CET4973080192.168.2.4213.226.100.197
Dec 14, 2024 20:05:21.007930994 CET4973680192.168.2.4213.226.100.197
Dec 14, 2024 20:05:21.130458117 CET8049730213.226.100.197192.168.2.4
Dec 14, 2024 20:05:21.134324074 CET8049736213.226.100.197192.168.2.4
Dec 14, 2024 20:05:21.134510040 CET4973680192.168.2.4213.226.100.197
Dec 14, 2024 20:05:21.134593964 CET4973680192.168.2.4213.226.100.197
Dec 14, 2024 20:05:21.254499912 CET8049736213.226.100.197192.168.2.4
Dec 14, 2024 20:05:43.082082987 CET8049736213.226.100.197192.168.2.4
Dec 14, 2024 20:05:43.082182884 CET4973680192.168.2.4213.226.100.197
Dec 14, 2024 20:05:43.082266092 CET4973680192.168.2.4213.226.100.197
Dec 14, 2024 20:05:43.202833891 CET8049736213.226.100.197192.168.2.4
  • 213.226.100.197
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.449730213.226.100.197807052C:\Users\user\Desktop\NLRpif3sEB.exe
TimestampBytes transferredDirectionData
Dec 14, 2024 20:04:59.073776960 CET65OUTGET / HTTP/1.1
Connection: Keep-Alive
Host: 213.226.100.197


Session IDSource IPSource PortDestination IPDestination PortPIDProcess
1192.168.2.449736213.226.100.197807052C:\Users\user\Desktop\NLRpif3sEB.exe
TimestampBytes transferredDirectionData
Dec 14, 2024 20:05:21.134593964 CET65OUTGET / HTTP/1.1
Connection: Keep-Alive
Host: 213.226.100.197


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:14:04:57
Start date:14/12/2024
Path:C:\Users\user\Desktop\NLRpif3sEB.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\NLRpif3sEB.exe"
Imagebase:0x770000
File size:544'256 bytes
MD5 hash:7083F90EC97477AC0DC977324BBA3EC8
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:14:05:42
Start date:14/12/2024
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\user\Desktop\NLRpif3sEB.exe"
Imagebase:0x240000
File size:236'544 bytes
MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:5
Start time:14:05:42
Start date:14/12/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:6
Start time:14:05:42
Start date:14/12/2024
Path:C:\Windows\SysWOW64\PING.EXE
Wow64 process (32bit):true
Commandline:ping 127.0.0.1
Imagebase:0x630000
File size:18'944 bytes
MD5 hash:B3624DD758CCECF93A1226CEF252CA12
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:16.4%
    Dynamic/Decrypted Code Coverage:55.9%
    Signature Coverage:13.1%
    Total number of Nodes:2000
    Total number of Limit Nodes:23
    execution_graph 14111 778262 14112 778274 VirtualAlloc 14111->14112 14113 778288 14111->14113 14112->14113 16640 412ce3 16641 412cf9 16640->16641 16642 413569 2 API calls 16641->16642 16643 412d09 16642->16643 16644 413973 HeapFree 16643->16644 16645 412e55 16644->16645 16646 7a435c 16647 7a436b VirtualAlloc 16646->16647 16648 7a437c 16646->16648 16647->16648 16649 7a4382 VirtualAlloc 16648->16649 16650 7a4393 16648->16650 16649->16650 16651 7a4399 MessageBoxW 16650->16651 16652 7a43ad 16650->16652 16651->16652 14114 7a452d 14115 7a4546 SetCalendarInfoA 14114->14115 14116 7a4537 GetCurrentProcess TerminateProcess 14114->14116 14117 7a4558 GetLastError 14115->14117 14118 7a4563 GetCurrentProcess TerminateProcess 14115->14118 14116->14115 14117->14118 14119 7a4572 IdnToNameprepUnicode 14117->14119 14118->14119 14120 7a4591 GetCurrentProcess TerminateProcess 14119->14120 14121 7a4586 GetLastError 14119->14121 14122 7a45a0 14120->14122 14121->14120 14121->14122 14137 7a510d 14122->14137 14124 7a46d2 14125 7a45aa _memset 14125->14124 14154 7a43c0 14125->14154 14127 7a45e9 14128 7a43c0 68 API calls 14127->14128 14132 7a45fd 14128->14132 14129 7a50d3 _free 66 API calls 14130 7a46c6 14129->14130 14131 7a50d3 _free 66 API calls 14130->14131 14131->14124 14136 7a46ba 14132->14136 14161 7a5040 14132->14161 14136->14129 14138 7a518a 14137->14138 14150 7a511b 14137->14150 14139 7a5a9f _malloc DecodePointer 14138->14139 14141 7a5190 14139->14141 14140 7a5126 14140->14150 14172 7a5a57 14140->14172 14181 7a58a8 14140->14181 14201 7a55c2 14140->14201 14143 7a5566 _malloc 65 API calls 14141->14143 14153 7a5182 14143->14153 14144 7a5149 RtlAllocateHeap 14144->14150 14144->14153 14146 7a5176 14206 7a5566 14146->14206 14150->14140 14150->14144 14150->14146 14151 7a5174 14150->14151 14204 7a5a9f DecodePointer 14150->14204 14152 7a5566 _malloc 65 API calls 14151->14152 14152->14153 14153->14125 14421 7a4960 GetPEB 14154->14421 14156 7a43cb 14157 7a4404 GetModuleHandleW 14156->14157 14158 7a4429 14157->14158 14159 7a510d _malloc 66 API calls 14158->14159 14160 7a445d 14158->14160 14159->14160 14160->14127 14422 7a4f20 14161->14422 14164 7a46ae 14166 7a50d3 14164->14166 14167 7a5107 _free 14166->14167 14168 7a50de HeapFree 14166->14168 14167->14136 14168->14167 14169 7a50f3 14168->14169 14170 7a5566 _malloc 64 API calls 14169->14170 14171 7a50f9 GetLastError 14170->14171 14171->14167 14209 7a7647 14172->14209 14174 7a5a5e 14175 7a7647 __FF_MSGBANNER 66 API calls 14174->14175 14180 7a5a6b 14174->14180 14175->14180 14176 7a58a8 __NMSG_WRITE 66 API calls 14177 7a5a83 14176->14177 14178 7a58a8 __NMSG_WRITE 66 API calls 14177->14178 14179 7a5a8d 14178->14179 14179->14140 14180->14176 14180->14179 14182 7a58c9 __NMSG_WRITE 14181->14182 14184 7a7647 __FF_MSGBANNER 63 API calls 14182->14184 14200 7a59e5 14182->14200 14183 7a50c4 __except_handler4 5 API calls 14186 7a5a55 14183->14186 14185 7a58e3 14184->14185 14187 7a59f4 GetStdHandle 14185->14187 14188 7a7647 __FF_MSGBANNER 63 API calls 14185->14188 14186->14140 14189 7a5a02 _strlen 14187->14189 14187->14200 14190 7a58f4 14188->14190 14192 7a5a38 WriteFile 14189->14192 14189->14200 14190->14187 14191 7a5906 14190->14191 14193 7a5932 GetModuleFileNameW 14191->14193 14195 7a5953 _wcslen 14191->14195 14191->14200 14192->14200 14193->14195 14194 7a6b5a __invoke_watson 10 API calls 14194->14195 14195->14194 14196 7a7487 63 API calls __NMSG_WRITE 14195->14196 14198 7a59d5 14195->14198 14243 7a74fc 14195->14243 14196->14195 14252 7a731b 14198->14252 14200->14183 14271 7a5597 GetModuleHandleW 14201->14271 14205 7a5ab4 14204->14205 14205->14150 14274 7a6453 GetLastError 14206->14274 14208 7a556b 14208->14151 14210 7a7653 14209->14210 14211 7a765d 14210->14211 14212 7a5566 _malloc 66 API calls 14210->14212 14211->14174 14213 7a7676 14212->14213 14216 7a6bac 14213->14216 14219 7a6b7f DecodePointer 14216->14219 14220 7a6b94 14219->14220 14225 7a6b5a 14220->14225 14222 7a6bab 14223 7a6b7f _strcpy_s 10 API calls 14222->14223 14224 7a6bb8 14223->14224 14224->14174 14228 7a6a31 14225->14228 14229 7a6a50 _memset __call_reportfault 14228->14229 14230 7a6a6e IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14229->14230 14233 7a6b3c __call_reportfault 14230->14233 14232 7a6b58 GetCurrentProcess TerminateProcess 14232->14222 14234 7a50c4 14233->14234 14235 7a50ce IsDebuggerPresent 14234->14235 14236 7a50cc 14234->14236 14242 7a6a1a 14235->14242 14236->14232 14239 7a54eb SetUnhandledExceptionFilter UnhandledExceptionFilter 14240 7a5508 __call_reportfault 14239->14240 14241 7a5510 GetCurrentProcess TerminateProcess 14239->14241 14240->14241 14241->14232 14242->14239 14248 7a750e 14243->14248 14244 7a7512 14245 7a7517 14244->14245 14246 7a5566 _malloc 66 API calls 14244->14246 14245->14195 14247 7a752e 14246->14247 14249 7a6bac _strcpy_s 11 API calls 14247->14249 14248->14244 14248->14245 14250 7a7555 14248->14250 14249->14245 14250->14245 14251 7a5566 _malloc 66 API calls 14250->14251 14251->14247 14270 7a631c EncodePointer 14252->14270 14254 7a7341 14255 7a73ce 14254->14255 14256 7a7351 LoadLibraryW 14254->14256 14262 7a73e8 DecodePointer DecodePointer 14255->14262 14267 7a73fb 14255->14267 14257 7a7466 14256->14257 14258 7a7366 GetProcAddress 14256->14258 14263 7a50c4 __except_handler4 5 API calls 14257->14263 14258->14257 14261 7a737c 7 API calls 14258->14261 14259 7a745a DecodePointer 14259->14257 14260 7a7431 DecodePointer 14260->14259 14264 7a7438 14260->14264 14261->14255 14265 7a73be GetProcAddress EncodePointer 14261->14265 14262->14267 14266 7a7485 14263->14266 14264->14259 14268 7a744b DecodePointer 14264->14268 14265->14255 14266->14200 14267->14259 14267->14260 14269 7a741e 14267->14269 14268->14259 14268->14269 14269->14259 14270->14254 14272 7a55ab GetProcAddress 14271->14272 14273 7a55bb ExitProcess 14271->14273 14272->14273 14288 7a632e TlsGetValue 14274->14288 14277 7a64c0 SetLastError 14277->14208 14280 7a6486 DecodePointer 14281 7a649b 14280->14281 14282 7a649f 14281->14282 14283 7a64b7 14281->14283 14297 7a639f 14282->14297 14284 7a50d3 _free 62 API calls 14283->14284 14286 7a64bd 14284->14286 14286->14277 14287 7a64a7 GetCurrentThreadId 14287->14277 14289 7a635e 14288->14289 14290 7a6343 DecodePointer TlsSetValue 14288->14290 14289->14277 14291 7a7f00 14289->14291 14290->14289 14293 7a7f09 14291->14293 14294 7a647e 14293->14294 14295 7a7f27 Sleep 14293->14295 14310 7a8c01 14293->14310 14294->14277 14294->14280 14296 7a7f3c 14295->14296 14296->14293 14296->14294 14319 7a6790 14297->14319 14299 7a63ab GetModuleHandleW 14320 7a6d36 14299->14320 14301 7a63e9 InterlockedIncrement 14327 7a6441 14301->14327 14304 7a6d36 __lock 64 API calls 14305 7a640a 14304->14305 14330 7a7f9a InterlockedIncrement 14305->14330 14307 7a6428 14342 7a644a 14307->14342 14309 7a6435 _doexit 14309->14287 14311 7a8c0d 14310->14311 14317 7a8c28 14310->14317 14312 7a8c19 14311->14312 14311->14317 14313 7a5566 _malloc 65 API calls 14312->14313 14315 7a8c1e 14313->14315 14314 7a8c3b HeapAlloc 14316 7a8c62 14314->14316 14314->14317 14315->14293 14316->14293 14317->14314 14317->14316 14318 7a5a9f _malloc DecodePointer 14317->14318 14318->14317 14319->14299 14321 7a6d4b 14320->14321 14322 7a6d5e EnterCriticalSection 14320->14322 14345 7a6c74 14321->14345 14322->14301 14324 7a6d51 14324->14322 14370 7a5864 14324->14370 14419 7a6c5d LeaveCriticalSection 14327->14419 14329 7a6403 14329->14304 14331 7a7fbb 14330->14331 14332 7a7fb8 InterlockedIncrement 14330->14332 14333 7a7fc8 14331->14333 14334 7a7fc5 InterlockedIncrement 14331->14334 14332->14331 14335 7a7fd2 InterlockedIncrement 14333->14335 14336 7a7fd5 14333->14336 14334->14333 14335->14336 14337 7a7fdf InterlockedIncrement 14336->14337 14338 7a7fe2 14336->14338 14337->14338 14339 7a7ffb InterlockedIncrement 14338->14339 14340 7a800b InterlockedIncrement 14338->14340 14341 7a8016 InterlockedIncrement 14338->14341 14339->14338 14340->14338 14341->14307 14420 7a6c5d LeaveCriticalSection 14342->14420 14344 7a6451 14344->14309 14346 7a6c80 _doexit 14345->14346 14347 7a5a57 __FF_MSGBANNER 65 API calls 14346->14347 14360 7a6ca6 14346->14360 14348 7a6c95 14347->14348 14350 7a58a8 __NMSG_WRITE 65 API calls 14348->14350 14353 7a6c9c 14350->14353 14352 7a6cb6 _doexit 14352->14324 14357 7a55c2 _malloc 3 API calls 14353->14357 14354 7a6cc8 14358 7a5566 _malloc 65 API calls 14354->14358 14355 7a6cd7 14356 7a6d36 __lock 65 API calls 14355->14356 14359 7a6cde 14356->14359 14357->14360 14358->14352 14361 7a6d11 14359->14361 14362 7a6ce6 InitializeCriticalSectionAndSpinCount 14359->14362 14360->14352 14377 7a7ebb 14360->14377 14365 7a50d3 _free 65 API calls 14361->14365 14363 7a6d02 14362->14363 14364 7a6cf6 14362->14364 14382 7a6d2d 14363->14382 14366 7a50d3 _free 65 API calls 14364->14366 14365->14363 14367 7a6cfc 14366->14367 14369 7a5566 _malloc 65 API calls 14367->14369 14369->14363 14371 7a5a57 __FF_MSGBANNER 66 API calls 14370->14371 14372 7a586e 14371->14372 14373 7a58a8 __NMSG_WRITE 66 API calls 14372->14373 14374 7a5876 14373->14374 14386 7a5830 14374->14386 14380 7a7ec4 14377->14380 14378 7a510d _malloc 65 API calls 14378->14380 14379 7a6cc1 14379->14354 14379->14355 14380->14378 14380->14379 14381 7a7edb Sleep 14380->14381 14381->14380 14385 7a6c5d LeaveCriticalSection 14382->14385 14384 7a6d34 14384->14352 14385->14384 14389 7a56da 14386->14389 14388 7a5841 14390 7a56e6 _doexit 14389->14390 14391 7a6d36 __lock 61 API calls 14390->14391 14392 7a56ed 14391->14392 14394 7a5718 DecodePointer 14392->14394 14399 7a5797 14392->14399 14396 7a572f DecodePointer 14394->14396 14394->14399 14408 7a5742 14396->14408 14397 7a5814 _doexit 14397->14388 14412 7a5805 14399->14412 14400 7a57fc 14402 7a5805 14400->14402 14403 7a55c2 _malloc 3 API calls 14400->14403 14404 7a5812 14402->14404 14417 7a6c5d LeaveCriticalSection 14402->14417 14403->14402 14404->14388 14406 7a5759 DecodePointer 14411 7a631c EncodePointer 14406->14411 14408->14399 14408->14406 14409 7a5768 DecodePointer DecodePointer 14408->14409 14410 7a631c EncodePointer 14408->14410 14409->14408 14410->14408 14411->14408 14413 7a580b 14412->14413 14414 7a57e5 14412->14414 14418 7a6c5d LeaveCriticalSection 14413->14418 14414->14397 14416 7a6c5d LeaveCriticalSection 14414->14416 14416->14400 14417->14404 14418->14414 14419->14329 14420->14344 14421->14156 14423 7a4f41 14422->14423 14424 7a4f45 14422->14424 14425 7a4fba 14423->14425 14426 7a4fb0 CloseHandle 14423->14426 14424->14423 14427 7a4f8d GetPEB 14424->14427 14428 7a4fca 14425->14428 14429 7a4fc0 CloseHandle 14425->14429 14426->14425 14427->14423 14428->14164 14430 7a4fe0 14428->14430 14429->14428 14437 7a4d80 14430->14437 14434 7a5003 14436 7a4ff3 14434->14436 14448 7a4cc0 GetPEB 14434->14448 14436->14164 14451 7a4960 GetPEB 14437->14451 14439 7a4ded VirtualAlloc 14441 7a4d92 14439->14441 14440 7a4e65 14440->14436 14442 7a4b40 14440->14442 14441->14439 14441->14440 14444 7a4b66 14442->14444 14443 7a4b81 14443->14434 14444->14443 14445 7a4b9d LoadLibraryA 14444->14445 14446 7a4bbc 14445->14446 14446->14444 14447 7a4c59 GetProcAddress 14446->14447 14447->14446 14452 413ea0 14448->14452 14451->14441 14459 404ea0 14452->14459 14528 407621 GetPEB 14459->14528 14461 404ea5 14462 4064c7 14461->14462 14463 4064e3 14462->14463 14529 4075f1 GetPEB 14463->14529 14465 4072ea 14530 405192 14465->14530 14469 4073b8 13 API calls 14470 4075c0 14469->14470 14471 4075ec 14470->14471 14472 405192 3 API calls 14470->14472 14473 413caf 14471->14473 14472->14470 14552 413b6c 14473->14552 14475 413cc0 14557 41701b GetVolumeInformationW 14475->14557 14478 413ce4 14479 413cf2 GetModuleFileNameW 14478->14479 14480 413ceb ExitProcess 14478->14480 14561 413b1d 14479->14561 14482 413d18 14483 413d21 14482->14483 14484 413d35 14482->14484 14566 413c2c 14483->14566 14573 40b4b3 14484->14573 14490 413d4d 14586 416f96 GetUserDefaultLangID 14490->14586 14493 413de6 14747 404f2c 14493->14747 14496 413d6c 14499 413d7e 14496->14499 14657 414523 14496->14657 14501 413d90 14499->14501 14667 4115b6 14499->14667 14503 413da2 14501->14503 14681 4123e4 14501->14681 14504 413db4 14503->14504 14694 416dac 14503->14694 14509 413dc6 14504->14509 14699 415ada 14504->14699 14507 413e04 14508 413e39 GetSystemTime 14507->14508 14759 406122 14507->14759 14769 40647d SystemTimeToFileTime SystemTimeToFileTime FileTimeToSystemTime 14508->14769 14703 41538e 14509->14703 14516 413e64 14518 413e70 CloseHandle 14516->14518 14770 413b96 14518->14770 14521 413e2f 14523 404f2c HeapFree 14521->14523 14525 413e38 14523->14525 14525->14508 14528->14461 14529->14465 14532 4051ce 14530->14532 14531 405283 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 14539 407605 GetPEB 14531->14539 14532->14531 14540 405108 14532->14540 14534 405267 14535 405277 14534->14535 14536 40526c LoadLibraryA 14534->14536 14544 40528d 14535->14544 14536->14531 14536->14535 14539->14469 14541 405117 14540->14541 14542 40513d GetPEB 14541->14542 14543 40515e 14542->14543 14543->14534 14545 4052c7 14544->14545 14546 405108 GetPEB 14545->14546 14551 40527e 14545->14551 14547 405375 14546->14547 14548 405385 14547->14548 14549 40537a LoadLibraryA 14547->14549 14550 40528d GetPEB 14548->14550 14549->14548 14549->14551 14550->14551 14551->14531 14553 413b72 14552->14553 14786 413010 14553->14786 14556 413b86 14556->14475 14558 417041 14557->14558 14560 413ccb CreateMutexA 14557->14560 14559 405e03 wvnsprintfA 14558->14559 14559->14560 14560->14478 14908 413756 14561->14908 14563 413b27 14564 413b47 14563->14564 14565 404f2c HeapFree 14563->14565 14564->14482 14565->14564 14567 413c45 14566->14567 14568 405dba wvnsprintfW 14567->14568 14569 413c76 ExpandEnvironmentStringsW 14568->14569 14570 413c95 14569->14570 14571 413caa ExitProcess 14569->14571 14572 405552 ShellExecuteW 14570->14572 14572->14571 14574 40b4c3 14573->14574 14575 40b4b8 CreateStreamOnHGlobal 14573->14575 14576 413a44 14574->14576 14575->14574 14577 413a58 14576->14577 14999 4054e6 OpenProcessToken 14577->14999 14582 416e8e RtlGetVersion 14583 413a6d 14582->14583 14584 41701b 2 API calls 14583->14584 14585 413a7b 14584->14585 14585->14490 14587 413d53 14586->14587 14587->14493 14588 4145b8 14587->14588 14589 4145d4 14588->14589 14590 405e03 wvnsprintfA 14589->14590 14591 414607 14590->14591 14592 405e03 wvnsprintfA 14591->14592 14593 41461f 14592->14593 14594 405dba wvnsprintfW 14593->14594 14595 4146c1 14594->14595 15016 405a55 14595->15016 14597 4146d5 14598 414717 14597->14598 14599 405e03 wvnsprintfA 14597->14599 14600 405dba wvnsprintfW 14598->14600 14601 414701 14599->14601 14602 41474f 14600->14602 14606 404f2c HeapFree 14601->14606 14603 405a55 4 API calls 14602->14603 14604 414763 14603->14604 14605 414796 14604->14605 14607 405e03 wvnsprintfA 14604->14607 14609 405e03 wvnsprintfA 14605->14609 14606->14598 14608 414781 14607->14608 14610 404f2c HeapFree 14608->14610 14611 4147b5 14609->14611 14610->14605 14612 414816 GetSystemInfo 14611->14612 14613 405e03 wvnsprintfA 14612->14613 14614 414840 14613->14614 14615 41485b GlobalMemoryStatusEx 14614->14615 14616 405e03 wvnsprintfA 14615->14616 14617 414896 14616->14617 14618 4148b0 GetSystemMetrics GetSystemMetrics 14617->14618 14619 405e03 wvnsprintfA 14618->14619 14620 4148d5 14619->14620 14621 4148f3 GetComputerNameW GetUserNameW 14620->14621 14622 405dba wvnsprintfW 14621->14622 14623 41493e 14622->14623 14624 4060c6 3 API calls 14623->14624 14625 414946 14624->14625 14626 414969 14625->14626 14628 404f2c HeapFree 14625->14628 14627 414987 GetLocalTime 14626->14627 14629 405e03 wvnsprintfA 14627->14629 14628->14626 14630 4149c1 14629->14630 15019 406418 GetTimeZoneInformation 14630->15019 14632 4149c9 14633 405e03 wvnsprintfA 14632->14633 14642 4149eb 14633->14642 14634 414a78 EnumDisplayDevicesW 14635 414a83 GetKeyboardLayoutList 14634->14635 14634->14642 14636 404eab RtlAllocateHeap 14635->14636 14638 414a96 14636->14638 14637 4060c6 3 API calls 14637->14642 14639 414b0d 14638->14639 14640 414a9e GetKeyboardLayoutList 14638->14640 14641 404f2c HeapFree 14639->14641 14640->14639 14646 414aaa 14640->14646 14645 414b15 14641->14645 14642->14634 14642->14637 14644 404f2c HeapFree 14642->14644 14644->14642 14647 405dba wvnsprintfW 14645->14647 14646->14639 15020 416e6d 14646->15020 14655 414b85 14647->14655 14649 414ca0 14649->14496 14650 405dba wvnsprintfW 14650->14655 14652 405a55 RtlAllocateHeap RegQueryValueExW RegQueryValueExW RegCloseKey 14652->14655 14653 4060c6 3 API calls 14653->14655 14654 405e03 wvnsprintfA 14654->14655 14655->14649 14655->14650 14655->14652 14655->14653 14655->14654 14656 404f2c HeapFree 14655->14656 15023 405ae5 14655->15023 15034 404f48 14655->15034 14656->14655 14658 414538 14657->14658 15049 405721 14658->15049 14660 41456f 14661 405721 13 API calls 14660->14661 14662 41457d 14661->14662 15054 404ce1 14662->15054 14665 404ce1 6 API calls 14666 4145b2 14665->14666 14666->14499 14668 4115c6 14667->14668 14669 40b4b3 CreateStreamOnHGlobal 14668->14669 14670 4115ce 14669->14670 14680 411615 14670->14680 15085 410ed8 14670->15085 14672 4115df 15120 4112d2 14672->15120 14676 4115f9 14676->14680 15148 40b589 14676->15148 14678 41160d 14679 404f2c HeapFree 14678->14679 14679->14680 14680->14501 14682 4123fb 14681->14682 14683 405dba wvnsprintfW 14682->14683 14684 412454 14683->14684 14685 405a55 4 API calls 14684->14685 14686 41246b 14685->14686 14687 404ce1 6 API calls 14686->14687 14693 41250d 14686->14693 14689 412494 14687->14689 14688 405dba wvnsprintfW 14688->14689 14689->14688 14691 412505 14689->14691 15228 40f39a 14689->15228 14692 404f2c HeapFree 14691->14692 14692->14693 14693->14503 15252 416916 CredEnumerateW 14694->15252 14700 415aeb 14699->14700 14701 415b4b 14700->14701 14702 415b0f GetDesktopWindow GetWindowDC EnumDisplayMonitors ReleaseDC 14700->14702 14701->14509 14702->14701 14704 404eab RtlAllocateHeap 14703->14704 14705 4153a1 14704->14705 14706 4153b1 GetUserNameW 14705->14706 14707 413dd7 14705->14707 14708 405721 13 API calls 14706->14708 14734 415025 14707->14734 14709 4153da 14708->14709 14710 405721 13 API calls 14709->14710 14711 4153e8 14710->14711 14712 405721 13 API calls 14711->14712 14713 4153f6 14712->14713 14714 405721 13 API calls 14713->14714 14715 415404 14714->14715 14716 405662 12 API calls 14715->14716 14717 415456 14716->14717 15303 414cb7 14717->15303 14720 415470 14722 41072d RtlAllocateHeap 14720->14722 14721 415467 RegCloseKey 14721->14720 14723 41547f 14722->14723 15347 405836 RtlAdjustPrivilege 14723->15347 14725 415680 14726 404f48 HeapFree 14725->14726 14726->14707 14728 415525 SHGetFolderPathW SHGetFolderPathW SHGetFolderPathW SHGetFolderPathW 14733 41548a 14728->14733 14729 404efc 3 API calls 14729->14733 14730 415649 CloseHandle 14730->14733 14731 41072d RtlAllocateHeap 14731->14733 14732 414cb7 58 API calls 14732->14733 14733->14707 14733->14725 14733->14728 14733->14729 14733->14730 14733->14731 14733->14732 15362 4058f2 OpenProcessToken 14733->15362 14735 415032 14734->14735 14737 415296 14735->14737 14738 406122 RtlAllocateHeap MultiByteToWideChar MultiByteToWideChar 14735->14738 14740 404f2c HeapFree 14735->14740 14741 405662 12 API calls 14735->14741 15821 4107d9 14735->15821 15825 410c0e GetLogicalDrives 14735->15825 15832 410b2d WNetOpenEnumW 14735->15832 15846 414e86 14735->15846 15860 4108e4 14735->15860 14736 415389 14736->14493 14737->14736 15877 414082 14737->15877 14738->14735 14740->14735 14741->14735 14748 404f35 HeapFree 14747->14748 14749 404f46 GetSystemTime 14747->14749 14748->14749 14750 413852 14749->14750 14751 40b765 4 API calls 14750->14751 14752 413868 14751->14752 14753 405dba wvnsprintfW 14752->14753 14758 41396d 14752->14758 14754 413907 14753->14754 14755 405dba wvnsprintfW 14754->14755 14756 41391b 14755->14756 14757 404f2c HeapFree 14756->14757 14757->14758 14758->14507 14760 406132 MultiByteToWideChar 14759->14760 14761 40612e 14759->14761 14760->14761 14762 406152 14760->14762 14761->14508 14766 405552 14761->14766 14763 404eab RtlAllocateHeap 14762->14763 14764 40615c 14763->14764 14764->14761 14765 406164 MultiByteToWideChar 14764->14765 14765->14761 14767 405566 14766->14767 14768 405573 ShellExecuteW 14767->14768 14768->14521 14769->14516 14771 413ba4 14770->14771 14772 413bbb 14770->14772 14771->14772 14773 404f2c HeapFree 14771->14773 14774 404f2c HeapFree 14772->14774 14773->14771 14775 413bc6 14774->14775 14776 413be8 14775->14776 14778 404f2c HeapFree 14775->14778 14777 404f2c HeapFree 14776->14777 14779 413bf3 14777->14779 14778->14775 14780 413c13 14779->14780 14781 404f2c HeapFree 14779->14781 14782 404f2c HeapFree 14780->14782 14781->14779 14783 413c1e 14782->14783 15940 41319c WSACleanup 14783->15940 14787 413029 14786->14787 14788 41304c WSAStartup 14787->14788 14789 413067 14788->14789 14796 4130bd 14789->14796 14797 413119 14789->14797 14799 404f2c HeapFree 14789->14799 14810 413117 14789->14810 14843 41072d 14789->14843 14791 413182 14820 416e8e RtlGetVersion 14791->14820 14796->14789 14798 406122 3 API calls 14796->14798 14803 404f2c HeapFree 14796->14803 14822 4131bb 14796->14822 14800 413120 14797->14800 14801 41313c 14797->14801 14798->14796 14799->14789 14848 40638e 14800->14848 14859 413457 14801->14859 14803->14796 14805 413144 14807 40638e RtlAllocateHeap 14805->14807 14806 413128 14852 4060c6 14806->14852 14809 41314e 14807->14809 14812 40638e RtlAllocateHeap 14809->14812 14816 40f13f 14810->14816 14811 413134 14814 404f2c HeapFree 14811->14814 14813 41315f 14812->14813 14867 413973 14813->14867 14814->14810 14817 40f150 14816->14817 14819 40f172 14816->14819 14872 404efc 14817->14872 14819->14791 14821 413188 CoInitializeEx 14820->14821 14821->14556 14825 4131d4 14822->14825 14824 405dba wvnsprintfW 14824->14825 14825->14824 14826 41340b 14825->14826 14827 404f2c HeapFree 14825->14827 14831 413315 14825->14831 14885 405e03 14825->14885 14895 405e7d 14826->14895 14827->14825 14830 404f2c HeapFree 14832 413409 14830->14832 14890 405dba 14831->14890 14832->14796 14834 41333d 14835 405dba wvnsprintfW 14834->14835 14836 413369 14835->14836 14836->14826 14839 4133a6 14836->14839 14837 4133c2 gethostbyname 14837->14839 14838 4133d7 DnsQuery_A 14838->14839 14840 413428 inet_ntoa 14838->14840 14839->14832 14839->14837 14839->14838 14841 405e7d 4 API calls 14840->14841 14842 413442 DnsFree 14841->14842 14842->14832 14844 410736 14843->14844 14845 41073a 14843->14845 14844->14789 14905 404eab 14845->14905 14847 410755 14847->14789 14849 40639a 14848->14849 14850 40639e 14848->14850 14849->14806 14851 404eab RtlAllocateHeap 14850->14851 14851->14849 14853 4060d6 WideCharToMultiByte 14852->14853 14854 4060d2 14852->14854 14853->14854 14855 4060f8 14853->14855 14854->14811 14856 404eab RtlAllocateHeap 14855->14856 14857 406101 14856->14857 14857->14854 14858 406109 WideCharToMultiByte 14857->14858 14858->14854 14860 41346c 14859->14860 14861 413483 InternetCrackUrlA 14860->14861 14862 41349f 14861->14862 14866 4134f8 14861->14866 14863 404eab RtlAllocateHeap 14862->14863 14864 4134a9 14863->14864 14865 404eab RtlAllocateHeap 14864->14865 14864->14866 14865->14866 14866->14805 14868 404f2c HeapFree 14867->14868 14869 41397a 14868->14869 14870 404f2c HeapFree 14869->14870 14871 413982 14870->14871 14871->14811 14873 404f12 14872->14873 14874 404f05 14872->14874 14878 404ecb 14873->14878 14875 404f2c HeapFree 14874->14875 14877 404f0c 14875->14877 14877->14819 14879 404ed4 14878->14879 14880 404ed8 14878->14880 14879->14877 14881 404ee1 14880->14881 14882 404ee9 RtlReAllocateHeap 14880->14882 14883 404eab RtlAllocateHeap 14881->14883 14882->14877 14884 404ee6 14883->14884 14884->14877 14886 405e0a 14885->14886 14887 405e0f 14885->14887 14886->14825 14888 405e16 wvnsprintfA 14887->14888 14889 405e31 14888->14889 14889->14825 14891 405dc1 14890->14891 14892 405dc6 14890->14892 14891->14834 14893 405dd1 wvnsprintfW 14892->14893 14894 405def 14893->14894 14894->14834 14900 405cdb 14895->14900 14898 405ea5 14898->14830 14899 404f2c HeapFree 14899->14898 14901 405ceb 14900->14901 14902 404efc RtlAllocateHeap RtlReAllocateHeap HeapFree 14901->14902 14903 405d0f wvnsprintfA 14901->14903 14904 405d26 14901->14904 14902->14901 14903->14901 14904->14898 14904->14899 14906 404eb5 14905->14906 14907 404eb7 RtlAllocateHeap 14905->14907 14906->14847 14907->14847 14909 41376f 14908->14909 14910 41701b 2 API calls 14909->14910 14911 413797 14910->14911 14912 405dba wvnsprintfW 14911->14912 14913 4137b5 14912->14913 14914 405dba wvnsprintfW 14913->14914 14915 4137cc 14914->14915 14916 413806 14915->14916 14928 4129a8 14915->14928 14948 412e5d 14915->14948 14972 412b44 14915->14972 14918 413848 14916->14918 14979 40452f 14916->14979 14918->14563 14919 413818 14919->14918 14920 404f2c HeapFree 14919->14920 14921 413833 14920->14921 14982 4044a2 14921->14982 14923 413840 14924 404f2c HeapFree 14923->14924 14924->14918 14986 413569 14928->14986 14930 4129c1 14931 4129c5 InternetOpenW 14930->14931 14932 412b34 14930->14932 14933 4129fd InternetSetOptionW 14930->14933 14931->14930 14935 413973 HeapFree 14932->14935 14933->14933 14934 412a14 InternetConnectW 14933->14934 14936 412a32 HttpOpenRequestW 14934->14936 14937 412b16 InternetCloseHandle 14934->14937 14938 412b3c 14935->14938 14939 412b0d InternetCloseHandle 14936->14939 14940 412a6c InternetQueryOptionW 14936->14940 14937->14930 14937->14932 14938->14915 14939->14937 14941 412a8a InternetSetOptionW 14940->14941 14942 412a9f HttpSendRequestW 14940->14942 14941->14942 14943 412b06 InternetCloseHandle 14942->14943 14946 412abb 14942->14946 14943->14939 14944 412abd InternetQueryDataAvailable 14944->14946 14945 404ecb 2 API calls 14947 412adf InternetReadFile 14945->14947 14946->14943 14946->14944 14946->14945 14947->14946 14949 4060c6 3 API calls 14948->14949 14950 412e73 14949->14950 14951 412e7a 14950->14951 14952 413457 2 API calls 14950->14952 14951->14915 14953 412e87 14952->14953 14954 404f2c HeapFree 14953->14954 14955 412e8d gethostbyname 14954->14955 14956 412ead socket 14955->14956 14957 412e9e 14955->14957 14959 413007 14956->14959 14960 412ec8 connect 14956->14960 14958 413973 HeapFree 14957->14958 14958->14951 14961 412efb 14960->14961 14962 412ffe closesocket 14960->14962 14963 405e03 wvnsprintfA 14961->14963 14962->14959 14964 412f27 send 14963->14964 14964->14962 14965 412f45 send 14964->14965 14965->14962 14966 412f5e recv 14965->14966 14967 404ecb 2 API calls 14966->14967 14968 412f82 14967->14968 14968->14966 14969 412f9f 14968->14969 14969->14962 14994 404fe2 14969->14994 14973 413569 2 API calls 14972->14973 14974 412b5d 14973->14974 14975 412cd3 14974->14975 14978 404ecb 2 API calls 14974->14978 14976 413973 HeapFree 14975->14976 14977 412cdb 14976->14977 14977->14915 14978->14974 14980 404eab RtlAllocateHeap 14979->14980 14981 404544 14980->14981 14981->14919 14983 4044b8 14982->14983 14984 404eab RtlAllocateHeap 14983->14984 14985 4044d6 14984->14985 14985->14923 14987 41357e 14986->14987 14988 4135a7 InternetCrackUrlW 14987->14988 14989 4135b9 14988->14989 14993 413620 14988->14993 14990 404eab RtlAllocateHeap 14989->14990 14991 4135c6 14990->14991 14992 404eab RtlAllocateHeap 14991->14992 14991->14993 14992->14993 14993->14930 14995 404eab RtlAllocateHeap 14994->14995 14996 404fef 14995->14996 14997 404f2c HeapFree 14996->14997 14998 405028 14996->14998 14997->14998 14998->14962 15000 405501 GetTokenInformation 14999->15000 15001 405529 14999->15001 15002 405520 CloseHandle 15000->15002 15003 40551a 15000->15003 15004 405595 OpenProcessToken 15001->15004 15002->15001 15003->15002 15005 4055b3 GetTokenInformation 15004->15005 15006 40565d 15004->15006 15007 405654 CloseHandle 15005->15007 15008 4055cc 15005->15008 15006->14582 15007->15006 15008->15007 15009 404eab RtlAllocateHeap 15008->15009 15010 4055df 15009->15010 15011 405652 15010->15011 15012 4055e6 GetTokenInformation 15010->15012 15011->15007 15013 4055fd GetSidSubAuthorityCount GetSidSubAuthority 15012->15013 15015 40561b 15012->15015 15013->15015 15014 404f2c HeapFree 15014->15011 15015->15014 15040 4059b0 15016->15040 15019->14632 15047 40502d 15020->15047 15022 416e7a GetLocaleInfoA 15022->14646 15024 405b08 15023->15024 15025 405b10 RegQueryInfoKeyW 15024->15025 15028 405b98 15024->15028 15026 405b34 15025->15026 15027 405b88 RegCloseKey 15025->15027 15029 404eab RtlAllocateHeap 15026->15029 15027->15028 15028->14655 15033 405b45 15029->15033 15030 405b86 15030->15027 15031 404eab RtlAllocateHeap 15032 405b60 RegEnumKeyExW 15031->15032 15032->15033 15033->15030 15033->15031 15035 404f67 15034->15035 15036 404f4f 15034->15036 15035->14655 15036->15035 15037 404f2c HeapFree 15036->15037 15038 404f61 15036->15038 15037->15036 15039 404f2c HeapFree 15038->15039 15039->15035 15045 4059c1 15040->15045 15041 4059e5 RegQueryValueExW 15043 405a30 RegCloseKey 15041->15043 15041->15045 15042 405a4f 15042->14597 15043->15042 15043->15045 15044 404eab RtlAllocateHeap 15044->15045 15045->15041 15045->15042 15045->15043 15045->15044 15046 405a11 RegQueryValueExW 15045->15046 15046->15043 15046->15045 15048 40503d 15047->15048 15048->15022 15050 40573d SHGetFolderPathW 15049->15050 15051 40572d 15049->15051 15050->14660 15067 405662 15051->15067 15055 404eab RtlAllocateHeap 15054->15055 15056 404cf7 15055->15056 15057 404e15 15056->15057 15081 404ca7 15056->15081 15057->14665 15060 404e0f 15061 404f2c HeapFree 15060->15061 15061->15057 15062 404dee FindNextFileW 15063 404e06 FindClose 15062->15063 15065 404d31 15062->15065 15063->15060 15064 404ca7 wvnsprintfW 15064->15065 15065->15062 15065->15063 15065->15064 15066 404ce1 3 API calls 15065->15066 15066->15065 15068 40567a CreateToolhelp32Snapshot 15067->15068 15070 4056c1 15067->15070 15069 4056af Process32NextW 15068->15069 15069->15070 15072 405695 15069->15072 15070->15050 15072->15069 15073 4056c3 OpenProcess 15072->15073 15076 405d77 15072->15076 15074 405710 CloseHandle 15073->15074 15075 4056dc OpenProcessToken DuplicateTokenEx CloseHandle CloseHandle 15073->15075 15074->15070 15075->15074 15077 4060c6 3 API calls 15076->15077 15078 405d89 15077->15078 15079 404f2c HeapFree 15078->15079 15080 405db2 15078->15080 15079->15080 15080->15072 15082 404cb7 15081->15082 15083 405dba wvnsprintfW 15082->15083 15084 404cd5 FindFirstFileW 15083->15084 15084->15060 15084->15065 15086 410eef 15085->15086 15087 410f19 CoCreateInstance 15086->15087 15088 411023 15087->15088 15089 410f48 15087->15089 15090 405dba wvnsprintfW 15088->15090 15089->15088 15103 404efc 3 API calls 15089->15103 15107 41072d RtlAllocateHeap 15089->15107 15109 410fe8 CoTaskMemFree 15089->15109 15110 410fff CoTaskMemFree 15089->15110 15154 410d22 15089->15154 15091 41105d 15090->15091 15175 405ba3 15091->15175 15093 411069 15094 411119 15093->15094 15096 41110e 15093->15096 15097 405a55 4 API calls 15093->15097 15102 404efc 3 API calls 15093->15102 15104 404f2c HeapFree 15093->15104 15105 41072d RtlAllocateHeap 15093->15105 15106 410d22 12 API calls 15093->15106 15095 404f48 HeapFree 15094->15095 15099 411123 15095->15099 15098 404f48 HeapFree 15096->15098 15097->15093 15098->15094 15100 411131 CredEnumerateW 15099->15100 15101 4112cd 15100->15101 15119 411153 15100->15119 15101->14672 15102->15093 15103->15089 15104->15093 15105->15093 15106->15093 15107->15089 15109->15089 15110->15089 15111 4112c4 CredFree 15111->15101 15112 4111e3 CryptUnprotectData 15112->15119 15113 41072d RtlAllocateHeap 15113->15119 15114 404f2c HeapFree 15116 4112ad LocalFree 15114->15116 15116->15119 15117 4060c6 3 API calls 15117->15119 15118 404f2c HeapFree 15118->15119 15119->15101 15119->15111 15119->15112 15119->15113 15119->15114 15119->15117 15119->15118 15186 405e43 15119->15186 15121 4112e9 15120->15121 15122 41131b LoadLibraryA 15121->15122 15123 4115b1 15122->15123 15124 411334 15122->15124 15141 40b765 GetHGlobalFromStream 15123->15141 15125 405192 3 API calls 15124->15125 15126 41133e 15125->15126 15127 405192 3 API calls 15126->15127 15128 41134a 15127->15128 15129 405192 3 API calls 15128->15129 15130 411357 15129->15130 15131 405192 3 API calls 15130->15131 15132 411364 15131->15132 15133 405192 3 API calls 15132->15133 15139 411371 15133->15139 15134 4115aa FreeLibrary 15134->15123 15135 41159a 15135->15134 15136 416e8e RtlGetVersion 15136->15139 15137 405e43 RtlAllocateHeap RtlReAllocateHeap HeapFree wvnsprintfW 15137->15139 15138 4060c6 RtlAllocateHeap WideCharToMultiByte WideCharToMultiByte 15138->15139 15139->15134 15139->15135 15139->15136 15139->15137 15139->15138 15140 404f2c HeapFree 15139->15140 15140->15139 15142 40b782 GlobalLock 15141->15142 15143 40b7c5 15141->15143 15142->15143 15144 40b792 15142->15144 15143->14676 15145 40b7be GlobalUnlock 15144->15145 15146 404eab RtlAllocateHeap 15144->15146 15145->15143 15147 40b7a6 15146->15147 15147->15145 15149 40b5a1 15148->15149 15150 405e03 wvnsprintfA 15149->15150 15153 40b5f3 15149->15153 15151 40b61a 15150->15151 15152 405e03 wvnsprintfA 15151->15152 15152->15153 15153->14678 15155 410d39 15154->15155 15191 410c9e 15155->15191 15157 410d79 15197 414442 15157->15197 15160 405dba wvnsprintfW 15161 410da2 15160->15161 15162 4059b0 4 API calls 15161->15162 15163 410dbe 15162->15163 15164 410ed2 15163->15164 15165 410de2 CryptUnprotectData 15163->15165 15164->15089 15166 410eca 15165->15166 15174 410e07 15165->15174 15167 404f2c HeapFree 15166->15167 15167->15164 15168 410ec3 LocalFree 15168->15166 15169 410ec0 15169->15168 15170 405e43 4 API calls 15170->15174 15172 4060c6 3 API calls 15172->15174 15173 404f2c HeapFree 15173->15174 15174->15168 15174->15169 15174->15170 15174->15172 15174->15173 15204 414397 15174->15204 15176 405bcb 15175->15176 15177 405c5b 15176->15177 15178 405bd3 RegQueryInfoKeyW 15176->15178 15177->15093 15179 405bf7 15178->15179 15180 405c4b RegCloseKey 15178->15180 15181 404eab RtlAllocateHeap 15179->15181 15180->15177 15185 405c08 15181->15185 15182 405c49 15182->15180 15183 404eab RtlAllocateHeap 15184 405c23 RegEnumValueW 15183->15184 15184->15185 15185->15182 15185->15183 15223 405c66 15186->15223 15189 405e6d 15189->15119 15190 404f2c HeapFree 15190->15189 15192 410cbd 15191->15192 15193 405dba wvnsprintfW 15192->15193 15194 410d03 15192->15194 15193->15192 15195 405dba wvnsprintfW 15194->15195 15196 410d12 15195->15196 15196->15157 15198 4060c6 3 API calls 15197->15198 15199 41444e 15198->15199 15203 410d81 15199->15203 15211 4143f1 15199->15211 15202 404f2c HeapFree 15202->15203 15203->15160 15205 4060c6 3 API calls 15204->15205 15206 4143a3 15205->15206 15207 4143b6 15206->15207 15217 414346 15206->15217 15207->15174 15210 404f2c HeapFree 15210->15207 15212 4143fc 15211->15212 15213 404efc RtlAllocateHeap RtlReAllocateHeap HeapFree 15212->15213 15216 41442a 15212->15216 15214 414419 15213->15214 15215 40638e RtlAllocateHeap 15214->15215 15214->15216 15215->15216 15216->15202 15218 414351 15217->15218 15219 404efc RtlAllocateHeap RtlReAllocateHeap HeapFree 15218->15219 15222 41437f 15218->15222 15220 41436e 15219->15220 15221 40638e RtlAllocateHeap 15220->15221 15220->15222 15221->15222 15222->15210 15224 405c79 15223->15224 15225 404efc 3 API calls 15224->15225 15226 405cc5 15224->15226 15227 405ca7 wvnsprintfW 15224->15227 15225->15224 15226->15189 15226->15190 15227->15224 15235 404a7c CreateFileW 15228->15235 15231 40f3cc 15231->14689 15234 404f2c HeapFree 15234->15231 15236 404ae1 15235->15236 15237 404aa5 GetFileSize 15235->15237 15236->15231 15243 40b67a 15236->15243 15238 404eab RtlAllocateHeap 15237->15238 15239 404ab6 15238->15239 15240 404ada CloseHandle 15239->15240 15241 404abd ReadFile 15239->15241 15240->15236 15241->15240 15242 404ad5 15241->15242 15242->15240 15244 4060c6 3 API calls 15243->15244 15246 40b68f 15244->15246 15245 40b75b 15245->15234 15246->15245 15247 405e03 wvnsprintfA 15246->15247 15248 40b6d7 15247->15248 15249 405e03 wvnsprintfA 15248->15249 15251 40b6ed 15249->15251 15250 404f2c HeapFree 15250->15245 15251->15250 15253 416940 15252->15253 15254 416b3a 15252->15254 15255 40b4b3 CreateStreamOnHGlobal 15253->15255 15271 416b3d 15254->15271 15269 416951 15255->15269 15256 416b30 CredFree 15256->15254 15257 416af1 15258 40b765 4 API calls 15257->15258 15261 416afc 15258->15261 15259 416b27 15259->15256 15260 405e43 4 API calls 15260->15269 15261->15259 15262 40b67a 5 API calls 15261->15262 15263 416b1f 15262->15263 15264 404f2c HeapFree 15263->15264 15264->15259 15266 405dba wvnsprintfW 15266->15269 15267 4060c6 3 API calls 15267->15269 15268 404f2c HeapFree 15268->15269 15269->15256 15269->15257 15269->15260 15269->15266 15269->15267 15269->15268 15288 405eb5 15269->15288 15295 416dc5 15269->15295 15272 416b54 15271->15272 15273 416b6a LoadLibraryA 15272->15273 15274 416b83 15273->15274 15275 416da7 15273->15275 15276 405192 3 API calls 15274->15276 15275->14504 15287 416b90 15276->15287 15277 416d88 FreeLibrary 15277->15275 15279 404f8c RtlAllocateHeap 15279->15287 15280 416ca1 CoTaskMemFree 15280->15287 15282 4060c6 3 API calls 15282->15287 15283 40638e RtlAllocateHeap 15283->15287 15284 404f2c HeapFree 15284->15287 15285 40f13f RtlAllocateHeap RtlReAllocateHeap HeapFree 15285->15287 15286 40b589 wvnsprintfA 15286->15287 15287->15277 15287->15279 15287->15280 15287->15282 15287->15283 15287->15284 15287->15285 15287->15286 15299 404911 CryptUnprotectData 15287->15299 15289 405c66 4 API calls 15288->15289 15293 405ecf 15289->15293 15290 405ef5 15290->15269 15291 405ee8 15292 404efc 3 API calls 15291->15292 15292->15290 15293->15290 15293->15291 15294 404f2c HeapFree 15293->15294 15294->15291 15296 416ddb 15295->15296 15297 404efc 3 API calls 15296->15297 15298 416df7 15297->15298 15298->15269 15300 404967 15299->15300 15301 40493d 15299->15301 15300->15287 15301->15300 15302 40495d LocalFree 15301->15302 15302->15300 15304 414cd0 15303->15304 15305 414cd9 15303->15305 15367 417a2d 15304->15367 15307 414cec 15305->15307 15379 4117c1 15305->15379 15309 414d00 15307->15309 15393 411b63 15307->15393 15310 414d14 15309->15310 15399 411bc7 15309->15399 15313 414d28 15310->15313 15405 40f9ee 15310->15405 15315 414d3b 15313->15315 15425 410692 15313->15425 15320 414d4f 15315->15320 15434 40f08f 15315->15434 15324 405721 13 API calls 15320->15324 15340 414dcc 15320->15340 15326 414d89 15324->15326 15325 414ded 15327 414e54 15325->15327 15478 41733e 15325->15478 15328 405721 13 API calls 15326->15328 15327->14720 15327->14721 15330 414d97 15328->15330 15332 404ce1 6 API calls 15330->15332 15334 414db4 15332->15334 15337 404ce1 6 API calls 15334->15337 15337->15340 15448 4173de 15340->15448 15348 405853 15347->15348 15349 405857 CreateToolhelp32Snapshot 15347->15349 15348->14733 15350 405876 Process32NextW 15349->15350 15351 4058ec 15349->15351 15352 4058e5 CloseHandle 15350->15352 15353 405888 15350->15353 15351->14733 15352->15351 15354 405889 OpenProcess 15353->15354 15355 4058d2 Process32NextW 15354->15355 15356 4058a2 OpenProcessToken 15354->15356 15355->15354 15363 405911 GetTokenInformation 15362->15363 15364 4059ab 15362->15364 15365 4059a2 CloseHandle 15363->15365 15366 40592a NtCreateToken 15363->15366 15364->14733 15365->15364 15366->15365 15368 417a43 15367->15368 15369 404ca7 wvnsprintfW 15368->15369 15370 417a66 15369->15370 15598 4177ab 15370->15598 15373 404ca7 wvnsprintfW 15374 417a85 15373->15374 15375 4177ab 6 API calls 15374->15375 15376 417a94 15375->15376 15604 41780d 15376->15604 15380 4117d8 15379->15380 15381 404ca7 wvnsprintfW 15380->15381 15382 411809 15381->15382 15644 404a5e GetFileAttributesW 15382->15644 15385 411855 15387 404ca7 wvnsprintfW 15385->15387 15386 404ce1 6 API calls 15386->15385 15388 41186b 15387->15388 15389 404a5e GetFileAttributesW 15388->15389 15390 411877 15389->15390 15391 4118b3 15390->15391 15392 404ce1 6 API calls 15390->15392 15391->15307 15392->15391 15394 411b79 15393->15394 15395 404ca7 wvnsprintfW 15394->15395 15396 411ba3 15395->15396 15397 404ce1 6 API calls 15396->15397 15398 411bc0 15397->15398 15398->15309 15400 411bdd 15399->15400 15401 404ca7 wvnsprintfW 15400->15401 15402 411c13 15401->15402 15403 404ce1 6 API calls 15402->15403 15404 411c30 15403->15404 15404->15310 15406 40fa05 15405->15406 15407 404ce1 6 API calls 15406->15407 15408 40fa41 15407->15408 15646 40f43a 15408->15646 15702 40fd2b 15425->15702 15435 40f0a3 15434->15435 15436 40b4b3 CreateStreamOnHGlobal 15435->15436 15437 40f0ab 15436->15437 15438 404ce1 6 API calls 15437->15438 15441 40f131 15437->15441 15439 40f0d7 15438->15439 15440 40b765 4 API calls 15439->15440 15442 40f0e5 15440->15442 15441->15320 15442->15441 15443 405dba wvnsprintfW 15442->15443 15444 40f116 15443->15444 15445 40b67a 5 API calls 15444->15445 15446 40f129 15445->15446 15447 404f2c HeapFree 15446->15447 15447->15441 15449 4173f4 15448->15449 15450 404ca7 wvnsprintfW 15449->15450 15451 41741c 15450->15451 15452 404ce1 6 API calls 15451->15452 15453 414ddb 15452->15453 15454 4128c3 15453->15454 15455 4128da 15454->15455 15456 404ca7 wvnsprintfW 15455->15456 15457 4128f1 15456->15457 15458 407656 5 API calls 15457->15458 15460 412902 15458->15460 15459 412992 15466 415863 15459->15466 15460->15459 15461 405d77 4 API calls 15460->15461 15464 412942 15461->15464 15462 412976 15463 40794a SysFreeString 15462->15463 15463->15459 15464->15462 15765 412513 15464->15765 15467 415878 15466->15467 15468 40b4b3 CreateStreamOnHGlobal 15467->15468 15469 41588d 15468->15469 15470 404ce1 6 API calls 15469->15470 15477 4158d8 15469->15477 15471 4158ae 15470->15471 15472 40b765 4 API calls 15471->15472 15473 4158bc 15472->15473 15474 40b589 wvnsprintfA 15473->15474 15473->15477 15475 4158d0 15474->15475 15476 404f2c HeapFree 15475->15476 15476->15477 15477->15325 15479 417354 15478->15479 15480 405a55 4 API calls 15479->15480 15481 417381 15480->15481 15482 405a55 4 API calls 15481->15482 15483 417390 15482->15483 15484 4173ca 15483->15484 15486 405e43 4 API calls 15483->15486 15485 404f2c HeapFree 15484->15485 15487 4173d1 15485->15487 15488 4173b0 15486->15488 15489 404f2c HeapFree 15487->15489 15488->15484 15491 40fa90 5 API calls 15488->15491 15490 414dff 15489->15490 15492 4173c2 15491->15492 15493 404f2c HeapFree 15492->15493 15493->15484 15599 4177c1 15598->15599 15600 404ca7 wvnsprintfW 15599->15600 15601 4177e4 15600->15601 15602 404ce1 6 API calls 15601->15602 15603 417806 15602->15603 15603->15373 15605 417824 15604->15605 15606 405dba wvnsprintfW 15605->15606 15607 417849 15606->15607 15621 404a40 GetFileAttributesW 15607->15621 15611 417869 15612 405d77 4 API calls 15611->15612 15615 417a14 15611->15615 15616 4178b5 15612->15616 15613 4179f0 15641 40794a 15613->15641 15615->15305 15616->15613 15617 40794a SysFreeString 15616->15617 15618 405e43 4 API calls 15616->15618 15620 404f2c HeapFree 15616->15620 15634 40fa90 15616->15634 15617->15616 15618->15616 15620->15616 15622 404a51 15621->15622 15622->15615 15623 407656 15622->15623 15624 40766a 15623->15624 15625 407677 CoCreateInstance 15624->15625 15626 407692 15625->15626 15627 4076b9 SysAllocString 15625->15627 15626->15627 15628 407644 15627->15628 15629 4076cd SysAllocString 15628->15629 15630 407709 15629->15630 15631 407749 VariantClear 15630->15631 15632 407647 SysFreeString 15631->15632 15633 40775e 15632->15633 15633->15611 15635 4060c6 RtlAllocateHeap WideCharToMultiByte WideCharToMultiByte 15634->15635 15637 40fa9f 15635->15637 15636 40fac0 15636->15616 15637->15636 15638 40b589 wvnsprintfA 15637->15638 15642 407953 SysFreeString 15641->15642 15643 40795c 15641->15643 15642->15643 15643->15615 15645 404a6f 15644->15645 15645->15385 15645->15386 15647 40f455 15646->15647 15648 405dba wvnsprintfW 15647->15648 15649 40f495 15648->15649 15650 404ce1 6 API calls 15649->15650 15651 40f4ae 15650->15651 15652 40f4b6 15651->15652 15653 40f4d1 15652->15653 15654 405dba wvnsprintfW 15653->15654 15655 40f511 15654->15655 15656 404ce1 6 API calls 15655->15656 15657 40f52a 15656->15657 15658 40f74a 15657->15658 15659 40f762 15658->15659 15660 404ca7 wvnsprintfW 15659->15660 15661 40f77f 15660->15661 15662 404ce1 6 API calls 15661->15662 15663 40f7ab 15662->15663 15664 40f7b2 15663->15664 15665 40f7ca 15664->15665 15666 404ca7 wvnsprintfW 15665->15666 15667 40f7e7 15666->15667 15668 404ce1 6 API calls 15667->15668 15669 40f813 15668->15669 15670 40f81a 15669->15670 15671 40f832 15670->15671 15672 404ca7 wvnsprintfW 15671->15672 15673 40f84f 15672->15673 15674 404ce1 6 API calls 15673->15674 15675 40f87b 15674->15675 15703 40fd38 15702->15703 15704 404ca7 wvnsprintfW 15703->15704 15705 40fdce 15704->15705 15706 404a40 GetFileAttributesW 15705->15706 15707 40fdda 15706->15707 15708 40ff01 15707->15708 15759 410775 15707->15759 15722 41062a 15708->15722 15710 40fdf1 15711 40fed2 GetPrivateProfileStringW 15710->15711 15712 40fef9 15711->15712 15713 40fdfd GetPrivateProfileStringW 15711->15713 15714 404f2c HeapFree 15712->15714 15715 40fe2e GetPrivateProfileStringW 15713->15715 15720 40fe78 15713->15720 15714->15708 15717 40fe53 GetPrivateProfileStringW 15715->15717 15715->15720 15716 404f2c HeapFree 15716->15720 15717->15720 15718 410775 RtlAllocateHeap 15718->15711 15719 405dba wvnsprintfW 15719->15720 15720->15716 15720->15718 15720->15719 15721 40fa90 5 API calls 15720->15721 15721->15720 15723 410641 15722->15723 15724 405dba wvnsprintfW 15723->15724 15725 41066f 15724->15725 15726 404ce1 6 API calls 15725->15726 15727 41068a 15726->15727 15728 40ff07 15727->15728 15730 40ff21 15728->15730 15729 405dba wvnsprintfW 15729->15730 15730->15729 15731 404a40 GetFileAttributesW 15730->15731 15732 407656 5 API calls 15730->15732 15733 4101e2 15730->15733 15734 40794a SysFreeString 15730->15734 15735 4060c6 3 API calls 15730->15735 15736 405d77 4 API calls 15730->15736 15737 405e43 4 API calls 15730->15737 15738 40fa90 5 API calls 15730->15738 15739 40452f RtlAllocateHeap 15730->15739 15740 404f2c HeapFree 15730->15740 15731->15730 15732->15730 15741 410397 15733->15741 15734->15730 15735->15730 15736->15730 15737->15730 15738->15730 15739->15730 15740->15730 15742 4103a4 15741->15742 15743 404ca7 wvnsprintfW 15742->15743 15744 410464 15743->15744 15745 404a40 GetFileAttributesW 15744->15745 15746 410470 15745->15746 15747 4105d7 15746->15747 15748 41047b GetPrivateProfileSectionNamesW 15746->15748 15747->15315 15748->15747 15757 41049c 15748->15757 15749 4104b4 GetPrivateProfileStringW 15750 4104dc GetPrivateProfileStringW 15749->15750 15749->15757 15751 4104ff GetPrivateProfileStringW 15750->15751 15750->15757 15751->15757 15752 4060c6 3 API calls 15752->15757 15753 40452f RtlAllocateHeap 15753->15757 15755 404f2c HeapFree 15755->15757 15756 405dba wvnsprintfW 15756->15757 15757->15747 15757->15749 15757->15752 15757->15753 15757->15755 15757->15756 15758 40fa90 5 API calls 15757->15758 15762 40488c 15757->15762 15758->15757 15760 404eab RtlAllocateHeap 15759->15760 15761 410783 15760->15761 15761->15710 15763 404eab RtlAllocateHeap 15762->15763 15764 4048a1 15763->15764 15764->15757 15778 41252d 15765->15778 15766 4128be 15766->15462 15767 405d77 RtlAllocateHeap HeapFree WideCharToMultiByte WideCharToMultiByte 15767->15778 15768 412513 9 API calls 15768->15778 15769 407647 SysFreeString 15769->15778 15770 4060c6 RtlAllocateHeap WideCharToMultiByte WideCharToMultiByte 15770->15778 15771 40452f RtlAllocateHeap 15771->15778 15773 404eab RtlAllocateHeap 15773->15778 15774 405dba wvnsprintfW 15774->15778 15775 405e43 4 API calls 15775->15778 15777 404f2c HeapFree 15777->15778 15778->15766 15778->15767 15778->15768 15778->15769 15778->15770 15778->15771 15778->15773 15778->15774 15778->15775 15778->15777 15779 404749 15778->15779 15785 41163f 15778->15785 15781 40475f 15779->15781 15780 404eab RtlAllocateHeap 15780->15781 15781->15780 15782 40465a RtlAllocateHeap HeapFree 15781->15782 15783 404f2c HeapFree 15781->15783 15784 404826 15781->15784 15782->15781 15783->15781 15784->15778 15786 41164c 15785->15786 15787 40b589 wvnsprintfA 15786->15787 15788 411658 15787->15788 15788->15778 15822 4108d7 15821->15822 15823 4107f1 15821->15823 15822->14735 15823->15822 15824 405dba wvnsprintfW 15823->15824 15824->15822 15830 410c2e 15825->15830 15827 410c99 15827->14735 15828 405dba wvnsprintfW 15828->15830 15829 4108e4 13 API calls 15829->15830 15830->15827 15830->15828 15830->15829 15831 404f2c HeapFree 15830->15831 15900 404f8c 15830->15900 15831->15830 15833 410c09 15832->15833 15834 410b5c 15832->15834 15833->14735 15835 404eab RtlAllocateHeap 15834->15835 15841 410b64 15835->15841 15836 410c00 WNetCloseEnum 15836->15833 15837 410bdf WNetEnumResourceW 15838 410bf9 15837->15838 15837->15841 15839 404f2c HeapFree 15838->15839 15840 410bff 15839->15840 15840->15836 15841->15836 15841->15837 15842 410b2d 13 API calls 15841->15842 15843 404f8c RtlAllocateHeap 15841->15843 15844 4108e4 13 API calls 15841->15844 15845 404f2c HeapFree 15841->15845 15842->15841 15843->15841 15844->15841 15845->15841 15847 414e93 15846->15847 15848 404eab RtlAllocateHeap 15847->15848 15856 414ea1 15848->15856 15849 415020 15849->14735 15850 415016 15851 404f48 HeapFree 15850->15851 15851->15849 15852 4058f2 4 API calls 15852->15856 15853 414f3a SHGetFolderPathW 15853->15856 15854 404efc 3 API calls 15854->15856 15855 414fdf CloseHandle 15855->15856 15856->15849 15856->15850 15856->15852 15856->15853 15856->15854 15856->15855 15857 41072d RtlAllocateHeap 15856->15857 15858 4107d9 wvnsprintfW 15856->15858 15859 4108e4 13 API calls 15856->15859 15857->15856 15858->15856 15859->15856 15861 404eab RtlAllocateHeap 15860->15861 15862 4108fa 15861->15862 15863 410b27 15862->15863 15864 404ca7 wvnsprintfW 15862->15864 15863->14735 15865 410922 FindFirstFileW 15864->15865 15866 410b1f 15865->15866 15871 410940 15865->15871 15867 404f2c HeapFree 15866->15867 15867->15863 15868 410afe FindNextFileW 15870 410b16 FindClose 15868->15870 15868->15871 15869 404ca7 wvnsprintfW 15869->15871 15870->15866 15871->15868 15871->15869 15872 404f8c RtlAllocateHeap 15871->15872 15873 4108e4 10 API calls 15871->15873 15874 404f2c HeapFree 15871->15874 15875 405dba wvnsprintfW 15871->15875 15876 40f39a 9 API calls 15871->15876 15872->15871 15873->15871 15874->15871 15875->15871 15876->15871 15905 4136aa 15877->15905 15879 414099 15880 4140b6 15879->15880 15881 4140fd PathFindExtensionA 15879->15881 15895 414160 15879->15895 15916 413ec6 VirtualAlloc 15880->15916 15882 41410c 15881->15882 15887 414112 15881->15887 15884 406122 3 API calls 15882->15884 15884->15887 15926 404c33 GetTempPathW 15887->15926 15889 4140c7 CreateThread 15893 4140ee VirtualFree 15889->15893 15894 4140de WaitForSingleObject CloseHandle 15889->15894 15938 4050f0 15889->15938 15890 414157 15891 404f2c HeapFree 15890->15891 15891->15895 15892 41414e 15897 404f2c HeapFree 15892->15897 15893->15890 15894->15893 15895->14737 15897->15890 15899 405552 ShellExecuteW 15899->15892 15901 404f95 15900->15901 15902 404fbf 15900->15902 15901->15902 15903 404eab RtlAllocateHeap 15901->15903 15902->15830 15904 404fa4 15903->15904 15904->15830 15906 406122 3 API calls 15905->15906 15908 4136bf 15906->15908 15907 41374d 15907->15879 15908->15907 15909 413457 2 API calls 15908->15909 15910 4136f3 15909->15910 15911 405dba wvnsprintfW 15910->15911 15912 41370a 15911->15912 15913 413973 HeapFree 15912->15913 15914 413745 15913->15914 15915 404f2c HeapFree 15914->15915 15915->15907 15917 413ef3 15916->15917 15924 414052 15916->15924 15918 413fb5 15917->15918 15920 413f55 LoadLibraryA 15917->15920 15925 40528d 2 API calls 15917->15925 15919 413fc2 VirtualProtect 15918->15919 15922 413fdb 15919->15922 15920->15917 15921 413ff5 VirtualFree 15921->15922 15922->15921 15923 414036 VirtualProtect 15922->15923 15922->15924 15923->15922 15924->15889 15924->15890 15925->15917 15927 404c54 15926->15927 15931 404c95 15926->15931 15928 405dba wvnsprintfW 15927->15928 15927->15931 15929 404c84 15928->15929 15930 404ca7 wvnsprintfW 15929->15930 15930->15931 15931->15892 15932 404bc9 CreateFileW 15931->15932 15933 404bf5 15932->15933 15934 404c2c 15932->15934 15935 404c17 CloseHandle 15933->15935 15936 404bff WriteFile 15933->15936 15934->15892 15934->15899 15935->15934 15937 404c23 DeleteFileW 15935->15937 15936->15935 15937->15934 15939 405106 15938->15939 15941 404f2c HeapFree 15940->15941 15942 4131ad 15941->15942 15943 404f2c HeapFree 15942->15943 15944 4131b8 CoUninitialize 15943->15944 15945 7a52a7 15983 7a6790 15945->15983 15947 7a52b3 GetStartupInfoW 15948 7a52c7 HeapSetInformation 15947->15948 15950 7a52d2 15947->15950 15948->15950 15984 7a5579 HeapCreate 15950->15984 15951 7a5320 15952 7a532b 15951->15952 16081 7a527e 15951->16081 15985 7a6615 GetModuleHandleW 15952->15985 15955 7a5331 15956 7a533c __RTC_Initialize 15955->15956 15957 7a527e _fast_error_exit 66 API calls 15955->15957 16010 7a608b GetStartupInfoW 15956->16010 15957->15956 15960 7a5356 GetCommandLineA 16023 7a5ff4 GetEnvironmentStringsW 15960->16023 15961 7a5864 __amsg_exit 66 API calls 15963 7a5355 15961->15963 15963->15960 15967 7a537b 16049 7a5cc0 15967->16049 15968 7a5864 __amsg_exit 66 API calls 15968->15967 15970 7a5381 15971 7a538c 15970->15971 15972 7a5864 __amsg_exit 66 API calls 15970->15972 16069 7a5643 15971->16069 15972->15971 15974 7a5394 15975 7a539f 15974->15975 15976 7a5864 __amsg_exit 66 API calls 15974->15976 16075 7a5c61 15975->16075 15976->15975 15978 7a53a5 15979 7a53cf 15978->15979 16089 7a581a 15978->16089 16092 7a5846 15979->16092 15982 7a53d4 _doexit 15983->15947 15984->15951 15986 7a6629 15985->15986 15987 7a6632 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 15985->15987 16095 7a6362 15986->16095 15989 7a667c TlsAlloc 15987->15989 15992 7a66ca TlsSetValue 15989->15992 15993 7a678b 15989->15993 15992->15993 15994 7a66db 15992->15994 15993->15955 16105 7a55ec 15994->16105 15999 7a6723 DecodePointer 16002 7a6738 15999->16002 16000 7a6786 16001 7a6362 __mtterm 70 API calls 16000->16001 16001->15993 16002->16000 16003 7a7f00 __calloc_crt 66 API calls 16002->16003 16004 7a674e 16003->16004 16004->16000 16005 7a6756 DecodePointer 16004->16005 16006 7a6767 16005->16006 16006->16000 16007 7a676b 16006->16007 16008 7a639f __getptd_noexit 66 API calls 16007->16008 16009 7a6773 GetCurrentThreadId 16008->16009 16009->15993 16011 7a7f00 __calloc_crt 66 API calls 16010->16011 16021 7a60a9 16011->16021 16012 7a6254 GetStdHandle 16018 7a621e 16012->16018 16013 7a7f00 __calloc_crt 66 API calls 16013->16021 16014 7a62b8 SetHandleCount 16017 7a534a 16014->16017 16015 7a6266 GetFileType 16015->16018 16016 7a619e 16016->16018 16019 7a61ca GetFileType 16016->16019 16020 7a61d5 InitializeCriticalSectionAndSpinCount 16016->16020 16017->15960 16017->15961 16018->16012 16018->16014 16018->16015 16022 7a628c InitializeCriticalSectionAndSpinCount 16018->16022 16019->16016 16019->16020 16020->16016 16020->16017 16021->16013 16021->16016 16021->16017 16021->16018 16022->16017 16022->16018 16024 7a5366 16023->16024 16026 7a6010 16023->16026 16036 7a5f36 16024->16036 16025 7a6025 WideCharToMultiByte 16027 7a607d FreeEnvironmentStringsW 16025->16027 16028 7a6045 16025->16028 16026->16025 16026->16026 16027->16024 16029 7a7ebb __malloc_crt 66 API calls 16028->16029 16030 7a604b 16029->16030 16030->16027 16031 7a6053 WideCharToMultiByte 16030->16031 16032 7a6071 FreeEnvironmentStringsW 16031->16032 16033 7a6065 16031->16033 16032->16024 16034 7a50d3 _free 66 API calls 16033->16034 16035 7a606d 16034->16035 16035->16032 16037 7a5f4b 16036->16037 16038 7a5f50 GetModuleFileNameA 16036->16038 16122 7a7e3e 16037->16122 16040 7a5f77 16038->16040 16116 7a5d9c 16040->16116 16043 7a5370 16043->15967 16043->15968 16044 7a5fb3 16045 7a7ebb __malloc_crt 66 API calls 16044->16045 16046 7a5fb9 16045->16046 16046->16043 16047 7a5d9c _parse_cmdline 76 API calls 16046->16047 16048 7a5fd3 16047->16048 16048->16043 16050 7a5cc9 16049->16050 16052 7a5cce _strlen 16049->16052 16051 7a7e3e ___initmbctable 94 API calls 16050->16051 16051->16052 16053 7a7f00 __calloc_crt 66 API calls 16052->16053 16056 7a5cdc 16052->16056 16059 7a5d03 _strlen 16053->16059 16054 7a5d52 16055 7a50d3 _free 66 API calls 16054->16055 16055->16056 16056->15970 16057 7a7f00 __calloc_crt 66 API calls 16057->16059 16058 7a5d78 16060 7a50d3 _free 66 API calls 16058->16060 16059->16054 16059->16056 16059->16057 16059->16058 16062 7a5d8f 16059->16062 16563 7a7e5c 16059->16563 16060->16056 16063 7a6b5a __invoke_watson 10 API calls 16062->16063 16065 7a5d9b 16063->16065 16064 7a7760 __wincmdln 76 API calls 16064->16065 16065->16064 16068 7a5e28 16065->16068 16066 7a5f26 16066->15970 16067 7a7760 76 API calls __wincmdln 16067->16068 16068->16066 16068->16067 16070 7a5651 __IsNonwritableInCurrentImage 16069->16070 16572 7a7110 16070->16572 16072 7a566f __initterm_e 16074 7a5690 __IsNonwritableInCurrentImage 16072->16074 16575 7a70f9 16072->16575 16074->15974 16076 7a5c6f 16075->16076 16079 7a5c74 16075->16079 16077 7a7e3e ___initmbctable 94 API calls 16076->16077 16077->16079 16078 7a5cb0 16078->15978 16079->16078 16080 7a7760 __wincmdln 76 API calls 16079->16080 16080->16079 16082 7a528c 16081->16082 16083 7a5291 16081->16083 16084 7a5a57 __FF_MSGBANNER 66 API calls 16082->16084 16085 7a58a8 __NMSG_WRITE 66 API calls 16083->16085 16084->16083 16086 7a5299 16085->16086 16087 7a55c2 _malloc 3 API calls 16086->16087 16088 7a52a3 16087->16088 16088->15952 16090 7a56da _doexit 66 API calls 16089->16090 16091 7a582b 16090->16091 16091->15979 16093 7a56da _doexit 66 API calls 16092->16093 16094 7a5851 16093->16094 16094->15982 16096 7a636c DecodePointer 16095->16096 16097 7a637b 16095->16097 16096->16097 16098 7a638c TlsFree 16097->16098 16099 7a639a 16097->16099 16098->16099 16100 7a6c22 DeleteCriticalSection 16099->16100 16101 7a6c3a 16099->16101 16102 7a50d3 _free 66 API calls 16100->16102 16103 7a6c4c DeleteCriticalSection 16101->16103 16104 7a662e 16101->16104 16102->16099 16103->16101 16104->15955 16114 7a631c EncodePointer 16105->16114 16107 7a55f4 __init_pointers __initp_misc_winsig 16115 7a6da2 EncodePointer 16107->16115 16109 7a561a EncodePointer EncodePointer EncodePointer EncodePointer 16110 7a6bbc 16109->16110 16111 7a6bc7 16110->16111 16112 7a6bd1 InitializeCriticalSectionAndSpinCount 16111->16112 16113 7a671f 16111->16113 16112->16111 16112->16113 16113->15999 16113->16000 16114->16107 16115->16109 16118 7a5dbb 16116->16118 16120 7a5e28 16118->16120 16126 7a7760 16118->16126 16119 7a5f26 16119->16043 16119->16044 16120->16119 16121 7a7760 76 API calls __wincmdln 16120->16121 16121->16120 16123 7a7e4e 16122->16123 16124 7a7e47 16122->16124 16123->16038 16450 7a7ca4 16124->16450 16129 7a770d 16126->16129 16132 7a7686 16129->16132 16133 7a7699 16132->16133 16139 7a76e6 16132->16139 16140 7a64cc 16133->16140 16136 7a76c6 16136->16139 16160 7a799b 16136->16160 16139->16118 16141 7a6453 __getptd_noexit 66 API calls 16140->16141 16142 7a64d4 16141->16142 16143 7a64e1 16142->16143 16144 7a5864 __amsg_exit 66 API calls 16142->16144 16143->16136 16145 7a825a 16143->16145 16144->16143 16146 7a8266 _doexit 16145->16146 16147 7a64cc __getptd 66 API calls 16146->16147 16148 7a826b 16147->16148 16149 7a8299 16148->16149 16151 7a827d 16148->16151 16150 7a6d36 __lock 66 API calls 16149->16150 16152 7a82a0 16150->16152 16153 7a64cc __getptd 66 API calls 16151->16153 16176 7a820d 16152->16176 16156 7a8282 16153->16156 16158 7a8290 _doexit 16156->16158 16159 7a5864 __amsg_exit 66 API calls 16156->16159 16158->16136 16159->16158 16161 7a79a7 _doexit 16160->16161 16162 7a64cc __getptd 66 API calls 16161->16162 16163 7a79ac 16162->16163 16164 7a6d36 __lock 66 API calls 16163->16164 16165 7a79be 16163->16165 16166 7a79dc 16164->16166 16167 7a79cc _doexit 16165->16167 16171 7a5864 __amsg_exit 66 API calls 16165->16171 16168 7a7a25 16166->16168 16169 7a7a0d InterlockedIncrement 16166->16169 16170 7a79f3 InterlockedDecrement 16166->16170 16167->16139 16446 7a7a36 16168->16446 16169->16168 16170->16169 16173 7a79fe 16170->16173 16171->16167 16173->16169 16174 7a50d3 _free 66 API calls 16173->16174 16175 7a7a0c 16174->16175 16175->16169 16177 7a821a 16176->16177 16178 7a824f 16176->16178 16177->16178 16179 7a7f9a ___addlocaleref 8 API calls 16177->16179 16184 7a82c7 16178->16184 16180 7a8230 16179->16180 16180->16178 16187 7a8029 16180->16187 16445 7a6c5d LeaveCriticalSection 16184->16445 16186 7a82ce 16186->16156 16188 7a803a InterlockedDecrement 16187->16188 16189 7a80bd 16187->16189 16190 7a804f InterlockedDecrement 16188->16190 16191 7a8052 16188->16191 16189->16178 16201 7a80c2 16189->16201 16190->16191 16192 7a805f 16191->16192 16193 7a805c InterlockedDecrement 16191->16193 16194 7a8069 InterlockedDecrement 16192->16194 16195 7a806c 16192->16195 16193->16192 16194->16195 16196 7a8076 InterlockedDecrement 16195->16196 16198 7a8079 16195->16198 16196->16198 16197 7a8092 InterlockedDecrement 16197->16198 16198->16197 16199 7a80ad InterlockedDecrement 16198->16199 16200 7a80a2 InterlockedDecrement 16198->16200 16199->16189 16200->16198 16202 7a80d9 16201->16202 16203 7a8146 16201->16203 16202->16203 16207 7a810d 16202->16207 16215 7a50d3 _free 66 API calls 16202->16215 16204 7a8193 16203->16204 16205 7a50d3 _free 66 API calls 16203->16205 16219 7a81bc 16204->16219 16271 7a8d30 16204->16271 16206 7a8167 16205->16206 16209 7a50d3 _free 66 API calls 16206->16209 16210 7a812e 16207->16210 16218 7a50d3 _free 66 API calls 16207->16218 16212 7a817a 16209->16212 16213 7a50d3 _free 66 API calls 16210->16213 16217 7a50d3 _free 66 API calls 16212->16217 16220 7a813b 16213->16220 16214 7a8201 16221 7a50d3 _free 66 API calls 16214->16221 16222 7a8102 16215->16222 16216 7a50d3 _free 66 API calls 16216->16219 16223 7a8188 16217->16223 16224 7a8123 16218->16224 16219->16214 16225 7a50d3 66 API calls _free 16219->16225 16226 7a50d3 _free 66 API calls 16220->16226 16227 7a8207 16221->16227 16231 7a9110 16222->16231 16229 7a50d3 _free 66 API calls 16223->16229 16259 7a90a7 16224->16259 16225->16219 16226->16203 16227->16178 16229->16204 16232 7a9121 16231->16232 16258 7a920a 16231->16258 16233 7a9132 16232->16233 16234 7a50d3 _free 66 API calls 16232->16234 16235 7a9144 16233->16235 16236 7a50d3 _free 66 API calls 16233->16236 16234->16233 16237 7a9156 16235->16237 16238 7a50d3 _free 66 API calls 16235->16238 16236->16235 16239 7a9168 16237->16239 16240 7a50d3 _free 66 API calls 16237->16240 16238->16237 16241 7a917a 16239->16241 16242 7a50d3 _free 66 API calls 16239->16242 16240->16239 16243 7a918c 16241->16243 16244 7a50d3 _free 66 API calls 16241->16244 16242->16241 16245 7a919e 16243->16245 16246 7a50d3 _free 66 API calls 16243->16246 16244->16243 16247 7a91b0 16245->16247 16248 7a50d3 _free 66 API calls 16245->16248 16246->16245 16249 7a91c2 16247->16249 16250 7a50d3 _free 66 API calls 16247->16250 16248->16247 16251 7a91d4 16249->16251 16252 7a50d3 _free 66 API calls 16249->16252 16250->16249 16253 7a91e6 16251->16253 16254 7a50d3 _free 66 API calls 16251->16254 16252->16251 16255 7a91f8 16253->16255 16256 7a50d3 _free 66 API calls 16253->16256 16254->16253 16257 7a50d3 _free 66 API calls 16255->16257 16255->16258 16256->16255 16257->16258 16258->16207 16260 7a90b4 16259->16260 16270 7a910c 16259->16270 16261 7a90c4 16260->16261 16262 7a50d3 _free 66 API calls 16260->16262 16263 7a90d6 16261->16263 16264 7a50d3 _free 66 API calls 16261->16264 16262->16261 16265 7a90e8 16263->16265 16266 7a50d3 _free 66 API calls 16263->16266 16264->16263 16267 7a50d3 _free 66 API calls 16265->16267 16268 7a90fa 16265->16268 16266->16265 16267->16268 16269 7a50d3 _free 66 API calls 16268->16269 16268->16270 16269->16270 16270->16210 16272 7a8d41 16271->16272 16273 7a81b1 16271->16273 16274 7a50d3 _free 66 API calls 16272->16274 16273->16216 16275 7a8d49 16274->16275 16276 7a50d3 _free 66 API calls 16275->16276 16277 7a8d51 16276->16277 16278 7a50d3 _free 66 API calls 16277->16278 16279 7a8d59 16278->16279 16280 7a50d3 _free 66 API calls 16279->16280 16281 7a8d61 16280->16281 16282 7a50d3 _free 66 API calls 16281->16282 16283 7a8d69 16282->16283 16284 7a50d3 _free 66 API calls 16283->16284 16285 7a8d71 16284->16285 16286 7a50d3 _free 66 API calls 16285->16286 16287 7a8d78 16286->16287 16288 7a50d3 _free 66 API calls 16287->16288 16289 7a8d80 16288->16289 16290 7a50d3 _free 66 API calls 16289->16290 16291 7a8d88 16290->16291 16292 7a50d3 _free 66 API calls 16291->16292 16293 7a8d90 16292->16293 16294 7a50d3 _free 66 API calls 16293->16294 16295 7a8d98 16294->16295 16296 7a50d3 _free 66 API calls 16295->16296 16297 7a8da0 16296->16297 16298 7a50d3 _free 66 API calls 16297->16298 16299 7a8da8 16298->16299 16300 7a50d3 _free 66 API calls 16299->16300 16301 7a8db0 16300->16301 16302 7a50d3 _free 66 API calls 16301->16302 16303 7a8db8 16302->16303 16304 7a50d3 _free 66 API calls 16303->16304 16305 7a8dc0 16304->16305 16306 7a50d3 _free 66 API calls 16305->16306 16307 7a8dcb 16306->16307 16308 7a50d3 _free 66 API calls 16307->16308 16309 7a8dd3 16308->16309 16310 7a50d3 _free 66 API calls 16309->16310 16311 7a8ddb 16310->16311 16312 7a50d3 _free 66 API calls 16311->16312 16313 7a8de3 16312->16313 16314 7a50d3 _free 66 API calls 16313->16314 16315 7a8deb 16314->16315 16316 7a50d3 _free 66 API calls 16315->16316 16317 7a8df3 16316->16317 16318 7a50d3 _free 66 API calls 16317->16318 16319 7a8dfb 16318->16319 16320 7a50d3 _free 66 API calls 16319->16320 16321 7a8e03 16320->16321 16322 7a50d3 _free 66 API calls 16321->16322 16323 7a8e0b 16322->16323 16324 7a50d3 _free 66 API calls 16323->16324 16325 7a8e13 16324->16325 16326 7a50d3 _free 66 API calls 16325->16326 16327 7a8e1b 16326->16327 16328 7a50d3 _free 66 API calls 16327->16328 16329 7a8e23 16328->16329 16330 7a50d3 _free 66 API calls 16329->16330 16331 7a8e2b 16330->16331 16332 7a50d3 _free 66 API calls 16331->16332 16333 7a8e33 16332->16333 16334 7a50d3 _free 66 API calls 16333->16334 16335 7a8e3b 16334->16335 16336 7a50d3 _free 66 API calls 16335->16336 16337 7a8e43 16336->16337 16338 7a50d3 _free 66 API calls 16337->16338 16339 7a8e51 16338->16339 16340 7a50d3 _free 66 API calls 16339->16340 16341 7a8e5c 16340->16341 16342 7a50d3 _free 66 API calls 16341->16342 16343 7a8e67 16342->16343 16344 7a50d3 _free 66 API calls 16343->16344 16345 7a8e72 16344->16345 16346 7a50d3 _free 66 API calls 16345->16346 16347 7a8e7d 16346->16347 16348 7a50d3 _free 66 API calls 16347->16348 16349 7a8e88 16348->16349 16350 7a50d3 _free 66 API calls 16349->16350 16351 7a8e93 16350->16351 16352 7a50d3 _free 66 API calls 16351->16352 16353 7a8e9e 16352->16353 16354 7a50d3 _free 66 API calls 16353->16354 16355 7a8ea9 16354->16355 16356 7a50d3 _free 66 API calls 16355->16356 16357 7a8eb4 16356->16357 16358 7a50d3 _free 66 API calls 16357->16358 16359 7a8ebf 16358->16359 16360 7a50d3 _free 66 API calls 16359->16360 16361 7a8eca 16360->16361 16362 7a50d3 _free 66 API calls 16361->16362 16363 7a8ed5 16362->16363 16364 7a50d3 _free 66 API calls 16363->16364 16365 7a8ee0 16364->16365 16366 7a50d3 _free 66 API calls 16365->16366 16367 7a8eeb 16366->16367 16368 7a50d3 _free 66 API calls 16367->16368 16369 7a8ef6 16368->16369 16370 7a50d3 _free 66 API calls 16369->16370 16371 7a8f04 16370->16371 16372 7a50d3 _free 66 API calls 16371->16372 16373 7a8f0f 16372->16373 16374 7a50d3 _free 66 API calls 16373->16374 16375 7a8f1a 16374->16375 16376 7a50d3 _free 66 API calls 16375->16376 16377 7a8f25 16376->16377 16378 7a50d3 _free 66 API calls 16377->16378 16379 7a8f30 16378->16379 16380 7a50d3 _free 66 API calls 16379->16380 16381 7a8f3b 16380->16381 16382 7a50d3 _free 66 API calls 16381->16382 16383 7a8f46 16382->16383 16384 7a50d3 _free 66 API calls 16383->16384 16385 7a8f51 16384->16385 16386 7a50d3 _free 66 API calls 16385->16386 16387 7a8f5c 16386->16387 16388 7a50d3 _free 66 API calls 16387->16388 16389 7a8f67 16388->16389 16390 7a50d3 _free 66 API calls 16389->16390 16391 7a8f72 16390->16391 16392 7a50d3 _free 66 API calls 16391->16392 16393 7a8f7d 16392->16393 16394 7a50d3 _free 66 API calls 16393->16394 16395 7a8f88 16394->16395 16396 7a50d3 _free 66 API calls 16395->16396 16397 7a8f93 16396->16397 16398 7a50d3 _free 66 API calls 16397->16398 16399 7a8f9e 16398->16399 16400 7a50d3 _free 66 API calls 16399->16400 16401 7a8fa9 16400->16401 16402 7a50d3 _free 66 API calls 16401->16402 16403 7a8fb7 16402->16403 16404 7a50d3 _free 66 API calls 16403->16404 16405 7a8fc2 16404->16405 16406 7a50d3 _free 66 API calls 16405->16406 16407 7a8fcd 16406->16407 16408 7a50d3 _free 66 API calls 16407->16408 16409 7a8fd8 16408->16409 16410 7a50d3 _free 66 API calls 16409->16410 16411 7a8fe3 16410->16411 16412 7a50d3 _free 66 API calls 16411->16412 16413 7a8fee 16412->16413 16414 7a50d3 _free 66 API calls 16413->16414 16415 7a8ff9 16414->16415 16416 7a50d3 _free 66 API calls 16415->16416 16417 7a9004 16416->16417 16418 7a50d3 _free 66 API calls 16417->16418 16419 7a900f 16418->16419 16420 7a50d3 _free 66 API calls 16419->16420 16421 7a901a 16420->16421 16422 7a50d3 _free 66 API calls 16421->16422 16423 7a9025 16422->16423 16424 7a50d3 _free 66 API calls 16423->16424 16425 7a9030 16424->16425 16426 7a50d3 _free 66 API calls 16425->16426 16427 7a903b 16426->16427 16428 7a50d3 _free 66 API calls 16427->16428 16429 7a9046 16428->16429 16430 7a50d3 _free 66 API calls 16429->16430 16431 7a9051 16430->16431 16432 7a50d3 _free 66 API calls 16431->16432 16445->16186 16449 7a6c5d LeaveCriticalSection 16446->16449 16448 7a7a3d 16448->16165 16449->16448 16451 7a7cb0 _doexit 16450->16451 16452 7a64cc __getptd 66 API calls 16451->16452 16453 7a7cb9 16452->16453 16454 7a799b _LocaleUpdate::_LocaleUpdate 68 API calls 16453->16454 16455 7a7cc3 16454->16455 16481 7a7a3f 16455->16481 16458 7a7ebb __malloc_crt 66 API calls 16459 7a7ce4 16458->16459 16460 7a7e03 _doexit 16459->16460 16488 7a7abb 16459->16488 16460->16123 16463 7a7e10 16463->16460 16470 7a50d3 _free 66 API calls 16463->16470 16471 7a7e23 16463->16471 16464 7a7d14 InterlockedDecrement 16465 7a7d24 16464->16465 16466 7a7d35 InterlockedIncrement 16464->16466 16465->16466 16468 7a50d3 _free 66 API calls 16465->16468 16466->16460 16469 7a7d4b 16466->16469 16467 7a5566 _malloc 66 API calls 16467->16460 16472 7a7d34 16468->16472 16469->16460 16473 7a6d36 __lock 66 API calls 16469->16473 16470->16471 16471->16467 16472->16466 16475 7a7d5f InterlockedDecrement 16473->16475 16476 7a7ddb 16475->16476 16477 7a7dee InterlockedIncrement 16475->16477 16476->16477 16479 7a50d3 _free 66 API calls 16476->16479 16498 7a7e05 16477->16498 16480 7a7ded 16479->16480 16480->16477 16482 7a7686 _LocaleUpdate::_LocaleUpdate 76 API calls 16481->16482 16483 7a7a53 16482->16483 16484 7a7a5e GetOEMCP 16483->16484 16485 7a7a7c 16483->16485 16487 7a7a6e 16484->16487 16486 7a7a81 GetACP 16485->16486 16485->16487 16486->16487 16487->16458 16487->16460 16489 7a7a3f getSystemCP 78 API calls 16488->16489 16490 7a7adb 16489->16490 16491 7a7ae6 setSBCS 16490->16491 16494 7a7b2a IsValidCodePage 16490->16494 16496 7a7b4f _memset __setmbcp_nolock 16490->16496 16492 7a50c4 __except_handler4 5 API calls 16491->16492 16493 7a7ca2 16492->16493 16493->16463 16493->16464 16494->16491 16495 7a7b3c GetCPInfo 16494->16495 16495->16491 16495->16496 16501 7a780b GetCPInfo 16496->16501 16562 7a6c5d LeaveCriticalSection 16498->16562 16500 7a7e0c 16500->16460 16502 7a78f3 16501->16502 16505 7a783f _memset 16501->16505 16507 7a50c4 __except_handler4 5 API calls 16502->16507 16511 7a8bc1 16505->16511 16509 7a7999 16507->16509 16509->16496 16510 7a8a94 ___crtLCMapStringA 82 API calls 16510->16502 16512 7a7686 _LocaleUpdate::_LocaleUpdate 76 API calls 16511->16512 16513 7a8bd4 16512->16513 16521 7a8ada 16513->16521 16516 7a8a94 16517 7a7686 _LocaleUpdate::_LocaleUpdate 76 API calls 16516->16517 16518 7a8aa7 16517->16518 16538 7a88ad 16518->16538 16522 7a8af8 16521->16522 16523 7a8b03 MultiByteToWideChar 16521->16523 16522->16523 16526 7a8b30 16523->16526 16533 7a8b2c 16523->16533 16524 7a50c4 __except_handler4 5 API calls 16527 7a78ae 16524->16527 16525 7a8b45 _memset __alloca_probe_16 16528 7a8b7e MultiByteToWideChar 16525->16528 16525->16533 16526->16525 16529 7a510d _malloc 66 API calls 16526->16529 16527->16516 16530 7a8b94 GetStringTypeW 16528->16530 16531 7a8ba5 16528->16531 16529->16525 16530->16531 16534 7a8851 16531->16534 16533->16524 16535 7a886e 16534->16535 16536 7a885d 16534->16536 16535->16533 16536->16535 16537 7a50d3 _free 66 API calls 16536->16537 16537->16535 16540 7a88cb MultiByteToWideChar 16538->16540 16541 7a8929 16540->16541 16545 7a8930 16540->16545 16542 7a50c4 __except_handler4 5 API calls 16541->16542 16544 7a78ce 16542->16544 16543 7a897d MultiByteToWideChar 16547 7a8a75 16543->16547 16548 7a8996 LCMapStringW 16543->16548 16544->16510 16546 7a510d _malloc 66 API calls 16545->16546 16551 7a8949 __alloca_probe_16 16545->16551 16546->16551 16549 7a8851 __freea 66 API calls 16547->16549 16548->16547 16550 7a89b5 16548->16550 16549->16541 16552 7a89bf 16550->16552 16554 7a89e8 16550->16554 16551->16541 16551->16543 16552->16547 16553 7a89d3 LCMapStringW 16552->16553 16553->16547 16556 7a8a03 __alloca_probe_16 16554->16556 16557 7a510d _malloc 66 API calls 16554->16557 16555 7a8a37 LCMapStringW 16558 7a8a6f 16555->16558 16559 7a8a4d WideCharToMultiByte 16555->16559 16556->16547 16556->16555 16557->16556 16560 7a8851 __freea 66 API calls 16558->16560 16559->16558 16560->16547 16562->16500 16564 7a7e6a 16563->16564 16567 7a7e71 16563->16567 16564->16567 16570 7a7e8f 16564->16570 16565 7a5566 _malloc 66 API calls 16566 7a7e76 16565->16566 16568 7a6bac _strcpy_s 11 API calls 16566->16568 16567->16565 16569 7a7e80 16568->16569 16569->16059 16570->16569 16571 7a5566 _malloc 66 API calls 16570->16571 16571->16566 16573 7a7116 EncodePointer 16572->16573 16573->16573 16574 7a7130 16573->16574 16574->16072 16578 7a70bd 16575->16578 16577 7a7106 16577->16074 16579 7a70c9 _doexit 16578->16579 16586 7a55da 16579->16586 16585 7a70ea _doexit 16585->16577 16587 7a6d36 __lock 66 API calls 16586->16587 16588 7a55e1 16587->16588 16589 7a6fd6 DecodePointer DecodePointer 16588->16589 16590 7a7004 16589->16590 16591 7a7085 16589->16591 16590->16591 16603 7a8871 16590->16603 16600 7a70f3 16591->16600 16593 7a7068 EncodePointer EncodePointer 16593->16591 16594 7a703a 16594->16591 16597 7a7f4c __realloc_crt 70 API calls 16594->16597 16598 7a7056 EncodePointer 16594->16598 16595 7a7016 16595->16593 16595->16594 16610 7a7f4c 16595->16610 16599 7a7050 16597->16599 16598->16593 16599->16591 16599->16598 16636 7a55e3 16600->16636 16604 7a887c 16603->16604 16605 7a8891 HeapSize 16603->16605 16606 7a5566 _malloc 66 API calls 16604->16606 16605->16595 16607 7a8881 16606->16607 16608 7a6bac _strcpy_s 11 API calls 16607->16608 16609 7a888c 16608->16609 16609->16595 16611 7a7f55 16610->16611 16613 7a7f94 16611->16613 16614 7a7f75 Sleep 16611->16614 16615 7a8c83 16611->16615 16613->16594 16614->16611 16616 7a8c99 16615->16616 16617 7a8c8e 16615->16617 16619 7a8ca1 16616->16619 16627 7a8cae 16616->16627 16618 7a510d _malloc 66 API calls 16617->16618 16620 7a8c96 16618->16620 16621 7a50d3 _free 66 API calls 16619->16621 16620->16611 16635 7a8ca9 _free 16621->16635 16622 7a8ce6 16623 7a5a9f _malloc DecodePointer 16622->16623 16625 7a8cec 16623->16625 16624 7a8cb6 HeapReAlloc 16624->16627 16624->16635 16628 7a5566 _malloc 66 API calls 16625->16628 16626 7a8d16 16630 7a5566 _malloc 66 API calls 16626->16630 16627->16622 16627->16624 16627->16626 16629 7a5a9f _malloc DecodePointer 16627->16629 16632 7a8cfe 16627->16632 16628->16635 16629->16627 16631 7a8d1b GetLastError 16630->16631 16631->16635 16633 7a5566 _malloc 66 API calls 16632->16633 16634 7a8d03 GetLastError 16633->16634 16634->16635 16635->16611 16639 7a6c5d LeaveCriticalSection 16636->16639 16638 7a55ea 16638->16585 16639->16638 16656 77a282 16657 77a291 VirtualAlloc 16656->16657 16658 77a2a5 16656->16658 16657->16658

    Control-flow Graph

    APIs
      • Part of subcall function 00413569: InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 004135AB
    • InternetOpenW.WININET(00000000,?,00000000,00000000,00000000), ref: 004129CC
    • InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 00412A08
    • InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00412A21
    • HttpOpenRequestW.WININET(0000EA60,?,?,00000000,00000000,00000000,-00000001,00000000), ref: 00412A5C
    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00412A80
    • InternetSetOptionW.WININET(00000000,0000001F,00003180,00000004), ref: 00412A99
    • HttpSendRequestW.WININET(00000000,?,?,0000EA60,?), ref: 00412AB1
    • InternetQueryDataAvailable.WININET(00000000,?,00000000,00000000), ref: 00412AC7
    • InternetReadFile.WININET(00000000,00000000,?,?), ref: 00412AEF
    • InternetCloseHandle.WININET(00000000), ref: 00412B07
    • InternetCloseHandle.WININET(0000EA60), ref: 00412B10
    • InternetCloseHandle.WININET(?), ref: 00412B19
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Internet$CloseHandleOption$HttpOpenQueryRequest$AvailableConnectCrackDataFileReadSend
    • String ID: `
    • API String ID: 2263532179-1850852036
    • Opcode ID: 337f231a003c4c706b158496a4df7ab4e4f1f63051ffc8cb6a84e9b7fa47582e
    • Instruction ID: dc99d5b8504d753b9beb300cd76dbe9c4bb2313e18cd3c81913fb33a92f5dd12
    • Opcode Fuzzy Hash: 337f231a003c4c706b158496a4df7ab4e4f1f63051ffc8cb6a84e9b7fa47582e
    • Instruction Fuzzy Hash: 53513AB1A00219BFDF119FA5DD49EEFBFB8EB48700F10412AF512E2150D7795A90DB68

    Control-flow Graph

    APIs
      • Part of subcall function 00413B6C: CoInitializeEx.COMBASE(00000000,00000002), ref: 00413B7B
      • Part of subcall function 0041701B: GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00413CCB,?,00000032), ref: 00417037
    • CreateMutexA.KERNEL32(00000000,00000001,?), ref: 00413CD6
    • ExitProcess.KERNEL32 ref: 00413CEC
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00413CFF
    • ExitProcess.KERNEL32 ref: 00413D2F
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: ExitProcess$CreateFileInformationInitializeModuleMutexNameVolume
    • String ID:
    • API String ID: 2804266631-0
    • Opcode ID: fcd8eb96de6217f256b999b5a7e5d2b0f0d3e120eca5a8fc7563aa3f23ff9bf0
    • Instruction ID: ddbba73eb4803778151220dfd07befdf9224cd48c48c060a4fbae49941d5bf6b
    • Opcode Fuzzy Hash: fcd8eb96de6217f256b999b5a7e5d2b0f0d3e120eca5a8fc7563aa3f23ff9bf0
    • Instruction Fuzzy Hash: AD514C72C00218AADF11FBB1AD4A9DE777CAF05305F1004ABF605A6042EB399BC88B59
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b26e765b5013b219c1abc091eac328a0d5c8a046ec8bb4a422298991ddf01ce7
    • Instruction ID: 7603a2472ed12046b4ab69322df02bc3577b2223112e8b6f7a6670809ff62f80
    • Opcode Fuzzy Hash: b26e765b5013b219c1abc091eac328a0d5c8a046ec8bb4a422298991ddf01ce7
    • Instruction Fuzzy Hash: 38012278A00208EFCB44CF58C190999BBB5FB4C354F208299EC499B746D736EE82CF80

    Control-flow Graph

    APIs
      • Part of subcall function 00405192: LoadLibraryA.KERNEL32(?,?,?,?,?,004072F6,98ED24FB), ref: 0040526D
    • LoadLibraryA.KERNEL32(?), ref: 0040731F
    • LoadLibraryA.KERNEL32(?), ref: 00407343
    • LoadLibraryA.KERNEL32(?), ref: 0040736C
    • LoadLibraryA.KERNEL32(?), ref: 00407395
    • LoadLibraryA.KERNEL32(?), ref: 004073DA
    • LoadLibraryA.KERNEL32(?), ref: 004073FF
    • LoadLibraryA.KERNEL32(?), ref: 00407428
    • LoadLibraryA.KERNEL32(?), ref: 0040744A
    • LoadLibraryA.KERNEL32(?), ref: 0040746F
    • LoadLibraryA.KERNEL32(?), ref: 00407497
    • LoadLibraryA.KERNEL32(?), ref: 004074C0
    • LoadLibraryA.KERNEL32(?), ref: 004074E5
    • LoadLibraryA.KERNEL32(?), ref: 0040750A
    • LoadLibraryA.KERNEL32(?), ref: 0040752F
    • LoadLibraryA.KERNEL32(?), ref: 00407551
    • LoadLibraryA.KERNEL32(?), ref: 00407573
    • LoadLibraryA.KERNEL32(?), ref: 00407598
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID: [Xx$(F&$.Y*$8I$>$f|j?$p$yF|d$uE$+N$LNF$U=$W0U$c50
    • API String ID: 1029625771-3468027254
    • Opcode ID: 1b2d95f987bde8cf06e019b5f51688bb45c474f0357fcc0c95498163d0c90df6
    • Instruction ID: 7b55cb6931a6eae9675ae3473d819d56059f9eb575f203993a4290f2a2dbd950
    • Opcode Fuzzy Hash: 1b2d95f987bde8cf06e019b5f51688bb45c474f0357fcc0c95498163d0c90df6
    • Instruction Fuzzy Hash: 178289B08052699BDB61CF518D987CEBBB5BB45308F5082DAD5097A200DBB91FC9CF89

    Control-flow Graph

    APIs
    • GetCurrentProcess.KERNEL32(00000000), ref: 007A4539
    • TerminateProcess.KERNEL32(00000000), ref: 007A4540
    • SetCalendarInfoA.KERNEL32(00000000,00000000,00000000,00000000), ref: 007A454E
    • GetLastError.KERNEL32 ref: 007A4558
    • GetCurrentProcess.KERNEL32(00000000), ref: 007A4565
    • TerminateProcess.KERNEL32(00000000), ref: 007A456C
    • IdnToNameprepUnicode.NORMALIZ(00000000,00000000,00000000,00000000,00000000), ref: 007A457C
    • GetLastError.KERNEL32 ref: 007A4586
    • GetCurrentProcess.KERNEL32(00000000), ref: 007A4593
    • TerminateProcess.KERNEL32(00000000), ref: 007A459A
    • _malloc.LIBCMT ref: 007A45A5
    • _memset.LIBCMT ref: 007A45C5
    • _free.LIBCMT ref: 007A46B5
      • Part of subcall function 007A50D3: HeapFree.KERNEL32(00000000,00000000,?,007A64BD,00000000,?,?,007A556B,007A5196), ref: 007A50E9
      • Part of subcall function 007A50D3: GetLastError.KERNEL32(00000000,?,007A64BD,00000000,?,?,007A556B,007A5196), ref: 007A50FB
    • _free.LIBCMT ref: 007A46C1
    • _free.LIBCMT ref: 007A46CD
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Process$CurrentErrorLastTerminate_free$CalendarFreeHeapInfoNameprepUnicode_malloc_memset
    • String ID:
    • API String ID: 3381973965-0
    • Opcode ID: 8134fef728c8e20ee777daae96959e7a555f79d35250498a4846d77ebe9982bb
    • Instruction ID: 9b1988303bafd2cbe8d39fde035f32bea6d13196881024d023cfe6cd46f04fe2
    • Opcode Fuzzy Hash: 8134fef728c8e20ee777daae96959e7a555f79d35250498a4846d77ebe9982bb
    • Instruction Fuzzy Hash: 854184B1D00104EBEB10DFE4DC4ABBF7774AFC6705F144664E205AA281E7BD5A44CB92

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 117 412e5d-412e78 call 4060c6 120 412e7a-412e7c 117->120 121 412e7d-412e9c call 413457 call 404f2c gethostbyname 117->121 126 412ead-412ec2 socket 121->126 127 412e9e-412eab call 413973 121->127 129 413007-41300a 126->129 130 412ec8-412ef5 connect 126->130 127->120 132 412efb-412f3f call 40f31f call 405e03 send 130->132 133 412ffe-413001 closesocket 130->133 132->133 138 412f45-412f58 send 132->138 133->129 138->133 139 412f5e-412f9d recv call 404ecb call 404f6a 138->139 144 412f9f-412fa3 139->144 144->133 145 412fa5-412faa 144->145 145->133 146 412fac-412fbd call 405d4f 145->146 146->133 149 412fbf-412fd0 call 413985 146->149 149->133 152 412fd2-412ffa call 40502d call 404fe2 149->152 152->133 157 412ffc 152->157 157->133
    APIs
    • gethostbyname.WS2_32(?), ref: 00412E92
    • socket.WS2_32(00000002,00000001,00000006), ref: 00412EB4
    • connect.WS2_32(00000000,?,00000010), ref: 00412EEC
    • send.WS2_32(00000000,?,00000000,00000000), ref: 00412F37
    • send.WS2_32(00000000,?,?,00000000), ref: 00412F4F
    • recv.WS2_32(?,?,00000400,00000000), ref: 00412F6B
    • closesocket.WS2_32(?), ref: 00413001
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: send$closesocketconnectgethostbynamerecvsocket
    • String ID:
    • API String ID: 1783939010-2344752452
    • Opcode ID: 29e188fea70a0dd2f8240455ef74e17abaa8d4ab1a3e0102d3a2115e332ad8ad
    • Instruction ID: da93d37a2aa8dd86005f6c059bbb5740c46efee5a5ea72e2e65dce030ffe33f1
    • Opcode Fuzzy Hash: 29e188fea70a0dd2f8240455ef74e17abaa8d4ab1a3e0102d3a2115e332ad8ad
    • Instruction Fuzzy Hash: 2C51B172900209ABDF219FA8CD45AEF7B75EF44320F104066F901F72A1DB799E91DB98

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 234 7a435c-7a4369 235 7a436b-7a4376 VirtualAlloc 234->235 236 7a437c-7a4380 234->236 235->236 237 7a4382-7a438d VirtualAlloc 236->237 238 7a4393-7a4397 236->238 237->238 239 7a4399-7a43a7 MessageBoxW 238->239 240 7a43ad-7a43b1 238->240 239->240
    APIs
    • VirtualAlloc.KERNEL32(00000000,00000059,00001000,00000004), ref: 007A4376
    • VirtualAlloc.KERNEL32(00000000,0000000F,00001000,00000004), ref: 007A438D
    • MessageBoxW.USER32(00000000,agifcyaupylynlxrdbouhbvogtggqihkuypuygkslhxscprmajfbaypsivploqthhskwfpyvgxvpxgfwmk,cesconhhsbwhrjrbwbloyiquwsvkaflobkbgbdklfwoveuhrqardvxivmlpjqxescwtgybfngsdfptrmlxrbihhnteiqfsrcqysgritpomedxiyrgkwknltmjdagrbwwfi,00000000), ref: 007A43A7
    Strings
    • cesconhhsbwhrjrbwbloyiquwsvkaflobkbgbdklfwoveuhrqardvxivmlpjqxescwtgybfngsdfptrmlxrbihhnteiqfsrcqysgritpomedxiyrgkwknltmjdagrbwwfi, xrefs: 007A439B
    • agifcyaupylynlxrdbouhbvogtggqihkuypuygkslhxscprmajfbaypsivploqthhskwfpyvgxvpxgfwmk, xrefs: 007A43A0
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual$Message
    • String ID: agifcyaupylynlxrdbouhbvogtggqihkuypuygkslhxscprmajfbaypsivploqthhskwfpyvgxvpxgfwmk$cesconhhsbwhrjrbwbloyiquwsvkaflobkbgbdklfwoveuhrqardvxivmlpjqxescwtgybfngsdfptrmlxrbihhnteiqfsrcqysgritpomedxiyrgkwknltmjdagrbwwfi
    • API String ID: 1804078305-2917780553
    • Opcode ID: aecf1159bca6e133df71d0762a3b084c6e9884186305670266c39c50bb5e68ab
    • Instruction ID: 4ccc7b0a136d033767af1b2392a51b79f3b498d818826f8e2b81bfe8fd7a722a
    • Opcode Fuzzy Hash: aecf1159bca6e133df71d0762a3b084c6e9884186305670266c39c50bb5e68ab
    • Instruction Fuzzy Hash: C3F01C756C0744BAEB308F14DC4BF893A20A786BA3F108220FB5D6C1D1D3F99684CA85

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 241 41701b-41703f GetVolumeInformationW 242 417041-417060 call 40f31f call 41700b * 3 241->242 243 417098 241->243 252 417065-417075 call 41700b 242->252 244 41709a-41709d 243->244 255 417077-417096 call 405e03 252->255 255->244
    APIs
    • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00413CCB,?,00000032), ref: 00417037
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: InformationVolume
    • String ID: C:\
    • API String ID: 2039140958-3404278061
    • Opcode ID: 889d53317b2db0a536e5275cff2a90517a2d7934359336816fc69587e525ddc7
    • Instruction ID: 38deaf873d01ad376382a45a46a62742d6431d24871cea28b4788a870ec15d02
    • Opcode Fuzzy Hash: 889d53317b2db0a536e5275cff2a90517a2d7934359336816fc69587e525ddc7
    • Instruction Fuzzy Hash: 80014071C05628B6CF11EFA28D498DFBF78EE49364B10006AF805B3141D6399B85DBF9

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 258 7a43c0-7a4430 call 7a4960 call 7a48b0 * 3 GetModuleHandleW 268 7a448b-7a4491 258->268 269 7a4432-7a4444 258->269 269->268 271 7a4446-7a4458 call 7a510d 269->271 274 7a445d-7a4467 271->274 275 7a4469-7a447a call 7a84f0 274->275 276 7a447d-7a4481 274->276 275->276 276->268 278 7a4483-7a4489 276->278 278->268
    APIs
    • GetModuleHandleW.KERNEL32(00000000), ref: 007A440C
    • _malloc.LIBCMT ref: 007A4458
      • Part of subcall function 007A510D: __FF_MSGBANNER.LIBCMT ref: 007A5126
      • Part of subcall function 007A510D: __NMSG_WRITE.LIBCMT ref: 007A512D
      • Part of subcall function 007A510D: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,007A445D,?), ref: 007A5152
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocateHandleHeapModule_malloc
    • String ID:
    • API String ID: 2614553508-0
    • Opcode ID: 7adfe9251f69acb726e66b4658be939180b60dacd9fb157a6e2c46932c0e176e
    • Instruction ID: d0c19a04872bb5edacb304ec11d2a00ff3ef6a5f5ae82b214c25015f012f4b1d
    • Opcode Fuzzy Hash: 7adfe9251f69acb726e66b4658be939180b60dacd9fb157a6e2c46932c0e176e
    • Instruction Fuzzy Hash: 5D21C7B5D00209EFDB04DFE4D849AEEBBB4EF89305F108658E905B7240E7799A41CFA1
    APIs
    • VirtualAlloc.KERNEL32(00000000,000000DE,00001000,00000004), ref: 00778282
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 2e95edaf039313932f4ef897ab547e282aa7891574b0cd2701677a94333f52e7
    • Instruction ID: 09aeb3727ea582ef36ec3334d74038e97b6a26b490ba5213d892397cd949db94
    • Opcode Fuzzy Hash: 2e95edaf039313932f4ef897ab547e282aa7891574b0cd2701677a94333f52e7
    • Instruction Fuzzy Hash: FF233A709012299BDB69CF08CD94BDDBBB5BF48348F1481D9E50DAB356D730AA91CF88
    APIs
    • VirtualAlloc.KERNEL32(00000000,000000DE,00001000,00000004), ref: 0079D01F
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 798682c59470c3559d4ad822a723b462a6fd2d684d814b33bb4b5dccfe1a5eec
    • Instruction ID: 00ee23968cfcfe08eb2416d9c2f617dddc6dd5a5b33136ae0221f53818b6b8dc
    • Opcode Fuzzy Hash: 798682c59470c3559d4ad822a723b462a6fd2d684d814b33bb4b5dccfe1a5eec
    • Instruction Fuzzy Hash: 3C234B719012289BCB69CF08DD95BDCBBB5BF48348F1481D9E50DAB356D730AA91CF88
    APIs
    • VirtualAlloc.KERNEL32(00000000,00000066,00001000,00000004), ref: 007820CC
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 94c296daabaf7f5dcc9535184ec28e80217e787753e14331037d7a257ae0ee4a
    • Instruction ID: b86aae80eb7d8cc66ba3cd63212d57bf84dff99bc080e8d35d9af136f9f0668d
    • Opcode Fuzzy Hash: 94c296daabaf7f5dcc9535184ec28e80217e787753e14331037d7a257ae0ee4a
    • Instruction Fuzzy Hash: E2233D709012299BCB69CF08C994BDDBBB6BF84349F1481D9D50DAB356D730AB91CF88

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 711 7a0942-7a094f 712 7a0951-7a095f VirtualAlloc 711->712 713 7a0965-7a15f4 711->713 712->713 714 7a1608-7a1614 713->714 715 7a15f6-7a1602 713->715 716 7a1616-7a1622 714->716 717 7a1625-7a162e 714->717 715->714 716->717 718 7a1642-7a164e 717->718 719 7a1630-7a163c 717->719 720 7a165c-7a167b 718->720 721 7a1650-7a1656 718->721 719->718 722 7a168f-7a169b 720->722 723 7a167d-7a1689 720->723 721->720 724 7a16af-7a16bb 722->724 725 7a169d-7a16a9 722->725 723->722 726 7a16cf-7a16e8 724->726 727 7a16bd-7a16c9 724->727 725->724 728 7a16ea-7a16f6 726->728 729 7a16fc-7a1715 726->729 727->726 728->729 730 7a1729-7a1748 729->730 731 7a1717-7a1723 729->731 732 7a174a-7a1756 730->732 733 7a175c-7a177b 730->733 731->730 732->733 734 7a178f-7a17ab 733->734 735 7a177d-7a1789 733->735 736 7a17bf-7a17ee 734->736 737 7a17ad-7a17b9 734->737 735->734 738 7a17fc-7a181b 736->738 739 7a17f0-7a17f9 736->739 737->736 740 7a182f-7a18a7 738->740 741 7a181d-7a1829 738->741 739->738 742 7a18bb-7a18c7 740->742 743 7a18a9-7a18b5 740->743 741->740 744 7a18db-7a190d 742->744 745 7a18c9-7a18d5 742->745 743->742 746 7a191b-7a1927 744->746 747 7a190f-7a1915 744->747 745->744 748 7a193b-7a1941 746->748 749 7a1929-7a1935 746->749 747->746 750 7a1943-7a194f 748->750 751 7a1955-7a1961 748->751 749->748 750->751 752 7a1972-7a197e 751->752 753 7a1963-7a196c 751->753 754 7a1992-7a199b 752->754 755 7a1980-7a198c 752->755 753->752 756 7a19af-7a19cb 754->756 757 7a199d-7a19a9 754->757 755->754 758 7a19df-7a19e8 756->758 759 7a19cd-7a19d9 756->759 757->756 760 7a19ea-7a19f6 758->760 761 7a19fc-7a1a35 758->761 759->758 760->761 762 7a1a49-7a1a65 761->762 763 7a1a37-7a1a43 761->763 764 7a1a79-7a1abe 762->764 765 7a1a67-7a1a73 762->765 763->762 766 7a1ad2-7a1b1e 764->766 767 7a1ac0-7a1acc 764->767 765->764 768 7a1b32-7a1b3b 766->768 769 7a1b20-7a1b2c 766->769 767->766 770 7a1b4f-7a1b81 768->770 771 7a1b3d-7a1b49 768->771 769->768 772 7a1b83-7a1b8f 770->772 773 7a1b95-7a1bb1 770->773 771->770 772->773 774 7a1bb3-7a1bbf 773->774 775 7a1bc5-7a1be4 773->775 774->775 776 7a1be6-7a1bef 775->776 777 7a1bf5-7a1c3a 775->777 776->777 778 7a1c48-7a1c67 777->778 779 7a1c3c-7a1c45 777->779 780 7a1c78-7a1c84 778->780 781 7a1c69-7a1c72 778->781 779->778 782 7a1c98-7a1ca1 780->782 783 7a1c86-7a1c92 780->783 781->780 784 7a1ca3-7a1caf 782->784 785 7a1cb5-7a1cbe 782->785 783->782 784->785 786 7a1ccf-7a1cd8 785->786 787 7a1cc0-7a1cc9 785->787 788 7a1cda-7a1ce6 786->788 789 7a1cec-7a1cf8 786->789 787->786 788->789 790 7a1cfa-7a1d06 789->790 791 7a1d0c-7a1d18 789->791 790->791 792 7a1d1a-7a1d26 791->792 793 7a1d2c-7a1d45 791->793 792->793 794 7a1d59-7a1d75 793->794 795 7a1d47-7a1d53 793->795 796 7a1d89-7a1db8 794->796 797 7a1d77-7a1d83 794->797 795->794 798 7a1dba-7a1dc3 796->798 799 7a1dc9-7a1de8 796->799 797->796 798->799 800 7a1dea-7a1df6 799->800 801 7a1dfc-7a1e08 799->801 800->801 802 7a1e0a-7a1e13 801->802 803 7a1e19-7a1e22 801->803 802->803 804 7a1e36-7a1e42 803->804 805 7a1e24-7a1e30 803->805 806 7a1e56-7a1e62 804->806 807 7a1e44-7a1e50 804->807 805->804 808 7a1e76-7a1e82 806->808 809 7a1e64-7a1e70 806->809 807->806 810 7a1e93-7a1e9f 808->810 811 7a1e84-7a1e8d 808->811 809->808 812 7a1eb0-7a1f1b 810->812 813 7a1ea1-7a1eaa 810->813 811->810 814 7a1f2c-7a1f45 812->814 815 7a1f1d-7a1f26 812->815 813->812 816 7a1f56-7a1f6f 814->816 817 7a1f47-7a1f50 814->817 815->814 818 7a1f7d-7a1f89 816->818 819 7a1f71-7a1f7a 816->819 817->816 820 7a1f8b-7a1f97 818->820 821 7a1f9d-7a1fb9 818->821 819->818 820->821 822 7a1fbb-7a1fc7 821->822 823 7a1fcd-7a1fd9 821->823 822->823 824 7a1fdb-7a1fe7 823->824 825 7a1fed-7a1ff9 823->825 824->825 826 7a1ffb-7a2007 825->826 827 7a200d-7a2019 825->827 826->827 828 7a201b-7a2027 827->828 829 7a202d-7a2039 827->829 828->829 830 7a203b-7a2047 829->830 831 7a204d-7a25fd 829->831 830->831
    APIs
    • VirtualAlloc.KERNEL32(00000000,000000D5,00001000,00000004), ref: 007A095F
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: ef74b55320617192862ccbed7205ab29fd65ed25cdb5208de4c74039b21e10a6
    • Instruction ID: 7560625ab9dc05fce6ddf7a83cd13b096130cac960ca4cc8a6dfdd1b2a3cb102
    • Opcode Fuzzy Hash: ef74b55320617192862ccbed7205ab29fd65ed25cdb5208de4c74039b21e10a6
    • Instruction Fuzzy Hash: 12132C709012299BDB69CF08CD94BDDBBB5BF88348F1481D9E50DAB356D730AA91CF48

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 832 79b342-79b34f 833 79b351-79b35c VirtualAlloc 832->833 834 79b362-79bfe5 832->834 833->834 835 79bfe7-79bff0 834->835 836 79bff6-79c01f 834->836 835->836 837 79c021-79c02d 836->837 838 79c033-79c03c 836->838 837->838 839 79c03e-79c04a 838->839 840 79c050-79c05c 838->840 839->840 841 79c05e-79c06a 840->841 842 79c070-79c0a2 840->842 841->842 843 79c0a4-79c0b0 842->843 844 79c0b6-79c0c2 842->844 843->844 845 79c0c4-79c0d0 844->845 846 79c0d6-79c0f2 844->846 845->846 847 79c0f4-79c100 846->847 848 79c106-79c148 846->848 847->848 849 79c159-79c188 848->849 850 79c14a-79c156 848->850 851 79c18a-79c196 849->851 852 79c19c-79c1a5 849->852 850->849 851->852 853 79c1a7-79c1b0 852->853 854 79c1b6-79c1c2 852->854 853->854 855 79c1d3-79c1df 854->855 856 79c1c4-79c1cd 854->856 857 79c1e1-79c1ed 855->857 858 79c1f3-79c1ff 855->858 856->855 857->858 859 79c20d-79c219 858->859 860 79c201-79c20a 858->860 861 79c21b-79c227 859->861 862 79c22a-79c27c 859->862 860->859 861->862 863 79c27e-79c28a 862->863 864 79c290-79c29c 862->864 863->864 865 79c29e-79c2aa 864->865 866 79c2b0-79c2bc 864->866 865->866 867 79c2be-79c2ca 866->867 868 79c2d0-79c2ef 866->868 867->868 869 79c2f1-79c2fd 868->869 870 79c303-79c335 868->870 869->870 871 79c349-79c355 870->871 872 79c337-79c343 870->872 873 79c369-79c372 871->873 874 79c357-79c363 871->874 872->871 875 79c383-79c38f 873->875 876 79c374-79c37d 873->876 874->873 877 79c391-79c39a 875->877 878 79c3a0-79c3ac 875->878 876->875 877->878 879 79c3bd-79c3c6 878->879 880 79c3ae-79c3ba 878->880 881 79c3c8-79c3d4 879->881 882 79c3da-79c409 879->882 880->879 881->882 883 79c40b-79c417 882->883 884 79c41a-79c426 882->884 883->884 885 79c428-79c434 884->885 886 79c43a-79c446 884->886 885->886 887 79c448-79c454 886->887 888 79c457-79c483 886->888 887->888 889 79c485-79c491 888->889 890 79c497-79c4cd 888->890 889->890 891 79c4cf-79c4d8 890->891 892 79c4de-79c4ea 890->892 891->892 893 79c4fb-79c52a 892->893 894 79c4ec-79c4f5 892->894 895 79c53b-79c554 893->895 896 79c52c-79c535 893->896 894->893 897 79c565-79c584 895->897 898 79c556-79c55f 895->898 896->895 899 79c598-79c5a4 897->899 900 79c586-79c592 897->900 898->897 901 79c5b8-79c640 899->901 902 79c5a6-79c5b2 899->902 900->899 903 79c642-79c64e 901->903 904 79c654-79c686 901->904 902->901 903->904 905 79c688-79c691 904->905 906 79c697-79c6c9 904->906 905->906 907 79c6cb-79c6d7 906->907 908 79c6dd-79c6e9 906->908 907->908 909 79c6eb-79c6f7 908->909 910 79c6fd-79c713 908->910 909->910 911 79c715-79c721 910->911 912 79c727-79c743 910->912 911->912 913 79c745-79c751 912->913 914 79c757-79c763 912->914 913->914 915 79c765-79c76e 914->915 916 79c774-79c780 914->916 915->916 917 79c791-79c79d 916->917 918 79c782-79c78e 916->918 919 79c79f-79c7ab 917->919 920 79c7b1-79c82c 917->920 918->917 919->920 921 79c82e-79c83a 920->921 922 79c840-79c849 920->922 921->922 923 79c84b-79c857 922->923 924 79c85d-79c89f 922->924 923->924 925 79c8a1-79c8ad 924->925 926 79c8b3-79c8cf 924->926 925->926 927 79c8d1-79c8dd 926->927 928 79c8e3-79c902 926->928 927->928 929 79c913-79c932 928->929 930 79c904-79c90d 928->930 931 79c943-79c975 929->931 932 79c934-79c93d 929->932 930->929 933 79c989-79c995 931->933 934 79c977-79c983 931->934 932->931 935 79c9a9-79c9c5 933->935 936 79c997-79c9a3 933->936 934->933 937 79c9d9-79c9f5 935->937 938 79c9c7-79c9d3 935->938 936->935 939 79c9f7-79ca00 937->939 940 79ca06-79ca25 937->940 938->937 939->940 941 79ca39-79cfec 940->941 942 79ca27-79ca33 940->942 942->941
    APIs
    • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0079B35C
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 54907d4ed6f6e3467cc576293e85d5bba377ddc6a4cf020fbb2c1d42d024a6f1
    • Instruction ID: a58b2ec191540d84a5dd12ea7064a8fb86ce9a2b5a24eb466b1b688c042848c2
    • Opcode Fuzzy Hash: 54907d4ed6f6e3467cc576293e85d5bba377ddc6a4cf020fbb2c1d42d024a6f1
    • Instruction Fuzzy Hash: EB134D709011289BDB69CF08DD94BDCBBB6BF84349F1482D9D50DAB356D730AA91CF88

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 943 7913d2-7913e2 944 7913f8-79211c 943->944 945 7913e4-7913f2 VirtualAlloc 943->945 946 79211e-79212a 944->946 947 792130-7921cb 944->947 945->944 946->947 948 7921cd-7921d9 947->948 949 7921dc-7921e8 947->949 948->949 950 7921ea-7921f6 949->950 951 7921fc-79221b 949->951 950->951 952 79221d-792229 951->952 953 79222f-79229e 951->953 952->953 954 7922af-7922bb 953->954 955 7922a0-7922ac 953->955 956 7922bd-7922c9 954->956 957 7922cf-7922eb 954->957 955->954 956->957 958 7922ed-7922f9 957->958 959 7922ff-79230b 957->959 958->959 960 79230d-792319 959->960 961 79231f-79232b 959->961 960->961 962 79232d-792339 961->962 963 79233f-792371 961->963 962->963 964 792373-79237f 963->964 965 792385-7923a4 963->965 964->965 966 7923b8-79240d 965->966 967 7923a6-7923b2 965->967 968 79240f-79241b 966->968 969 792421-79242a 966->969 967->966 968->969 970 79242c-792438 969->970 971 79243e-7924a6 969->971 970->971 972 7924a8-7924b4 971->972 973 7924ba-7924c6 971->973 972->973 974 7924c8-7924d4 973->974 975 7924da-7924e6 973->975 974->975 976 7924e8-7924f1 975->976 977 7924f7-792529 975->977 976->977 978 79252b-792534 977->978 979 79253a-792546 977->979 978->979 980 792548-792554 979->980 981 79255a-792563 979->981 980->981 982 792565-792571 981->982 983 792574-7925df 981->983 982->983 984 7925e1-7925ea 983->984 985 7925f0-79260f 983->985 984->985 986 792611-79261d 985->986 987 792623-79262f 985->987 986->987 988 792631-79263d 987->988 989 792640-79266c 987->989 988->989 990 79266e-79267a 989->990 991 792680-7926a6 989->991 990->991 992 7926a8-7926b4 991->992 993 7926ba-7926c6 991->993 992->993 994 7926c8-7926d4 993->994 995 7926d7-7926e3 993->995 994->995 996 7926e5-7926ee 995->996 997 7926f4-792739 995->997 996->997 998 79273b-792744 997->998 999 792747-792760 997->999 998->999 1000 792762-79276e 999->1000 1001 792774-792780 999->1001 1000->1001 1002 792782-79278e 1001->1002 1003 792794-7927b3 1001->1003 1002->1003 1004 7927b5-7927c1 1003->1004 1005 7927c7-7927f6 1003->1005 1004->1005 1006 7927f8-792801 1005->1006 1007 792807-792849 1005->1007 1006->1007 1008 79284b-792854 1007->1008 1009 792857-792863 1007->1009 1008->1009 1010 792865-792871 1009->1010 1011 792877-7928a9 1009->1011 1010->1011 1012 7928ab-7928b4 1011->1012 1013 7928ba-7928c3 1011->1013 1012->1013 1014 7928d1-7928ed 1013->1014 1015 7928c5-7928ce 1013->1015 1016 7928ef-7928fb 1014->1016 1017 792901-79290d 1014->1017 1015->1014 1016->1017 1018 79290f-79291b 1017->1018 1019 792921-79293a 1017->1019 1018->1019 1020 79293c-792948 1019->1020 1021 79294e-792993 1019->1021 1020->1021 1022 792995-7929a1 1021->1022 1023 7929a7-7929b0 1021->1023 1022->1023 1024 7929b2-7929be 1023->1024 1025 7929c4-7929d0 1023->1025 1024->1025 1026 7929d2-7929de 1025->1026 1027 7929e4-7929f0 1025->1027 1026->1027 1028 792a01-792a43 1027->1028 1029 7929f2-7929fb 1027->1029 1030 792a45-792a51 1028->1030 1031 792a57-792a63 1028->1031 1029->1028 1030->1031 1032 792a65-792a71 1031->1032 1033 792a77-792a93 1031->1033 1032->1033 1034 792a95-792aa1 1033->1034 1035 792aa7-792ac3 1033->1035 1034->1035 1036 792ac5-792ad1 1035->1036 1037 792ad7-792ae3 1035->1037 1036->1037 1038 792ae5-792af1 1037->1038 1039 792af7-792b16 1037->1039 1038->1039 1040 792b18-792b21 1039->1040 1041 792b24-7930c4 1039->1041 1040->1041
    APIs
    • VirtualAlloc.KERNEL32(00000000,0000009E,00001000,00000004), ref: 007913F2
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 86968a3957e8cc3cd70d8444a9fe91604947625c44eab641b4986f754c2ffebe
    • Instruction ID: d45ca6791911ad2428259630704d1934c3cf442826b5f258def718d5783e99a7
    • Opcode Fuzzy Hash: 86968a3957e8cc3cd70d8444a9fe91604947625c44eab641b4986f754c2ffebe
    • Instruction Fuzzy Hash: C9134A719012289BCB69CF08DD95BDCBBB5BF48348F1481D9E50DAB356D730AA91CF88

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1042 794982-794992 1043 7949a8-79562f 1042->1043 1044 794994-7949a2 VirtualAlloc 1042->1044 1045 795631-79563d 1043->1045 1046 795643-79564f 1043->1046 1044->1043 1045->1046 1047 795651-79565d 1046->1047 1048 795663-79566f 1046->1048 1047->1048 1049 795671-79567d 1048->1049 1050 795683-79568f 1048->1050 1049->1050 1051 795691-79569a 1050->1051 1052 7956a0-795705 1050->1052 1051->1052 1053 795707-795713 1052->1053 1054 795716-795722 1052->1054 1053->1054 1055 795724-795730 1054->1055 1056 795736-795762 1054->1056 1055->1056 1057 795764-795770 1056->1057 1058 795776-795782 1056->1058 1057->1058 1059 795790-7957c2 1058->1059 1060 795784-79578d 1058->1060 1061 7957c4-7957d0 1059->1061 1062 7957d6-7957e2 1059->1062 1060->1059 1061->1062 1063 7957e4-7957f0 1062->1063 1064 7957f6-795815 1062->1064 1063->1064 1065 795817-795823 1064->1065 1066 795826-795845 1064->1066 1065->1066 1067 795847-795850 1066->1067 1068 795856-795862 1066->1068 1067->1068 1069 795873-7958b2 1068->1069 1070 795864-79586d 1068->1070 1071 7958b4-7958c0 1069->1071 1072 7958c6-7958d2 1069->1072 1070->1069 1071->1072 1073 7958d4-7958e0 1072->1073 1074 7958e6-7958f2 1072->1074 1073->1074 1075 7958f4-795900 1074->1075 1076 795906-795922 1074->1076 1075->1076 1077 795933-79594f 1076->1077 1078 795924-79592d 1076->1078 1079 795951-79595d 1077->1079 1080 795963-795992 1077->1080 1078->1077 1079->1080 1081 795994-7959a0 1080->1081 1082 7959a6-7959d5 1080->1082 1081->1082 1083 7959e9-795a18 1082->1083 1084 7959d7-7959e3 1082->1084 1085 795a1a-795a26 1083->1085 1086 795a2c-795a84 1083->1086 1084->1083 1085->1086 1087 795a98-795ac7 1086->1087 1088 795a86-795a92 1086->1088 1089 795ac9-795ad2 1087->1089 1090 795ad8-795af7 1087->1090 1088->1087 1089->1090 1091 795af9-795b05 1090->1091 1092 795b0b-795b17 1090->1092 1091->1092 1093 795b19-795b25 1092->1093 1094 795b2b-795b37 1092->1094 1093->1094 1095 795b39-795b45 1094->1095 1096 795b4b-795b67 1094->1096 1095->1096 1097 795b69-795b72 1096->1097 1098 795b78-795b84 1096->1098 1097->1098 1099 795b98-795ba1 1098->1099 1100 795b86-795b92 1098->1100 1101 795ba3-795baf 1099->1101 1102 795bb5-795bc1 1099->1102 1100->1099 1101->1102 1103 795bc3-795bcf 1102->1103 1104 795bd5-795c1a 1102->1104 1103->1104 1105 795c1c-795c28 1104->1105 1106 795c2e-795c3a 1104->1106 1105->1106 1107 795c3c-795c48 1106->1107 1108 795c4e-795ccd 1106->1108 1107->1108 1109 795cdb-795ce7 1108->1109 1110 795ccf-795cd5 1108->1110 1111 795ce9-795cf5 1109->1111 1112 795cfb-795d04 1109->1112 1110->1109 1111->1112 1113 795d12-795d2e 1112->1113 1114 795d06-795d0c 1112->1114 1115 795d30-795d3c 1113->1115 1116 795d42-795d91 1113->1116 1114->1113 1115->1116 1117 795d93-795d9f 1116->1117 1118 795da5-795dc4 1116->1118 1117->1118 1119 795dd8-795e2d 1118->1119 1120 795dc6-795dd2 1118->1120 1121 795e2f-795e3b 1119->1121 1122 795e41-795e4a 1119->1122 1120->1119 1121->1122 1123 795e4c-795e58 1122->1123 1124 795e5e-795e7d 1122->1124 1123->1124 1125 795e7f-795e8b 1124->1125 1126 795e91-795edd 1124->1126 1125->1126 1127 795edf-795eeb 1126->1127 1128 795ef1-795f0d 1126->1128 1127->1128 1129 795f0f-795f1b 1128->1129 1130 795f1e-795f3a 1128->1130 1129->1130 1131 795f3c-795f48 1130->1131 1132 795f4e-795f57 1130->1132 1131->1132 1133 795f59-795f62 1132->1133 1134 795f68-795f74 1132->1134 1133->1134 1135 795f88-795f91 1134->1135 1136 795f76-795f82 1134->1136 1137 795f93-795f9f 1135->1137 1138 795fa5-795fb1 1135->1138 1136->1135 1137->1138 1139 795fb3-795fbf 1138->1139 1140 795fc5-795fe1 1138->1140 1139->1140 1141 795fe3-795fef 1140->1141 1142 795ff5-796014 1140->1142 1141->1142 1143 796028-796034 1142->1143 1144 796016-796022 1142->1144 1145 796048-796054 1143->1145 1146 796036-796042 1143->1146 1144->1143 1147 796065-796618 1145->1147 1148 796056-79605f 1145->1148 1146->1145 1148->1147
    APIs
    • VirtualAlloc.KERNEL32(00000000,000000BE,00001000,00000004), ref: 007949A2
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: d59b4f7a9a79709cb48b885bb91a11b17edaa2919701f8d2b3bb476890adae49
    • Instruction ID: 483f5e49c44f9b23bf973b8d08b746d6168d93457586ee73c343c5ed113bec5d
    • Opcode Fuzzy Hash: d59b4f7a9a79709cb48b885bb91a11b17edaa2919701f8d2b3bb476890adae49
    • Instruction Fuzzy Hash: 99134D709011289BDB69CF08DD94B9DBBB6BF84349F1482D9D50DAB346D730AA91CF88

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1149 78c2b2-78c2c2 1150 78c2d8-78cf46 1149->1150 1151 78c2c4-78c2d2 VirtualAlloc 1149->1151 1152 78cf48-78cf54 1150->1152 1153 78cf5a-78cf66 1150->1153 1151->1150 1152->1153 1154 78cf68-78cf74 1153->1154 1155 78cf7a-78cfbf 1153->1155 1154->1155 1156 78cfd0-78d00f 1155->1156 1157 78cfc1-78cfca 1155->1157 1158 78d011-78d01d 1156->1158 1159 78d023-78d078 1156->1159 1157->1156 1158->1159 1160 78d07a-78d086 1159->1160 1161 78d08c-78d0ab 1159->1161 1160->1161 1162 78d0ad-78d0b9 1161->1162 1163 78d0bf-78d0db 1161->1163 1162->1163 1164 78d0dd-78d0e9 1163->1164 1165 78d0ef-78d0fb 1163->1165 1164->1165 1166 78d0fd-78d109 1165->1166 1167 78d10f-78d1aa 1165->1167 1166->1167 1168 78d1ac-78d1b8 1167->1168 1169 78d1be-78d1da 1167->1169 1168->1169 1170 78d1dc-78d1e8 1169->1170 1171 78d1ee-78d1fa 1169->1171 1170->1171 1172 78d1fc-78d208 1171->1172 1173 78d20e-78d22d 1171->1173 1172->1173 1174 78d23b-78d257 1173->1174 1175 78d22f-78d235 1173->1175 1176 78d259-78d265 1174->1176 1177 78d26b-78d287 1174->1177 1175->1174 1176->1177 1178 78d298-78d2b7 1177->1178 1179 78d289-78d292 1177->1179 1180 78d2c8-78d2f1 1178->1180 1181 78d2b9-78d2c5 1178->1181 1179->1178 1182 78d2f3-78d2ff 1180->1182 1183 78d305-78d321 1180->1183 1181->1180 1182->1183 1184 78d323-78d32f 1183->1184 1185 78d335-78d341 1183->1185 1184->1185 1186 78d343-78d34f 1185->1186 1187 78d355-78d387 1185->1187 1186->1187 1188 78d398-78d3c7 1187->1188 1189 78d389-78d395 1187->1189 1190 78d3c9-78d3d5 1188->1190 1191 78d3db-78d459 1188->1191 1189->1188 1190->1191 1192 78d45b-78d467 1191->1192 1193 78d46d-78d476 1191->1193 1192->1193 1194 78d478-78d484 1193->1194 1195 78d48a-78d493 1193->1195 1194->1195 1196 78d495-78d4a1 1195->1196 1197 78d4a7-78d4b0 1195->1197 1196->1197 1198 78d4b2-78d4be 1197->1198 1199 78d4c4-78d4dd 1197->1199 1198->1199 1200 78d4ee-78d520 1199->1200 1201 78d4df-78d4e8 1199->1201 1202 78d522-78d52e 1200->1202 1203 78d534-78d550 1200->1203 1201->1200 1202->1203 1204 78d552-78d55e 1203->1204 1205 78d564-78d5a9 1203->1205 1204->1205 1206 78d5ab-78d5b7 1205->1206 1207 78d5bd-78d5c9 1205->1207 1206->1207 1208 78d5cb-78d5d7 1207->1208 1209 78d5dd-78d60f 1207->1209 1208->1209 1210 78d611-78d61d 1209->1210 1211 78d623-78d62c 1209->1211 1210->1211 1212 78d62e-78d63a 1211->1212 1213 78d640-78d649 1211->1213 1212->1213 1214 78d65a-78d679 1213->1214 1215 78d64b-78d654 1213->1215 1216 78d67b-78d687 1214->1216 1217 78d68d-78d699 1214->1217 1215->1214 1216->1217 1218 78d69b-78d6a7 1217->1218 1219 78d6ad-78d6d3 1217->1219 1218->1219 1220 78d6e4-78d6f0 1219->1220 1221 78d6d5-78d6de 1219->1221 1222 78d6f2-78d6fe 1220->1222 1223 78d704-78d710 1220->1223 1221->1220 1222->1223 1224 78d721-78d750 1223->1224 1225 78d712-78d71b 1223->1225 1226 78d752-78d75e 1224->1226 1227 78d764-78d793 1224->1227 1225->1224 1226->1227 1228 78d7a4-78d7ad 1227->1228 1229 78d795-78d79e 1227->1229 1230 78d7af-78d7bb 1228->1230 1231 78d7c1-78d7cd 1228->1231 1229->1228 1230->1231 1232 78d7cf-78d7db 1231->1232 1233 78d7e1-78d800 1231->1233 1232->1233 1234 78d802-78d80e 1233->1234 1235 78d814-78d81d 1233->1235 1234->1235 1236 78d82e-78d84a 1235->1236 1237 78d81f-78d82b 1235->1237 1238 78d85b-78d887 1236->1238 1239 78d84c-78d855 1236->1239 1237->1236 1240 78d889-78d895 1238->1240 1241 78d89b-78d8a7 1238->1241 1239->1238 1240->1241 1242 78d8b8-78d8c1 1241->1242 1243 78d8a9-78d8b5 1241->1243 1244 78d8d2-78d8de 1242->1244 1245 78d8c3-78d8cf 1242->1245 1243->1242 1246 78d8e0-78d8ec 1244->1246 1247 78d8f2-78de92 1244->1247 1245->1244 1246->1247
    APIs
    • VirtualAlloc.KERNEL32(00000000,0000010C,00001000,00000004), ref: 0078C2D2
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 88537b647c7e6074c9c4e37c9926deb876b4e393bc6b30e9741a25a32368b849
    • Instruction ID: a9427460b799ec06383e2a5480e07a95c75885a612bd899009249a5e1af7a02c
    • Opcode Fuzzy Hash: 88537b647c7e6074c9c4e37c9926deb876b4e393bc6b30e9741a25a32368b849
    • Instruction Fuzzy Hash: 67132C709012299BDB69CF08CD94BEDBBB5BF44348F1481D9E50DAB356D730AA91CF88

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1343 79eec2-79eecf 1344 79eed1-79eedf VirtualAlloc 1343->1344 1345 79eee5-79fbaa 1343->1345 1344->1345 1346 79fbac-79fbb8 1345->1346 1347 79fbbe-79fbe4 1345->1347 1346->1347 1348 79fbf8-79fc01 1347->1348 1349 79fbe6-79fbf2 1347->1349 1350 79fc03-79fc0f 1348->1350 1351 79fc15-79fc1e 1348->1351 1349->1348 1350->1351 1352 79fc20-79fc2c 1351->1352 1353 79fc32-79fc64 1351->1353 1352->1353 1354 79fc78-79fc81 1353->1354 1355 79fc66-79fc72 1353->1355 1356 79fc83-79fc8c 1354->1356 1357 79fc92-79fc9e 1354->1357 1355->1354 1356->1357 1358 79fca0-79fcac 1357->1358 1359 79fcb2-79fcbe 1357->1359 1358->1359 1360 79fcc0-79fccc 1359->1360 1361 79fcd2-79fcf1 1359->1361 1360->1361 1362 79fcf3-79fcff 1361->1362 1363 79fd05-79fd24 1361->1363 1362->1363 1364 79fd35-79fd74 1363->1364 1365 79fd26-79fd32 1363->1365 1366 79fd88-79fdca 1364->1366 1367 79fd76-79fd82 1364->1367 1365->1364 1368 79fddb-79fe07 1366->1368 1369 79fdcc-79fdd5 1366->1369 1367->1366 1370 79fe09-79fe12 1368->1370 1371 79fe18-79fe34 1368->1371 1369->1368 1370->1371 1372 79fe45-79fe74 1371->1372 1373 79fe36-79fe3f 1371->1373 1374 79fe88-79fe94 1372->1374 1375 79fe76-79fe82 1372->1375 1373->1372 1376 79fea5-79fec1 1374->1376 1377 79fe96-79fe9f 1374->1377 1375->1374 1378 79fec3-79fecf 1376->1378 1379 79fed5-79ff07 1376->1379 1377->1376 1378->1379 1380 79ff09-79ff15 1379->1380 1381 79ff1b-79ff3a 1379->1381 1380->1381 1382 79ff3c-79ff48 1381->1382 1383 79ff4e-79ff57 1381->1383 1382->1383 1384 79ff59-79ff65 1383->1384 1385 79ff6b-79ff77 1383->1385 1384->1385 1386 79ff79-79ff82 1385->1386 1387 79ff88-79ffa7 1385->1387 1386->1387 1388 79ffa9-79ffb2 1387->1388 1389 79ffb8-79ffc4 1387->1389 1388->1389 1390 79ffd2-79ffde 1389->1390 1391 79ffc6-79ffcc 1389->1391 1392 79ffef-79fffb 1390->1392 1393 79ffe0-79ffec 1390->1393 1391->1390 1394 79fffd-7a0009 1392->1394 1395 7a000f-7a001b 1392->1395 1393->1392 1394->1395 1396 7a002c-7a0045 1395->1396 1397 7a001d-7a0026 1395->1397 1398 7a0056-7a0062 1396->1398 1399 7a0047-7a0050 1396->1399 1397->1396 1400 7a0076-7a00b5 1398->1400 1401 7a0064-7a0070 1398->1401 1399->1398 1402 7a00c9-7a00e2 1400->1402 1403 7a00b7-7a00c3 1400->1403 1401->1400 1404 7a00f6-7a00ff 1402->1404 1405 7a00e4-7a00f0 1402->1405 1403->1402 1406 7a0110-7a011c 1404->1406 1407 7a0101-7a010a 1404->1407 1405->1404 1408 7a011e-7a012a 1406->1408 1409 7a012d-7a014c 1406->1409 1407->1406 1408->1409 1410 7a014e-7a015a 1409->1410 1411 7a0160-7a017f 1409->1411 1410->1411 1412 7a0193-7a01c2 1411->1412 1413 7a0181-7a018d 1411->1413 1414 7a01d3-7a01df 1412->1414 1415 7a01c4-7a01cd 1412->1415 1413->1412 1416 7a01f3-7a01ff 1414->1416 1417 7a01e1-7a01ed 1414->1417 1415->1414 1418 7a0213-7a0268 1416->1418 1419 7a0201-7a020d 1416->1419 1417->1416 1420 7a026a-7a0276 1418->1420 1421 7a027c-7a0285 1418->1421 1419->1418 1420->1421 1422 7a0296-7a02fe 1421->1422 1423 7a0287-7a0293 1421->1423 1424 7a0312-7a0354 1422->1424 1425 7a0300-7a030c 1422->1425 1423->1422 1426 7a0356-7a0362 1424->1426 1427 7a0365-7a0371 1424->1427 1425->1424 1426->1427 1428 7a0373-7a037f 1427->1428 1429 7a0385-7a0925 1427->1429 1428->1429
    APIs
    • VirtualAlloc.KERNEL32(00000000,000000DD,00001000,00000004), ref: 0079EEDF
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: b6bb2ccbaaec487e9e6d9ac6b0353434e7e2cedece5744b86d92a2edd794861b
    • Instruction ID: bd6e0630745fa1277f2bb8f2d842732093fd9a04d0a4b6f1e4bcb8b1ef4981a3
    • Opcode Fuzzy Hash: b6bb2ccbaaec487e9e6d9ac6b0353434e7e2cedece5744b86d92a2edd794861b
    • Instruction Fuzzy Hash: 48033F709011299BDB68CF08CD94BDDBBB6BF84349F1482D9D50DAB356D730AA91CF88

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1248 77a282-77a28f 1249 77a2a5-77af69 1248->1249 1250 77a291-77a29f VirtualAlloc 1248->1250 1251 77af7d-77af89 1249->1251 1252 77af6b-77af77 1249->1252 1250->1249 1253 77af8b-77af94 1251->1253 1254 77af9a-77afb9 1251->1254 1252->1251 1253->1254 1255 77afcd-77afd9 1254->1255 1256 77afbb-77afc7 1254->1256 1257 77afed-77aff9 1255->1257 1258 77afdb-77afe7 1255->1258 1256->1255 1259 77b00d-77b016 1257->1259 1260 77affb-77b007 1257->1260 1258->1257 1261 77b02a-77b046 1259->1261 1262 77b018-77b024 1259->1262 1260->1259 1263 77b05a-77b066 1261->1263 1264 77b048-77b054 1261->1264 1262->1261 1265 77b07a-77b086 1263->1265 1266 77b068-77b074 1263->1266 1264->1263 1267 77b097-77b0a3 1265->1267 1268 77b088-77b094 1265->1268 1266->1265 1269 77b0b7-77b0d6 1267->1269 1270 77b0a5-77b0b1 1267->1270 1268->1267 1271 77b0e7-77b0f3 1269->1271 1272 77b0d8-77b0e1 1269->1272 1270->1269 1273 77b107-77b149 1271->1273 1274 77b0f5-77b101 1271->1274 1272->1271 1275 77b15d-77b17c 1273->1275 1276 77b14b-77b157 1273->1276 1274->1273 1277 77b190-77b19c 1275->1277 1278 77b17e-77b18a 1275->1278 1276->1275 1279 77b1b0-77b1bc 1277->1279 1280 77b19e-77b1aa 1277->1280 1278->1277 1281 77b1be-77b1c7 1279->1281 1282 77b1cd-77b1d9 1279->1282 1280->1279 1281->1282 1283 77b1ed-77b209 1282->1283 1284 77b1db-77b1e7 1282->1284 1285 77b21d-77b249 1283->1285 1286 77b20b-77b217 1283->1286 1284->1283 1287 77b25d-77b269 1285->1287 1288 77b24b-77b257 1285->1288 1286->1285 1289 77b26b-77b274 1287->1289 1290 77b27a-77b283 1287->1290 1288->1287 1289->1290 1291 77b297-77b2b3 1290->1291 1292 77b285-77b291 1290->1292 1293 77b2c7-77b2f6 1291->1293 1294 77b2b5-77b2c1 1291->1294 1292->1291 1295 77b30a-77b313 1293->1295 1296 77b2f8-77b304 1293->1296 1294->1293 1297 77b327-77b333 1295->1297 1298 77b315-77b321 1295->1298 1296->1295 1299 77b347-77b353 1297->1299 1300 77b335-77b341 1297->1300 1298->1297 1301 77b367-77b373 1299->1301 1302 77b355-77b361 1299->1302 1300->1299 1303 77b387-77b3cc 1301->1303 1304 77b375-77b381 1301->1304 1302->1301 1305 77b3e0-77b3ec 1303->1305 1306 77b3ce-77b3da 1303->1306 1304->1303 1307 77b3ee-77b3f7 1305->1307 1308 77b3fd-77b409 1305->1308 1306->1305 1307->1308 1309 77b40b-77b414 1308->1309 1310 77b41a-77b44c 1308->1310 1309->1310 1311 77b460-77b48f 1310->1311 1312 77b44e-77b45a 1310->1312 1313 77b4a3-77b4bf 1311->1313 1314 77b491-77b49d 1311->1314 1312->1311 1315 77b4c1-77b4ca 1313->1315 1316 77b4d0-77b4ef 1313->1316 1314->1313 1315->1316 1317 77b503-77b50c 1316->1317 1318 77b4f1-77b4fd 1316->1318 1319 77b520-77b529 1317->1319 1320 77b50e-77b51a 1317->1320 1318->1317 1321 77b53d-77b556 1319->1321 1322 77b52b-77b537 1319->1322 1320->1319 1323 77b56a-77b583 1321->1323 1324 77b558-77b564 1321->1324 1322->1321 1325 77b597-77b5c6 1323->1325 1326 77b585-77b591 1323->1326 1324->1323 1327 77b5da-77b5e6 1325->1327 1328 77b5c8-77b5d4 1325->1328 1326->1325 1329 77b5f7-77b603 1327->1329 1330 77b5e8-77b5f4 1327->1330 1328->1327 1331 77b617-77b65c 1329->1331 1332 77b605-77b611 1329->1332 1330->1329 1333 77b65e-77b667 1331->1333 1334 77b66a-77b676 1331->1334 1332->1331 1333->1334 1335 77b68a-77b6e2 1334->1335 1336 77b678-77b684 1334->1336 1337 77b6f6-77b702 1335->1337 1338 77b6e4-77b6f0 1335->1338 1336->1335 1339 77b716-77b71f 1337->1339 1340 77b704-77b710 1337->1340 1338->1337 1341 77b733-77bcd3 1339->1341 1342 77b721-77b72d 1339->1342 1340->1339 1342->1341
    APIs
    • VirtualAlloc.KERNEL32(00000000,00000098,00001000,00000004), ref: 0077A29F
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: c6db90cfb276ba4a49809ad35bbe09fbd641879b7b3643afda5a861a8ba6cc85
    • Instruction ID: a106854258a7af08f6e37882bed854ee6e228bef7986de2670836a82f8a5bc67
    • Opcode Fuzzy Hash: c6db90cfb276ba4a49809ad35bbe09fbd641879b7b3643afda5a861a8ba6cc85
    • Instruction Fuzzy Hash: 9A033F709011289BDB69CF08CD94BDDBBB6BF84349F1482D9D54DAB346D730AA91CF88
    APIs
    • VirtualAlloc.KERNEL32(00000000,00000088,00001000,00000004), ref: 007875A2
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 36198adadb680999069345f051bd1b32994855e5032f004fe61c5a69ef4ffd6e
    • Instruction ID: 684b8447fc6b2b2115c497e757c4fa1ff2ba6996c40512a43f651e86379adc09
    • Opcode Fuzzy Hash: 36198adadb680999069345f051bd1b32994855e5032f004fe61c5a69ef4ffd6e
    • Instruction Fuzzy Hash: D0033F709011299BCB68CF08CD94BDDBBB6BF84349F1482D9D50DAB356D730AA91CF88
    APIs
    • VirtualAlloc.KERNEL32(00000000,000000DB,00001000,00000004), ref: 00797DDF
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: feb95bda0b9f1b583c46d0ec3f29066dcee9d26513474099623c73b3eeb74b9f
    • Instruction ID: 0763054f922897336c3b695466e5573d64e96b1119e8d1d5963de5a7a659d49f
    • Opcode Fuzzy Hash: feb95bda0b9f1b583c46d0ec3f29066dcee9d26513474099623c73b3eeb74b9f
    • Instruction Fuzzy Hash: C8033F709012289BDB69CF08DDA4BDDBBB5BF44348F1881D9E50DAB356D730AA91CF48
    APIs
    • VirtualAlloc.KERNEL32(00000000,00000086,00001000,00000004), ref: 0077BD0F
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: f231486b0e6904a909a0279c3af612fda6284ac8f23a4435d1500f0236a0402f
    • Instruction ID: 0bb81c680a662cfb15ddd9d1a441061e9d746ec722a4cd672c313fb4ee67d9f6
    • Opcode Fuzzy Hash: f231486b0e6904a909a0279c3af612fda6284ac8f23a4435d1500f0236a0402f
    • Instruction Fuzzy Hash: 00F23F709021299BDB65CF08CD94BDCBBB6BF84349F1482D9D50DAB356D730AA91CF88
    APIs
    • VirtualAlloc.KERNEL32(00000000,000000E1,00001000,00000004), ref: 00788F8F
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 5763fcd6c4f3cd2c6edc9dfd4c6d2779e1d8483ff28c48c47ee8c193ceb68812
    • Instruction ID: b1bfc2f9dd4fca8134159995ae5b1d45377ebb25217b49321f7a9679d31a7ab3
    • Opcode Fuzzy Hash: 5763fcd6c4f3cd2c6edc9dfd4c6d2779e1d8483ff28c48c47ee8c193ceb68812
    • Instruction Fuzzy Hash: A1F22C719012289BDB69CF08CD95BDDBBB5BF44348F1881D9E50DAB346D730AA91CF88
    APIs
    • VirtualAlloc.KERNEL32(00000000,000000BC,00001000,00000004), ref: 0078098F
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 3c0a94b87f156aed99cf6d480110563c6cbe46641c4493229cbd16636153aa47
    • Instruction ID: 024b244749d2e4740259f4ec524ade803deaf89b4dec13471571bc0acc4c31de
    • Opcode Fuzzy Hash: 3c0a94b87f156aed99cf6d480110563c6cbe46641c4493229cbd16636153aa47
    • Instruction Fuzzy Hash: 4DF231709021299BDB64CF08CD94BDDBBB6BF84349F1881D9D50DAB346D730AA91CF88
    APIs
    • VirtualAlloc.KERNEL32(00000000,0000009E,00001000,00000004), ref: 0079664F
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: fc7cd6a717d9db890970b0587fd6183609e8ca2374658964fe309e5eeae41dc9
    • Instruction ID: 812c6e58b07d90ddbbaf0b4b88945bfb65488049c828c9dcc08808611c664b99
    • Opcode Fuzzy Hash: fc7cd6a717d9db890970b0587fd6183609e8ca2374658964fe309e5eeae41dc9
    • Instruction Fuzzy Hash: 32F231709021289BDB69CF08CD94BDDBBB6BF84349F1481D9D50DAB356D730AA91CF88
    APIs
    • VirtualAlloc.KERNEL32(00000000,00000038,00001000,00000004), ref: 0078DECC
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 22c54504594a15ea54e3b305804400b49d886a9f38036a1b150e98cac3ab1f5f
    • Instruction ID: 132cba3d6ddca75d5a4f9206853a6a90f3d22786c486d9fc7f0c9f63e64f2257
    • Opcode Fuzzy Hash: 22c54504594a15ea54e3b305804400b49d886a9f38036a1b150e98cac3ab1f5f
    • Instruction Fuzzy Hash: 7BF23E719012289BDB69CF08CC95BDDBBB5BF44348F1881D9E54DAB346D730AA91CF88
    APIs
    • WSAStartup.WS2_32(00000202,?), ref: 00413058
      • Part of subcall function 00404F2C: HeapFree.KERNEL32(00000000,00000000,?,00404F0C,0041A778,?,0040F172,?,00413CC0,00000000,?,?,00413182,?), ref: 00404F40
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: FreeHeapStartup
    • String ID:
    • API String ID: 2645306408-0
    • Opcode ID: 793fe0e23c926e118c317851a62ca9fc2f271c520f6b2796c1a3be0fbcd07ad0
    • Instruction ID: 85eaebae8ecb59086afdba9375555a315fe97a6d3168c9436cec4943f927f23a
    • Opcode Fuzzy Hash: 793fe0e23c926e118c317851a62ca9fc2f271c520f6b2796c1a3be0fbcd07ad0
    • Instruction Fuzzy Hash: 9E4126729002055ADB10BBF59C067DE77B8AF04329F10467FE525F71C2DB7CAAC886A9
    APIs
    • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 004135AB
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: CrackInternet
    • String ID:
    • API String ID: 1381609488-0
    • Opcode ID: 658dbce22cafce58bf59a8bd09dcdeda872eb88c7ff47981754a46a1ee662e29
    • Instruction ID: e614fb814403e5dece979d69869864768b2494d54fb3b1e4180828ee4861d7d4
    • Opcode Fuzzy Hash: 658dbce22cafce58bf59a8bd09dcdeda872eb88c7ff47981754a46a1ee662e29
    • Instruction Fuzzy Hash: A6415F71D00209EFCB25DFA9D849AAEB7B8EF48708F04846EE115E7351D734AA91CB18
    APIs
    • LoadLibraryA.KERNEL32(?,?,?,?,?,004072F6,98ED24FB), ref: 0040526D
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 0731132f2c085ddfa4906626f7d310de20feb9acd7983381990d4f9d4327e38d
    • Instruction ID: 67fdade5f613ffbd55c1bcba6ed67b2f355c1f356c8aa0174c7c74f795b6b543
    • Opcode Fuzzy Hash: 0731132f2c085ddfa4906626f7d310de20feb9acd7983381990d4f9d4327e38d
    • Instruction Fuzzy Hash: 8B311931E006099BCB10DFA9C881BAEB7F4EF44315F2444AEE805E7281DB74AA41CF98
    APIs
    • ExpandEnvironmentStringsW.KERNEL32(?,?,00000104,?,?,00000031), ref: 00413C88
      • Part of subcall function 00405552: ShellExecuteW.SHELL32(00000000,?,?,?,00000000,00413CAA), ref: 00405584
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: EnvironmentExecuteExpandShellStrings
    • String ID:
    • API String ID: 3420131149-0
    • Opcode ID: c51505f62ae0d60d765b208fd1d9be1b0dc86cce8ea40458f69f07a3423c06be
    • Instruction ID: 7c1f23a69d59edf966e54b30518460001e067b65124b0e8b2901e75b1d68294f
    • Opcode Fuzzy Hash: c51505f62ae0d60d765b208fd1d9be1b0dc86cce8ea40458f69f07a3423c06be
    • Instruction Fuzzy Hash: 0C016272900219ABEF10B795DC45FCE737DEB44358F044177BA04F3180D678AA098BA4
    APIs
    • ShellExecuteW.SHELL32(00000000,?,?,?,00000000,00413CAA), ref: 00405584
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: ExecuteShell
    • String ID:
    • API String ID: 587946157-0
    • Opcode ID: 008b087240dcf4241beb349bef6002c78aa6b1512e1df1ad9dd9a7f0ddd57d53
    • Instruction ID: d18ec08f8543c4dbb60dbc8c47ccdfc66d3fd6096a5b5cf377363826124ae3c7
    • Opcode Fuzzy Hash: 008b087240dcf4241beb349bef6002c78aa6b1512e1df1ad9dd9a7f0ddd57d53
    • Instruction Fuzzy Hash: 98E04F369001187BEF017BD4DC06BCD7769EB48758F008135FE01B71C1D674A65586A5
    APIs
    • RtlAllocateHeap.NTDLL(00000008,-00000004), ref: 00404EC3
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocateHeap
    • String ID:
    • API String ID: 1279760036-0
    • Opcode ID: 8de547f49fd63792ecd1c3ec1873396ff74d5ae091e0cf02c82d7f9a26d6e923
    • Instruction ID: 46188779325abd20179e1254f5e46e5fa802359deee1d993e7d5786f3ad3df08
    • Opcode Fuzzy Hash: 8de547f49fd63792ecd1c3ec1873396ff74d5ae091e0cf02c82d7f9a26d6e923
    • Instruction Fuzzy Hash: 6FC08031240208BBFA100B55FC06FE3379CE750619F048071FD0CD9650D731FC504585
    APIs
      • Part of subcall function 00413010: WSAStartup.WS2_32(00000202,?), ref: 00413058
    • CoInitializeEx.COMBASE(00000000,00000002), ref: 00413B7B
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: InitializeStartup
    • String ID:
    • API String ID: 757567358-0
    • Opcode ID: 5fec628b651680302c66f62c61b06849b678b99d9a90760234df615ded1974c9
    • Instruction ID: 6401bba1a63e528685dd402c426a869b913f33cdd7edc6ad85fc1aed2aa27d7e
    • Opcode Fuzzy Hash: 5fec628b651680302c66f62c61b06849b678b99d9a90760234df615ded1974c9
    • Instruction Fuzzy Hash: 92C08C723C830024F1383BB26C0BF4C0680CB04B2AF30042FF201380C39EAEAD90046E
    APIs
      • Part of subcall function 00413CAF: CreateMutexA.KERNEL32(00000000,00000001,?), ref: 00413CD6
      • Part of subcall function 00413CAF: ExitProcess.KERNEL32 ref: 00413CEC
    • ExitProcess.KERNEL32 ref: 00413EB7
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: ExitProcess$CreateMutex
    • String ID:
    • API String ID: 876306376-0
    • Opcode ID: d563ec539f073a063a248b7edb6121168ff304b69d91af3401d83f336c15bb41
    • Instruction ID: f214b6c546d575785904b22b39ee5774269018132e23d6b5c8a454dc11483360
    • Opcode Fuzzy Hash: d563ec539f073a063a248b7edb6121168ff304b69d91af3401d83f336c15bb41
    • Instruction Fuzzy Hash: 39B092A2024A0516E2803BFB9C0F78831481B4072AF54033AFA69641D27E6836A444FF
    APIs
    • VirtualAlloc.KERNEL32(?,?,00003000,00000040), ref: 007A4E0B
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 719d1ed409448da2ad6b142b06b2317d0f302e47669c53cac2345cbf88c1876d
    • Instruction ID: 69e09e36a2ad8962a7bf792ff95ee88fc6a2152da214f98d7650f507184c0d72
    • Opcode Fuzzy Hash: 719d1ed409448da2ad6b142b06b2317d0f302e47669c53cac2345cbf88c1876d
    • Instruction Fuzzy Hash: 8E51CA74A00209EFCB08CF54D495AADBBB1FF89314F248298E9499B341D775EE81CB94
    APIs
      • Part of subcall function 00405E03: wvnsprintfA.SHLWAPI(?,00000040,00000000,?), ref: 00405E21
    • GlobalMemoryStatusEx.KERNEL32(?,80000004,?,?,?,?,?,?,?), ref: 0041486C
    • GetSystemMetrics.USER32(00000000), ref: 004148B2
    • GetSystemMetrics.USER32(00000001), ref: 004148BC
    • GetComputerNameW.KERNEL32(?,?), ref: 00414909
    • GetUserNameW.ADVAPI32(?,00000101), ref: 0041491A
      • Part of subcall function 00405DBA: wvnsprintfW.SHLWAPI(?,00000104,00000000,?), ref: 00405DDC
    • GetLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041498B
    • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 00414A79
    • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 00414A85
    • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 00414AA0
      • Part of subcall function 004060C6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,?,00000000,00000000,?,?,00413134,00000000), ref: 004060E8
    • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041481A
      • Part of subcall function 00404F2C: HeapFree.KERNEL32(00000000,00000000,?,00404F0C,0041A778,?,0040F172,?,00413CC0,00000000,?,?,00413182,?), ref: 00404F40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: System$KeyboardLayoutListMetricsNamewvnsprintf$ByteCharComputerDevicesDisplayEnumFreeGlobalHeapInfoLocalMemoryMultiStatusTimeUserWide
    • String ID: $%S x%d$%s(%S)$%s\%s$%s\%s\%s$@$l=A
    • API String ID: 375986244-4245113576
    • Opcode ID: 9978e68bb9819ef7fd30dcb5c34c97ff33be2dc4cf0c4f32a4b81d9b13fe43eb
    • Instruction ID: 63ff94530e6feffdfb7e96b5c04adaf04086d6c0553b814bd94c6ab8dbfd29ed
    • Opcode Fuzzy Hash: 9978e68bb9819ef7fd30dcb5c34c97ff33be2dc4cf0c4f32a4b81d9b13fe43eb
    • Instruction Fuzzy Hash: DC126472900218ABDF10EBA5DC45BDE7779EB48314F0144BAFA08B7181DB78AF858F94
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040D634
    • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 0040D668
    • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 0040D6B3
    • SetFilePointer.KERNEL32(?,0000000C,00000000,00000000), ref: 0040D6EB
    • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 0040D6FF
    • SetFilePointer.KERNEL32(?,00000038,00000000,00000000), ref: 0040D72E
    • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 0040D742
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: File$Read$Pointer$Create
    • String ID:
    • API String ID: 974188869-0
    • Opcode ID: 8a4ad88e3ab9d38b818211dc3e193142bc454c36bee6eecd4d783f39b308e044
    • Instruction ID: 84ebc060d0621895f24b80f2e4f6a002ceadae2b21af062f922643ae4e17e730
    • Opcode Fuzzy Hash: 8a4ad88e3ab9d38b818211dc3e193142bc454c36bee6eecd4d783f39b308e044
    • Instruction Fuzzy Hash: 83C17E72D00119AFDB14DF94D8809EEBBB9FF88300F14847AE955B7290D735AE45CBA4
    APIs
    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,00413DD7,?,?,00414E1F,00413DD7,?,?), ref: 004119AA
    • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00413DD7,?,?,00414E1F,00413DD7), ref: 00411A27
    • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00413DD7,?,?,00414E1F,00413DD7), ref: 00411A5A
    • FindClose.KERNEL32(00000000,?,?,?), ref: 00411ABF
    • FindNextFileW.KERNEL32(?,?,?,?,?,?,00413DD7,?,?,00414E1F,00413DD7,?,?), ref: 00411B3E
    • FindClose.KERNEL32(?,?,?,?,?,00413DD7,?,?,00414E1F,00413DD7,?,?,?,?,?,00000000), ref: 00411B4F
      • Part of subcall function 00405DBA: wvnsprintfW.SHLWAPI(?,00000104,00000000,?), ref: 00405DDC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNext$wvnsprintf
    • String ID: %s%s$%s%s\$%s\%s\%s$%s\%s\%s\%s
    • API String ID: 943964047-654875542
    • Opcode ID: dd70484e7b8f062de1627af05d2bb0e73b74333fcc5ca2cf95427de7cffbf31e
    • Instruction ID: ea2d4c6f06bba6889578ba78540cc3033c32bd1741134c71fc68db188b5883d4
    • Opcode Fuzzy Hash: dd70484e7b8f062de1627af05d2bb0e73b74333fcc5ca2cf95427de7cffbf31e
    • Instruction Fuzzy Hash: 10614A72900218AADB21EB90DC45EDE777DEB04314F4445B7FA08B3091E738AB898F68
    APIs
    • CoCreateInstance.COMBASE(00401000,00000000,00004401,00401010,?), ref: 00410F3A
    • CoTaskMemFree.COMBASE(?), ref: 00410FEB
    • CoTaskMemFree.COMBASE(?), ref: 00411002
    • CredEnumerateW.ADVAPI32(?,00000000,?,?), ref: 00411145
    • CryptUnprotectData.CRYPT32(004115DF,00000000,0000004A,00000000,00000000,00000000,?), ref: 00411201
    • LocalFree.KERNEL32(?), ref: 004112B1
    • CredFree.ADVAPI32(?), ref: 004112C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Free$CredTask$CreateCryptDataEnumerateInstanceLocalUnprotect
    • String ID: %s\%s\%s$J
    • API String ID: 847491909-3392352968
    • Opcode ID: cabbff06b2101c33da73da649a489b026c12fe618483aefe325a352881240ba3
    • Instruction ID: f20f3bdc523f32172019d99ea4a9c5d2acc98d4ba874119d7bf4abe8c2f71e7c
    • Opcode Fuzzy Hash: cabbff06b2101c33da73da649a489b026c12fe618483aefe325a352881240ba3
    • Instruction Fuzzy Hash: 57C16E72D00119AFCF10DFA5D881AEEB7B9EF48314F14406BE604B7291DB79AE85CB58
    APIs
    • RtlAdjustPrivilege.NTDLL(00000014,00000001,00000000,?), ref: 00405849
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,00000001), ref: 00405869
    • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040587E
    • OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 00405896
    • OpenProcessToken.ADVAPI32(00000000,0000000A,?), ref: 004058A9
    • CloseHandle.KERNEL32(?), ref: 004058C1
    • CloseHandle.KERNEL32(00000000), ref: 004058C8
    • Process32NextW.KERNEL32(00000000,0000022C), ref: 004058DA
    • CloseHandle.KERNEL32(00000000), ref: 004058E6
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: CloseHandle$NextOpenProcessProcess32$AdjustCreatePrivilegeSnapshotTokenToolhelp32
    • String ID:
    • API String ID: 4144978764-0
    • Opcode ID: 288efba21ccabab0d353f82fcd98234522787933f75711a39f8c2e4291eeda84
    • Instruction ID: 621fd83d4662feb52ae53584e4e942dca7b79aa80e7d553c684b4606091f2438
    • Opcode Fuzzy Hash: 288efba21ccabab0d353f82fcd98234522787933f75711a39f8c2e4291eeda84
    • Instruction Fuzzy Hash: 22118E32A41215BBEB206B60AC4DBEF3BB8EB05B54F048076F901E61D0D7789D59DE68
    APIs
    • FindFirstFileW.KERNEL32(QRA,?,00000000,00000000,00000000), ref: 0041092E
    • FindNextFileW.KERNEL32(?,?), ref: 00410B08
    • FindClose.KERNEL32(?), ref: 00410B19
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNext
    • String ID: %s\%s$%s\%s\%s$QRA$QRA
    • API String ID: 3541575487-3613279923
    • Opcode ID: 0673e515e73f1fe6bb11bff91bb11307f776c28c320290fa16475a6bbf37cf96
    • Instruction ID: bf7924639df49b3f9cf932feb5dce01370ee5a3f54a8194052eeded70ea7b8fc
    • Opcode Fuzzy Hash: 0673e515e73f1fe6bb11bff91bb11307f776c28c320290fa16475a6bbf37cf96
    • Instruction Fuzzy Hash: 6851B37290021AABDF24EF50C8459EEB775EF54354F10406AEA04772D1D778AEC58B98
    APIs
    • GetTokenInformation.ADVAPI32(000000FF,00000003(TokenIntegrityLevel),00000000,00000000,?,00000000), ref: 00405768
    • GetTokenInformation.ADVAPI32(000000FF,00000003(TokenIntegrityLevel),00000000,?,?,00000000), ref: 004057A5
    • DuplicateTokenEx.ADVAPI32(000000FF,00000024,00000000,00000002,00000002,000000FF,00000000), ref: 004057D4
    • AdjustTokenPrivileges.ADVAPI32(000000FF,00000000,00000000,00000000,00000000,00000000), ref: 004057F3
    • NtSetInformationThread.NTDLL(000000FE,00000005,000000FF,00000004), ref: 00405803
    • CloseHandle.KERNEL32(000000FF), ref: 0040580F
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Token$Information$AdjustCloseDuplicateHandlePrivilegesThread
    • String ID:
    • API String ID: 611535677-0
    • Opcode ID: b9e9d181e24312ca3cdbdf2eca6f523f2d8d4b095f2b28e937357d39b6af328c
    • Instruction ID: 227ccfd11fb12c717d30c07917c2268877481373599fd8ad21870a49e25d02be
    • Opcode Fuzzy Hash: b9e9d181e24312ca3cdbdf2eca6f523f2d8d4b095f2b28e937357d39b6af328c
    • Instruction Fuzzy Hash: C4212C72900609BFEB20AFA1DC89E9B7B7DEB44754F10843AFA05A5190D7349E90DB94
    APIs
    • OpenProcessToken.ADVAPI32(00000000,00000008,0041551C,00000000), ref: 00405903
    • GetTokenInformation.ADVAPI32(0041551C,0000000A(TokenIntegrityLevel),?,00000038,?), ref: 00405920
    • NtCreateToken.NTDLL(0041551C,000F01FF,0041803C,00000002,?,?,?,00418024,?,00000000,?,0041A800,User32 ), ref: 0040599A
    • CloseHandle.KERNEL32(0041551C), ref: 004059A5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Token$CloseCreateHandleInformationOpenProcess
    • String ID: User32
    • API String ID: 791112728-31512923
    • Opcode ID: 8b4807e47cd7d9c0ab678ae9e597a5b8f2ae17fa3ec1aff7756dee87ef57a2b3
    • Instruction ID: 449fceeca6f02f62c474ee06d4cec9e5ea51b23d83900698e46271b5417625ee
    • Opcode Fuzzy Hash: 8b4807e47cd7d9c0ab678ae9e597a5b8f2ae17fa3ec1aff7756dee87ef57a2b3
    • Instruction Fuzzy Hash: DF212C75D4020DBEEB01CF94DC45AEEBBBDEB48700F10412AFA10F6290D7B45A49CB65
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 007A54D9
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007A54EE
    • UnhandledExceptionFilter.KERNEL32(007AA180), ref: 007A54F9
    • GetCurrentProcess.KERNEL32(C0000409), ref: 007A5515
    • TerminateProcess.KERNEL32(00000000), ref: 007A551C
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID:
    • API String ID: 2579439406-0
    • Opcode ID: 239cc5bb6e247c8b1f3cce5c7a26aa655069520aed34f52955300488d9cf4947
    • Instruction ID: 18b5e9626fba571128c3c30d75ea272174d823823029d75777a691923218220b
    • Opcode Fuzzy Hash: 239cc5bb6e247c8b1f3cce5c7a26aa655069520aed34f52955300488d9cf4947
    • Instruction Fuzzy Hash: 3D21D4B4410204EFD761DF68E9446593BA0FB8A321F80C119E50A93A60EBBC5D85CF2E
    APIs
    • CoCreateInstance.COMBASE(004010C4,00000000,00004401,004010D4,00000000), ref: 00407688
    • SysAllocString.OLEAUT32(?), ref: 004076BD
    • SysAllocString.OLEAUT32(00413DD7), ref: 004076E4
    • VariantClear.OLEAUT32(?), ref: 0040774D
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocString$ClearCreateInstanceVariant
    • String ID:
    • API String ID: 1533990153-0
    • Opcode ID: 21ae9dc6ccabbf0237440588804318c15eb7717ecb859a93fa846122d7a12a7d
    • Instruction ID: d989e8f11c9b4fc0ee7ab9285f716e1cb7648385bfeb727a4384310e233b5fb2
    • Opcode Fuzzy Hash: 21ae9dc6ccabbf0237440588804318c15eb7717ecb859a93fa846122d7a12a7d
    • Instruction Fuzzy Hash: C0313875E00208AFCF00EFE4C8899DEBB79EF49314F1044AAE901FB290DB75AA458B54
    APIs
      • Part of subcall function 004059B0: RegOpenKeyExW.ADVAPI32(80000002,00000001,00000000,00000001,00000000,?,?,?), ref: 004059DB
      • Part of subcall function 004059B0: RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,?), ref: 004059F4
      • Part of subcall function 004059B0: RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,?), ref: 00405A1E
      • Part of subcall function 004059B0: RegCloseKey.ADVAPI32(00000000), ref: 00405A33
    • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,00000000,?), ref: 00410DF9
    • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00000000), ref: 00410EC4
      • Part of subcall function 00404F2C: HeapFree.KERNEL32(00000000,00000000,?,00404F0C,0041A778,?,0040F172,?,00413CC0,00000000,?,?,00413182,?), ref: 00404F40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: FreeQueryValue$CloseCryptDataHeapLocalOpenUnprotect
    • String ID: %S\%S\%s
    • API String ID: 1170349874-688238448
    • Opcode ID: 23367135cf618639a9a6bbe0c38b83fb558316127c41b7a8f9599740e9569a74
    • Instruction ID: 61974f6221aaa33da51fb8b4332ca456937d8993f373d9cc068e8b2d38f05129
    • Opcode Fuzzy Hash: 23367135cf618639a9a6bbe0c38b83fb558316127c41b7a8f9599740e9569a74
    • Instruction Fuzzy Hash: 4D517D72D00218AFCF10EBA5DC45EEEBBB9EF48314F14446AF905B7251D778AA84CB94
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,00415460,00000000,00000104), ref: 00404D1F
    • FindNextFileW.KERNEL32(00000031,?), ref: 00404DF8
    • FindClose.KERNEL32(00000031), ref: 00404E09
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNext
    • String ID:
    • API String ID: 3541575487-0
    • Opcode ID: 9d64c5089cf14b4a96ce550f7ce1266c8fa2eb8d575155b75a5d0b30425f4508
    • Instruction ID: 3ee7f45571ec2e728f2d45caa32b95f4a36e807a3dbe421b590e3191cc866bd4
    • Opcode Fuzzy Hash: 9d64c5089cf14b4a96ce550f7ce1266c8fa2eb8d575155b75a5d0b30425f4508
    • Instruction Fuzzy Hash: E131A37240015AABDF219F61DD45BEF7778AF80314F14007AFE00B21E1DB389EA58B98
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: db61b9b9f382132f461e048fe4f0cf894bc94ff5cbe9208f56b214efccfd4e23
    • Instruction ID: 0499112fb87adadc1840ab0f4fe0e7ecc1b63a423e09ac322512921c4978a43a
    • Opcode Fuzzy Hash: db61b9b9f382132f461e048fe4f0cf894bc94ff5cbe9208f56b214efccfd4e23
    • Instruction Fuzzy Hash: 835184B4D01209DFCB04CF98C884BADBBB2FF89314F248659D815AB355D775AA81CF94
    APIs
    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00412074
    • LocalFree.KERNEL32(?,?,?,004121DC,00000000,?,?), ref: 00412096
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: CryptDataFreeLocalUnprotect
    • String ID:
    • API String ID: 1561624719-0
    • Opcode ID: 38d28ae3e0e395046ee51ea414fa60c357db4448f3fa60973f9418c10d68782e
    • Instruction ID: d40dfb0f535090772b9fe0eae1febc21ddc0b2eafc90de01a658c335882751cd
    • Opcode Fuzzy Hash: 38d28ae3e0e395046ee51ea414fa60c357db4448f3fa60973f9418c10d68782e
    • Instruction Fuzzy Hash: 1731E775800189AEDF258F7886446DFBFB6EB4E744F00411BDA51E2216C3B99AD3CB1E
    APIs
    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,00411D31), ref: 00404933
    • LocalFree.KERNEL32(00000001,00403AEC,?,?,00411D31,00000001,?,?,?,?,?,?,?,?,00000000,00000104), ref: 00404960
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: CryptDataFreeLocalUnprotect
    • String ID:
    • API String ID: 1561624719-0
    • Opcode ID: daddabe56ba01ab0a22bf5a4db6c56f94cdad8289dcfc64dffa5827e9870c4fd
    • Instruction ID: eff705749294552a49cb4206b8a8151450b07a935f9774916d4ace2d366a322e
    • Opcode Fuzzy Hash: daddabe56ba01ab0a22bf5a4db6c56f94cdad8289dcfc64dffa5827e9870c4fd
    • Instruction Fuzzy Hash: 51F014B1900209BFDF109FA9CC85CEFBBBDEB85344B10447AF941A3250D3719E809B64
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID: I@$I@
    • API String ID: 0-1008241598
    • Opcode ID: 9cec92ef4e791106ecc81ca5f9fd656491a685019501de78ba6063891f0cc789
    • Instruction ID: aa87177d6922c40db767e09e7f7300f8604da9cde321312a12b3189cf78b8dcd
    • Opcode Fuzzy Hash: 9cec92ef4e791106ecc81ca5f9fd656491a685019501de78ba6063891f0cc789
    • Instruction Fuzzy Hash: D881DF71D081A59FDB1DCF6D84904ADFFF1AE9A240748C29ED8A5AB387C2389514CFB1
    APIs
    • CloseHandle.KERNEL32(00000000), ref: 007A4FB4
    • CloseHandle.KERNEL32(00000000), ref: 007A4FC4
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 0918ba0efda8a7d5d509f8b693bcf2007239f4c3fa7ac6d29940f89961ebd616
    • Instruction ID: 609a045c782a2321b6ee6935b76d78a2d1b0faec7dd8b78a52baa914e08193e7
    • Opcode Fuzzy Hash: 0918ba0efda8a7d5d509f8b693bcf2007239f4c3fa7ac6d29940f89961ebd616
    • Instruction Fuzzy Hash: 2921C574A00208EFCB04CF54C498AA9BBB1FB89304F24D699E8095B351C3B9EE85CF81
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Version
    • String ID:
    • API String ID: 1889659487-0
    • Opcode ID: 3cf1fedbdff5723513f479be4ed969bcb2ac4b1f9bb60681a2d7a451bed1a486
    • Instruction ID: cc9333183fa8c00dccd2b6004e22b404908c773762507ea227cbcdaa759150bb
    • Opcode Fuzzy Hash: 3cf1fedbdff5723513f479be4ed969bcb2ac4b1f9bb60681a2d7a451bed1a486
    • Instruction Fuzzy Hash: 6521D8709452188ECF38CD60A8463EE7375572230EF2654BFE28596200DA3CEAC78B5B
    APIs
    • GetTimeZoneInformation.KERNEL32(?), ref: 00406428
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: InformationTimeZone
    • String ID:
    • API String ID: 565725191-0
    • Opcode ID: 94fb4f433fb7da04c7912a50c4e658d83ca068ef18c375c02743d519853954a0
    • Instruction ID: 9d2192f2e320e058be2c2fda52b9328630a0c2766cdf8855c04a576f05d35507
    • Opcode Fuzzy Hash: 94fb4f433fb7da04c7912a50c4e658d83ca068ef18c375c02743d519853954a0
    • Instruction Fuzzy Hash: A7D0A776A00314EFDB10AF58EC05F44B7F85B05210F0181AAB5D5C31C0D670A5804F66
    APIs
    • GetLocaleInfoA.KERNEL32(80000004,0000005A,?,00000010,?,00414AE1,?,?,80000004,?), ref: 00416E86
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: 492bb2610ae7a41e0d722d4a2fa9f85706a9627eede23f664937886feea1bbda
    • Instruction ID: 012795880ae3241001a3ff6f5d3db474ef08a8b0ec5b54ed7dba30c2656240b6
    • Opcode Fuzzy Hash: 492bb2610ae7a41e0d722d4a2fa9f85706a9627eede23f664937886feea1bbda
    • Instruction Fuzzy Hash: 06D0C93214420CBAEF111A41EC06F893B65EB09721F108025F618180E19AB36960AA88
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00035AC7), ref: 007A5B0E
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: cf0380885927d80152fafb068e2e38a1448bd77a53e2b0c2640bfec31c28d5a3
    • Instruction ID: 52cbd6ad20da741451a9a5655261218dc6c3373671ffda77b0962f78cb40da5d
    • Opcode Fuzzy Hash: cf0380885927d80152fafb068e2e38a1448bd77a53e2b0c2640bfec31c28d5a3
    • Instruction Fuzzy Hash: 7F9002A0761A009A874227B05C498066AA05ACA702746C6547005D4154EB6840049A26
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID: UUUU
    • API String ID: 0-1798160573
    • Opcode ID: 47e17f6eb2f6ed35542de6a4c203a3b3d24fb82f53f471f5337a6533c5149852
    • Instruction ID: 8ce0b6fa30e06822d17ffbceaa72673f25687c9f49871aa502c7412ad644dc10
    • Opcode Fuzzy Hash: 47e17f6eb2f6ed35542de6a4c203a3b3d24fb82f53f471f5337a6533c5149852
    • Instruction Fuzzy Hash: CB51A333F205240BE75C866D8C2A76D3AD287C4354F1E4279E956E72D2D8BCDE12D394
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID: FH@
    • API String ID: 0-3307908349
    • Opcode ID: eba58216cf352b7931a6f12906384ae6f21cbea08298cad6a557a78378606dc1
    • Instruction ID: 5d692aa64f1d02948a3fba6f80e0249745d5ed7c23a60299a5f2d1b3268d9ccc
    • Opcode Fuzzy Hash: eba58216cf352b7931a6f12906384ae6f21cbea08298cad6a557a78378606dc1
    • Instruction Fuzzy Hash: 7F617F70E0066A9EDB15CFAEC8906AEFFF1FF89301F14816AD555E3241D678A601CFA0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID: UUUU
    • API String ID: 0-1798160573
    • Opcode ID: fe74a95da04a3da5957119185af521d6831f355d274b42a1a7b6e0e1e4b16eb0
    • Instruction ID: 1b809dd5407cdfa181b2f36f59f0f85b0af94b7e88463b934ea3cc36f223f438
    • Opcode Fuzzy Hash: fe74a95da04a3da5957119185af521d6831f355d274b42a1a7b6e0e1e4b16eb0
    • Instruction Fuzzy Hash: 21212C323745150BF79CE93D8C0776B62D2DBC8264B18CA3AAA66C72C1DC7CE9138285
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID: gR@
    • API String ID: 0-1284012785
    • Opcode ID: 1bf41191eea62a3d51b1ebc75e6daf2de291ca19e34a7d679d4947561c48509c
    • Instruction ID: 70ef8581f865f0112264750e87cdc896a5a700d15b24c2966dd795d3664bc740
    • Opcode Fuzzy Hash: 1bf41191eea62a3d51b1ebc75e6daf2de291ca19e34a7d679d4947561c48509c
    • Instruction Fuzzy Hash: 0A119131A10A04EFCB21DF69C880BABB3F5EF44354B14487AD846E7251E734AE40CB84
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 289f2053dfa9c8ca239bfff4ed5d862ef5a3f26f2a123b0f2921e60597c983e9
    • Instruction ID: 6f7324b15eca2b7b96dab9f736eed971c045b4517cab1c08fd2209b19b6e3684
    • Opcode Fuzzy Hash: 289f2053dfa9c8ca239bfff4ed5d862ef5a3f26f2a123b0f2921e60597c983e9
    • Instruction Fuzzy Hash: 1FF18832A146959FD740CFAEDCD0489BBF3EFC920175EC6A8C6545B366C2347A12CBA4
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a7b310c85ba78bd130b6d947e25122e94d9fd7f65a3e45bbfc28b2ae52817406
    • Instruction ID: 806ef46059b39e71137c6a37a0d5405ef7dec956314bec1b2ce83c269c788100
    • Opcode Fuzzy Hash: a7b310c85ba78bd130b6d947e25122e94d9fd7f65a3e45bbfc28b2ae52817406
    • Instruction Fuzzy Hash: 83D172B1E1020A9FDB54DFA9D481ADDBBF0BF0D314F10456AE518FB281E775AA808B54
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 66f8a48aecfb97492cb446f1ed1ed734e4917f1bc2179caba97a06dca3b7bf3e
    • Instruction ID: ec769a8d708e545d2d17ded63e2c92bfaf155a030af962b35be15012192d49a3
    • Opcode Fuzzy Hash: 66f8a48aecfb97492cb446f1ed1ed734e4917f1bc2179caba97a06dca3b7bf3e
    • Instruction Fuzzy Hash: 6A71A276B503019BCB08DFEAF9D291A7361EB58340F49817AEE026B2B1D6747B21CB45
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e6aeb10b79cc9689488747f47cd5120282e3b2ecb0f1b3d475f73ce1d6f941e8
    • Instruction ID: c52894c21cce98a5b3e3be7a8c82c8448c5d44fd66a7b6e0b5206e9568c8f8a0
    • Opcode Fuzzy Hash: e6aeb10b79cc9689488747f47cd5120282e3b2ecb0f1b3d475f73ce1d6f941e8
    • Instruction Fuzzy Hash: 2C61643160C5A04ED71CCF2A84BD475FBE2AFC920134E82EFD49B4F2A2C6389565DB65
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5ceb65251ef5f374cc1676978594b672cbf917856a3a8c51848abcda614c3d36
    • Instruction ID: 99e0d7b0a9de723bba338dea900c8a8687d99cdd99ccb4afe0071543674cb564
    • Opcode Fuzzy Hash: 5ceb65251ef5f374cc1676978594b672cbf917856a3a8c51848abcda614c3d36
    • Instruction Fuzzy Hash: 2F61BC71E0464A9BD715CFA9C0C06EEFBF1EF99300F54C1ADC989A7346C274A959CBA0
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fb87ecb3a1000084d9293c3e741e807016fcaee7161e8a27ba20a818466f514b
    • Instruction ID: 777ffbebf7581f0ae84988816b3b3784bbe2ec13b3104a3b9d140de91e986b4e
    • Opcode Fuzzy Hash: fb87ecb3a1000084d9293c3e741e807016fcaee7161e8a27ba20a818466f514b
    • Instruction Fuzzy Hash: A6419522F051895FDB098AAD98516EEBF719F96310F4940AEE481FB383C974DA09C7E1
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 660f38a9e7a8f2821e6550479c5de09e585330eaaeef16a5887133e29895604e
    • Instruction ID: d8afc9364d1788d87b36511f3b298ec2c8d48509b9e0938bb4da120c49f6a260
    • Opcode Fuzzy Hash: 660f38a9e7a8f2821e6550479c5de09e585330eaaeef16a5887133e29895604e
    • Instruction Fuzzy Hash: 6F31D4B37605201BE70C9E7DDCA23EA66C1E789318F46463DC997D72D0D26C994686C8
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 49da9b4152dcc3c3c9f53b880ea02307f24100b3f3ace170fc16e5d65d613d31
    • Instruction ID: e4598f198c1ebe2c8d5ed442411fc326abb90028f457679b4f86855f8050cae0
    • Opcode Fuzzy Hash: 49da9b4152dcc3c3c9f53b880ea02307f24100b3f3ace170fc16e5d65d613d31
    • Instruction Fuzzy Hash: 262181322314109BC748DF3DEC9968A37E2E38935871AC63DD51AD72A0EF38E402CB48
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f8a0c9c23e36e7928c497b593758381672b939dfc3bcbd3f81601b2ea83f3f8c
    • Instruction ID: 8a4452ef7110f5f205f0f63f16211c95a03bb306aef0532b39cacefe1c6f7b48
    • Opcode Fuzzy Hash: f8a0c9c23e36e7928c497b593758381672b939dfc3bcbd3f81601b2ea83f3f8c
    • Instruction Fuzzy Hash: E201A477F2052416F74C98BACC5136AA1479BC4261F1EC6399E69D72C9CCB4CC1142D0
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f9ed70d17b65b173f63ea8bde167bd4dbe7c19cd1b27e585218ed96e6e4df4c6
    • Instruction ID: 58c6f5837427d6eca2c2deaad74ce6c6656098581891570576efec04afcca601
    • Opcode Fuzzy Hash: f9ed70d17b65b173f63ea8bde167bd4dbe7c19cd1b27e585218ed96e6e4df4c6
    • Instruction Fuzzy Hash: 42D001392A1A48CFC241CF4CD084E40B3F8FB0DA20B068092FA0A8BB32C334FC00DA80
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7c05f99247aa81ce170190a3f42a6638173cba83a8e8f878aed30f5516b3ecb7
    • Instruction ID: 01513cdb45ce42654985ae443ff07ed2023d2f9c2cc80418f216d1c85a703bac
    • Opcode Fuzzy Hash: 7c05f99247aa81ce170190a3f42a6638173cba83a8e8f878aed30f5516b3ecb7
    • Instruction Fuzzy Hash: ECC00139661A40CFCA55CF08C194E00B3F4FB5D760B068491E906CB732C234ED40DA40
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c92737c4d31cfb72025dec89eae0fb42358f12c3dfe317aacb3237dbb5ec58c0
    • Instruction ID: d8bc9acd7da5fb0c73b53ea44bd5ea9bf3d426c042c7258b91cd9e99573d7f24
    • Opcode Fuzzy Hash: c92737c4d31cfb72025dec89eae0fb42358f12c3dfe317aacb3237dbb5ec58c0
    • Instruction Fuzzy Hash: E9C00839661940CFCA55CF08C194E00B3F4FB59760B068491E905CB732C234ED40DA40
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fb1dcb45eca10bbd415de50d8dac458e7e42156cf4c282332bc7bc400f2a61b4
    • Instruction ID: 09a661d3bcde169e3a68bda8983e2d082d1c510c2daa6ab026a58b72df35bac7
    • Opcode Fuzzy Hash: fb1dcb45eca10bbd415de50d8dac458e7e42156cf4c282332bc7bc400f2a61b4
    • Instruction Fuzzy Hash: 3AA00235692980CFCE16CF08C290F0073B4F754B40F010490E401C7A21C228ED40C940
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,007A5331), ref: 007A661D
    • __mtterm.LIBCMT ref: 007A6629
      • Part of subcall function 007A6362: DecodePointer.KERNEL32(00000004,007A678B,?,007A5331), ref: 007A6373
      • Part of subcall function 007A6362: TlsFree.KERNEL32(00000002,007A678B,?,007A5331), ref: 007A638D
      • Part of subcall function 007A6362: DeleteCriticalSection.KERNEL32(00000000,00000000,76EF5810,?,007A678B,?,007A5331), ref: 007A6C23
      • Part of subcall function 007A6362: _free.LIBCMT ref: 007A6C26
      • Part of subcall function 007A6362: DeleteCriticalSection.KERNEL32(00000002,76EF5810,?,007A678B,?,007A5331), ref: 007A6C4D
    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 007A663F
    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 007A664C
    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 007A6659
    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 007A6666
    • TlsAlloc.KERNEL32(?,007A5331), ref: 007A66B6
    • TlsSetValue.KERNEL32(00000000,?,007A5331), ref: 007A66D1
    • __init_pointers.LIBCMT ref: 007A66DB
    • EncodePointer.KERNEL32(?,007A5331), ref: 007A66EC
    • EncodePointer.KERNEL32(?,007A5331), ref: 007A66F9
    • EncodePointer.KERNEL32(?,007A5331), ref: 007A6706
    • EncodePointer.KERNEL32(?,007A5331), ref: 007A6713
    • DecodePointer.KERNEL32(007A64E6,?,007A5331), ref: 007A6734
    • __calloc_crt.LIBCMT ref: 007A6749
    • DecodePointer.KERNEL32(00000000,?,007A5331), ref: 007A6763
    • GetCurrentThreadId.KERNEL32 ref: 007A6775
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Pointer$AddressEncodeProc$Decode$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
    • API String ID: 3698121176-3819984048
    • Opcode ID: 814aa18a6c8fef730e53cf24bb78f6f86b7ca81c8605b44ba1845c6885a8da56
    • Instruction ID: fbddf77bf767cb1a0270eddca731c5901e26842e4bd404519163d3cafe3cf770
    • Opcode Fuzzy Hash: 814aa18a6c8fef730e53cf24bb78f6f86b7ca81c8605b44ba1845c6885a8da56
    • Instruction Fuzzy Hash: 19314371940310EBDB21AF74AD0CA1A3FA4EBE7760B19CB16E410931B0E77D9841CF5A
    APIs
    • LoadIconW.USER32(00000000,00007F00), ref: 0077103B
    • LoadCursorW.USER32(00000000,00007F00), ref: 0077104B
    • GetStockObject.GDI32(00000000), ref: 00771056
    • RegisterClassW.USER32(00000003), ref: 00771071
    • MessageBoxW.USER32(00000000,ghfgfngfnfgng4356345,ghk445fdg,00000010), ref: 0077108C
    • CreateWindowExW.USER32(00000000,ghk445fdg,hjgk,hgj456,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007710C5
    • ShowWindow.USER32(?,00000000), ref: 007710D4
    • UpdateWindow.USER32(?), ref: 007710DE
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 007710EE
    • TranslateMessage.USER32(?), ref: 007710FC
    • DispatchMessageW.USER32(?), ref: 00771106
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Message$Window$Load$ClassCreateCursorDispatchIconObjectRegisterShowStockTranslateUpdate
    • String ID: ghfgfngfnfgng4356345$ghk445fdg$hjgk,hgj456
    • API String ID: 2734574773-3954598336
    • Opcode ID: 5cada1a3ba475c714c27c5260af52c3b75f6cadbe001525e951d910ff2189cae
    • Instruction ID: e34ce5f6339e24239c35d254c0e216dd7b9a8a947514402fb0197f8d5fdec988
    • Opcode Fuzzy Hash: 5cada1a3ba475c714c27c5260af52c3b75f6cadbe001525e951d910ff2189cae
    • Instruction Fuzzy Hash: 5321EDB4A4430CFBEB548FA0DC59FAD7BB4EB89701F208114F605BA2C0D7B9A544CB69
    APIs
    • MonitorFromPoint.USER32(?,?,00000001), ref: 00415918
    • GetMonitorInfoW.USER32(?,?), ref: 0041597F
    • CreateCompatibleDC.GDI32(?), ref: 0041599C
    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 004159AA
    • SelectObject.GDI32(?,00000000), ref: 004159B7
    • BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,40CC0020), ref: 004159D4
    • GetCursorInfo.USER32(?), ref: 004159E5
    • GetIconInfo.USER32(?,?), ref: 004159F2
    • DrawIcon.USER32(?,?,?,?), ref: 00415A0C
      • Part of subcall function 00404F2C: HeapFree.KERNEL32(00000000,00000000,?,00404F0C,0041A778,?,0040F172,?,00413CC0,00000000,?,?,00413182,?), ref: 00404F40
    • DeleteObject.GDI32(?), ref: 00415ABD
    • DeleteDC.GDI32(?), ref: 00415AC6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Info$CompatibleCreateDeleteIconMonitorObject$BitmapCursorDrawFreeFromHeapPointSelect
    • String ID: (
    • API String ID: 265149036-3887548279
    • Opcode ID: 960edca231de8e156615f46315c9ec6b5a0806d22cdf4613aaf9fa20cff76dd2
    • Instruction ID: 977c3bf0a044a8a20248cdf5c9f61e8bce22bd1014bcf420fbffb512a4ba3380
    • Opcode Fuzzy Hash: 960edca231de8e156615f46315c9ec6b5a0806d22cdf4613aaf9fa20cff76dd2
    • Instruction Fuzzy Hash: 19510472900109EFDF10AFA4DD48ADEBB79FF48354F10806AF905B6160DB35AE45DBA8
    APIs
    • GetUserNameW.ADVAPI32(?,?), ref: 004153C6
      • Part of subcall function 00405721: SHGetFolderPathW.SHELL32(00000000,004153DA,00000000,00000000,?,?,004153DA,?,0000001A), ref: 00405748
    • RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,000F003F,00413DD7), ref: 00415417
      • Part of subcall function 00405662: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000031,00000000), ref: 0040568B
      • Part of subcall function 00405662: Process32NextW.KERNEL32(00000000,0000022C), ref: 004056B7
    • RegCloseKey.ADVAPI32(00413DD7), ref: 0041546A
    • SHGetFolderPathW.SHELL32(00000000,0000001A,?,00000000,?), ref: 00415533
    • SHGetFolderPathW.SHELL32(00000000,0000001C,?,00000000,?), ref: 00415547
    • SHGetFolderPathW.SHELL32(00000000,00000021,?,00000000,?), ref: 0041555B
    • SHGetFolderPathW.SHELL32(00000000,00000005,?,00000000,?), ref: 0041556F
    • CloseHandle.KERNEL32(?), ref: 0041564C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: FolderPath$Close$CreateHandleNameNextOpenProcess32SnapshotToolhelp32User
    • String ID: p
    • API String ID: 3969033429-2181537457
    • Opcode ID: 924a323fa76a1090de7a96ea6f10674524437ed1f40757f51c06702636f56135
    • Instruction ID: 7a52210d9c567d5fd2296ea13022ca8b3bd9af4c8aad6b8387a35ee1e3cfdfc0
    • Opcode Fuzzy Hash: 924a323fa76a1090de7a96ea6f10674524437ed1f40757f51c06702636f56135
    • Instruction Fuzzy Hash: 66914872900519EBDF21DFD0CC85EEEBBB8FB89304F1041AAE605A2190DB759A858F58
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,007ABBF0,00000008,007A64A7,00000000,00000000,?,?,007A556B,007A5196,?,?,007A445D,?), ref: 007A63B0
    • __lock.LIBCMT ref: 007A63E4
      • Part of subcall function 007A6D36: __mtinitlocknum.LIBCMT ref: 007A6D4C
      • Part of subcall function 007A6D36: __amsg_exit.LIBCMT ref: 007A6D58
      • Part of subcall function 007A6D36: EnterCriticalSection.KERNEL32(]Dz,]Dz,?,007A63E9,0000000D), ref: 007A6D60
    • InterlockedIncrement.KERNEL32(007AD320), ref: 007A63F1
    • __lock.LIBCMT ref: 007A6405
    • ___addlocaleref.LIBCMT ref: 007A6423
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
    • String ID: KERNEL32.DLL$]Dz
    • API String ID: 637971194-3240989328
    • Opcode ID: abdc8df70c2647b0777e55f8b559ad2ff6c046c353a265a340970a34cec5229c
    • Instruction ID: f49e9c0f3754d3f823320086cd40013f7190b0d59c6ebfb9a4fd6e560ce942b1
    • Opcode Fuzzy Hash: abdc8df70c2647b0777e55f8b559ad2ff6c046c353a265a340970a34cec5229c
    • Instruction Fuzzy Hash: 1A018471544700EFD7209F75D80A749BBE0BF86324F108A0DE496577A1DBBCAA44CB16
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000031,00000000), ref: 0040568B
    • Process32NextW.KERNEL32(00000000,0000022C), ref: 004056B7
    • OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 004056D0
    • OpenProcessToken.ADVAPI32(00000000,?,0000001A), ref: 004056E4
    • DuplicateTokenEx.ADVAPI32(0000001A,?,00000000,00000002,00000001,0041A7F8), ref: 004056FA
    • CloseHandle.KERNEL32(0000001A), ref: 00405703
    • CloseHandle.KERNEL32(00000000), ref: 0040570A
    • CloseHandle.KERNEL32(00000000), ref: 00405711
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: CloseHandle$OpenProcessToken$CreateDuplicateNextProcess32SnapshotToolhelp32
    • String ID:
    • API String ID: 3292448913-0
    • Opcode ID: a2706c85aca0541312226067f5d2733b4dfed527a6ba5c4ceb9f6ef4114542b9
    • Instruction ID: d1fd8e19b9ea3247be9f77e8ce275ec634d9c5db201f2df05c7f63bf9e51eaf8
    • Opcode Fuzzy Hash: a2706c85aca0541312226067f5d2733b4dfed527a6ba5c4ceb9f6ef4114542b9
    • Instruction Fuzzy Hash: 99119032900515FBDB116BA4DC8DEDB7BB8EB48351F104176F621A20A1D7354A81DF6D
    APIs
      • Part of subcall function 00405DBA: wvnsprintfW.SHLWAPI(?,00000104,00000000,?), ref: 00405DDC
    • gethostbyname.WS2_32(?), ref: 004133C6
    • DnsQuery_A.DNSAPI(?,00000001,00000002,?,00000000,00000000), ref: 004133F0
    • inet_ntoa.WS2_32(?), ref: 0041342E
    • DnsFree.DNSAPI(00000000,00000001), ref: 00413449
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: FreeQuery_gethostbynameinet_ntoawvnsprintf
    • String ID: link$pro
    • API String ID: 3295049255-2616294489
    • Opcode ID: 045e133d47ac88580c665aacfaf8e3db3c41d6694abbf577b760372e7ea348a6
    • Instruction ID: 7d109828660f677fbe1903f41f5432d556e214821793483ce54f1a277a5bc00b
    • Opcode Fuzzy Hash: 045e133d47ac88580c665aacfaf8e3db3c41d6694abbf577b760372e7ea348a6
    • Instruction Fuzzy Hash: 5C717272D00118ABDB21EFA5CC45ADFBBB9EF44305F0081B6EA05B7141D7786B498F98
    APIs
    • GetPrivateProfileStringW.KERNEL32(?,?,00000000,?,000000FF,?), ref: 0040FE20
    • GetPrivateProfileStringW.KERNEL32(?,?,00000000,?,000000FF,?), ref: 0040FE49
    • GetPrivateProfileStringW.KERNEL32(?,?,00000000,?,000000FF,?), ref: 0040FE6E
    • GetPrivateProfileStringW.KERNEL32(?,00000000,00000000,?,0000FFFF,?), ref: 0040FEEB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: PrivateProfileString
    • String ID: $
    • API String ID: 1096422788-227171996
    • Opcode ID: 96352c368fbae6d2e604c92080f5f374570bf7a16415aa76f73c6bb17155fea8
    • Instruction ID: 4bcdd06559af57f3a18aa75212f78c00efbe9c848d9a626a581925e0767f4e7f
    • Opcode Fuzzy Hash: 96352c368fbae6d2e604c92080f5f374570bf7a16415aa76f73c6bb17155fea8
    • Instruction Fuzzy Hash: 1E512D72901119AAEF20EBE0DC45EEEB37DEF04314F14447BBA05F3591E778AA498B54
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0040B7FC
    • CopyFileW.KERNEL32(?,?,00000000), ref: 0040B82C
    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0040B849
    • GetFileSize.KERNEL32(?,00000000), ref: 0040B85B
    • ReadFile.KERNEL32(?,?,00001000,?,00000000), ref: 0040B885
    • CloseHandle.KERNEL32(?), ref: 0040B8B9
    • DeleteFileW.KERNEL32(?), ref: 0040B8DA
      • Part of subcall function 00404C33: GetTempPathW.KERNEL32(000000F6,?,00000000), ref: 00404C4A
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: File$Create$CloseCopyDeleteHandlePathReadSizeTemp
    • String ID:
    • API String ID: 2441216986-0
    • Opcode ID: 5cde616fb5c3efed58da4bb7fb09baae2c060ff0f539486901b99e14cd691bdc
    • Instruction ID: 7c42100144d45914e9297fa56b25ebb1347f1c04ecc592c3643096512dc84bbf
    • Opcode Fuzzy Hash: 5cde616fb5c3efed58da4bb7fb09baae2c060ff0f539486901b99e14cd691bdc
    • Instruction Fuzzy Hash: 9231707294421D7EEB10AFA59C88EDE7B7CEB54314F0080B6F914A72E0D7359E458B68
    APIs
    • OpenProcessToken.ADVAPI32(000000FF,00000008,00000035,?,?,?,?,00413A65,?,00000035,?), ref: 004055A5
    • GetTokenInformation.ADVAPI32(00000035,00000019(TokenIntegrityLevel),00000000,00000000,?,?,?,?,?,00413A65,?,00000035,?), ref: 004055BE
    • GetTokenInformation.ADVAPI32(00000035,00000019(TokenIntegrityLevel),00000000,?,?,00000035,?,?,?,?,00413A65,?,00000035,?), ref: 004055F3
    • GetSidSubAuthorityCount.ADVAPI32(00000000,?,?,?,?,00413A65,?,00000035,?), ref: 004055FF
    • GetSidSubAuthority.ADVAPI32(00000000,?,?,?,?,?,00413A65,?,00000035,?), ref: 0040560C
    • CloseHandle.KERNEL32(00000035,?,?,?,?,00413A65,?,00000035,?), ref: 00405657
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Token$AuthorityInformation$CloseCountHandleOpenProcess
    • String ID:
    • API String ID: 2447973151-0
    • Opcode ID: 8e5a2c07dcb05d72aa895c2322314f2ed1911261ab06a30e74bfad54bc2c1be2
    • Instruction ID: efd7c50f993448333591d6de82e587b9959ddcf8b0942f83b87ffec69861eda7
    • Opcode Fuzzy Hash: 8e5a2c07dcb05d72aa895c2322314f2ed1911261ab06a30e74bfad54bc2c1be2
    • Instruction Fuzzy Hash: BA219D70541504BEFF216B90DC88AEF7B6AEB12350F640877F505F22E0D63A9E819E1D
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,0040EE99,?), ref: 00404B27
    • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,?,0040EE99,?), ref: 00404B3A
    • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,?,?,?,?,0040EE99,?), ref: 00404B65
    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,?,?,?,0040EE99,?), ref: 00404B78
    • CloseHandle.KERNEL32(?,?,?,?,?,0040EE99,?), ref: 00404B87
    • CloseHandle.KERNEL32(?,?,?,?,?,0040EE99,?), ref: 00404B90
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: File$CloseCreateHandle$MappingSizeView
    • String ID:
    • API String ID: 2246244431-0
    • Opcode ID: 5f155232a6646b183a63d33a187dcf7d7451c11ffa5c6e8337a98a603e46b336
    • Instruction ID: a5cce8ab798561b9d34a8d8371e3b839bcf71193e68395df42d84d91d4c577ad
    • Opcode Fuzzy Hash: 5f155232a6646b183a63d33a187dcf7d7451c11ffa5c6e8337a98a603e46b336
    • Instruction Fuzzy Hash: 4F115EB0140645BEDB315F62CC4DE5BBFBDEBD5B20B10892EF556A22E0D270A880CA24
    APIs
    • __getptd.LIBCMT ref: 007A79A7
      • Part of subcall function 007A64CC: __getptd_noexit.LIBCMT ref: 007A64CF
      • Part of subcall function 007A64CC: __amsg_exit.LIBCMT ref: 007A64DC
    • __amsg_exit.LIBCMT ref: 007A79C7
    • __lock.LIBCMT ref: 007A79D7
    • InterlockedDecrement.KERNEL32(?), ref: 007A79F4
    • _free.LIBCMT ref: 007A7A07
    • InterlockedIncrement.KERNEL32(03211660), ref: 007A7A1F
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
    • String ID:
    • API String ID: 3470314060-0
    • Opcode ID: 2ee706187f3e899d3ed0e159b92ea3223b33c052d765eeb2f576ca54bb3119f5
    • Instruction ID: b16279dd9bdb553f1490d6e45083c96aefc685467326c24904a4d9d133bb9180
    • Opcode Fuzzy Hash: 2ee706187f3e899d3ed0e159b92ea3223b33c052d765eeb2f576ca54bb3119f5
    • Instruction Fuzzy Hash: 4E01C432905611EBDB29AF689809B5E73A0BBC7720F048315E41067691EB3C6D41CFD5
    APIs
    • GetPrivateProfileSectionNamesW.KERNEL32(?,0000FFFF,?), ref: 0041048E
    • GetPrivateProfileStringW.KERNEL32(?,?,00000000,?,000000FF,?), ref: 004104CE
    • GetPrivateProfileStringW.KERNEL32(?,?,00000000,?,000000FF,?), ref: 004104F1
    • GetPrivateProfileStringW.KERNEL32(?,?,00000000,?,000000FF,?), ref: 00410514
      • Part of subcall function 00404F2C: HeapFree.KERNEL32(00000000,00000000,?,00404F0C,0041A778,?,0040F172,?,00413CC0,00000000,?,?,00413182,?), ref: 00404F40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: PrivateProfile$String$FreeHeapNamesSection
    • String ID: ;MA
    • API String ID: 2696703033-2473825069
    • Opcode ID: d62af84dadb8aeb0cd767306cd763f2b7af0cc5cd4c31ce0c62e74ab7763d04b
    • Instruction ID: ca2be330a2425339e36bd4ad192777fe90c5f7ef25b94e226df5f8c55297d755
    • Opcode Fuzzy Hash: d62af84dadb8aeb0cd767306cd763f2b7af0cc5cd4c31ce0c62e74ab7763d04b
    • Instruction Fuzzy Hash: F9512C72900119ABDF20EBA0DC45AFEB379EF44314F44447BFA05B7181EB78AE858B59
    APIs
    • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,00000031), ref: 00416932
      • Part of subcall function 0040B4B3: CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0040B4BD
    • CredFree.ADVAPI32(?,?), ref: 00416B33
      • Part of subcall function 00404F2C: HeapFree.KERNEL32(00000000,00000000,?,00404F0C,0041A778,?,0040F172,?,00413CC0,00000000,?,?,00413182,?), ref: 00404F40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: CredFree$CreateEnumerateGlobalHeapStream
    • String ID: %-50s %s$%2.2X $Name:%lsComment: %lsUser:%lsData:
    • API String ID: 1001871379-3138396605
    • Opcode ID: 2401751eb88739c885c15fd53acb714d68e7c2f50a4fcf00982f6b5b26fd4f3d
    • Instruction ID: 6ab3aa2b8b6f7ef3ca89290d3b3c0aa47683973965a1ba494867f240cd4163d2
    • Opcode Fuzzy Hash: 2401751eb88739c885c15fd53acb714d68e7c2f50a4fcf00982f6b5b26fd4f3d
    • Instruction Fuzzy Hash: 69616172D10119ABCF10EFA5C8819EEB7B9EF04314F15447BE505B7251DB38AE868BA8
    APIs
    • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,00020019,?,00000000,00000000,%s\%s\%s,?,?,?), ref: 00405BC5
    • RegQueryInfoKeyW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00405BED
    • RegCloseKey.ADVAPI32(?), ref: 00405C4E
      • Part of subcall function 00404EAB: RtlAllocateHeap.NTDLL(00000008,-00000004), ref: 00404EC3
    • RegEnumValueW.ADVAPI32(00000064,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000064,?), ref: 00405C33
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocateCloseEnumHeapInfoOpenQueryValue
    • String ID: p
    • API String ID: 691525546-2181537457
    • Opcode ID: 55dbc965931b86bd302de6135924febe7d29aa3ec2cc84c16f3282715dc9fca4
    • Instruction ID: 559e2e5736a9b18d769bac7e7b774088cfa7331c56084f597a9c19479372ca08
    • Opcode Fuzzy Hash: 55dbc965931b86bd302de6135924febe7d29aa3ec2cc84c16f3282715dc9fca4
    • Instruction Fuzzy Hash: 7D2107B1A01228BFDB119F95DD88DEFBFBCEF49754B104066F509E2240D7349A41CBA4
    APIs
    • RegOpenKeyExW.ADVAPI32(?,80000002,00000000,00000000,?,0000000C,00414BA8,80000002,?,00000000,80000004,?,80000004,00000101), ref: 00405B02
    • RegQueryInfoKeyW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00405B2A
    • RegCloseKey.ADVAPI32(?), ref: 00405B8B
      • Part of subcall function 00404EAB: RtlAllocateHeap.NTDLL(00000008,-00000004), ref: 00404EC3
    • RegEnumKeyExW.ADVAPI32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000104,?), ref: 00405B70
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocateCloseEnumHeapInfoOpenQuery
    • String ID: p
    • API String ID: 79905894-2181537457
    • Opcode ID: fcc0f04dcc2990d29ea97bfc5bf1f946e5fbdeeb452cb9ad7d8b28dd5c7e85df
    • Instruction ID: 4659c6dd2db164814af5c74531739fe8379935b17861b01e63ab91215f33c974
    • Opcode Fuzzy Hash: fcc0f04dcc2990d29ea97bfc5bf1f946e5fbdeeb452cb9ad7d8b28dd5c7e85df
    • Instruction Fuzzy Hash: 6D212A71901118BFDB219F96DD48DEFBFBCEF49754B004066F809E2250D734AA41CBA4
    APIs
    • RegOpenKeyExW.ADVAPI32(80000002,00000001,00000000,00000001,00000000,?,?,?), ref: 004059DB
    • RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,?), ref: 004059F4
    • RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000000,00000000,?), ref: 00405A1E
    • RegCloseKey.ADVAPI32(00000000), ref: 00405A33
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: QueryValue$CloseOpen
    • String ID: p
    • API String ID: 1586453840-2181537457
    • Opcode ID: 1e1a48a50e87a1d6d4d9f908bd0cd47c7c24171afe7967bd192c0825355f52d0
    • Instruction ID: 181d92b4c8150ffe79d116bba498cf6b0d4d091711c9081e6bb2855d3830407c
    • Opcode Fuzzy Hash: 1e1a48a50e87a1d6d4d9f908bd0cd47c7c24171afe7967bd192c0825355f52d0
    • Instruction Fuzzy Hash: E4112671A00508BFDB219F95CC88DEFBF7AFB84754B508166F901A2260E3349E50DF64
    APIs
    • CreateFileW.KERNEL32(00000000,40000000,00000001,00000000,00000002,00000080,00000000,00000000,00000000,?,?,?,00414138,?,00000000,?), ref: 00404BE8
    • WriteFile.KERNEL32(00000000,?,8AA,00000000,00000000,?,00414138,?,00000000,?), ref: 00404C0B
    • CloseHandle.KERNEL32(00000000,?,00414138,?,00000000,?), ref: 00404C18
    • DeleteFileW.KERNEL32(00000000,?,00414138,?,00000000,?), ref: 00404C26
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: File$CloseCreateDeleteHandleWrite
    • String ID: 8AA
    • API String ID: 656945655-1031823992
    • Opcode ID: a0ec578e906b5ba35e8b491669ca7ef15f49042a5f37ecc34628d32a2ccd2aa2
    • Instruction ID: e312bcca5666c2f4f790f24bab3cad1eb1922108b339b2b114f4ebf39fa5c7da
    • Opcode Fuzzy Hash: a0ec578e906b5ba35e8b491669ca7ef15f49042a5f37ecc34628d32a2ccd2aa2
    • Instruction Fuzzy Hash: 6D01AD71409248BFEF111FA08C48FEE3B68EB45360F048179FA50621E0D3754E458B64
    APIs
    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,00413E64,?), ref: 0040648D
    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,00413E64,?), ref: 004064A1
    • FileTimeToSystemTime.KERNEL32(?,d>A,?,?,?,00413E64,?), ref: 004064BA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Time$FileSystem
    • String ID: d>A$d>A
    • API String ID: 2086374402-2582024514
    • Opcode ID: adc8e36154be0d079bfb275c6732458b9ef8cff690ff206a2f1399756dcc4060
    • Instruction ID: 62224ee6774ae8b78034f3a60de505545d6ba04fca9e53ab2c9371a3c230174a
    • Opcode Fuzzy Hash: adc8e36154be0d079bfb275c6732458b9ef8cff690ff206a2f1399756dcc4060
    • Instruction Fuzzy Hash: 1CF0FF7AD0011DFBCF019FA9D8489CEBBBCEA48655B0181A6EA19A3114D634A6498BA4
    APIs
    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,00000000,00000000,00000000,?,00000000,00000031), ref: 00413EE3
    • LoadLibraryA.KERNEL32(?), ref: 00413F58
    • VirtualProtect.KERNEL32(00000000,?,00000002,?), ref: 00413FCD
    • VirtualFree.KERNEL32(?,?,00004000), ref: 00413FFE
    • VirtualProtect.KERNEL32(?,?,?,?), ref: 0041403F
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Virtual$Protect$AllocFreeLibraryLoad
    • String ID:
    • API String ID: 90962928-0
    • Opcode ID: f791cf7a9550d6329176ee1bda85158125c2f50f71a086ac02e9e1274acc6c29
    • Instruction ID: 19d78efe76cc26541039a5d7913da310be6636b7ff9dc4ba670cb481fcde2d22
    • Opcode Fuzzy Hash: f791cf7a9550d6329176ee1bda85158125c2f50f71a086ac02e9e1274acc6c29
    • Instruction Fuzzy Hash: 6751A175A00705AFDB20CF55CC84FE67BB5FF88315F14846AEA059B251D738EA82CB58
    APIs
    • PathFindExtensionA.SHLWAPI(?,?,00000000,00000031), ref: 00414102
      • Part of subcall function 00413EC6: VirtualAlloc.KERNEL32(00000000,?,00003000,00000040,00000000,00000000,00000000,00000000,?,00000000,00000031), ref: 00413EE3
      • Part of subcall function 00413EC6: VirtualProtect.KERNEL32(00000000,?,00000002,?), ref: 00413FCD
    • CreateThread.KERNEL32(00000000,00000000,004050F0,00000000,00000000,00000000), ref: 004140D1
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004140E1
    • CloseHandle.KERNEL32(00000000), ref: 004140E8
    • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 004140F5
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Virtual$AllocCloseCreateExtensionFindFreeHandleObjectPathProtectSingleThreadWait
    • String ID:
    • API String ID: 248983594-0
    • Opcode ID: ea3605a9d323946bc61b7faccc9b8e1bfbca0fb761fb71cf2cad8dcc6b35fc97
    • Instruction ID: 1fd631035d38c11dd4dca8261721d85a0394e2d27002a17067acf375899f0d5c
    • Opcode Fuzzy Hash: ea3605a9d323946bc61b7faccc9b8e1bfbca0fb761fb71cf2cad8dcc6b35fc97
    • Instruction Fuzzy Hash: 642125728001187ADB106B649C89DEF376DDB81368F14013FFA10B62C1DA388EC586AC
    APIs
    • _malloc.LIBCMT ref: 007A8C91
      • Part of subcall function 007A510D: __FF_MSGBANNER.LIBCMT ref: 007A5126
      • Part of subcall function 007A510D: __NMSG_WRITE.LIBCMT ref: 007A512D
      • Part of subcall function 007A510D: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,007A445D,?), ref: 007A5152
    • _free.LIBCMT ref: 007A8CA4
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: AllocateHeap_free_malloc
    • String ID:
    • API String ID: 1020059152-0
    • Opcode ID: e62985e7e6789076ed1bc6b4840851d40973ade6df2e44df0c42a207d78d8494
    • Instruction ID: c135799619e70c89f0f78ac3a8c813dfec2b818690833b2681f378ca661ab166
    • Opcode Fuzzy Hash: e62985e7e6789076ed1bc6b4840851d40973ade6df2e44df0c42a207d78d8494
    • Instruction Fuzzy Hash: CA110832902A11EBCB312B34EC0865A37969FC33B0F244755F8459A150EE3CCD408BB6
    APIs
    • __getptd.LIBCMT ref: 007A8266
      • Part of subcall function 007A64CC: __getptd_noexit.LIBCMT ref: 007A64CF
      • Part of subcall function 007A64CC: __amsg_exit.LIBCMT ref: 007A64DC
    • __getptd.LIBCMT ref: 007A827D
    • __amsg_exit.LIBCMT ref: 007A828B
    • __lock.LIBCMT ref: 007A829B
    • __updatetlocinfoEx_nolock.LIBCMT ref: 007A82AF
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
    • String ID:
    • API String ID: 938513278-0
    • Opcode ID: dd125564e6e9fcfa156f6af8895a4d1da27018628faace160713f42e4c19e748
    • Instruction ID: 200ac39e248fcefc6df6e1b94e90becd37db1dce45cd6637707d3a632952dd11
    • Opcode Fuzzy Hash: dd125564e6e9fcfa156f6af8895a4d1da27018628faace160713f42e4c19e748
    • Instruction Fuzzy Hash: D6F09032A44B10DBDBB0BB74980AB6D37A07F83720F188709F515A76D2DF2C5D408A5B
    APIs
    • LoadLibraryA.KERNEL32(?,00000000,?,00000031), ref: 0041131F
      • Part of subcall function 00405192: LoadLibraryA.KERNEL32(?,?,?,?,?,004072F6,98ED24FB), ref: 0040526D
    • FreeLibrary.KERNEL32(00000000), ref: 004115AB
      • Part of subcall function 00416E8E: RtlGetVersion.NTDLL(?), ref: 00416EAB
      • Part of subcall function 00404F2C: HeapFree.KERNEL32(00000000,00000000,?,00404F0C,0041A778,?,0040F172,?,00413CC0,00000000,?,?,00413182,?), ref: 00404F40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Library$FreeLoad$HeapVersion
    • String ID: 4$8
    • API String ID: 2294480396-97111398
    • Opcode ID: e96ea99d3d67079c3c40f3da4a3396d77189df7c1f4810a95be94a213226a20b
    • Instruction ID: da08ae2bdbddc67e45404d6be35d999ed2b863f5bf8dbd1cc8a5796a08cd29d6
    • Opcode Fuzzy Hash: e96ea99d3d67079c3c40f3da4a3396d77189df7c1f4810a95be94a213226a20b
    • Instruction Fuzzy Hash: 97918F71D00618ABCF21DB95CC45AEFBBBAEF84700F14456BE505B7261D7399E80CBA8
    APIs
    • SHGetFolderPathW.SHELL32(00000000,0000001A,?,00000000,?,?,00415240,00000000,?,?,00000000,00000000,?,00000000,?), ref: 00414F48
    • CloseHandle.KERNEL32(?,?,00415240,00000000,?,?,00000000,00000000,?,00000000,?), ref: 00414FE2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: CloseFolderHandlePath
    • String ID: @RA$@RA
    • API String ID: 1943059022-724470139
    • Opcode ID: 9db2bd3b9ce3174623cf6424b750cee39d999d3e999ed14b03181c7b8e0b245a
    • Instruction ID: 7d3bd842f0370e2a21f54626ff5449ef890e8a7442342d7b05add279836dd212
    • Opcode Fuzzy Hash: 9db2bd3b9ce3174623cf6424b750cee39d999d3e999ed14b03181c7b8e0b245a
    • Instruction Fuzzy Hash: 23413A7290011AAFCF10DF95CC949EFBBB9FF48304F10446AE611B6290DB399E91CBA4
    APIs
    • GetLogicalDrives.KERNEL32 ref: 00410C17
      • Part of subcall function 00405DBA: wvnsprintfW.SHLWAPI(?,00000104,00000000,?), ref: 00405DDC
      • Part of subcall function 004108E4: FindFirstFileW.KERNEL32(QRA,?,00000000,00000000,00000000), ref: 0041092E
      • Part of subcall function 004108E4: FindNextFileW.KERNEL32(?,?), ref: 00410B08
      • Part of subcall function 00404F2C: HeapFree.KERNEL32(00000000,00000000,?,00404F0C,0041A778,?,0040F172,?,00413CC0,00000000,?,?,00413182,?), ref: 00404F40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: FileFind$DrivesFirstFreeHeapLogicalNextwvnsprintf
    • String ID: %s\%c$A$\\?\%c:
    • API String ID: 1843991470-1503768234
    • Opcode ID: a1edfc6e9cabf554445d2a185e10a61f255003450b096631e2ac9218a3463a49
    • Instruction ID: 2679cea3a276ca4328893308c8c2b4d0c4727979c0711d4b4784de73a077c24f
    • Opcode Fuzzy Hash: a1edfc6e9cabf554445d2a185e10a61f255003450b096631e2ac9218a3463a49
    • Instruction Fuzzy Hash: 4801B172A00608BBEB15AB94D9466DEBBB5DF00318F10406BE900762C2D7B95EC19FE9
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,00000000,00000000,?,?,?,0040F3AD,?,?,00000000), ref: 00404A98
    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F3AD,?,?,00000000,00000104,?,0040F5FC,?,?,?), ref: 00404AA7
    • ReadFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,?,0040F3AD,?,?,00000000,00000104,?,0040F5FC,?), ref: 00404AC8
    • CloseHandle.KERNEL32(00000000,?,?,?,0040F3AD,?,?,00000000,00000104,?,0040F5FC,?,?,?), ref: 00404ADB
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: File$CloseCreateHandleReadSize
    • String ID:
    • API String ID: 3919263394-0
    • Opcode ID: b028bbf5e78a84a3989ba24cfca3f53e27e424d55d47b694da6f965884ede5ee
    • Instruction ID: 35ced7b7e6b8fcb80760e5361844cac7ae60d847a3c82796c2aff2ab1ebf9c76
    • Opcode Fuzzy Hash: b028bbf5e78a84a3989ba24cfca3f53e27e424d55d47b694da6f965884ede5ee
    • Instruction Fuzzy Hash: C2F081B1640218BFFB119FA4DC89FEB366CEB04354F004179FA01A62D0D7B49E018B68
    APIs
    • GetDesktopWindow.USER32 ref: 00415B18
    • GetWindowDC.USER32(00000000,?,?,?,00413DC6,?), ref: 00415B21
    • EnumDisplayMonitors.USER32(00000000,00000000,004158F7,?,?,?,?,00413DC6,?), ref: 00415B34
    • ReleaseDC.USER32(00000000,00000000), ref: 00415B3C
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: Window$DesktopDisplayEnumMonitorsRelease
    • String ID:
    • API String ID: 3138938612-0
    • Opcode ID: 09942aec3327468421f9ad7013ce1eabb26cd18543247e64c5682214829e7bf5
    • Instruction ID: 79ebf71b1ab3dc720c427369539a26d712b4a8fa409b07612e71690da23c6d59
    • Opcode Fuzzy Hash: 09942aec3327468421f9ad7013ce1eabb26cd18543247e64c5682214829e7bf5
    • Instruction Fuzzy Hash: 670121B2900118AF9B10DFA5DC889EFBFBCFF89751B004126F902E2110D7345A41CBA4
    APIs
    • GetTempPathW.KERNEL32(000000F6,?,00000000), ref: 00404C4A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107276262.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_NLRpif3sEB.jbxd
    Similarity
    • API ID: PathTemp
    • String ID: "AA$%08x.%s
    • API String ID: 2920410445-3318964645
    • Opcode ID: c89cc8e68427bbb63d604f05537d755ce9629acc9bc5e5b3f558cfa4640d61b0
    • Instruction ID: a8c78cdc698b28e01514b2981d1d0c4832bbd0bd718657f1769f43814eb44599
    • Opcode Fuzzy Hash: c89cc8e68427bbb63d604f05537d755ce9629acc9bc5e5b3f558cfa4640d61b0
    • Instruction Fuzzy Hash: F7F08CF160512867EF206A258C45AEB231CDBC1308F0580B7BB04B62C1C67D9E9686A8
    APIs
    • DecodePointer.KERNEL32(?,007A6BB8,00000000,00000000,00000000,00000000,00000000,007A7681,?,007A5A5E,00000003,007A6C95,007ABC40,0000000C,007A6D51,]Dz), ref: 007A6B8A
    • __invoke_watson.LIBCMT ref: 007A6BA6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: DecodePointer__invoke_watson
    • String ID: ]Dz
    • API String ID: 4034010525-3219158738
    • Opcode ID: a58abab4c5cd0933b1016a3fcd90b5e2346e381d307a25c01d427331c07e2a1a
    • Instruction ID: a341a9404c5f1b4474ba8471716c8c20c92b228c957d0c62c3637073c76ff66f
    • Opcode Fuzzy Hash: a58abab4c5cd0933b1016a3fcd90b5e2346e381d307a25c01d427331c07e2a1a
    • Instruction Fuzzy Hash: AFE0ECB2000109FBDF022FA1DC09CAA3F6AEB96750B594460FD14C5031E73AC871DBA5
    APIs
    • ___crtCorExitProcess.LIBCMT ref: 007A55CA
      • Part of subcall function 007A5597: GetModuleHandleW.KERNEL32(mscoree.dll,]Dz,007A55CF,]Dz,?,007A6CA6,000000FF,0000001E,007ABC40,0000000C,007A6D51,]Dz,]Dz,?,007A63E9,0000000D), ref: 007A55A1
      • Part of subcall function 007A5597: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007A55B1
    • ExitProcess.KERNEL32 ref: 007A55D3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2107350122.0000000000771000.00000020.00000001.01000000.00000003.sdmp, Offset: 00770000, based on PE: true
    • Associated: 00000000.00000002.2107335308.0000000000770000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107428905.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107445842.00000000007AD000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2107519452.00000000007AF000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_770000_NLRpif3sEB.jbxd
    Similarity
    • API ID: ExitProcess$AddressHandleModuleProc___crt
    • String ID: ]Dz
    • API String ID: 2427264223-3219158738
    • Opcode ID: 6a4a52c7647a3a0698b12d84ad6488c459b0c1d82df7ac45c35798237ef07522
    • Instruction ID: ee597b200325d2df145ac888f6c71ebba8e5ff53bdd4191530df45c5dfe49c32
    • Opcode Fuzzy Hash: 6a4a52c7647a3a0698b12d84ad6488c459b0c1d82df7ac45c35798237ef07522
    • Instruction Fuzzy Hash: 48B09231000248FFCB012F12DC0E85E3F2BEBC23A0B108021F81809031EF7AAEA6DA95