Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3344.exe

Overview

General Information

Sample name:3344.exe
Analysis ID:1576286
MD5:c2fd049f5e4af19811db14b28e1d9bdc
SHA1:4ff988b0876061921d162e2077221f6a4923c976
SHA256:a908193949c9b3f45f3b409d4b28949014ae27e9bb1e962fd5e65ebbc97fb89e
Tags:exemalwaremeterpretertrojanuser-Joker
Infos:

Detection

Metasploit
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Found API chain indicative of debugger detection
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Found evasive API chain (date check)
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Yara signature match

Classification

  • System is w10x64
  • 3344.exe (PID: 5424 cmdline: "C:\Users\user\Desktop\3344.exe" MD5: C2FD049F5E4AF19811DB14B28E1D9BDC)
  • cleanup
{"Type": "Metasploit Connect", "IP": "45.43.36.223", "Port": 3344}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3314997826.000000000062C000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.3314997826.000000000062C000.00000004.00000010.00020000.00000000.sdmpWindows_Trojan_Metasploit_91bc5d7dunknownunknown
    • 0x3a09:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
    • 0x3c79:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
    00000000.00000002.3314907968.00000000001C0000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      00000000.00000002.3314907968.00000000001C0000.00000020.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_91bc5d7dunknownunknown
      • 0xd7:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000000.00000002.3314907968.00000000001C0000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "45.43.36.223", "Port": 3344}
      Source: 3344.exeReversingLabs: Detection: 79%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.9% probability
      Source: global trafficTCP traffic: 192.168.2.5:49704 -> 45.43.36.223:3344
      Source: Joe Sandbox ViewASN Name: UHGL-AS-APUCloudHKHoldingsGroupLimitedHK UHGL-AS-APUCloudHKHoldingsGroupLimitedHK
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: unknownTCP traffic detected without corresponding DNS query: 45.43.36.223
      Source: C:\Users\user\Desktop\3344.exeCode function: 0_2_001C00D6 LoadLibraryA,WSASocketA,connect,recv,closesocket,0_2_001C00D6

      System Summary

      barindex
      Source: 00000000.00000002.3314997826.000000000062C000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
      Source: 00000000.00000002.3314907968.00000000001C0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
      Source: 3344.exeStatic PE information: Number of sections : 18 > 10
      Source: 00000000.00000002.3314997826.000000000062C000.00000004.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
      Source: 00000000.00000002.3314907968.00000000001C0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
      Source: classification engineClassification label: mal80.troj.evad.winEXE@1/0@0/1
      Source: 3344.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\3344.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 3344.exeReversingLabs: Detection: 79%
      Source: C:\Users\user\Desktop\3344.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\3344.exeSection loaded: mswsock.dllJump to behavior
      Source: 3344.exeStatic PE information: section name: .xdata
      Source: 3344.exeStatic PE information: section name: /4
      Source: 3344.exeStatic PE information: section name: /19
      Source: 3344.exeStatic PE information: section name: /31
      Source: 3344.exeStatic PE information: section name: /45
      Source: 3344.exeStatic PE information: section name: /57
      Source: 3344.exeStatic PE information: section name: /70
      Source: 3344.exeStatic PE information: section name: /81
      Source: 3344.exeStatic PE information: section name: /92
      Source: C:\Users\user\Desktop\3344.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-4952
      Source: C:\Users\user\Desktop\3344.exeAPI coverage: 9.7 %
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: 3344.exe, 00000000.00000002.3315010379.0000000000750000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll1

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\3344.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-4267
      Source: C:\Users\user\Desktop\3344.exeCode function: 0_2_004091E0 free,IsDebuggerPresent,RaiseException,0_2_004091E0
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\3344.exeCode function: 0_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,_initterm,GetStartupInfoA,0_2_00401180
      Source: C:\Users\user\Desktop\3344.exeCode function: 0_2_004050F0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_004050F0
      Source: C:\Users\user\Desktop\3344.exeCode function: 0_2_00411498 SetUnhandledExceptionFilter,0_2_00411498
      Source: C:\Users\user\Desktop\3344.exeCode function: 0_2_0040B259 SetUnhandledExceptionFilter,0_2_0040B259
      Source: C:\Users\user\Desktop\3344.exeCode function: 0_2_00409470 GetSystemTimeAsFileTime,0_2_00409470

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.3314997826.000000000062C000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.3314907968.00000000001C0000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote ServicesData from Local System1
      Non-Standard Port
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      DLL Side-Loading
      LSASS Memory111
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      3344.exe79%ReversingLabsWin64.Backdoor.Meterpreter
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      45.43.36.223
      unknownUnited States
      135377UHGL-AS-APUCloudHKHoldingsGroupLimitedHKtrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1576286
      Start date and time:2024-12-16 18:13:07 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 51s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:3344.exe
      Detection:MAL
      Classification:mal80.troj.evad.winEXE@1/0@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 9
      • Number of non-executed functions: 47
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • VT rate limit hit for: 3344.exe
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      45.43.36.223m.elfGet hashmaliciousUnknownBrowse
        5544x64.elfGet hashmaliciousConnectBackBrowse
          shell64.elfGet hashmaliciousConnectBackBrowse
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            UHGL-AS-APUCloudHKHoldingsGroupLimitedHKm.elfGet hashmaliciousUnknownBrowse
            • 45.43.36.223
            5544x64.elfGet hashmaliciousConnectBackBrowse
            • 45.43.36.223
            rebirth.mpsl.elfGet hashmaliciousMirai, OkiruBrowse
            • 128.1.49.123
            ORDER-401.exeGet hashmaliciousFormBookBrowse
            • 107.155.56.30
            MAERSK LINE SHIPPING DOC_4253.exeGet hashmaliciousFormBookBrowse
            • 107.155.56.30
            New Purchase Order.exeGet hashmaliciousFormBookBrowse
            • 107.155.56.30
            Docs.exeGet hashmaliciousFormBook, PureLog StealerBrowse
            • 107.155.56.30
            nabppc.elfGet hashmaliciousUnknownBrowse
            • 107.155.48.54
            shell64.elfGet hashmaliciousConnectBackBrowse
            • 45.43.36.223
            XFO-E2024-013 SMP-10.3-F01-2210 Host spare parts.exeGet hashmaliciousFormBook, PureLog StealerBrowse
            • 107.155.56.30
            No context
            No context
            No created / dropped files found
            File type:PE32+ executable (GUI) x86-64, for MS Windows
            Entropy (8bit):5.575277699276052
            TrID:
            • Win64 Executable GUI (202006/5) 92.64%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • VXD Driver (31/22) 0.01%
            File name:3344.exe
            File size:152'748 bytes
            MD5:c2fd049f5e4af19811db14b28e1d9bdc
            SHA1:4ff988b0876061921d162e2077221f6a4923c976
            SHA256:a908193949c9b3f45f3b409d4b28949014ae27e9bb1e962fd5e65ebbc97fb89e
            SHA512:0c3c5727dc92dc43c835d2130c660f727faa87a23f2e21a00a6df69a1399c66d5c327309560adadadf6e18f6b6bceb725ddbfb6c9637ad73f5ae14a75bc9665c
            SSDEEP:3072:6Pm7brhtbDKROb953j/wmIIrXt8i8NI/FDjV/+1EdB/:6Pm7brhVWa953j/bIwXt8xEjV/+1EdB/
            TLSH:64E3F9D57BD40CEED905423C84E6D322673EF4D082634B0B6A31B7311E17ED16EDAA6A
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...OYTg.n........'...........................@.............................. .......y........ ............................
            Icon Hash:13170f0f8f060c0c
            Entrypoint:0x4014b0
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
            DLL Characteristics:
            Time Stamp:0x6754594F [Sat Dec 7 14:18:55 2024 UTC]
            TLS Callbacks:0x405220
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:5b928a8f4e4a094efc0701738c18f7f0
            Instruction
            dec eax
            sub esp, 28h
            dec eax
            mov eax, dword ptr [0000C935h]
            mov dword ptr [eax], 00000001h
            call 00007F79E5479B3Fh
            call 00007F79E5475CAAh
            nop
            nop
            dec eax
            add esp, 28h
            ret
            nop dword ptr [eax+00h]
            nop word ptr [eax+eax+00000000h]
            dec eax
            sub esp, 28h
            dec eax
            mov eax, dword ptr [0000C905h]
            mov dword ptr [eax], 00000000h
            call 00007F79E5479B0Fh
            call 00007F79E5475C7Ah
            nop
            nop
            dec eax
            add esp, 28h
            ret
            nop dword ptr [eax+00h]
            nop word ptr [eax+eax+00000000h]
            dec eax
            sub esp, 28h
            call 00007F79E547B1C4h
            dec eax
            test eax, eax
            sete al
            movzx eax, al
            neg eax
            dec eax
            add esp, 28h
            ret
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            dec eax
            lea ecx, dword ptr [00000009h]
            jmp 00007F79E5475FC9h
            nop dword ptr [eax+00h]
            ret
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            nop
            push edi
            push esi
            push ebx
            dec eax
            sub esp, 20h
            dec eax
            mov eax, dword ptr [ecx]
            dec eax
            test eax, eax
            dec eax
            mov esi, ecx
            dec eax
            mov ebx, edx
            je 00007F79E5476032h
            dec eax
            mov edi, dword ptr [eax]
            dec eax
            mov eax, dword ptr [edx]
            dec eax
            cmp dword ptr [edx+08h], eax
            jnle 00007F79E5475FFAh
            dec eax
            mov ecx, edx
            call 00007F79E547840Fh
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x110000xe28.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x140000x1398.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe0000xf6c.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0xd7200x28.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x113580x308.idata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xa4d80xa600a2b3f3abc3fa63f379a0662169f7459aFalse0.5587584713855421data6.171384214115333IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .data0xc0000x5600x6009f0b37e587a9a2b0a00cf2880260cd37False0.4309895833333333data3.9515367953932268IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rdata0xd0000xe500x1000b3e3aa802b225cec638f69a84941874dFalse0.379150390625data4.29555985877433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
            .pdata0xe0000xf6c0x1000928545e4ac7851c53bbb650d6ea5fd60False0.455078125data4.533340610576811IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
            .xdata0xf0000xc880xe00cb206662c211b9eb5a83839b3fd392deFalse0.19921875data3.707790104287517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
            .bss0x100000xae00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .idata0x110000xe280x1000aaa93e08234604a959bdc3835082e374False0.299560546875data4.114530536451111IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .CRT0x120000x700x2004e74fd0d4b00a683ad4eb4fc34090084False0.078125data0.3281187745953951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .tls0x130000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x140000x13980x13989c0bdd5191b101b77b3c9352dd1333beFalse0.24561403508771928data3.911992311561148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            /40x160000x800x2000c45878a7b8aab977175e41d0aafb1f6False0.1015625data0.39045257474477IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /190x170000x475e0x48000a92d7ddc53616cb05fcd997534c4ed7False0.3926866319444444data5.958908140921361IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /310x1c0000x5000x600376602388f36e2131f481e79b13268c6False0.3111979166666667data4.2370580733237615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /450x1d0000x7040x80060b8788e399a725f8e966a34043e6ccbFalse0.4345703125data5.106197583426308IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /570x1e0000x1300x200f702b75bf874d9585c7a98dd44affa4eFalse0.375data2.649450423169222IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /700x1f0000x12c0x200da6bb64456072fa6a17880b326fe66d6False0.375data3.8316609167251707IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /810x200000x74e0x80078803b79751d58899dd3958cbc59ed79False0.2177734375data1.7520564810585573IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            /920x210000x1f00x20086fa71369197029a259ef41e9e0d6f40False0.193359375data0.9967668471309872IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x140f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.1977016885553471
            RT_GROUP_ICON0x151a00x14dataEnglishUnited States1.1
            RT_MANIFEST0x151b80x1caXML 1.0 document, ASCII text, with very long lines (456), with CRLF line terminatorsEnglishUnited States0.5764192139737991
            DLLImport
            KERNEL32.dllAddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetHandleInformation, GetLastError, GetProcAddress, GetProcessAffinityMask, GetStartupInfoA, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount, InitializeCriticalSection, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, OutputDebugStringA, QueryPerformanceCounter, RaiseException, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlAddFunctionTable, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetEvent, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SuspendThread, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnhandledExceptionFilter, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject
            msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _beginthreadex, _cexit, _endthreadex, _fileno, _fmode, _initterm, _onexit, _setjmp, _setmode, _strdup, _ultoa, abort, calloc, exit, fflush, fprintf, free, fwrite, longjmp, malloc, memcpy, memmove, memset, printf, realloc, signal, strlen, strncmp, vfprintf
            USER32.dllMessageBoxA
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Dec 16, 2024 18:14:00.831334114 CET497043344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:00.951523066 CET33444970445.43.36.223192.168.2.5
            Dec 16, 2024 18:14:00.951678038 CET497043344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:03.537416935 CET33444970445.43.36.223192.168.2.5
            Dec 16, 2024 18:14:03.537509918 CET497043344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:03.538579941 CET497043344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:03.540550947 CET497053344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:03.658427954 CET33444970445.43.36.223192.168.2.5
            Dec 16, 2024 18:14:03.660320997 CET33444970545.43.36.223192.168.2.5
            Dec 16, 2024 18:14:03.660444021 CET497053344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:06.248842955 CET33444970545.43.36.223192.168.2.5
            Dec 16, 2024 18:14:06.248924971 CET497053344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:06.249921083 CET497053344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:06.251626015 CET497063344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:06.369956017 CET33444970545.43.36.223192.168.2.5
            Dec 16, 2024 18:14:06.371473074 CET33444970645.43.36.223192.168.2.5
            Dec 16, 2024 18:14:06.371562958 CET497063344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:08.963439941 CET33444970645.43.36.223192.168.2.5
            Dec 16, 2024 18:14:08.963552952 CET497063344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:08.964210987 CET497063344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:08.965579033 CET497073344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:09.084964991 CET33444970645.43.36.223192.168.2.5
            Dec 16, 2024 18:14:09.085911036 CET33444970745.43.36.223192.168.2.5
            Dec 16, 2024 18:14:09.085998058 CET497073344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:11.663192987 CET33444970745.43.36.223192.168.2.5
            Dec 16, 2024 18:14:11.663300991 CET497073344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:11.664304972 CET497073344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:11.665736914 CET497083344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:11.784656048 CET33444970745.43.36.223192.168.2.5
            Dec 16, 2024 18:14:11.785868883 CET33444970845.43.36.223192.168.2.5
            Dec 16, 2024 18:14:11.786022902 CET497083344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:14.368704081 CET33444970845.43.36.223192.168.2.5
            Dec 16, 2024 18:14:14.368846893 CET497083344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:14.369563103 CET497083344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:14.371001005 CET497093344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:14.489404917 CET33444970845.43.36.223192.168.2.5
            Dec 16, 2024 18:14:14.491014957 CET33444970945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:14.491110086 CET497093344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:17.086855888 CET33444970945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:17.086982965 CET497093344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:17.087636948 CET497093344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:17.088948011 CET497113344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:17.207417965 CET33444970945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:17.208807945 CET33444971145.43.36.223192.168.2.5
            Dec 16, 2024 18:14:17.208895922 CET497113344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:19.805835009 CET33444971145.43.36.223192.168.2.5
            Dec 16, 2024 18:14:19.807507038 CET497113344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:19.827013969 CET497113344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:19.828392982 CET497183344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:19.947160959 CET33444971145.43.36.223192.168.2.5
            Dec 16, 2024 18:14:19.948503017 CET33444971845.43.36.223192.168.2.5
            Dec 16, 2024 18:14:19.948617935 CET497183344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:22.558554888 CET33444971845.43.36.223192.168.2.5
            Dec 16, 2024 18:14:22.558645010 CET497183344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:22.559384108 CET497183344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:22.560765028 CET497263344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:22.681360006 CET33444971845.43.36.223192.168.2.5
            Dec 16, 2024 18:14:22.682564020 CET33444972645.43.36.223192.168.2.5
            Dec 16, 2024 18:14:22.682673931 CET497263344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:25.274336100 CET33444972645.43.36.223192.168.2.5
            Dec 16, 2024 18:14:25.274444103 CET497263344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:25.275165081 CET497263344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:25.276552916 CET497333344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:25.395612001 CET33444972645.43.36.223192.168.2.5
            Dec 16, 2024 18:14:25.396958113 CET33444973345.43.36.223192.168.2.5
            Dec 16, 2024 18:14:25.397057056 CET497333344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:27.991339922 CET33444973345.43.36.223192.168.2.5
            Dec 16, 2024 18:14:27.995424986 CET497333344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:27.999154091 CET497333344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:28.001204014 CET497393344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:28.119118929 CET33444973345.43.36.223192.168.2.5
            Dec 16, 2024 18:14:28.121072054 CET33444973945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:28.121171951 CET497393344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:30.708434105 CET33444973945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:30.711249113 CET497393344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:30.711946011 CET497393344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:30.713340998 CET497503344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:30.832535982 CET33444973945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:30.833978891 CET33444975045.43.36.223192.168.2.5
            Dec 16, 2024 18:14:30.834145069 CET497503344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:33.416908979 CET33444975045.43.36.223192.168.2.5
            Dec 16, 2024 18:14:33.416990995 CET497503344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:33.418039083 CET497503344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:33.419981003 CET497563344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:33.542604923 CET33444975045.43.36.223192.168.2.5
            Dec 16, 2024 18:14:33.544770002 CET33444975645.43.36.223192.168.2.5
            Dec 16, 2024 18:14:33.544883966 CET497563344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:36.134063005 CET33444975645.43.36.223192.168.2.5
            Dec 16, 2024 18:14:36.134149075 CET497563344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:36.134850025 CET497563344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:36.136291027 CET497623344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:36.258658886 CET33444975645.43.36.223192.168.2.5
            Dec 16, 2024 18:14:36.260353088 CET33444976245.43.36.223192.168.2.5
            Dec 16, 2024 18:14:36.260602951 CET497623344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:38.851211071 CET33444976245.43.36.223192.168.2.5
            Dec 16, 2024 18:14:38.851376057 CET497623344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:38.852166891 CET497623344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:38.853635073 CET497683344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:38.971924067 CET33444976245.43.36.223192.168.2.5
            Dec 16, 2024 18:14:38.973356009 CET33444976845.43.36.223192.168.2.5
            Dec 16, 2024 18:14:38.973468065 CET497683344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:41.558701038 CET33444976845.43.36.223192.168.2.5
            Dec 16, 2024 18:14:41.558866978 CET497683344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:41.559624910 CET497683344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:41.561111927 CET497793344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:41.679505110 CET33444976845.43.36.223192.168.2.5
            Dec 16, 2024 18:14:41.680951118 CET33444977945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:41.681045055 CET497793344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:44.274085999 CET33444977945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:44.275420904 CET497793344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:44.328238964 CET497793344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:44.330948114 CET497843344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:44.447954893 CET33444977945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:44.450769901 CET33444978445.43.36.223192.168.2.5
            Dec 16, 2024 18:14:44.450915098 CET497843344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:47.056075096 CET33444978445.43.36.223192.168.2.5
            Dec 16, 2024 18:14:47.057281017 CET497843344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:47.069380999 CET497843344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:47.089075089 CET497893344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:47.189176083 CET33444978445.43.36.223192.168.2.5
            Dec 16, 2024 18:14:47.208868027 CET33444978945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:47.208962917 CET497893344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:49.822259903 CET33444978945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:49.822334051 CET497893344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:49.823051929 CET497893344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:49.825201035 CET497953344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:49.942785978 CET33444978945.43.36.223192.168.2.5
            Dec 16, 2024 18:14:49.945075035 CET33444979545.43.36.223192.168.2.5
            Dec 16, 2024 18:14:49.945422888 CET497953344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:52.572073936 CET33444979545.43.36.223192.168.2.5
            Dec 16, 2024 18:14:52.572410107 CET497953344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:52.572918892 CET497953344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:52.574311018 CET498043344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:52.692923069 CET33444979545.43.36.223192.168.2.5
            Dec 16, 2024 18:14:52.694406033 CET33444980445.43.36.223192.168.2.5
            Dec 16, 2024 18:14:52.694694996 CET498043344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:55.274838924 CET33444980445.43.36.223192.168.2.5
            Dec 16, 2024 18:14:55.275012016 CET498043344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:55.275770903 CET498043344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:55.277261019 CET498113344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:55.395469904 CET33444980445.43.36.223192.168.2.5
            Dec 16, 2024 18:14:55.397088051 CET33444981145.43.36.223192.168.2.5
            Dec 16, 2024 18:14:55.397193909 CET498113344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:57.984967947 CET33444981145.43.36.223192.168.2.5
            Dec 16, 2024 18:14:57.985069036 CET498113344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:57.985876083 CET498113344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:57.987339020 CET498173344192.168.2.545.43.36.223
            Dec 16, 2024 18:14:58.105865955 CET33444981145.43.36.223192.168.2.5
            Dec 16, 2024 18:14:58.107194901 CET33444981745.43.36.223192.168.2.5
            Dec 16, 2024 18:14:58.107311964 CET498173344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:00.696916103 CET33444981745.43.36.223192.168.2.5
            Dec 16, 2024 18:15:00.697460890 CET498173344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:00.698038101 CET498173344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:00.699450016 CET498253344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:00.817919970 CET33444981745.43.36.223192.168.2.5
            Dec 16, 2024 18:15:00.819221973 CET33444982545.43.36.223192.168.2.5
            Dec 16, 2024 18:15:00.819478035 CET498253344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:03.401262999 CET33444982545.43.36.223192.168.2.5
            Dec 16, 2024 18:15:03.401349068 CET498253344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:03.402187109 CET498253344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:03.403594017 CET498323344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:03.527616024 CET33444982545.43.36.223192.168.2.5
            Dec 16, 2024 18:15:03.527657986 CET33444983245.43.36.223192.168.2.5
            Dec 16, 2024 18:15:03.527743101 CET498323344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:06.099822044 CET33444983245.43.36.223192.168.2.5
            Dec 16, 2024 18:15:06.099904060 CET498323344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:06.100783110 CET498323344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:06.102372885 CET498403344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:06.220740080 CET33444983245.43.36.223192.168.2.5
            Dec 16, 2024 18:15:06.222327948 CET33444984045.43.36.223192.168.2.5
            Dec 16, 2024 18:15:06.222413063 CET498403344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:08.823896885 CET33444984045.43.36.223192.168.2.5
            Dec 16, 2024 18:15:08.824115038 CET498403344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:08.824738979 CET498403344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:08.826179981 CET498473344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:08.944782972 CET33444984045.43.36.223192.168.2.5
            Dec 16, 2024 18:15:08.945983887 CET33444984745.43.36.223192.168.2.5
            Dec 16, 2024 18:15:08.946073055 CET498473344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:11.542675972 CET33444984745.43.36.223192.168.2.5
            Dec 16, 2024 18:15:11.542803049 CET498473344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:11.543859959 CET498473344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:11.545851946 CET498543344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:11.663794041 CET33444984745.43.36.223192.168.2.5
            Dec 16, 2024 18:15:11.665863991 CET33444985445.43.36.223192.168.2.5
            Dec 16, 2024 18:15:11.665993929 CET498543344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:14.244231939 CET33444985445.43.36.223192.168.2.5
            Dec 16, 2024 18:15:14.244462013 CET498543344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:14.245166063 CET498543344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:14.246560097 CET498613344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:14.364974022 CET33444985445.43.36.223192.168.2.5
            Dec 16, 2024 18:15:14.366278887 CET33444986145.43.36.223192.168.2.5
            Dec 16, 2024 18:15:14.366380930 CET498613344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:16.948852062 CET33444986145.43.36.223192.168.2.5
            Dec 16, 2024 18:15:16.949145079 CET498613344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:16.950062037 CET498613344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:16.951509953 CET498693344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:17.069736004 CET33444986145.43.36.223192.168.2.5
            Dec 16, 2024 18:15:17.071368933 CET33444986945.43.36.223192.168.2.5
            Dec 16, 2024 18:15:17.071527004 CET498693344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:19.746897936 CET33444986945.43.36.223192.168.2.5
            Dec 16, 2024 18:15:19.747014046 CET498693344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:19.747728109 CET498693344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:19.749157906 CET498763344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:19.867513895 CET33444986945.43.36.223192.168.2.5
            Dec 16, 2024 18:15:19.868937016 CET33444987645.43.36.223192.168.2.5
            Dec 16, 2024 18:15:19.869049072 CET498763344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:22.522619009 CET33444987645.43.36.223192.168.2.5
            Dec 16, 2024 18:15:22.522744894 CET498763344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:22.524022102 CET498763344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:22.525650978 CET498823344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:22.644088984 CET33444987645.43.36.223192.168.2.5
            Dec 16, 2024 18:15:22.645411015 CET33444988245.43.36.223192.168.2.5
            Dec 16, 2024 18:15:22.645560026 CET498823344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:25.244973898 CET33444988245.43.36.223192.168.2.5
            Dec 16, 2024 18:15:25.245125055 CET498823344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:25.246124983 CET498823344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:25.248142004 CET498893344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:25.366215944 CET33444988245.43.36.223192.168.2.5
            Dec 16, 2024 18:15:25.368036985 CET33444988945.43.36.223192.168.2.5
            Dec 16, 2024 18:15:25.368180990 CET498893344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:27.976927996 CET33444988945.43.36.223192.168.2.5
            Dec 16, 2024 18:15:27.977066994 CET498893344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:27.977806091 CET498893344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:27.979218006 CET498963344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:28.098139048 CET33444988945.43.36.223192.168.2.5
            Dec 16, 2024 18:15:28.099582911 CET33444989645.43.36.223192.168.2.5
            Dec 16, 2024 18:15:28.099695921 CET498963344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:30.680150986 CET33444989645.43.36.223192.168.2.5
            Dec 16, 2024 18:15:30.680351019 CET498963344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:30.681102991 CET498963344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:30.682518005 CET499053344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:30.800954103 CET33444989645.43.36.223192.168.2.5
            Dec 16, 2024 18:15:30.802329063 CET33444990545.43.36.223192.168.2.5
            Dec 16, 2024 18:15:30.802536011 CET499053344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:33.383557081 CET33444990545.43.36.223192.168.2.5
            Dec 16, 2024 18:15:33.383687973 CET499053344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:33.384387016 CET499053344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:33.385751009 CET499113344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:33.504300117 CET33444990545.43.36.223192.168.2.5
            Dec 16, 2024 18:15:33.505733013 CET33444991145.43.36.223192.168.2.5
            Dec 16, 2024 18:15:33.505853891 CET499113344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:36.084721088 CET33444991145.43.36.223192.168.2.5
            Dec 16, 2024 18:15:36.084834099 CET499113344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:36.085479975 CET499113344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:36.086790085 CET499183344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:36.205223083 CET33444991145.43.36.223192.168.2.5
            Dec 16, 2024 18:15:36.206624985 CET33444991845.43.36.223192.168.2.5
            Dec 16, 2024 18:15:36.206737995 CET499183344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:38.847851992 CET33444991845.43.36.223192.168.2.5
            Dec 16, 2024 18:15:38.847964048 CET499183344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:38.848701000 CET499183344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:38.850182056 CET499243344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:38.968413115 CET33444991845.43.36.223192.168.2.5
            Dec 16, 2024 18:15:38.969966888 CET33444992445.43.36.223192.168.2.5
            Dec 16, 2024 18:15:38.970091105 CET499243344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:41.870351076 CET33444992445.43.36.223192.168.2.5
            Dec 16, 2024 18:15:41.870443106 CET499243344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:41.871148109 CET499243344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:41.872579098 CET499313344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:41.990998030 CET33444992445.43.36.223192.168.2.5
            Dec 16, 2024 18:15:41.992614985 CET33444993145.43.36.223192.168.2.5
            Dec 16, 2024 18:15:41.992732048 CET499313344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:44.573101997 CET33444993145.43.36.223192.168.2.5
            Dec 16, 2024 18:15:44.573177099 CET499313344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:44.573782921 CET499313344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:44.574976921 CET499393344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:44.693512917 CET33444993145.43.36.223192.168.2.5
            Dec 16, 2024 18:15:44.694788933 CET33444993945.43.36.223192.168.2.5
            Dec 16, 2024 18:15:44.694876909 CET499393344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:47.273952961 CET33444993945.43.36.223192.168.2.5
            Dec 16, 2024 18:15:47.274097919 CET499393344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:47.274804115 CET499393344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:47.276213884 CET499453344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:47.394484043 CET33444993945.43.36.223192.168.2.5
            Dec 16, 2024 18:15:47.396086931 CET33444994545.43.36.223192.168.2.5
            Dec 16, 2024 18:15:47.396239042 CET499453344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:49.977591991 CET33444994545.43.36.223192.168.2.5
            Dec 16, 2024 18:15:49.981458902 CET499453344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:49.982176065 CET499453344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:49.983526945 CET499523344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:50.101902008 CET33444994545.43.36.223192.168.2.5
            Dec 16, 2024 18:15:50.103267908 CET33444995245.43.36.223192.168.2.5
            Dec 16, 2024 18:15:50.103498936 CET499523344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:52.681541920 CET33444995245.43.36.223192.168.2.5
            Dec 16, 2024 18:15:52.681617022 CET499523344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:52.682229996 CET499523344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:52.683370113 CET499603344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:52.803116083 CET33444995245.43.36.223192.168.2.5
            Dec 16, 2024 18:15:52.804933071 CET33444996045.43.36.223192.168.2.5
            Dec 16, 2024 18:15:52.805038929 CET499603344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:55.384546995 CET33444996045.43.36.223192.168.2.5
            Dec 16, 2024 18:15:55.384628057 CET499603344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:55.385565042 CET499603344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:55.387562990 CET499683344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:55.508440971 CET33444996045.43.36.223192.168.2.5
            Dec 16, 2024 18:15:55.510267019 CET33444996845.43.36.223192.168.2.5
            Dec 16, 2024 18:15:55.510356903 CET499683344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:58.090459108 CET33444996845.43.36.223192.168.2.5
            Dec 16, 2024 18:15:58.090886116 CET499683344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:58.091753960 CET499683344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:58.093588114 CET499743344192.168.2.545.43.36.223
            Dec 16, 2024 18:15:58.211846113 CET33444996845.43.36.223192.168.2.5
            Dec 16, 2024 18:15:58.213702917 CET33444997445.43.36.223192.168.2.5
            Dec 16, 2024 18:15:58.213815928 CET499743344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:00.792824030 CET33444997445.43.36.223192.168.2.5
            Dec 16, 2024 18:16:00.792932034 CET499743344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:00.793628931 CET499743344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:00.795084000 CET499813344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:00.913372993 CET33444997445.43.36.223192.168.2.5
            Dec 16, 2024 18:16:00.914875031 CET33444998145.43.36.223192.168.2.5
            Dec 16, 2024 18:16:00.914998055 CET499813344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:03.492968082 CET33444998145.43.36.223192.168.2.5
            Dec 16, 2024 18:16:03.493046999 CET499813344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:03.494129896 CET499813344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:03.496031046 CET499883344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:03.614263058 CET33444998145.43.36.223192.168.2.5
            Dec 16, 2024 18:16:03.615927935 CET33444998845.43.36.223192.168.2.5
            Dec 16, 2024 18:16:03.616058111 CET499883344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:06.197679043 CET33444998845.43.36.223192.168.2.5
            Dec 16, 2024 18:16:06.197860956 CET499883344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:06.198529959 CET499883344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:06.199951887 CET499963344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:06.318238020 CET33444998845.43.36.223192.168.2.5
            Dec 16, 2024 18:16:06.319741011 CET33444999645.43.36.223192.168.2.5
            Dec 16, 2024 18:16:06.319823027 CET499963344192.168.2.545.43.36.223
            Dec 16, 2024 18:16:08.947947979 CET33444999645.43.36.223192.168.2.5
            Dec 16, 2024 18:16:08.948065996 CET499963344192.168.2.545.43.36.223

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:12:13:59
            Start date:16/12/2024
            Path:C:\Users\user\Desktop\3344.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\3344.exe"
            Imagebase:0x400000
            File size:152'748 bytes
            MD5 hash:C2FD049F5E4AF19811DB14B28E1D9BDC
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3314997826.000000000062C000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000002.3314997826.000000000062C000.00000004.00000010.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3314907968.00000000001C0000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000002.3314907968.00000000001C0000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
            Reputation:low
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:6%
              Dynamic/Decrypted Code Coverage:0.6%
              Signature Coverage:3.3%
              Total number of Nodes:1413
              Total number of Limit Nodes:12
              execution_graph 4437 407c40 GetCurrentProcess GetProcessAffinityMask 4438 407c66 4437->4438 4419 408b40 4420 4074f0 34 API calls 4419->4420 4421 408b52 4420->4421 4422 408b67 4421->4422 4423 406820 7 API calls 4421->4423 4424 408b7c 4423->4424 4429 4084e0 4424->4429 4427 406ac0 3 API calls 4428 408ba8 4427->4428 4430 407630 9 API calls 4429->4430 4432 4084ea 4430->4432 4431 40850d 4431->4427 4432->4431 4433 408513 WaitForSingleObject 4432->4433 4433->4431 4434 408523 4433->4434 4435 406ac0 3 API calls 4434->4435 4436 40852c 4435->4436 4439 405e40 4440 405e60 EnterCriticalSection 4439->4440 4441 405e51 4439->4441 4442 405e93 LeaveCriticalSection 4440->4442 4443 405e79 4440->4443 4445 405ea0 4442->4445 4443->4442 4444 405e7f free LeaveCriticalSection 4443->4444 4444->4445 4447 408f40 4448 406820 7 API calls 4447->4448 4449 408f59 4448->4449 4450 409040 4449->4450 4452 408f7a GetHandleInformation 4449->4452 4451 406ac0 3 API calls 4450->4451 4453 40904c 4451->4453 4452->4450 4454 408f8d 4452->4454 4455 409060 4454->4455 4456 408f97 4454->4456 4458 406ac0 3 API calls 4455->4458 4457 4074f0 34 API calls 4456->4457 4459 408f9c 4457->4459 4460 40906c 4458->4460 4461 409090 4459->4461 4462 408fb3 4459->4462 4465 406ac0 3 API calls 4461->4465 4463 408fc1 WaitForSingleObject 4462->4463 4464 408fdf CloseHandle 4462->4464 4466 408fdb 4463->4466 4467 408fcd 4463->4467 4468 408ff1 CloseHandle 4464->4468 4469 408ff3 4464->4469 4465->4453 4466->4464 4467->4466 4470 4090a3 4467->4470 4468->4469 4472 406c50 2 API calls 4469->4472 4471 406ac0 3 API calls 4470->4471 4471->4453 4473 409010 4472->4473 4474 4073a0 4 API calls 4473->4474 4475 409019 4474->4475 4476 409023 4475->4476 4478 4070a0 12 API calls 4475->4478 4477 406ac0 3 API calls 4476->4477 4479 40902f 4477->4479 4478->4476 4977 4090c0 4978 407630 9 API calls 4977->4978 4979 4090cb 4978->4979 4980 406820 7 API calls 4979->4980 4981 4090da 4980->4981 4982 409180 4981->4982 4984 4090f0 GetHandleInformation 4981->4984 4983 406ac0 3 API calls 4982->4983 4985 40918c 4983->4985 4984->4982 4986 409103 4984->4986 4987 4091a0 4986->4987 4988 40910e 4986->4988 4989 406ac0 3 API calls 4987->4989 4990 409125 CloseHandle 4988->4990 5001 409167 4988->5001 4989->4985 4992 409138 4990->4992 4990->5001 4991 406ac0 3 API calls 4993 409173 4991->4993 4994 409141 CloseHandle 4992->4994 4995 409143 4992->4995 4994->4995 4996 406c50 2 API calls 4995->4996 4997 409154 4996->4997 4998 4073a0 4 API calls 4997->4998 4999 40915d 4998->4999 5000 4070a0 12 API calls 4999->5000 4999->5001 5000->5001 5001->4991 5002 408bc0 5003 4072e0 13 API calls 5002->5003 5004 408bdf 5003->5004 5005 408c2f CreateEventA 5004->5005 5007 408c60 Sleep 5004->5007 5008 408c4c Sleep 5004->5008 5024 408d48 5004->5024 5005->5004 5006 408c70 5005->5006 5009 4073a0 4 API calls 5006->5009 5007->5004 5008->5004 5008->5006 5012 408c84 5009->5012 5010 408d1d 5018 4070a0 12 API calls 5010->5018 5010->5024 5011 408ccd _beginthreadex 5014 408d60 SetThreadPriority ResetEvent 5011->5014 5015 408cfd 5011->5015 5012->5010 5012->5011 5013 408cc3 5012->5013 5019 4074f0 34 API calls 5012->5019 5013->5011 5021 408dd0 ResumeThread CloseHandle 5014->5021 5022 408da9 ResumeThread 5014->5022 5016 408d06 CloseHandle 5015->5016 5017 408d0c 5015->5017 5016->5017 5023 406c50 2 API calls 5017->5023 5018->5024 5019->5013 5025 408db6 Sleep 5021->5025 5022->5025 5026 408d15 5023->5026 5027 4073a0 4 API calls 5026->5027 5027->5010 5028 408ac0 5029 4074f0 34 API calls 5028->5029 5030 408ad2 5029->5030 5031 408ae7 5030->5031 5032 406820 7 API calls 5030->5032 5033 408afc 5032->5033 5034 4084e0 10 API calls 5033->5034 5035 408b20 5034->5035 5036 406ac0 3 API calls 5035->5036 5037 408b28 5036->5037 5041 4019c0 5042 4019d2 _fileno _setmode 5041->5042 5043 4019f5 _fileno _setmode 5042->5043 5044 401a0a _fileno _setmode 5043->5044 5045 404ba2 5044->5045 5046 406460 51 API calls 5045->5046 5047 404bb3 5046->5047 5048 404be9 5047->5048 5049 406460 51 API calls 5047->5049 5050 404bc4 5049->5050 5050->5048 5051 403969 57 API calls 5050->5051 5052 404bde exit 5051->5052 5052->5048 5053 4017c0 5054 4017e5 5053->5054 5055 401811 5054->5055 5074 403f55 5054->5074 5056 404216 5055->5056 5059 401970 57 API calls 5055->5059 5066 4018df 5055->5066 5058 403377 57 API calls 5056->5058 5060 404225 5058->5060 5061 404121 5059->5061 5062 402ffa 57 API calls 5060->5062 5063 406460 51 API calls 5061->5063 5064 404261 5062->5064 5065 404132 5063->5065 5065->5064 5067 401970 57 API calls 5065->5067 5068 40414e 5067->5068 5068->5064 5069 403e63 57 API calls 5068->5069 5070 40416f 5069->5070 5071 4041fb 5070->5071 5072 4029bb 51 API calls 5070->5072 5071->5056 5073 4029bb 51 API calls 5071->5073 5072->5071 5073->5056 5075 403f6c 5074->5075 5081 403f88 5074->5081 5077 402ee2 57 API calls 5075->5077 5079 403f8d 5075->5079 5075->5081 5076 402771 51 API calls 5076->5079 5077->5079 5078 403fca 5078->5081 5082 402a85 5078->5082 5079->5076 5079->5078 5079->5081 5081->5055 5083 406460 51 API calls 5082->5083 5084 402aa1 5083->5084 5087 402922 5084->5087 5086 402aaf 5086->5081 5088 402946 5087->5088 5090 40293c 5087->5090 5089 4025aa 6 API calls 5088->5089 5089->5090 5090->5086 4483 40b349 GetCurrentThreadId 4484 40174a 4491 401622 4484->4491 4488 401768 4489 401622 57 API calls 4488->4489 4490 4017a0 4489->4490 4492 40162e 4491->4492 4497 40164f 4491->4497 4493 40164a 4492->4493 4494 401644 4492->4494 4505 402ad7 4493->4505 4507 4038ed 4494->4507 4497->4488 4498 402b95 4497->4498 4499 402bba 4498->4499 4503 402b6b 4498->4503 4501 406460 51 API calls 4499->4501 4500 402b37 57 API calls 4502 402b81 4500->4502 4501->4503 4503->4500 4504 402bcd 4503->4504 4504->4488 4518 403377 4505->4518 4508 403863 4507->4508 4509 403901 4508->4509 4510 406460 51 API calls 4508->4510 4509->4497 4511 40387c 4510->4511 4512 4038ae 4511->4512 4513 4038a0 4511->4513 4693 4030de 4511->4693 4516 406460 51 API calls 4512->4516 4701 403442 4513->4701 4517 4038d4 4516->4517 4517->4497 4529 402b37 4518->4529 4521 403399 4524 4033d0 4521->4524 4525 40339e 4521->4525 4522 4033ac 4523 402ad7 57 API calls 4522->4523 4528 4033b1 4523->4528 4552 40330e 4524->4552 4533 40315d 4525->4533 4530 402b57 4529->4530 4531 402b44 4529->4531 4530->4521 4530->4522 4531->4530 4532 402ad7 57 API calls 4531->4532 4532->4530 4562 4019a5 4533->4562 4553 40331c 4552->4553 4555 40332c 4552->4555 4554 403327 4553->4554 4557 403334 4553->4557 4556 402ad7 57 API calls 4554->4556 4555->4528 4556->4555 4558 403339 4557->4558 4559 40334e 4557->4559 4560 40315d 57 API calls 4558->4560 4690 402797 4559->4690 4560->4555 4583 401970 4562->4583 4586 401902 4583->4586 4587 401913 4586->4587 4590 401943 4586->4590 4592 403d2e 4587->4592 4591 402ad7 57 API calls 4591->4590 4593 403d41 4592->4593 4595 403d5d 4592->4595 4594 403d80 4593->4594 4593->4595 4599 401931 4594->4599 4600 402771 4594->4600 4595->4599 4603 402ee2 4595->4603 4607 40298b 4595->4607 4599->4590 4599->4591 4601 406460 51 API calls 4600->4601 4602 402785 4601->4602 4604 402ef0 4603->4604 4605 402eff 4603->4605 4604->4605 4606 402ad7 57 API calls 4604->4606 4605->4595 4606->4605 4608 406460 51 API calls 4607->4608 4609 402922 4608->4609 4611 40293c 4609->4611 4612 4025aa 4609->4612 4611->4595 4613 4025ce 4612->4613 4618 4025ea 4612->4618 4614 402743 4613->4614 4615 40274a 4613->4615 4617 402095 6 API calls 4614->4617 4616 402549 fwrite fflush exit VirtualAlloc VirtualAlloc 4615->4616 4616->4618 4617->4618 4618->4611 4691 402771 51 API calls 4690->4691 4692 4027a4 4691->4692 4692->4555 4694 403103 4693->4694 4695 4030f7 4693->4695 4697 402771 51 API calls 4694->4697 4695->4694 4696 4030be 4695->4696 4699 40305e 57 API calls 4696->4699 4698 403112 4697->4698 4698->4513 4700 4030d8 4699->4700 4700->4513 4702 403457 4701->4702 4704 403461 4701->4704 4705 4033e3 4702->4705 4704->4512 4706 4033f2 4705->4706 4707 40298b 57 API calls 4706->4707 4708 403438 4707->4708 4708->4704 5091 4049cf 5092 4049f1 5091->5092 5096 4049f9 5092->5096 5099 404818 5092->5099 5095 4029bb 51 API calls 5095->5096 5098 404b39 5096->5098 5107 40432d 5096->5107 5100 403e63 57 API calls 5099->5100 5106 40484a 5100->5106 5101 4049b1 5101->5095 5101->5096 5101->5098 5102 4047c3 57 API calls 5102->5106 5103 402ad7 57 API calls 5103->5106 5104 401902 57 API calls 5104->5106 5105 403d2e 57 API calls 5105->5106 5106->5101 5106->5102 5106->5103 5106->5104 5106->5105 5108 404348 5107->5108 5109 404361 5108->5109 5110 404397 5108->5110 5114 40426f 5109->5114 5112 40426f 57 API calls 5110->5112 5113 40437e 5112->5113 5113->5098 5115 404291 5114->5115 5116 4042aa 5115->5116 5117 4042c5 5115->5117 5118 4042a8 5115->5118 5116->5113 5120 4042db 5117->5120 5122 402771 51 API calls 5117->5122 5119 402ad7 57 API calls 5118->5119 5119->5116 5120->5116 5121 40315d 57 API calls 5120->5121 5121->5116 5122->5120 5172 4085d0 5173 408650 5172->5173 5174 4085dc 5172->5174 5175 4074f0 34 API calls 5173->5175 5177 408620 5174->5177 5178 4085ee 5174->5178 5176 40862f 5175->5176 5180 408540 35 API calls 5176->5180 5179 4074f0 34 API calls 5177->5179 5181 4074f0 34 API calls 5178->5181 5182 408625 5179->5182 5183 408634 Sleep 5180->5183 5184 4085f3 5181->5184 5182->5176 5182->5184 5185 408540 35 API calls 5183->5185 5187 408540 35 API calls 5184->5187 5186 408641 5185->5186 5188 408600 5187->5188 5189 408660 Sleep 5188->5189 5190 408609 WaitForSingleObject 5188->5190 5191 408611 5189->5191 5190->5191 5192 408540 35 API calls 5191->5192 5193 408616 5192->5193 3868 404ed0 3871 404d7e 3868->3871 3872 404d9c VirtualAllocEx 3871->3872 3874 404e09 3872->3874 3880 406460 3874->3880 3876 404e15 3877 404ea4 3876->3877 3878 404e1e WriteProcessMemory VirtualProtect 3876->3878 3878->3877 3879 404e71 CreateThread 3878->3879 3879->3877 4043 1c0000 3879->4043 3881 4064b3 3880->3881 3882 406476 3880->3882 3909 407d10 3881->3909 3931 4080b0 GetLastError 3882->3931 3885 406481 3887 4064f0 calloc 3885->3887 3888 406489 3885->3888 3886 4064c6 3935 406820 3886->3935 3890 406622 abort 3887->3890 3891 40650e 3887->3891 3892 406580 realloc 3888->3892 3893 406495 3888->3893 3907 406635 3890->3907 3962 408120 GetLastError 3891->3962 3892->3890 3898 4065a8 memset 3892->3898 3896 40651f 3893->3896 3897 4064a5 3893->3897 3894 4064d2 3899 4065f0 3894->3899 3952 406ac0 3894->3952 3896->3893 3900 4065d5 malloc 3896->3900 3901 406535 malloc 3896->3901 3897->3876 3902 408120 40 API calls 3898->3902 3904 406610 memset 3899->3904 3900->3890 3905 406548 3900->3905 3901->3890 3901->3905 3902->3893 3904->3897 3905->3904 3908 406567 memcpy 3905->3908 3907->3876 3908->3897 3910 407d92 3909->3910 3911 407d27 3909->3911 3910->3886 3912 407d63 3911->3912 3971 406dc0 3911->3971 3912->3886 3914 407d31 3915 406820 7 API calls 3914->3915 3916 407d40 3915->3916 3917 407da2 3916->3917 3918 407d48 3916->3918 3975 4074f0 3917->3975 3919 407d70 fprintf 3918->3919 3920 407d4e 3918->3920 3919->3920 3922 406ac0 3 API calls 3920->3922 3926 407e00 3920->3926 3924 407d56 3922->3924 3923 407db8 3923->3926 3927 4074f0 34 API calls 3923->3927 3924->3912 3989 4071f0 3924->3989 3929 407dce 3927->3929 3929->3926 3930 4074f0 34 API calls 3929->3930 3930->3920 3932 4074f0 34 API calls 3931->3932 3933 4080c7 3932->3933 3934 4080f5 SetLastError 3933->3934 3934->3885 3936 406860 3935->3936 3937 406835 3935->3937 4041 4067b0 malloc 3936->4041 3939 406842 3937->3939 3941 4068d0 GetCurrentThreadId 3937->3941 3942 406887 3937->3942 3943 406854 GetCurrentThreadId 3939->3943 3947 406849 3939->3947 3940 406868 3940->3937 3944 406875 3940->3944 3941->3942 3941->3947 3945 406900 CreateEventA 3942->3945 3946 40688e 3942->3946 3943->3947 3944->3894 3948 406931 GetLastError 3945->3948 3949 406918 3945->3949 3946->3939 3950 4068a7 WaitForSingleObject 3946->3950 3947->3894 3948->3947 3949->3946 3951 406926 CloseHandle 3949->3951 3950->3946 3950->3947 3951->3946 3953 406af0 3952->3953 3954 406ad2 3952->3954 3955 4067b0 malloc 3953->3955 3958 406b1b GetCurrentThreadId 3954->3958 3960 406adb 3954->3960 3961 406ae6 3954->3961 3957 406af5 3955->3957 3956 406b50 SetEvent 3956->3961 3957->3954 3959 406b02 3957->3959 3958->3960 3958->3961 3959->3882 3960->3956 3960->3961 3961->3882 3963 4074f0 34 API calls 3962->3963 3964 408143 3963->3964 3965 408190 realloc 3964->3965 3966 408157 3964->3966 3967 4081b0 realloc 3965->3967 3970 40817a 3965->3970 3969 40816f SetLastError 3966->3969 3968 4081c4 memset memset 3967->3968 3967->3970 3968->3966 3969->3970 3970->3896 3972 406dd6 3971->3972 3973 406e01 calloc 3972->3973 3974 406de7 3972->3974 3973->3974 3974->3914 3976 407501 3975->3976 3977 407506 TlsGetValue 3975->3977 4013 407460 3976->4013 3979 407530 3977->3979 3980 40751a 3977->3980 3993 4072e0 3979->3993 3980->3923 3983 407547 GetCurrentThreadId CreateEventA 4007 4073a0 3983->4007 3986 407620 abort 3987 4075d7 GetThreadPriority TlsSetValue 3987->3986 3988 407611 3987->3988 3988->3923 3991 407205 3989->3991 3992 40726a free 3991->3992 4036 406c50 3991->4036 3992->3991 3994 406820 7 API calls 3993->3994 3995 4072f1 3994->3995 3996 407350 calloc 3995->3996 3997 4072fd 3995->3997 3998 407367 3996->3998 3999 40732f 3996->3999 4027 406f10 3997->4027 4002 406f10 2 API calls 3998->4002 4001 406ac0 3 API calls 3999->4001 4003 40733b 4001->4003 4004 40736f 4002->4004 4003->3980 4003->3983 4005 407390 free 4004->4005 4006 407305 4004->4006 4005->3999 4006->3999 4008 4073b2 4007->4008 4009 4073bc GetCurrentProcess GetCurrentThread GetCurrentProcess DuplicateHandle 4007->4009 4008->4009 4010 4073ce GetCurrentThreadId _ultoa 4008->4010 4009->3986 4009->3987 4011 407413 OutputDebugStringA abort 4010->4011 4014 406dc0 calloc 4013->4014 4015 407473 4014->4015 4016 406820 7 API calls 4015->4016 4017 407482 4016->4017 4018 4074c0 4017->4018 4019 40748c 4017->4019 4021 407491 4018->4021 4023 4074d0 fprintf 4018->4023 4033 406e80 TlsAlloc 4019->4033 4022 406ac0 3 API calls 4021->4022 4025 4074a3 4022->4025 4023->4021 4024 4074b0 4024->3977 4025->4024 4026 4071f0 3 API calls 4025->4026 4026->4024 4028 406f26 4027->4028 4030 406fe2 4027->4030 4029 407009 malloc 4028->4029 4032 406f44 4028->4032 4029->4030 4029->4032 4030->4006 4031 406fd0 memcpy 4031->4030 4032->4030 4032->4031 4034 406e95 4033->4034 4035 406e9a abort 4033->4035 4034->4021 4037 406c84 4036->4037 4038 406c66 4036->4038 4037->3991 4039 406c75 free 4038->4039 4040 406c6f CloseHandle 4038->4040 4039->4037 4040->4039 4042 4067ce 4041->4042 4042->3940 4046 1c00d6 LoadLibraryA 4043->4046 4047 1c011b 4046->4047 4048 1c011f WSASocketA 4047->4048 4049 1c013e connect 4048->4049 4050 1c015e recv 4049->4050 4052 1c0154 4049->4052 4051 1c01d1 closesocket 4050->4051 4050->4052 4051->4048 4052->4049 4052->4050 4052->4051 4053 1c01ee 4052->4053 4712 408250 4713 4074f0 34 API calls 4712->4713 4714 408259 4713->4714 4715 409750 4716 4097b3 4715->4716 4717 409768 4715->4717 4718 4097c0 GetCurrentThreadId 4717->4718 4719 409770 GetCurrentThreadId printf 4717->4719 4719->4716 5123 407fd0 5124 407fea 5123->5124 5125 40809b 5123->5125 5124->5125 5126 409dc0 70 API calls 5124->5126 5127 408006 5126->5127 5128 406820 7 API calls 5127->5128 5131 408037 5128->5131 5129 406ac0 3 API calls 5130 40808f 5129->5130 5132 409d20 53 API calls 5130->5132 5131->5129 5132->5125 5133 409bd0 5134 409930 14 API calls 5133->5134 5135 409be0 5134->5135 5136 409be4 5135->5136 5137 406b80 3 API calls 5135->5137 5138 409bff 5137->5138 5139 409c19 5138->5139 5141 406ac0 3 API calls 5138->5141 5140 406820 7 API calls 5139->5140 5142 406ac0 3 API calls 5139->5142 5143 409650 3 API calls 5139->5143 5140->5139 5141->5139 5142->5139 5143->5139 5144 409ed0 5145 409f10 5144->5145 5146 409ee9 5144->5146 5146->5145 5147 409930 14 API calls 5146->5147 5148 409ef3 5147->5148 5149 409ef7 5148->5149 5150 406950 8 API calls 5148->5150 5151 409f36 5150->5151 5152 409f90 5151->5152 5153 409f3a 5151->5153 5154 4096b0 2 API calls 5152->5154 5155 406950 8 API calls 5153->5155 5154->5149 5156 409f49 5155->5156 5157 409fa0 5156->5157 5161 409f50 5156->5161 5158 406ac0 3 API calls 5157->5158 5159 409fa8 5158->5159 5160 4096b0 2 API calls 5159->5160 5160->5149 5163 4082d0 34 API calls 5161->5163 5171 409f71 5161->5171 5162 4096b0 2 API calls 5162->5149 5164 409fdf 5163->5164 5165 4082d0 34 API calls 5164->5165 5166 409fef 5165->5166 5167 40a01b 5166->5167 5169 40a049 5166->5169 5168 4082d0 34 API calls 5167->5168 5168->5171 5170 4082d0 34 API calls 5169->5170 5170->5171 5171->5162 5197 402bd3 5198 402be6 5197->5198 5199 402bf2 5197->5199 5200 406460 51 API calls 5198->5200 5200->5199 5201 4015d4 5204 401550 5201->5204 5205 401565 5204->5205 5208 401594 5204->5208 5206 401579 5205->5206 5210 403993 5205->5210 5206->5208 5209 403377 57 API calls 5206->5209 5211 4039a2 5210->5211 5212 40298b 57 API calls 5211->5212 5213 4039e8 5212->5213 5213->5206 4720 40b259 SetUnhandledExceptionFilter 5214 4016da 5215 401622 57 API calls 5214->5215 5216 4016eb 5215->5216 5217 402b95 57 API calls 5216->5217 5218 4016f8 5216->5218 5217->5218 5219 401622 57 API calls 5218->5219 5220 401730 5219->5220 5221 4092e0 5222 4092ff 5221->5222 5226 409368 5221->5226 5223 407630 9 API calls 5222->5223 5224 409304 5223->5224 5225 40935b strlen 5224->5225 5224->5226 5225->5226 4721 405b60 4727 405b81 4721->4727 4722 405c26 4723 405c0b signal 4725 405d00 signal 4723->4725 4728 405bc8 4723->4728 4724 405cb0 signal 4726 405cc6 signal 4724->4726 4724->4728 4725->4722 4726->4722 4727->4722 4727->4723 4727->4728 4730 405bb2 signal 4727->4730 4728->4722 4728->4723 4728->4724 4729 405c67 signal 4728->4729 4729->4728 4731 405d30 signal 4729->4731 4730->4728 4732 405d19 signal 4730->4732 4731->4722 4732->4722 4733 40a360 4734 40a3bf 4733->4734 4735 40a377 4733->4735 4739 40a37f 4735->4739 4756 409470 GetSystemTimeAsFileTime 4735->4756 4738 4093f0 GetSystemTimeAsFileTime 4738->4739 4739->4734 4739->4738 4740 408670 4739->4740 4741 4074f0 34 API calls 4740->4741 4742 40867d 4741->4742 4743 4086b0 4742->4743 4744 408684 4742->4744 4746 408540 35 API calls 4743->4746 4745 408540 35 API calls 4744->4745 4747 408689 4745->4747 4748 4086b5 Sleep 4746->4748 4749 4086d0 Sleep 4747->4749 4750 408692 WaitForSingleObject 4747->4750 4751 408540 35 API calls 4748->4751 4753 40869a 4749->4753 4750->4753 4752 4086c2 4751->4752 4752->4739 4754 408540 35 API calls 4753->4754 4755 40869f 4754->4755 4755->4739 4756->4739 5227 4086e0 5228 407630 9 API calls 5227->5228 5230 4086f3 5228->5230 5229 408711 GetHandleInformation 5229->5230 5243 408786 5229->5243 5230->5227 5230->5229 5231 406820 7 API calls 5230->5231 5232 4074f0 34 API calls 5230->5232 5233 40874f 5230->5233 5234 40879c 5230->5234 5237 40886f SetEvent 5230->5237 5242 40877e 5230->5242 5230->5243 5246 406ac0 malloc GetCurrentThreadId SetEvent 5230->5246 5252 408921 5230->5252 5254 40892d 5230->5254 5231->5230 5232->5230 5235 4087c0 5233->5235 5236 40875a 5233->5236 5238 406ac0 3 API calls 5234->5238 5235->5234 5239 4087c4 5235->5239 5236->5234 5240 40875e 5236->5240 5237->5230 5238->5243 5239->5243 5244 4087c8 SuspendThread WaitForSingleObject 5239->5244 5241 408778 SetEvent 5240->5241 5240->5242 5241->5242 5245 406ac0 3 API calls 5242->5245 5244->5242 5247 4087ed GetThreadContext SetThreadContext 5244->5247 5245->5243 5246->5230 5248 408838 SetEvent 5247->5248 5249 40883e 5247->5249 5248->5249 5250 406ac0 3 API calls 5249->5250 5251 408846 ResumeThread 5250->5251 5251->5242 5253 406ac0 3 API calls 5252->5253 5253->5254 5255 40afe0 5256 40b130 5255->5256 5257 40affc 5255->5257 5257->5256 5258 40b162 5257->5258 5259 40b012 5257->5259 5261 40a560 9 API calls 5258->5261 5260 40b100 5259->5260 5263 40b02f 5259->5263 5277 409470 GetSystemTimeAsFileTime 5259->5277 5276 40b0ef 5261->5276 5265 40a890 49 API calls 5263->5265 5264 40a890 49 API calls 5266 40b0fb 5264->5266 5267 40b06b 5265->5267 5268 4082d0 34 API calls 5266->5268 5267->5260 5269 40a140 5 API calls 5267->5269 5268->5260 5270 40b092 5269->5270 5270->5260 5271 4082d0 34 API calls 5270->5271 5272 40b0c9 5271->5272 5273 4082d0 34 API calls 5272->5273 5274 40b0dc 5273->5274 5275 406ac0 3 API calls 5274->5275 5275->5276 5276->5260 5276->5264 5276->5266 5277->5263 5278 4014e0 5279 405010 5 API calls 5278->5279 5280 4014f6 5279->5280 5281 401180 30 API calls 5280->5281 5282 4014fb 5281->5282 5283 4091e0 5284 4091fc 5283->5284 5287 4092af 5283->5287 5285 407630 9 API calls 5284->5285 5286 409201 5285->5286 5286->5287 5288 409263 IsDebuggerPresent 5286->5288 5289 40925e free 5286->5289 5290 409297 RaiseException 5288->5290 5291 40928d 5288->5291 5289->5288 5290->5287 5291->5287 5291->5290 5292 4063e0 5293 406410 5292->5293 5294 4063f2 5292->5294 5294->5293 5295 4063fe free 5294->5295 5295->5294 4757 40166a 4758 401622 57 API calls 4757->4758 4759 40167b 4758->4759 4760 402b95 57 API calls 4759->4760 4761 401688 4759->4761 4760->4761 4762 401622 57 API calls 4761->4762 4763 4016c0 4762->4763 4764 4016d2 4763->4764 4765 402b6b 4763->4765 4767 406460 51 API calls 4763->4767 4766 402b37 57 API calls 4765->4766 4769 402bcd 4765->4769 4768 402b81 4766->4768 4767->4765 4770 40446e 4771 40447f 4770->4771 4772 4044d5 exit 4771->4772 4773 40226e 4779 402233 4773->4779 4775 40228c VirtualFree 4776 4022e2 4775->4776 4777 4022cb 4775->4777 4778 4022d7 exit 4777->4778 4778->4776 4780 402243 4779->4780 4780->4775 4781 409c70 4782 409930 14 API calls 4781->4782 4783 409c80 4782->4783 4784 409c84 4783->4784 4794 406b80 4783->4794 4786 409c9f 4787 406b80 3 API calls 4786->4787 4793 409ce2 4786->4793 4788 409cac 4787->4788 4789 409cf0 4788->4789 4790 409cb2 4788->4790 4791 406ac0 3 API calls 4789->4791 4792 409650 3 API calls 4790->4792 4790->4793 4791->4793 4792->4793 4795 406b93 4794->4795 4796 406bc4 4794->4796 4797 406ba0 4795->4797 4798 406be2 4795->4798 4803 406bd9 4795->4803 4799 4067b0 malloc 4796->4799 4800 406ba9 4797->4800 4802 406bb2 GetCurrentThreadId 4797->4802 4798->4800 4801 406bef GetCurrentThreadId 4798->4801 4799->4795 4800->4786 4801->4800 4802->4786 4803->4786 5299 4050f0 RtlCaptureContext RtlLookupFunctionEntry 5300 40512a RtlVirtualUnwind 5299->5300 5301 4051cd 5299->5301 5302 405163 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 5300->5302 5301->5302 5302->5301 5303 4051f0 5304 4051f9 5303->5304 5305 4051fd 5304->5305 5306 405ee0 3 API calls 5304->5306 5307 405215 5306->5307 5311 40abf0 5312 40abfc 5311->5312 5313 40ac17 5311->5313 5312->5313 5314 40ac30 EnterCriticalSection 5312->5314 5315 40ac90 5314->5315 5316 40ac44 5314->5316 5317 40ace5 LeaveCriticalSection 5315->5317 5318 40ac98 5315->5318 5316->5317 5322 40ac4f LeaveCriticalSection 5316->5322 5317->5313 5319 40a890 49 API calls 5318->5319 5321 40acbf 5319->5321 5321->5322 5323 40acf5 LeaveCriticalSection 5321->5323 5322->5313 5323->5313 4804 40b279 SetLastError 5324 40b1f9 VirtualQuery 5325 4114f8 5324->5325 4358 404efc 4361 404eec 4358->4361 4364 404eb8 4361->4364 4369 404bef 4364->4369 4398 4044e0 signal signal signal signal 4369->4398 4371 404bf8 InitializeCriticalSection 4372 404ba2 4371->4372 4373 406460 51 API calls 4372->4373 4374 404bb3 4373->4374 4375 404be9 4374->4375 4376 406460 51 API calls 4374->4376 4380 404c20 4375->4380 4377 404bc4 4376->4377 4377->4375 4378 403969 57 API calls 4377->4378 4379 404bde exit 4378->4379 4379->4375 4381 404c3e 4380->4381 4382 404c5e 4381->4382 4399 40455c 4381->4399 4412 4046d5 GetProcAddress 4382->4412 4385 404c71 4386 4046d5 2 API calls 4385->4386 4387 404c8b 4386->4387 4388 4046d5 2 API calls 4387->4388 4389 404ca5 4388->4389 4390 4046d5 2 API calls 4389->4390 4391 404cbf 4390->4391 4392 4046d5 2 API calls 4391->4392 4393 404cd9 4392->4393 4394 4046d5 2 API calls 4393->4394 4395 404cf3 4394->4395 4396 4046d5 2 API calls 4395->4396 4397 404d0d 4396->4397 4400 404585 4399->4400 4416 401a82 fwrite 4400->4416 4413 4047a9 4412->4413 4414 4046ff 4412->4414 4413->4385 4414->4413 4415 40478e GetProcAddress 4414->4415 4415->4413 4415->4414 4417 4066c0 fflush 4416->4417 4418 4115d0 4417->4418 5329 407b80 5330 407bf0 5329->5330 5331 407b9a 5329->5331 5332 407c00 GetCurrentThreadId 5331->5332 5333 407ba4 5331->5333 5334 407630 9 API calls 5333->5334 5335 407bae 5334->5335 5336 407630 9 API calls 5335->5336 5337 407bbc GetCurrentThreadId 5336->5337 5338 407630 9 API calls 5337->5338 5339 407bd0 printf 5338->5339 5339->5330 4805 405303 4806 40532f 4805->4806 4807 405366 fprintf 4806->4807 5340 403787 5341 40379e 5340->5341 5359 40311c 5341->5359 5343 4037ab 5367 40357e 5343->5367 5346 406460 51 API calls 5347 4037c1 5346->5347 5358 403807 5347->5358 5377 402a25 5347->5377 5350 406460 51 API calls 5351 4037de 5350->5351 5352 4037ec 5351->5352 5381 4029f2 5351->5381 5354 403816 5352->5354 5355 4037fb 5352->5355 5352->5358 5356 402ad7 57 API calls 5354->5356 5357 406460 51 API calls 5355->5357 5356->5358 5357->5358 5360 403144 5359->5360 5361 403135 5359->5361 5363 402771 51 API calls 5360->5363 5361->5360 5362 4030be 5361->5362 5364 40305e 57 API calls 5362->5364 5365 403153 5363->5365 5366 4030d8 5364->5366 5365->5343 5366->5343 5368 406460 51 API calls 5367->5368 5376 4035a9 5368->5376 5370 4030de 57 API calls 5370->5376 5372 403776 5372->5346 5373 406460 51 API calls 5373->5376 5376->5370 5376->5372 5376->5373 5385 402c83 5376->5385 5391 402e1f 5376->5391 5398 403496 5376->5398 5407 402b6b 5376->5407 5378 402a3b 5377->5378 5379 402a36 5377->5379 5378->5350 5380 4029bb 51 API calls 5379->5380 5380->5378 5382 402a03 5381->5382 5384 402a08 5381->5384 5383 4029bb 51 API calls 5382->5383 5383->5384 5384->5352 5386 402d85 5385->5386 5387 402ca0 5385->5387 5386->5376 5388 406460 51 API calls 5387->5388 5389 402cde 5387->5389 5388->5389 5389->5386 5410 402c42 5389->5410 5392 402e6d 5391->5392 5393 402e3c 5391->5393 5392->5376 5395 406460 51 API calls 5393->5395 5396 402e65 5393->5396 5394 402c42 57 API calls 5394->5396 5395->5396 5396->5392 5396->5394 5414 402d8d 5396->5414 5399 4034c2 5398->5399 5400 40356f 5398->5400 5399->5400 5401 403442 57 API calls 5399->5401 5400->5376 5402 4034e6 5401->5402 5403 406460 51 API calls 5402->5403 5404 403500 5403->5404 5404->5400 5405 402c42 57 API calls 5404->5405 5406 403442 57 API calls 5404->5406 5405->5404 5406->5404 5408 402b37 57 API calls 5407->5408 5409 402b81 5408->5409 5411 402c55 5410->5411 5412 402c6c 5410->5412 5411->5389 5413 402ad7 57 API calls 5412->5413 5413->5411 5415 402da4 5414->5415 5416 406460 51 API calls 5415->5416 5419 402db0 5416->5419 5417 402e16 5417->5396 5418 402c42 57 API calls 5418->5419 5419->5417 5419->5418 4808 40b309 GetThreadPriority 5420 40b389 CreateEventA 4054 407790 4055 4077b1 4054->4055 4056 40779b 4054->4056 4058 407880 AddVectoredExceptionHandler 4055->4058 4059 4077ba 4055->4059 4057 4077a4 4056->4057 4060 407860 RemoveVectoredExceptionHandler 4056->4060 4058->4057 4059->4057 4061 4077ca TlsGetValue 4059->4061 4060->4057 4061->4057 4062 4077d8 4061->4062 4063 4078a0 4062->4063 4064 4077e2 4062->4064 4065 407940 4063->4065 4066 4078b2 4063->4066 4067 4077f2 4064->4067 4068 407995 4064->4068 4070 407945 CloseHandle 4065->4070 4071 40794b 4065->4071 4072 4078b7 CloseHandle 4066->4072 4073 4078bd 4066->4073 4074 4077fb CloseHandle 4067->4074 4075 40780f 4067->4075 4069 407680 65 API calls 4068->4069 4079 40799a 4069->4079 4070->4071 4080 406c50 2 API calls 4071->4080 4072->4073 4076 407970 4073->4076 4077 4078df 4073->4077 4074->4075 4081 40780d CloseHandle 4074->4081 4078 406c50 2 API calls 4075->4078 4111 407680 4076->4111 4083 407980 4077->4083 4084 4078f1 4077->4084 4085 407828 4078->4085 4079->4079 4086 40795c 4080->4086 4081->4075 4089 406c50 2 API calls 4083->4089 4087 407900 CloseHandle 4084->4087 4088 407906 4084->4088 4090 4073a0 4 API calls 4085->4090 4091 4073a0 4 API calls 4086->4091 4087->4088 4092 406c50 2 API calls 4088->4092 4093 407988 4089->4093 4094 407831 4090->4094 4095 407965 4091->4095 4096 407916 4092->4096 4097 4073a0 4 API calls 4093->4097 4098 40792c TlsSetValue 4094->4098 4099 40783f 4094->4099 4095->4057 4100 4073a0 4 API calls 4096->4100 4097->4095 4098->4057 4103 4070a0 4099->4103 4100->4094 4104 406820 7 API calls 4103->4104 4107 4070b6 4104->4107 4105 4070cb free 4105->4107 4106 4070d9 free 4106->4107 4107->4105 4107->4106 4108 4070e7 free 4107->4108 4109 4071d0 memcpy 4107->4109 4110 4071ac free 4107->4110 4108->4107 4109->4107 4110->4107 4117 407630 4111->4117 4113 407695 4114 407760 4113->4114 4124 409a80 4113->4124 4135 409d20 4113->4135 4114->4077 4118 407670 4117->4118 4119 40763d 4117->4119 4118->4113 4120 406820 7 API calls 4119->4120 4121 407649 4120->4121 4122 406ac0 3 API calls 4121->4122 4123 407660 4122->4123 4123->4113 4143 409930 4124->4143 4126 409a90 4127 409a94 4126->4127 4128 406820 7 API calls 4126->4128 4127->4113 4129 409aaf 4128->4129 4130 406ac0 3 API calls 4129->4130 4134 409ac9 4129->4134 4130->4134 4131 406820 7 API calls 4131->4134 4132 406ac0 3 API calls 4132->4134 4134->4131 4134->4132 4147 409650 4134->4147 4137 409d2f 4135->4137 4136 409d90 4136->4113 4137->4136 4138 409650 3 API calls 4137->4138 4141 409d4c 4137->4141 4138->4141 4139 406820 7 API calls 4139->4141 4141->4139 4142 406ac0 malloc GetCurrentThreadId SetEvent 4141->4142 4184 40aac0 4141->4184 4142->4141 4144 409980 4143->4144 4146 40993f 4143->4146 4152 4098d0 4144->4152 4146->4126 4148 406ac0 3 API calls 4147->4148 4149 409665 4148->4149 4150 406ac0 3 API calls 4149->4150 4151 409670 4150->4151 4151->4134 4153 4098e4 4152->4153 4154 4098ea 4153->4154 4157 4097f0 4153->4157 4154->4146 4156 40990d 4156->4146 4158 409878 4157->4158 4159 409807 calloc 4157->4159 4158->4156 4159->4158 4160 40982a 4159->4160 4161 409898 free 4160->4161 4162 409890 4160->4162 4163 409867 4160->4163 4161->4156 4164 406c50 2 API calls 4162->4164 4171 40a420 4163->4171 4164->4161 4166 409872 4166->4158 4167 406c50 2 API calls 4166->4167 4168 4098b8 4167->4168 4169 406c50 2 API calls 4168->4169 4170 4098c0 free 4169->4170 4170->4158 4172 40a540 4171->4172 4173 40a433 4171->4173 4172->4166 4174 40a441 calloc 4173->4174 4177 40a550 4173->4177 4175 40a4f1 4174->4175 4176 40a461 CreateSemaphoreA CreateSemaphoreA 4174->4176 4175->4166 4178 40a4b7 4176->4178 4179 40a50d 4176->4179 4177->4166 4180 40a500 CloseHandle 4178->4180 4181 40a4bc InitializeCriticalSection InitializeCriticalSection InitializeCriticalSection 4178->4181 4182 40a512 CloseHandle 4179->4182 4183 40a51b free 4179->4183 4180->4179 4181->4175 4182->4183 4183->4166 4185 40aacb 4184->4185 4186 40aae6 4184->4186 4185->4186 4187 40ab00 EnterCriticalSection 4185->4187 4186->4141 4188 40ab60 4187->4188 4189 40ab14 4187->4189 4190 40abc0 LeaveCriticalSection 4188->4190 4191 40ab68 4188->4191 4189->4190 4196 40ab1f LeaveCriticalSection 4189->4196 4190->4186 4197 40a890 EnterCriticalSection LeaveCriticalSection 4191->4197 4195 40abd0 LeaveCriticalSection 4195->4186 4196->4186 4198 40a8e2 4197->4198 4199 40a8f5 4197->4199 4198->4195 4198->4196 4204 40a5c0 4199->4204 4201 40a900 EnterCriticalSection 4202 40a913 4201->4202 4203 40a90c LeaveCriticalSection 4201->4203 4202->4203 4203->4198 4205 40a670 WaitForSingleObject 4204->4205 4206 40a5d9 4204->4206 4207 40a785 WaitForSingleObject 4205->4207 4208 40a687 4205->4208 4244 408270 4206->4244 4207->4201 4208->4207 4210 40a692 4208->4210 4210->4201 4212 40a72d WaitForSingleObject 4216 40a810 4212->4216 4222 40a6b0 4212->4222 4213 40a5fd WaitForMultipleObjects 4217 40a840 ResetEvent 4213->4217 4224 40a5f1 4213->4224 4214 40a7a1 WaitForSingleObject 4219 40a7af 4214->4219 4242 40a65c 4214->4242 4215 40a6c5 WaitForSingleObject 4221 40a7f0 4215->4221 4231 40a6bc 4215->4231 4218 408410 34 API calls 4216->4218 4220 40a758 4217->4220 4217->4224 4227 40a815 4218->4227 4228 40a7ce WaitForSingleObject 4219->4228 4240 40a6f7 4219->4240 4226 408540 35 API calls 4220->4226 4220->4242 4235 408410 34 API calls 4221->4235 4221->4242 4222->4212 4222->4220 4223 40a749 4222->4223 4229 408410 34 API calls 4222->4229 4222->4231 4233 408410 34 API calls 4223->4233 4223->4242 4224->4213 4224->4217 4225 40a628 4224->4225 4230 408540 35 API calls 4224->4230 4224->4242 4225->4208 4234 40a633 WaitForSingleObject 4225->4234 4226->4231 4227->4220 4236 40a819 WaitForSingleObject 4227->4236 4228->4240 4228->4242 4229->4222 4230->4224 4231->4214 4231->4215 4231->4228 4232 40a6e5 4231->4232 4238 408410 34 API calls 4231->4238 4231->4242 4239 408410 34 API calls 4232->4239 4232->4240 4233->4220 4237 40a64d 4234->4237 4234->4242 4235->4242 4236->4201 4237->4242 4247 408410 4237->4247 4238->4231 4239->4240 4240->4242 4251 408540 4240->4251 4242->4201 4245 4074f0 34 API calls 4244->4245 4246 408279 4245->4246 4246->4222 4246->4224 4248 408425 4247->4248 4249 40841e 4247->4249 4250 4074f0 34 API calls 4248->4250 4249->4242 4250->4249 4252 4074f0 34 API calls 4251->4252 4254 40854b 4252->4254 4253 408563 4253->4242 4254->4253 4255 406820 7 API calls 4254->4255 4256 40857c 4255->4256 4257 4085b1 4256->4257 4258 4085ab ResetEvent 4256->4258 4260 4085b9 4256->4260 4259 406ac0 3 API calls 4257->4259 4258->4257 4259->4260 4809 401010 4811 401058 4809->4811 4810 40106b __set_app_type 4812 401075 4810->4812 4811->4810 4811->4812 4813 408310 4814 4074f0 34 API calls 4813->4814 4820 40831e 4814->4820 4815 407680 65 API calls 4815->4820 4816 408345 TlsGetValue 4817 40838a _endthreadex 4816->4817 4816->4820 4817->4820 4818 408376 CloseHandle 4818->4820 4819 4083e0 CloseHandle 4819->4820 4820->4815 4820->4816 4820->4817 4820->4818 4820->4819 4821 4083a3 CloseHandle 4820->4821 4822 4083c5 TlsSetValue 4820->4822 4823 4070a0 12 API calls 4820->4823 4821->4820 4821->4822 4822->4817 4823->4820 5421 407c90 GetCurrentProcess GetProcessAffinityMask 5422 407d00 5421->5422 5424 407cc6 GetCurrentProcess SetProcessAffinityMask 5421->5424 5424->5422 5425 40ae90 EnterCriticalSection 5426 40af10 5425->5426 5427 40aeb6 LeaveCriticalSection 5425->5427 5430 40a890 49 API calls 5426->5430 5442 40af1a LeaveCriticalSection 5426->5442 5428 40aeca 5427->5428 5435 40aee6 5427->5435 5431 40a140 5 API calls 5428->5431 5434 40af71 5430->5434 5431->5435 5432 406820 7 API calls 5436 40aef3 5432->5436 5433 406820 7 API calls 5433->5436 5437 40afc1 LeaveCriticalSection 5434->5437 5438 40af78 5434->5438 5435->5432 5435->5436 5437->5436 5439 40a140 5 API calls 5438->5439 5440 40af95 5439->5440 5441 40afa5 LeaveCriticalSection 5440->5441 5440->5442 5441->5436 5442->5433 5443 409990 5445 4099a6 5443->5445 5444 409a01 5445->5444 5446 4095f0 9 API calls 5445->5446 5447 4099d7 5446->5447 5448 409a20 5447->5448 5449 4099ec 5447->5449 5450 409a32 5447->5450 5451 409650 3 API calls 5449->5451 5452 409650 3 API calls 5450->5452 5451->5444 5453 409a42 5452->5453 5453->5448 5460 40a920 5453->5460 5455 409a51 5456 406c50 2 API calls 5455->5456 5457 409a5a 5456->5457 5458 406c50 2 API calls 5457->5458 5459 409a63 free 5458->5459 5459->5444 5461 40a934 5460->5461 5468 40a980 5460->5468 5462 40a890 49 API calls 5461->5462 5461->5468 5463 40a969 5462->5463 5464 40a9e0 TryEnterCriticalSection 5463->5464 5465 40a96f 5463->5465 5466 40aa94 5464->5466 5467 40a9f5 5464->5467 5465->5455 5471 40a140 5 API calls 5466->5471 5469 40aa30 5467->5469 5470 40a9fd 5467->5470 5468->5455 5473 40a140 5 API calls 5469->5473 5472 40a140 5 API calls 5470->5472 5474 40aab0 5471->5474 5475 40aa14 LeaveCriticalSection 5472->5475 5476 40aa4e 7 API calls 5473->5476 5474->5474 5475->5465 5476->5466 5477 40b291 RtlLookupFunctionEntry 4824 40b319 GetSystemTimeAsFileTime 5478 40239a 5480 40243e 5478->5480 5481 4023cc 5478->5481 5479 4024bb 5480->5479 5483 401ef9 5 API calls 5480->5483 5481->5480 5484 401ef9 5481->5484 5483->5479 5485 401f4e 5484->5485 5488 401ec5 5485->5488 5491 401e7e 5488->5491 5492 401e98 5491->5492 5493 401eaa 5492->5493 5495 401bc4 5492->5495 5493->5480 5496 401bd9 5495->5496 5497 401bed 5496->5497 5499 401b80 VirtualAlloc 5496->5499 5497->5493 5500 401ba0 5499->5500 5501 401ba5 5499->5501 5503 401b49 5500->5503 5501->5497 5504 401b59 5503->5504 5505 401a82 2 API calls 5504->5505 5506 401b75 exit 5505->5506 5507 401b80 VirtualAlloc 5506->5507 5508 401ba0 5507->5508 5509 401ba5 5507->5509 5510 401b49 2 API calls 5508->5510 5509->5501 5510->5509 4825 406420 4826 406432 4825->4826 4831 407e30 4826->4831 4828 406445 4829 406449 4828->4829 4830 40644e abort 4828->4830 4832 407e50 4831->4832 4833 407f71 4831->4833 4845 409dc0 4832->4845 4833->4828 4835 407ec0 4840 409d20 53 API calls 4835->4840 4836 407ede 4838 407fb0 4836->4838 4839 407eea realloc 4836->4839 4837 407e5c 4837->4835 4837->4836 4841 409d20 53 API calls 4838->4841 4839->4838 4842 407f22 memset 4839->4842 4843 407f9f 4840->4843 4841->4833 4844 409d20 53 API calls 4842->4844 4843->4828 4844->4833 4846 409930 14 API calls 4845->4846 4847 409dd4 4846->4847 4848 409dd8 4847->4848 4863 4095f0 4847->4863 4848->4837 4850 409df0 4862 409e17 4850->4862 4875 4082d0 4850->4875 4852 409e26 4852->4837 4855 4082d0 34 API calls 4857 409e66 4855->4857 4858 409e8b 4857->4858 4860 409eb0 4857->4860 4878 40ad10 4857->4878 4859 4082d0 34 API calls 4858->4859 4859->4862 4861 4082d0 34 API calls 4860->4861 4861->4862 4871 4096b0 4862->4871 4864 406820 7 API calls 4863->4864 4865 409606 4864->4865 4866 40960c 4865->4866 4867 406820 7 API calls 4865->4867 4866->4850 4868 409629 4867->4868 4868->4866 4869 406ac0 3 API calls 4868->4869 4870 409637 4869->4870 4870->4850 4872 4096c7 4871->4872 4873 4096dc 4872->4873 4874 409703 fprintf exit 4872->4874 4873->4852 4874->4852 4876 4074f0 34 API calls 4875->4876 4877 4082d9 4876->4877 4877->4855 4879 40ad80 4878->4879 4880 40ad25 4878->4880 4879->4857 4880->4879 4881 40ae42 4880->4881 4882 40ad37 4880->4882 4906 40a560 4881->4906 4883 40ad73 4882->4883 4885 40a890 49 API calls 4882->4885 4883->4857 4886 40ad6b 4885->4886 4886->4883 4887 40ad90 EnterCriticalSection LeaveCriticalSection 4886->4887 4899 40a140 EnterCriticalSection 4887->4899 4889 40adc1 4889->4883 4892 4082d0 34 API calls 4889->4892 4890 40a890 49 API calls 4891 40ae23 4890->4891 4893 4082d0 34 API calls 4891->4893 4894 40adf8 4892->4894 4893->4883 4895 4082d0 34 API calls 4894->4895 4896 40ae08 4895->4896 4897 406ac0 3 API calls 4896->4897 4898 40ae1b 4897->4898 4898->4883 4898->4890 4898->4891 4900 40a1c0 LeaveCriticalSection 4899->4900 4901 40a170 4899->4901 4900->4889 4902 40a190 ReleaseSemaphore 4901->4902 4903 40a177 LeaveCriticalSection 4901->4903 4902->4903 4904 40a1a7 LeaveCriticalSection 4902->4904 4905 40a182 4903->4905 4904->4905 4905->4889 4907 40a575 4906->4907 4908 40a420 9 API calls 4907->4908 4909 40a582 4907->4909 4908->4909 4909->4898 4910 405220 4911 405232 4910->4911 4912 405242 4911->4912 4915 405ee0 4911->4915 4914 405287 4916 405f80 4915->4916 4919 405eee 4915->4919 4917 405fa0 InitializeCriticalSection 4916->4917 4918 405f8a 4916->4918 4917->4918 4918->4914 4920 405f45 free 4919->4920 4921 405f56 DeleteCriticalSection 4919->4921 4922 405ef0 4919->4922 4920->4920 4920->4921 4921->4922 4922->4914 4923 409b20 4924 409930 14 API calls 4923->4924 4925 409b33 4924->4925 4926 409b37 4925->4926 4934 406950 4925->4934 4928 409b52 4929 406ac0 3 API calls 4928->4929 4931 409b6c 4928->4931 4929->4931 4930 406950 8 API calls 4930->4931 4931->4930 4932 409650 3 API calls 4931->4932 4933 406ac0 3 API calls 4931->4933 4932->4931 4933->4931 4937 406967 4934->4937 4947 406979 4934->4947 4935 4069a7 4938 4069c0 GetCurrentThreadId 4935->4938 4939 4069ae 4935->4939 4936 4067b0 malloc 4940 40699a 4936->4940 4952 4093f0 GetSystemTimeAsFileTime 4937->4952 4938->4939 4939->4928 4940->4935 4941 406a40 GetCurrentThreadId 4940->4941 4942 4069fa 4940->4942 4944 4069e8 4940->4944 4941->4939 4941->4942 4945 406a70 CreateEventA 4942->4945 4946 406a01 4942->4946 4944->4928 4948 406aa1 GetLastError 4945->4948 4949 406a88 4945->4949 4946->4935 4951 406a15 WaitForSingleObject 4946->4951 4947->4936 4947->4940 4949->4946 4950 406a96 CloseHandle 4949->4950 4950->4946 4951->4939 4951->4946 4952->4947 5511 4082a0 5512 407630 9 API calls 5511->5512 5513 4082a9 5512->5513 5514 4079a0 5515 406820 7 API calls 5514->5515 5516 4079bb 5515->5516 5517 406820 7 API calls 5516->5517 5518 4079cb 5517->5518 5519 4079d9 TlsSetValue GetCurrentThreadId 5518->5519 5520 407460 16 API calls 5518->5520 5521 406ac0 3 API calls 5519->5521 5520->5519 5522 4079fe _setjmp 5521->5522 5523 407a19 5522->5523 5524 407aad 5522->5524 5525 406820 7 API calls 5523->5525 5526 406ac0 3 API calls 5524->5526 5534 407a25 5525->5534 5526->5534 5527 406820 7 API calls 5527->5534 5528 407a46 CloseHandle 5528->5534 5529 406ac0 malloc GetCurrentThreadId SetEvent 5529->5534 5530 407680 65 API calls 5530->5534 5531 406c50 CloseHandle free 5531->5534 5532 407b3e TlsSetValue 5532->5534 5533 4070a0 12 API calls 5533->5532 5534->5527 5534->5528 5534->5529 5534->5530 5534->5531 5534->5532 5534->5533 5535 407b51 _endthreadex 5534->5535 5536 407aa7 Sleep 5534->5536 5535->5534 5536->5534 5537 40b2a1 RtlAddFunctionTable 5538 411450 5537->5538 5539 4015ad 5540 401550 57 API calls 5539->5540 5541 4015c2 5540->5541 5542 401baf VirtualAlloc 4261 4014b0 4266 405010 4261->4266 4263 4014c6 4270 401180 4263->4270 4265 4014cb 4267 405050 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 4266->4267 4268 405039 4266->4268 4269 4050ab 4267->4269 4268->4263 4269->4263 4271 401470 GetStartupInfoA 4270->4271 4272 4011b4 4270->4272 4286 4013f0 4271->4286 4273 4011dc Sleep 4272->4273 4274 4011f1 4272->4274 4273->4272 4275 401224 4274->4275 4276 40143c _initterm 4274->4276 4274->4286 4288 405610 4275->4288 4276->4275 4278 40124c SetUnhandledExceptionFilter 4318 405a70 4278->4318 4280 401315 malloc 4282 40133c 4280->4282 4285 401387 4280->4285 4281 401268 4281->4280 4283 401350 strlen malloc memcpy 4282->4283 4283->4283 4284 401382 4283->4284 4284->4285 4285->4286 4287 4013e5 _cexit 4285->4287 4286->4265 4287->4286 4290 405643 4288->4290 4292 405632 4288->4292 4289 4056b0 4289->4292 4294 4056b9 4289->4294 4290->4289 4290->4292 4295 405783 4290->4295 4291 4058aa 4298 405940 4291->4298 4299 4058dd 4291->4299 4292->4278 4297 405707 4294->4297 4324 405440 4294->4324 4295->4291 4295->4292 4296 4057ca 4295->4296 4295->4297 4296->4295 4304 405440 11 API calls 4296->4304 4311 405440 11 API calls 4296->4311 4297->4292 4308 405732 VirtualProtect 4297->4308 4300 405a00 4298->4300 4301 40594b 4298->4301 4302 4058e4 4299->4302 4303 40595f signal 4299->4303 4307 405971 4300->4307 4313 405a16 signal 4300->4313 4305 40594d 4301->4305 4309 405984 4301->4309 4302->4307 4302->4309 4310 4058f5 4302->4310 4306 4059e0 signal 4303->4306 4303->4307 4304->4296 4305->4303 4305->4307 4306->4307 4307->4278 4308->4297 4309->4307 4312 405992 signal 4309->4312 4310->4307 4315 40590b signal 4310->4315 4311->4295 4314 405a30 signal 4312->4314 4317 405921 4312->4317 4313->4317 4314->4317 4316 405a50 signal 4315->4316 4315->4317 4316->4317 4317->4278 4319 405a7f 4318->4319 4321 405aac 4319->4321 4353 406050 4319->4353 4321->4281 4322 405aa7 4322->4321 4323 405b40 RtlAddFunctionTable 4322->4323 4323->4321 4325 40550e 4324->4325 4326 405462 4324->4326 4325->4294 4325->4325 4326->4325 4327 4054cc VirtualQuery 4326->4327 4336 4055e0 4326->4336 4328 4054fa 4327->4328 4327->4336 4328->4325 4330 405570 VirtualProtect 4328->4330 4329 405632 4329->4294 4330->4325 4331 4055a0 GetLastError 4330->4331 4331->4325 4332 4058aa 4334 405940 4332->4334 4335 4058dd 4332->4335 4333 4056b0 4333->4329 4344 405732 VirtualProtect 4333->4344 4337 405a00 4334->4337 4338 40594b 4334->4338 4339 4058e4 4335->4339 4340 40595f signal 4335->4340 4336->4329 4336->4332 4336->4333 4343 405971 4337->4343 4348 405a16 signal 4337->4348 4341 40594d 4338->4341 4345 405984 4338->4345 4339->4343 4339->4345 4346 4058f5 4339->4346 4342 4059e0 signal 4340->4342 4340->4343 4341->4340 4341->4343 4342->4343 4343->4294 4344->4333 4345->4343 4347 405992 signal 4345->4347 4346->4343 4350 40590b signal 4346->4350 4349 405a30 signal 4347->4349 4352 405921 4347->4352 4348->4352 4349->4352 4351 405a50 signal 4350->4351 4350->4352 4351->4352 4352->4294 4355 40605f 4353->4355 4354 4060d0 4354->4322 4355->4354 4356 4060ae strncmp 4355->4356 4356->4355 4357 4060c3 4356->4357 4357->4322 4953 408e30 4954 407630 9 API calls 4953->4954 4955 408e42 4954->4955 4956 408f12 4955->4956 4957 408e5b GetHandleInformation 4955->4957 4957->4956 4958 408e6e 4957->4958 4958->4956 4959 4074f0 34 API calls 4958->4959 4961 408e82 4959->4961 4960 408eb1 WaitForSingleObject 4962 408ec0 CloseHandle 4960->4962 4961->4956 4961->4960 4961->4962 4963 408ed2 CloseHandle 4962->4963 4964 408ed4 4962->4964 4963->4964 4965 406c50 2 API calls 4964->4965 4966 408ef1 4965->4966 4967 4073a0 4 API calls 4966->4967 4968 408efa 4967->4968 4968->4956 4969 4070a0 12 API calls 4968->4969 4969->4956 4970 40a230 4971 40a282 4970->4971 4972 40a248 4970->4972 4973 40a290 GetCurrentThreadId fprintf 4972->4973 4974 40a250 GetCurrentThreadId fprintf 4972->4974 4974->4971 5543 4072b0 5544 406ac0 3 API calls 5543->5544 5545 4072c1 5544->5545 5549 405db5 5550 405de4 calloc 5549->5550 5551 405dd9 5549->5551 5550->5551 5552 405dfb EnterCriticalSection LeaveCriticalSection 5550->5552 4975 40b239 TlsAlloc 4976 40b339 GetLastError 5553 403abd 5554 403ad4 5553->5554 5564 403af4 5553->5564 5555 402b37 57 API calls 5554->5555 5556 403ae1 5555->5556 5557 403aef 5556->5557 5559 403af6 5556->5559 5558 402ad7 57 API calls 5557->5558 5558->5564 5560 403afb 5559->5560 5561 403b26 5559->5561 5563 40315d 57 API calls 5560->5563 5562 4039f2 57 API calls 5561->5562 5562->5564 5563->5564

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 401180-4011ae 1 401470-401473 GetStartupInfoA 0->1 2 4011b4-4011d1 0->2 4 401480-401499 call 4066f0 1->4 3 4011e4-4011ef 2->3 5 4011f1-4011ff 3->5 6 4011d3-4011d6 3->6 18 40149e-4014a6 call 4066c8 4->18 10 401205-401209 5->10 11 401427-401436 call 406708 5->11 8 401410-401421 6->8 9 4011dc-4011e1 Sleep 6->9 8->10 8->11 9->3 10->4 14 40120f-40121e 10->14 16 401224-401226 11->16 17 40143c-401457 _initterm 11->17 14->16 14->17 19 40122c-401239 16->19 20 40145d-401462 16->20 17->19 17->20 21 401247-401294 call 405610 SetUnhandledExceptionFilter call 405a70 call 406770 call 405410 call 406780 19->21 22 40123b-401243 19->22 20->19 35 4012b2-4012b8 21->35 36 401296 21->36 22->21 37 4012a0-4012a2 35->37 38 4012ba-4012c8 35->38 39 4012f7-4012fd 36->39 43 4012d0-4012d2 37->43 44 4012a4-4012a7 37->44 40 4012ae 38->40 41 401315-40133a malloc 39->41 42 4012ff-401309 39->42 40->35 50 401387-4013c2 call 404fd0 call 40b3f0 41->50 51 40133c-401349 41->51 48 401400-401405 42->48 49 40130f 42->49 46 4012d4 43->46 47 4012e5-4012ee 43->47 44->43 45 4012a9 44->45 45->40 53 4012f0 46->53 47->53 54 4012e0-4012e3 47->54 48->49 49->41 59 4013c7-4013d5 50->59 55 401350-401380 strlen malloc memcpy 51->55 53->39 54->47 54->53 55->55 57 401382 55->57 57->50 59->18 60 4013db-4013e3 59->60 61 4013f0-4013ff 60->61 62 4013e5-4013ea _cexit 60->62 62->61
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled_cexitmemcpystrlen
              • String ID: 0 A
              • API String ID: 1640792405-1333094694
              • Opcode ID: 72d2380a66f59b17d7d0b7229c9ae5c33d9b528bfb37d31652a3532418e5254a
              • Instruction ID: 7fd7e69588d464a95354bfc1fae6e64fad2bb469d7e9e12ca67e8cf5d31449df
              • Opcode Fuzzy Hash: 72d2380a66f59b17d7d0b7229c9ae5c33d9b528bfb37d31652a3532418e5254a
              • Instruction Fuzzy Hash: A2718DB171074486EB249F56E89076A37A1FB49B88F84403BEF49A73A5DF7DC884C748

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 149 1c00d6-1c011e LoadLibraryA 151 1c011f-1c013c WSASocketA 149->151 152 1c013e-1c0152 connect 151->152 153 1c015e-1c017a recv 152->153 154 1c0154-1c0157 152->154 156 1c017c-1c01a0 153->156 157 1c01d1-1c01de closesocket 153->157 154->152 155 1c0159 call 1c01f1 154->155 155->153 160 1c01a2-1c01b9 156->160 157->151 162 1c01bb-1c01ca 160->162 163 1c01e3-1c01ec 160->163 162->157 163->160 164 1c01ee 163->164
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314907968.00000000001C0000.00000020.00001000.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_1c0000_3344.jbxd
              Yara matches
              Similarity
              • API ID: LibraryLoadSocketclosesocketconnectrecv
              • String ID: unMa$ws2_
              • API String ID: 2974377591-4254217991
              • Opcode ID: 2058f79279c0fba5183a20154c738821c279f9cd7bb2525e365d92f7879f836f
              • Instruction ID: a88093527675b80ad386f85dfd0a04dbdefc04371b795b6588e792e652b4ef2a
              • Opcode Fuzzy Hash: 2058f79279c0fba5183a20154c738821c279f9cd7bb2525e365d92f7879f836f
              • Instruction Fuzzy Hash: DF31D12175CA4C1BE21D716C381B73A66C6C3AD726F25802FEA8EC72D6DC91CC8301DA

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 206 404d7e-404e18 VirtualAllocEx call 404d20 call 406460 213 404ea5-404eb2 206->213 214 404e1e-404e6f WriteProcessMemory VirtualProtect 206->214 214->213 215 404e71-404e9b CreateThread 214->215 216 404ea4 215->216 216->213
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Virtual$AllocCreateMemoryProcessProtectThreadWrite
              • String ID: ZnktJt
              • API String ID: 589471592-3639927098
              • Opcode ID: 93f7e6e721c6d3ef7779802b8d633a2d29b62137bfd480fa8152d07a5f882355
              • Instruction ID: 815d3d090862fbd88549531cd80d5ffafdacf8f0a7f6368fc3c6a27604b9e8ad
              • Opcode Fuzzy Hash: 93f7e6e721c6d3ef7779802b8d633a2d29b62137bfd480fa8152d07a5f882355
              • Instruction Fuzzy Hash: 973174B6604A8485EB209F66E81435A7BA1B789BD5F448126AF4D57BA8DF3CC049CB08

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Value
              • String ID:
              • API String ID: 3702945584-0
              • Opcode ID: 84bee37f05bfdbf9993bf61e8910bedf794a0f1c16ea23a0d288ed955fa0f344
              • Instruction ID: 4d44d83db687c105a8f915d7577d791569068d88c1e7933cc6d3c0b1d6ba4111
              • Opcode Fuzzy Hash: 84bee37f05bfdbf9993bf61e8910bedf794a0f1c16ea23a0d288ed955fa0f344
              • Instruction Fuzzy Hash: 0C3173B2A057448AFB209F21F84879A76A0F745BA4F480229DF5E47BE0DF3CE085C719

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: _fileno_setmode$exit
              • String ID: @g@
              • API String ID: 1042937471-3552307234
              • Opcode ID: e91c2104583d018695db4ed5a3c960c343f752282967dfc752c49b34cbbdf3da
              • Instruction ID: 2d189f3c614311821e3ac3c8582c5dcc26b918c8221a04532d2892516a15019d
              • Opcode Fuzzy Hash: e91c2104583d018695db4ed5a3c960c343f752282967dfc752c49b34cbbdf3da
              • Instruction Fuzzy Hash: 84012191B1160481EF19B7B3BC653791656AFD8BC4F59803B9B0E673E1DD3CC8968708

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 94 407790-407799 95 4077b1-4077b4 94->95 96 40779b-40779e 94->96 99 407880-407899 AddVectoredExceptionHandler 95->99 100 4077ba-4077bd 95->100 97 407850-40785a 96->97 98 4077a4-4077b0 96->98 97->98 102 407860-407871 RemoveVectoredExceptionHandler 97->102 99->98 100->98 101 4077bf-4077c8 100->101 101->98 103 4077ca-4077d6 TlsGetValue 101->103 102->98 103->98 104 4077d8-4077dc 103->104 105 4078a0-4078ac 104->105 106 4077e2-4077ec 104->106 107 407940-407943 105->107 108 4078b2-4078b5 105->108 109 4077f2-4077f9 106->109 110 407995 call 407680 106->110 112 407945 CloseHandle 107->112 113 40794b-407965 call 406c50 call 4073a0 107->113 114 4078b7 CloseHandle 108->114 115 4078bd-4078d9 108->115 116 4077fb-40780b CloseHandle 109->116 117 40781f-407839 call 406c50 call 4073a0 109->117 121 40799a 110->121 112->113 113->98 114->115 118 407970-407975 call 407680 115->118 119 4078df-4078eb 115->119 123 40780d CloseHandle 116->123 124 40780f-407817 116->124 142 40792c-40793a TlsSetValue 117->142 143 40783f-407847 call 4070a0 117->143 118->119 126 407980-407990 call 406c50 call 4073a0 119->126 127 4078f1-4078fe 119->127 121->121 123->124 124->117 126->98 131 407900 CloseHandle 127->131 132 407906-407926 call 406c50 call 4073a0 127->132 131->132 132->142 132->143 142->98 143->142
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CloseHandleValue$ExceptionHandlerRemoveVectored
              • String ID:
              • API String ID: 2941551293-0
              • Opcode ID: d6bd3e596a312003b2f53f3e1b2e677f550e30ec508400ae04fa6f1ac7d8f231
              • Instruction ID: 82006c851bddbc6f7d96567a6e4e65ba1afed02984d87f7f7e250f3d7a5db34a
              • Opcode Fuzzy Hash: d6bd3e596a312003b2f53f3e1b2e677f550e30ec508400ae04fa6f1ac7d8f231
              • Instruction Fuzzy Hash: 05413675A0A64095FB19AF26D8643A93360EF80B98F54413BDF0A633D4DF7CA885C35B

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 165 406460-406474 166 4064b3-4064c1 call 407d10 165->166 167 406476-406487 call 4080b0 165->167 171 4064c6-4064d9 call 406820 166->171 172 4064f0-406508 calloc 167->172 173 406489-40648f 167->173 186 4065f0-406602 171->186 187 4064df-4064eb call 406ac0 171->187 175 406622-406633 abort 172->175 176 40650e-40651f call 408120 172->176 177 406580-4065a6 realloc 173->177 178 406495-40649f 173->178 181 406640-406644 175->181 182 406635-406638 175->182 176->178 177->175 185 4065a8-4065d0 memset call 408120 177->185 183 406524-40652f 178->183 184 4064a5-4064b2 178->184 191 406646 181->191 192 40664a-40664d 181->192 182->181 189 4065d5-4065e1 malloc 183->189 190 406535-406542 malloc 183->190 185->178 195 406610-40661d memset 186->195 187->167 189->175 200 4065e3-4065ea 189->200 190->175 196 406548-406553 190->196 191->192 197 406654 192->197 198 40664f-406652 192->198 203 406572-406575 195->203 202 406557-406561 196->202 198->197 204 406655-406659 198->204 200->202 202->195 205 406567-40656f memcpy 202->205 203->184 205->203
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 937b6b15a6eb3c012a691d233e4ef296c6d7008006586f58407847eac017d767
              • Instruction ID: 2d2e5f29fd85e46d0c498564adfce658b9e55527e4f874cc8bdcd0573f201fa6
              • Opcode Fuzzy Hash: 937b6b15a6eb3c012a691d233e4ef296c6d7008006586f58407847eac017d767
              • Instruction Fuzzy Hash: F741C572602A0095EA15EF12E8107993365F744B88F9A883B9A4F37795DF3DD9A6C308

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 217 407d10-407d25 218 407d92-407da1 217->218 219 407d27-407d2a 217->219 220 407d63-407d6f 219->220 221 407d2c-407d46 call 406dc0 call 406820 219->221 226 407da2-407db3 call 4074f0 221->226 227 407d48-407d4c 221->227 232 407db8-407dbb 226->232 228 407d70-407d90 fprintf 227->228 229 407d4e-407d59 call 406ac0 227->229 228->229 229->220 237 407d5b-407d5e call 4071f0 229->237 235 407e00-407e0a 232->235 236 407dbd-407dd1 call 4074f0 232->236 238 407e10-407e1f 235->238 241 407e20-407e2f 236->241 243 407dd3-407de9 call 4074f0 236->243 237->220 238->241 243->238 247 407deb-407dfa 243->247 247->229
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: fprintf
              • String ID: once %p is %d
              • API String ID: 383729395-95064319
              • Opcode ID: 1c4048602193c1d03f8171ed58baf2ca15e9a686ce7ac89604a45be64e55e6ba
              • Instruction ID: 597bc4bad2a3756a14a74a292123235e9860e307772a6839578ae55869fee0c3
              • Opcode Fuzzy Hash: 1c4048602193c1d03f8171ed58baf2ca15e9a686ce7ac89604a45be64e55e6ba
              • Instruction Fuzzy Hash: A721B573A1AB0085DA159B16E54137A67A4FF88BD4F084136DF4D137A4EB3CD841C34A

              Control-flow Graph

              APIs
                • Part of subcall function 004044E0: signal.MSVCRT ref: 004044F0
                • Part of subcall function 004044E0: signal.MSVCRT ref: 00404501
                • Part of subcall function 004044E0: signal.MSVCRT ref: 00404512
                • Part of subcall function 004044E0: signal.MSVCRT ref: 00404523
              • exit.MSVCRT ref: 00404BE3
              • InitializeCriticalSection.KERNEL32 ref: 00404BFF
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: signal$CriticalInitializeSectionexit
              • String ID:
              • API String ID: 2966010811-0
              • Opcode ID: ed26bddd2918d9262c35d06a69f1064c08af1c9a6198f958b283c222558c2428
              • Instruction ID: 326a7d92601b150306925d15231b8e509079ec1334bb9b553f7a1e7cc46397de
              • Opcode Fuzzy Hash: ed26bddd2918d9262c35d06a69f1064c08af1c9a6198f958b283c222558c2428
              • Instruction Fuzzy Hash: 03F054D561150481EB19F773DC9236822209BE4748F854037E70A262F2DF3CC599871D
              APIs
              • RtlCaptureContext.KERNEL32 ref: 00405104
              • RtlLookupFunctionEntry.KERNEL32 ref: 0040511B
              • RtlVirtualUnwind.KERNEL32 ref: 0040515D
              • SetUnhandledExceptionFilter.KERNEL32 ref: 004051A1
              • UnhandledExceptionFilter.KERNEL32 ref: 004051AE
              • GetCurrentProcess.KERNEL32 ref: 004051B4
              • TerminateProcess.KERNEL32 ref: 004051C2
              • abort.MSVCRT ref: 004051C8
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtualabort
              • String ID:
              • API String ID: 4278921479-0
              • Opcode ID: f5151f613f79c80f9e3833b4f785945d4aeade73ae1625b39d7e3f47ba99ee10
              • Instruction ID: bfb6b45e1e078e74a33f55577b5553ee43ed6af10de6dde30463632e920f560e
              • Opcode Fuzzy Hash: f5151f613f79c80f9e3833b4f785945d4aeade73ae1625b39d7e3f47ba99ee10
              • Instruction Fuzzy Hash: 8521EDB5610F45A5EB008B66FC843D937B4B708B88F54412AEB4EA7B64EF78C199C708
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: DebuggerExceptionPresentRaisefree
              • String ID:
              • API String ID: 462861877-0
              • Opcode ID: 9992174eacac8e5ab886b3de233fb8ebd4dc72c1beb8de0acb777f7299ac8dad
              • Instruction ID: ce4e9d721cdb7bbce20e722b64e5cbb7c9defe4ee7ac0e4a9b2f1b449396240f
              • Opcode Fuzzy Hash: 9992174eacac8e5ab886b3de233fb8ebd4dc72c1beb8de0acb777f7299ac8dad
              • Instruction Fuzzy Hash: C721C3723013409BFA219F65A94039A7694EB98BE4F08467EAF4D537C1DB3DCC85C608
              APIs
              • GetSystemTimeAsFileTime.KERNEL32 ref: 0040949B
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Time$FileSystem
              • String ID:
              • API String ID: 2086374402-0
              • Opcode ID: 26814105f8035f977cef670bb666e7c765a3ee1fc66542955a4f888f446064b1
              • Instruction ID: c225d318a346da5ab50a1fa63e0d27ac38d33a664c6e9188a2d5e0a368294727
              • Opcode Fuzzy Hash: 26814105f8035f977cef670bb666e7c765a3ee1fc66542955a4f888f446064b1
              • Instruction Fuzzy Hash: 72F0B4A671424847DF288F29E91136DA36393C87D5F54C131EE1D87B6CD93CE9468B00
              Memory Dump Source
              • Source File: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5338b2410c88fadbddd5476d659243740ef45eec0dfff78edda5a85c0f4bb367
              • Instruction ID: a055776a41e1b0b55d4ae2a34dec70663757dcbc0511ef016f381426a7f18ad1
              • Opcode Fuzzy Hash: 5338b2410c88fadbddd5476d659243740ef45eec0dfff78edda5a85c0f4bb367
              • Instruction Fuzzy Hash: 85C01297E4EFC645F11283E40D392AA1EC29A53F3470DC26F4F65073E3950A4C42534A
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 071e3f193f53798d230cda8995b9538793e79beb0202c8a377ead432d12d34ac
              • Instruction ID: 55653edafb2575ef809dfd7c181ac5c2f4b73e9893a71408b2c11404d4732a45
              • Opcode Fuzzy Hash: 071e3f193f53798d230cda8995b9538793e79beb0202c8a377ead432d12d34ac
              • Instruction Fuzzy Hash: 12A0026245AC09C0F3004B05D8013B15129D30A700F042020521852065C92DC1904128

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 284 405610-405630 285 405632-405642 284->285 286 405643-40569a call 406160 call 4063a0 284->286 286->285 291 40569c-4056a2 286->291 292 405770-405772 291->292 293 4056a8-4056aa 291->293 294 4056b0-4056b3 292->294 295 405778-40577d 292->295 293->294 296 405754-405759 293->296 294->285 298 4056b9-4056d8 294->298 295->294 299 405783-405789 295->299 296->294 297 40575f-405764 296->297 297->299 300 405766-40576d 297->300 301 4056e4-405705 call 405440 298->301 302 4058be-4058db call 40b430 299->302 303 40578f-4057ab 299->303 300->292 314 4056e0 301->314 315 405707-405718 301->315 316 405940-405945 302->316 317 4058dd-4058e2 302->317 304 4057f5-40580a 303->304 305 4057ad 303->305 310 4057b2 304->310 311 40580c-40583d call 405440 304->311 305->285 312 405870-405873 310->312 313 4057b8-4057bb 310->313 329 4057e8-4057ef 311->329 320 405875-4058a5 call 405440 312->320 321 4058aa-4058b9 call 40b430 312->321 322 405840-40586a call 405440 313->322 323 4057c1-4057c4 313->323 314->301 315->285 326 40571e 315->326 324 405a00-405a10 call 406678 316->324 325 40594b 316->325 327 4058e4-4058e9 317->327 328 40595f-40596f signal 317->328 320->329 321->302 322->329 323->321 333 4057ca-4057e3 call 405440 323->333 338 405971-405974 324->338 358 405a16-405a27 signal 324->358 334 405984-405989 325->334 335 40594d-405952 325->335 336 405720-405730 326->336 340 4059f4-4059fa 327->340 341 4058ef 327->341 337 4059e0-4059ef signal call 405410 328->337 328->338 329->304 329->315 333->329 334->340 342 40598b-405990 334->342 335->340 352 405958-40595d 335->352 345 405740-40574d 336->345 346 405732-40573d VirtualProtect 336->346 337->340 353 405976-405983 338->353 354 4059ce-4059d7 338->354 349 4059c0-4059c5 341->349 350 4058f5-4058fa 341->350 342->354 355 405992-4059a2 signal 342->355 345->336 357 40574f 345->357 346->345 349->355 356 4059c7-4059cc 349->356 350->340 359 405900-405905 350->359 352->328 352->354 361 405a30-405a41 signal 355->361 362 4059a8-4059ab 355->362 356->340 356->354 357->285 363 405933-405937 358->363 359->354 364 40590b-40591b signal 359->364 361->363 365 4059b1-4059be 362->365 366 405a66-405a6b 362->366 367 405a50-405a61 signal 364->367 368 405921-405924 364->368 366->363 367->363 368->366 369 40592a-405931 368->369 369->363
              APIs
              • VirtualProtect.KERNEL32(00410610,00007FF8C6F6ADA0,?,?,?,00000001,0040124C), ref: 0040573D
              Strings
              • Unknown pseudo relocation bit size %d., xrefs: 004058AA
              • Unknown pseudo relocation protocol version %d., xrefs: 004058BE
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: ProtectVirtual
              • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
              • API String ID: 544645111-395989641
              • Opcode ID: d898b03a5d72de10162663d79a07c72910f85af380d3e9c2501badecda1e5893
              • Instruction ID: ec0788aba67833d99a14cc676751f17a9673eef151461daced4147b7fc9a059f
              • Opcode Fuzzy Hash: d898b03a5d72de10162663d79a07c72910f85af380d3e9c2501badecda1e5893
              • Instruction Fuzzy Hash: 3D9125B1B10A4086EB249766D84475F6362E7847A8F94893BCF0D777D5DA3DC882CF09
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CreateEventSleep
              • String ID:
              • API String ID: 3100162736-0
              • Opcode ID: 32ec87e576383e8f8f36a4a7583a92c245c68f92f9b89b3a5f40a635df0c231e
              • Instruction ID: cda0395fe9995eafc324e38ee0f4f8db92a7d219bb67c06cc15b7fd2b27d9db8
              • Opcode Fuzzy Hash: 32ec87e576383e8f8f36a4a7583a92c245c68f92f9b89b3a5f40a635df0c231e
              • Instruction Fuzzy Hash: 7951AF72605B4086E7149F31EA447AA3264FB54BA8F14433ADF6A677D8DF3CC881C359
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: signal
              • String ID: CCG
              • API String ID: 1946981877-1584390748
              • Opcode ID: c7754e18dd7f6f2718d97efecffbec134b501eb59c16e22e9bc238a7a538a630
              • Instruction ID: c7980c0de720be52abb6cac1ee74694571d924d4e52592449492c6cb1179f141
              • Opcode Fuzzy Hash: c7754e18dd7f6f2718d97efecffbec134b501eb59c16e22e9bc238a7a538a630
              • Instruction Fuzzy Hash: 07317E60749E0446FF38627D845973B2012DB89338F298B3B992AA73E5DD3D9CD14E1E
              APIs
              • WaitForMultipleObjects.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF8C887F230,0040A900,?,?,0040AD6B), ref: 0040A60B
              • WaitForSingleObject.KERNEL32 ref: 0040A63F
              • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF8C887F230,0040A900,?,?,0040AD6B), ref: 0040A67A
              • WaitForSingleObject.KERNEL32(?,?,?,?,?,?,?,?,00000000,00007FF8C887F230,0040A900,?,?,0040AD6B), ref: 0040A6CD
              • ResetEvent.KERNEL32 ref: 0040A845
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Wait$ObjectSingle$EventMultipleObjectsReset
              • String ID:
              • API String ID: 654736092-0
              • Opcode ID: 04b1f1abd6f68fd1b037ea4d9a4c971e1355cd3456d290d3a99d3ada0a2acf6d
              • Instruction ID: 796082e024a666101088674e1bea0b77694cc4b4648ffe1f6039798b7fbbda1b
              • Opcode Fuzzy Hash: 04b1f1abd6f68fd1b037ea4d9a4c971e1355cd3456d290d3a99d3ada0a2acf6d
              • Instruction Fuzzy Hash: 1F51E22270430542FB24767AAA8576F01669B847D8F1C8437CE89A77E1ED3DCCE7921B
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: ErrorLastMessageexitfwrite
              • String ID: (bad format; library may be wrong architecture)$@g@$could no$could not load: $t load:
              • API String ID: 3526235566-1396288416
              • Opcode ID: b695c2350faa932a37b32754816e9e5f307918df9a2535d8c508ec1021807acb
              • Instruction ID: 46bbdd4718f8384f04350224fa1e605d36a6ae5acf09ccdf4a0e1121748b961b
              • Opcode Fuzzy Hash: b695c2350faa932a37b32754816e9e5f307918df9a2535d8c508ec1021807acb
              • Instruction Fuzzy Hash: 322104B4701A4492EF14EB62E455B6A6315E784BC4F88043A9F0E277D5FE7CC549C308
              APIs
              • GetHandleInformation.KERNEL32 ref: 00408719
                • Part of subcall function 004074F0: TlsGetValue.KERNEL32 ref: 0040750C
              • SetEvent.KERNEL32 ref: 00408778
              • SetEvent.KERNEL32 ref: 0040886F
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Event$HandleInformationValue
              • String ID:
              • API String ID: 211894710-0
              • Opcode ID: ab1906855233d964621fb7e65b87f2ca98b0e39930b8f2cfd7e1cd92da2bc748
              • Instruction ID: b4421c339d4265d0bdc360d1b60a550c43b1c4af659e952e11673354c775c42c
              • Opcode Fuzzy Hash: ab1906855233d964621fb7e65b87f2ca98b0e39930b8f2cfd7e1cd92da2bc748
              • Instruction Fuzzy Hash: 9651A37661164086DB25AF759E413792B60E785BB8F18433ADFAA673D8DF3CC885C308
              APIs
                • Part of subcall function 0040A890: EnterCriticalSection.KERNEL32(?,?,?,?,?,?,0040AD6B), ref: 0040A8C0
                • Part of subcall function 0040A890: LeaveCriticalSection.KERNEL32(?,?,0040AD6B,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040A8D6
              • TryEnterCriticalSection.KERNEL32 ref: 0040A9E7
              • LeaveCriticalSection.KERNEL32 ref: 0040AA23
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave
              • String ID:
              • API String ID: 3168844106-0
              • Opcode ID: 5cb9d73e3b5ad60b21f971affb5d9989a1806b9f74b9ff7e3f69561cfc880a09
              • Instruction ID: e4db76effc332ca64321fdfda63012cdd3d3168a4dd2c78f27009671b3495e37
              • Opcode Fuzzy Hash: 5cb9d73e3b5ad60b21f971affb5d9989a1806b9f74b9ff7e3f69561cfc880a09
              • Instruction Fuzzy Hash: 2D318D7330070485EB41DF26EC007AA2310AB85BB8F9D46379E69A73D4DE3CC896C30A
              APIs
              • calloc.MSVCRT ref: 0040A44B
              • CreateSemaphoreA.KERNEL32 ref: 0040A48C
              • CreateSemaphoreA.KERNEL32 ref: 0040A4A2
              • InitializeCriticalSection.KERNEL32(?,00409872,?,00000008,?,0040990D,?,?,?,00409985,?,?,?,?,00409DD4), ref: 0040A4C7
              • InitializeCriticalSection.KERNEL32(?,00409872,?,00000008,?,0040990D,?,?,?,00409985,?,?,?,?,00409DD4), ref: 0040A4CD
              • InitializeCriticalSection.KERNEL32(?,00409872,?,00000008,?,0040990D,?,?,?,00409985,?,?,?,?,00409DD4), ref: 0040A4D3
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CriticalInitializeSection$CreateSemaphore$calloc
              • String ID:
              • API String ID: 2075313795-0
              • Opcode ID: 0bd96b484e588b6d61870943261d653de27ff8bb9003036ec8967b3bb832b4a0
              • Instruction ID: 128bbd00df7b5017e5f860e02d31810bbb14c5408239721ec137699294012a8d
              • Opcode Fuzzy Hash: 0bd96b484e588b6d61870943261d653de27ff8bb9003036ec8967b3bb832b4a0
              • Instruction Fuzzy Hash: 3E219C3270170486FB599F69F9507AA22A0EB44B98F0842368F2D4B7D8EE38C8D5C305
              APIs
              Strings
              • SIGINT: Interrupted by Ctrl-C., xrefs: 00404473
              • SIGFPE: Arithmetic error., xrefs: 00404497
              • SIGSEGV: Illegal storage access. (Attempt to read from nil?), xrefs: 0040447F
              • unknown signal, xrefs: 004044A3
              • SIGILL: Illegal operation., xrefs: 004044AD
              • SIGABRT: Abnormal termination., xrefs: 0040448B
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: exit
              • String ID: SIGABRT: Abnormal termination.$SIGFPE: Arithmetic error.$SIGILL: Illegal operation.$SIGINT: Interrupted by Ctrl-C.$SIGSEGV: Illegal storage access. (Attempt to read from nil?)$unknown signal
              • API String ID: 2483651598-3987738871
              • Opcode ID: 0f099a9a48e2a54ee3d0144dd51444fef535e7246d11d3071e8a6daf15bd6a81
              • Instruction ID: c50fe41d982ba2d869cf1ea4c672eac364cab60b25e8d7062e0672bf833e2d93
              • Opcode Fuzzy Hash: 0f099a9a48e2a54ee3d0144dd51444fef535e7246d11d3071e8a6daf15bd6a81
              • Instruction Fuzzy Hash: CBF05EF0600A4090E618E7D59C953E92262DB803A4FD5462BE72A77AE48F3CC949D298
              APIs
              Strings
              • VirtualQuery failed for %d bytes at address %p, xrefs: 004055E7
              • Address %p has no image-section, xrefs: 004055FD
              • VirtualProtect failed with code 0x%x, xrefs: 004055A6
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Virtual$ErrorLastProtectQuery
              • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
              • API String ID: 637304234-2123141913
              • Opcode ID: e2fae49aa962b9c0f4ff22a6c751d4fd290e40669d6f11738ebef2aa7a26a7f1
              • Instruction ID: 3234b13779dfbf688fb9b4b38bcd367d7dab7da1405971afa70d880db30e62e3
              • Opcode Fuzzy Hash: e2fae49aa962b9c0f4ff22a6c751d4fd290e40669d6f11738ebef2aa7a26a7f1
              • Instruction Fuzzy Hash: B051C6B3701A5096DB148F26EC4079E77A6E799BA4F448126EF0D67398DB3CC581CB08
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CurrentThreadValue$CloseHandleSleep_endthreadex_setjmp
              • String ID:
              • API String ID: 398069486-0
              • Opcode ID: c0412a412931fae94798f8b897466d43117539c242fd4bc176f1d6b29b298314
              • Instruction ID: a24f973f3b46aeaf33cf87e96cd7c3d803f45ba779c19e591cff38fadeb8cc05
              • Opcode Fuzzy Hash: c0412a412931fae94798f8b897466d43117539c242fd4bc176f1d6b29b298314
              • Instruction Fuzzy Hash: 9F411835704A0595DB14AF22D8913A93B60E788BA8F0A52379F0E677A4DF3CE485C789
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CurrentThreadfprintf
              • String ID: C%p %d %s$C%p %d V=%0X w=%ld %s
              • API String ID: 1384477639-884133013
              • Opcode ID: c300bd2e3240b9b88016a1aa02a38e8ed37adfc29734f7c29e1712256e857b6d
              • Instruction ID: e018a8ffa0a6004cc7d9db567dbf221ec3a68c520bbb8601b9a978c770f479fb
              • Opcode Fuzzy Hash: c300bd2e3240b9b88016a1aa02a38e8ed37adfc29734f7c29e1712256e857b6d
              • Instruction Fuzzy Hash: 6D015EB660174889E6119B66F8407993764F798FE8F48803AEF4C53714DB3CC5D5C708
              APIs
              Strings
              • (, xrefs: 00409703
              • Assertion failed: (%s), file %s, line %d, xrefs: 0040971C
              • (((rwlock_t *)*rwl)->valid == LIFE_RWLOCK) && (((rwlock_t *)*rwl)->busy > 0), xrefs: 00409712
              • ../../src/mingw-w64/mingw-w64-libraries/winpthreads/src/rwlock.c, xrefs: 0040970B
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: exitfprintf
              • String ID: ($(((rwlock_t *)*rwl)->valid == LIFE_RWLOCK) && (((rwlock_t *)*rwl)->busy > 0)$../../src/mingw-w64/mingw-w64-libraries/winpthreads/src/rwlock.c$Assertion failed: (%s), file %s, line %d
              • API String ID: 4243785698-3651547468
              • Opcode ID: 75b3554476031ab20edded67fa10d4747db7fda8559f1d36472bd0d557ea95a3
              • Instruction ID: 49d8b01bfee3644271ad429ab12f1a83106b7f1585004467be13693869ca0aaf
              • Opcode Fuzzy Hash: 75b3554476031ab20edded67fa10d4747db7fda8559f1d36472bd0d557ea95a3
              • Instruction Fuzzy Hash: 8001A2B6701604C6D7009F69E8943983770F785B58FC5812ADB0E773A2CB3CC889C749
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Time$FileSystem
              • String ID:
              • API String ID: 2086374402-0
              • Opcode ID: 4f3da7276251e1da0c0e6aa49c04d6e0bcf7ff3e088fe48462008955fc8f5936
              • Instruction ID: adb2d998708df20823972c9038fe79fc01efe8dead41dd2d8f2d3a7cb5e430a5
              • Opcode Fuzzy Hash: 4f3da7276251e1da0c0e6aa49c04d6e0bcf7ff3e088fe48462008955fc8f5936
              • Instruction Fuzzy Hash: 6331A5B27012018AFF255F75990076B6251EB84B99F198136CF1A9BBC4EE7CCC91C789
              APIs
              • GetCurrentThreadId.KERNEL32 ref: 00406854
              • WaitForSingleObject.KERNEL32(0000003D,00000008,00000000,00000008,00407D40,?,?,0000003D,?,0000003D,?,?,004064C6,00000008), ref: 004068AD
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CurrentObjectSingleThreadWait
              • String ID:
              • API String ID: 1728940165-0
              • Opcode ID: 47bece56c122f0e1aa41513e5a3a78f6c3e946c29ee868df62646a0172b6a58c
              • Instruction ID: fc1a62eaa0c57444cf29d0e8a597dc91e7f803d354e66607114e0600c8627551
              • Opcode Fuzzy Hash: 47bece56c122f0e1aa41513e5a3a78f6c3e946c29ee868df62646a0172b6a58c
              • Instruction Fuzzy Hash: C0318F73B022058AEB156F35D84075B2291EB44B99F19C136CF1A9B7D8EA3CCCE1C399
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: ErrorLastmemsetrealloc$Value
              • String ID:
              • API String ID: 1675512986-0
              • Opcode ID: 223d3009a9ef8e85c21bbbcd79417698199e98664a99f6a07d58e65fcfa285a3
              • Instruction ID: 62be2ed5063c3c54d6ec1774876784d2551a296588f3e042287308eae0213996
              • Opcode Fuzzy Hash: 223d3009a9ef8e85c21bbbcd79417698199e98664a99f6a07d58e65fcfa285a3
              • Instruction Fuzzy Hash: 9321C0327107409ADB14EF3B9840B5D3791FB88FA8F48083A9E4A17795EE3DD496C788
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CloseHandleValue$_endthreadex
              • String ID:
              • API String ID: 3955988603-0
              • Opcode ID: 49bc13754463169454b9be46e57fb6d5d04353065d8bb5c09bcab0570a8f4f03
              • Instruction ID: 526bc60f57dce2b01feb9568bca3646861effedfad43c078d0c5a4ced2b6647e
              • Opcode Fuzzy Hash: 49bc13754463169454b9be46e57fb6d5d04353065d8bb5c09bcab0570a8f4f03
              • Instruction Fuzzy Hash: 46216872504A44C2EB259F21E5543697BA0F7C4F58F09413ADF8A273E4DF3E9885C349
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: AddressProc
              • String ID: @$@g@$could not import:
              • API String ID: 190572456-1198613637
              • Opcode ID: 0036827a0c924401b60dbb7201a3dd1273e294c45e7202368e0e09dab5bad789
              • Instruction ID: 7ebad886d2771344b8451b3406e87352118a2874c6dd50b7a055f892b80eabb8
              • Opcode Fuzzy Hash: 0036827a0c924401b60dbb7201a3dd1273e294c45e7202368e0e09dab5bad789
              • Instruction Fuzzy Hash: 7B112997B0524014FB21E716E8103AB9652A3DB798E980136DF5D2B7CAE77C8856C304
              APIs
              Strings
              • Error cleaning up spin_keys for thread , xrefs: 004073DA
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CurrentDebugOutputStringThread_ultoaabort
              • String ID: Error cleaning up spin_keys for thread
              • API String ID: 4191895893-2906507043
              • Opcode ID: bdaedb090970d0d01ca587cde6f6eebd88a8ab7cd9dc0983605b5b8f45151603
              • Instruction ID: 2b11dbf325f9206dae38f93986ee680d06634de1643b34b317702c6f72ce58b4
              • Opcode Fuzzy Hash: bdaedb090970d0d01ca587cde6f6eebd88a8ab7cd9dc0983605b5b8f45151603
              • Instruction Fuzzy Hash: 7F1129B2B0864085FF218B24E40436A6E91E385758F944332DB99673E4DB3CD886C30B
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CurrentThread$printf
              • String ID: T%p %d %s$T%p %d V=%0X H=%p %s
              • API String ID: 2165381015-2059990036
              • Opcode ID: 29dbc66d3d7f7ac1b409f4ea41836fe4aea110396dbf3ab6a3c667dd83629912
              • Instruction ID: dcb3b3d40c25abdf613877dc25bbea6bbdaa2e02ccee726ce835203a99874290
              • Opcode Fuzzy Hash: 29dbc66d3d7f7ac1b409f4ea41836fe4aea110396dbf3ab6a3c667dd83629912
              • Instruction Fuzzy Hash: 8B019233B09B0489EA11AF27F80075A6365F7C8BA4F484136AF4D977A4DA3DE49AC744
              APIs
              Strings
              • RWL%p %d %s, xrefs: 004097CC
              • RWL%p %d V=%0X B=%d r=%ld w=%ld L=%p %s, xrefs: 00409783
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CurrentThread$printf
              • String ID: RWL%p %d %s$RWL%p %d V=%0X B=%d r=%ld w=%ld L=%p %s
              • API String ID: 2165381015-1971217749
              • Opcode ID: 51896dfdb83fa2b6406bfcde1285ee30d0da6173f234a2b3343976dbe63aadde
              • Instruction ID: a39229a982d9eed359273817342c3f8bb6fbb43b1c76c3abbe98cff30270695c
              • Opcode Fuzzy Hash: 51896dfdb83fa2b6406bfcde1285ee30d0da6173f234a2b3343976dbe63aadde
              • Instruction Fuzzy Hash: 7901B177711A448AE7119F15F80074A77A4E788F94F058125EF0D53754DB3DC48ACB44
              APIs
              • GetSystemTimeAsFileTime.KERNEL32 ref: 00405055
              • GetCurrentProcessId.KERNEL32 ref: 00405060
              • GetCurrentThreadId.KERNEL32 ref: 00405069
              • GetTickCount.KERNEL32 ref: 00405071
              • QueryPerformanceCounter.KERNEL32 ref: 0040507E
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
              • String ID:
              • API String ID: 1445889803-0
              • Opcode ID: b90df0e09f7277041c6bb00634418d3dfcf8a71308a7458ae5798fb1bcc463cc
              • Instruction ID: 2ece7c0d7d3fb42eb0943ea6b84fda6fadd33c193ba9ef62400c82e1c4872bcb
              • Opcode Fuzzy Hash: b90df0e09f7277041c6bb00634418d3dfcf8a71308a7458ae5798fb1bcc463cc
              • Instruction Fuzzy Hash: 56116D6A611B1486FB105B25BC1835A6360B788BB4F0807319F5C53BA4EA3CD4C58748
              APIs
              • EnterCriticalSection.KERNEL32 ref: 0040A156
              • LeaveCriticalSection.KERNEL32 ref: 0040A17A
              • ReleaseSemaphore.KERNEL32 ref: 0040A19D
              • LeaveCriticalSection.KERNEL32 ref: 0040A1AF
              • LeaveCriticalSection.KERNEL32 ref: 0040A1C3
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CriticalSection$Leave$EnterReleaseSemaphore
              • String ID:
              • API String ID: 2813224205-0
              • Opcode ID: eb46011cbe728a7e239ab3df55bf4d0488c8117b2b47d2258addfa5a4c687160
              • Instruction ID: 164aa6dd7d0e247058e53e0e1e16b20f93f41b26d58e958307811f433d7fc4db
              • Opcode Fuzzy Hash: eb46011cbe728a7e239ab3df55bf4d0488c8117b2b47d2258addfa5a4c687160
              • Instruction Fuzzy Hash: E701A272B0571883FB154B67AD003A96390AB89FF6F4481308F0E46794ED3C89D78309
              APIs
              • EnterCriticalSection.KERNEL32 ref: 0040AEA9
              • LeaveCriticalSection.KERNEL32 ref: 0040AEBF
                • Part of subcall function 0040A140: EnterCriticalSection.KERNEL32 ref: 0040A156
                • Part of subcall function 0040A140: LeaveCriticalSection.KERNEL32 ref: 0040A17A
              • LeaveCriticalSection.KERNEL32 ref: 0040AF23
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CriticalSection$Leave$Enter
              • String ID:
              • API String ID: 2978645861-0
              • Opcode ID: 04a503100a7fbef466b93cf7d5a47c3b286b1f2d37fe78cf0c8e8f2f3d7cd60e
              • Instruction ID: 89df100aa4702b325f5cbe8a15e88f7f6ea04ae4ce9daa85113d1dcf1404b2a8
              • Opcode Fuzzy Hash: 04a503100a7fbef466b93cf7d5a47c3b286b1f2d37fe78cf0c8e8f2f3d7cd60e
              • Instruction Fuzzy Hash: FD3126B22007418AD7509F36D84079A7760F784B98F088532DF2A97798EF38C4A68755
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: b5ac732659f302b197f9af42b44f581d10ac1d948493383e0a19733665c99845
              • Instruction ID: 9b98cce580f341b08afbd0a9d25e67d2c1d52a802931573d647f1a11822e4c55
              • Opcode Fuzzy Hash: b5ac732659f302b197f9af42b44f581d10ac1d948493383e0a19733665c99845
              • Instruction Fuzzy Hash: 3231BCB1B2BA4080EE54DF12E8607AA2351BB44B84F4845378B0E6B7C1DFBCA4C5C34E
              APIs
              • GetHandleInformation.KERNEL32 ref: 00408F7F
                • Part of subcall function 004074F0: TlsGetValue.KERNEL32 ref: 0040750C
              • WaitForSingleObject.KERNEL32 ref: 00408FC3
              • CloseHandle.KERNEL32 ref: 00408FE6
              • CloseHandle.KERNEL32 ref: 00408FF1
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Handle$Close$InformationObjectSingleValueWait
              • String ID:
              • API String ID: 3336430066-0
              • Opcode ID: 94561ba535e7eb87de228245231c173bc1b10866d201c30543573a7873aa3289
              • Instruction ID: 4c2eb582730636790bbe5faf07eb2e4dc223f9ad87af774a6c34e96179dcb02f
              • Opcode Fuzzy Hash: 94561ba535e7eb87de228245231c173bc1b10866d201c30543573a7873aa3289
              • Instruction Fuzzy Hash: BF31727271551090EB51AF26E9507AA2361EB80B98F48413B9F0EB73E5DF3CCC86C349
              APIs
              • GetHandleInformation.KERNEL32 ref: 00408E60
                • Part of subcall function 004074F0: TlsGetValue.KERNEL32 ref: 0040750C
              • WaitForSingleObject.KERNEL32 ref: 00408EB6
              • CloseHandle.KERNEL32 ref: 00408EC7
              • CloseHandle.KERNEL32 ref: 00408ED2
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Handle$Close$InformationObjectSingleValueWait
              • String ID:
              • API String ID: 3336430066-0
              • Opcode ID: bf54d20186730b733f3033573d09d0865ddafb60e2947f94218dff133e39fce1
              • Instruction ID: 3835ea98b7a576cb77332b9312d704c85cbc0be8ef46f1dcbc300e920ddb46e3
              • Opcode Fuzzy Hash: bf54d20186730b733f3033573d09d0865ddafb60e2947f94218dff133e39fce1
              • Instruction Fuzzy Hash: C0219272711A4185EB149F35DA4036A7365EB84BA8F48423BAE6DA77D8DF3CCC81C348
              APIs
              • GetCurrentProcess.KERNEL32 ref: 00407CAD
              • GetProcessAffinityMask.KERNEL32 ref: 00407CBC
              • GetCurrentProcess.KERNEL32 ref: 00407CF2
              • SetProcessAffinityMask.KERNEL32 ref: 00407CFA
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: Process$AffinityCurrentMask
              • String ID:
              • API String ID: 1231390398-0
              • Opcode ID: ae649716770078c60aab8f91a67604c6a9c84ba7e9c394b8010b5a28038c2cc7
              • Instruction ID: 4759968dd8259ccfd3f6dd1bf9cc40f5d15925abbff648fe7c63ac5051aaa0d9
              • Opcode Fuzzy Hash: ae649716770078c60aab8f91a67604c6a9c84ba7e9c394b8010b5a28038c2cc7
              • Instruction Fuzzy Hash: 57F0C273B08A4846FF354B69B8003EA5350BB88B88F4D0136EE8C577A0EE3CD985C208
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: signal
              • String ID:
              • API String ID: 1946981877-0
              • Opcode ID: 1f763610e80ed9761a22474f708b1abc43244adf62ebf0a3229126d9af61beb2
              • Instruction ID: 9934b6a286831ffb280c01ce65422ec9cde4883020077afceda4b065336c0c96
              • Opcode Fuzzy Hash: 1f763610e80ed9761a22474f708b1abc43244adf62ebf0a3229126d9af61beb2
              • Instruction Fuzzy Hash: 2BE08CE8B0271091F748A725D896768127293C9340FA2583F870B2BBD55F7D8D26CB4F
              APIs
              Strings
              • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00405379
              • Unknown error, xrefs: 00405400
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: fprintf
              • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
              • API String ID: 383729395-3474627141
              • Opcode ID: 6717ab7750e2b4dc33bb1ad409d0c977c4de9569680406e74c1b6971a852950d
              • Instruction ID: fd98b8da69ad5590dccb171f3213f91dfb8c00cde0b8a78468a27d2991999229
              • Opcode Fuzzy Hash: 6717ab7750e2b4dc33bb1ad409d0c977c4de9569680406e74c1b6971a852950d
              • Instruction Fuzzy Hash: 9B11A363804E84C6D3068F5CE8423EAB375FF9A759F599316EB8927221EB39C547C704
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: FreeVirtualexit
              • String ID: virtualFree failing!
              • API String ID: 1212090140-3108117800
              • Opcode ID: 6e8f441944f96f08a83f8e86f4d2cd5d40a6e226664ccc1f5e6b63cfb09c4585
              • Instruction ID: a0115fd554974488176b1ee1999c0447be5f02f20f4853970660cae25a7a0da8
              • Opcode Fuzzy Hash: 6e8f441944f96f08a83f8e86f4d2cd5d40a6e226664ccc1f5e6b63cfb09c4585
              • Instruction Fuzzy Hash: AAF05E6A707A5085EA44EB72E88C39923E1F744B80FA0C439CA0DA7390DE79C5A6D345
              APIs
              Strings
              • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00405379
              • Overflow range error (OVERFLOW), xrefs: 004053C0
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: fprintf
              • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
              • API String ID: 383729395-4064033741
              • Opcode ID: 882ceb7b6f2dd19204402db65d8aef6977eb84556260a19403f501113d26d431
              • Instruction ID: 867f74a3dffa014e4d68d9ce76b1e956c410b44e23c0172ff7d17b53c539413b
              • Opcode Fuzzy Hash: 882ceb7b6f2dd19204402db65d8aef6977eb84556260a19403f501113d26d431
              • Instruction Fuzzy Hash: 59F06256804E8481C2019F1CA4003ABB374FF8D789F59531AEF8936164DB38C647C704
              APIs
              Strings
              • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00405379
              • The result is too small to be represented (UNDERFLOW), xrefs: 004053D0
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: fprintf
              • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
              • API String ID: 383729395-2187435201
              • Opcode ID: 1a271ccfc8e5f425e06f946d243b90e02c14ea4d60abc81d0947c2f763f70fd2
              • Instruction ID: 076bf1569d1e244970be082962cc41633047343012a583bcdaae8345c7c95ead
              • Opcode Fuzzy Hash: 1a271ccfc8e5f425e06f946d243b90e02c14ea4d60abc81d0947c2f763f70fd2
              • Instruction Fuzzy Hash: 79F06257904E8481C2019F18A8003ABB374FF8D789F59531AEF8936164DB38C6878704
              APIs
              Strings
              • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00405379
              • Total loss of significance (TLOSS), xrefs: 004053E0
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: fprintf
              • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
              • API String ID: 383729395-4273532761
              • Opcode ID: 0291d077e61e7b707ed6a624acc9aed5aa3e2d20fd64d71826d408d38fca1f77
              • Instruction ID: b81d57ea15fcdd01d8f8965055a28406150b722845be22f2793afbb6d306b246
              • Opcode Fuzzy Hash: 0291d077e61e7b707ed6a624acc9aed5aa3e2d20fd64d71826d408d38fca1f77
              • Instruction Fuzzy Hash: E9F06252804E8481C2019F18A4003ABB374FF8D789F59531AEF8936524DB38C6878704
              APIs
              Strings
              • Partial loss of significance (PLOSS), xrefs: 004053F0
              • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00405379
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: fprintf
              • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
              • API String ID: 383729395-4283191376
              • Opcode ID: d20a4b237e3385310399897af6f419364295070e4dac8793e780f094f282666b
              • Instruction ID: 0716048b3bf2fc4679c05361fb154fe1a7f62ab04906b8cd34354216b042b1e8
              • Opcode Fuzzy Hash: d20a4b237e3385310399897af6f419364295070e4dac8793e780f094f282666b
              • Instruction Fuzzy Hash: C5F06252804E8481C2019F18A4003ABB374FF4D789F59531AEF8936164DB38C6478704
              APIs
              Strings
              • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00405379
              • Argument singularity (SIGN), xrefs: 004053B0
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: fprintf
              • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
              • API String ID: 383729395-2468659920
              • Opcode ID: 6981bf5c895afa7006720006c0a65c668c2d463687c0fe2ced7e869ead1392a8
              • Instruction ID: 6bb61e6e97de5c731350b2bf9ff51882cf36e3e0163fa033220d3b90616c32f7
              • Opcode Fuzzy Hash: 6981bf5c895afa7006720006c0a65c668c2d463687c0fe2ced7e869ead1392a8
              • Instruction Fuzzy Hash: CBF06252804E8481C2019F18A4003ABB375FF5D789F59531AEF8936124DB39C6478704
              APIs
              Strings
              • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00405379
              • Argument domain error (DOMAIN), xrefs: 00405341
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: fprintf
              • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
              • API String ID: 383729395-2713391170
              • Opcode ID: 041dfcac5cd2730f3cb7b2935f7dd9dd07187338d4c308035037506489feeb3f
              • Instruction ID: 8fcf6f73da62e2695ed878605290a599c25e892194e8eb97a34d2c33614aac7b
              • Opcode Fuzzy Hash: 041dfcac5cd2730f3cb7b2935f7dd9dd07187338d4c308035037506489feeb3f
              • Instruction Fuzzy Hash: 3AF03656904F8881D201DF19A80039BB375FF5E799F55531AEF8937524DB29C547C704
              APIs
              • exit.MSVCRT(?,?,?,?,00401BA5,?,?,?,?,0040255D,?,?,?,?,?,00000000), ref: 00401B7A
              • VirtualAlloc.KERNEL32 ref: 00401B95
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: AllocVirtualexit
              • String ID: out of memory
              • API String ID: 1690354023-49810860
              • Opcode ID: 48897c503623f553911eb7674d49bff72344a57f923af7e61834ed1e6285ddc7
              • Instruction ID: 2a05ff1038f12bd885fa3be1bb0d76cd0f9cb3262eb703b16512da769b87dae4
              • Opcode Fuzzy Hash: 48897c503623f553911eb7674d49bff72344a57f923af7e61834ed1e6285ddc7
              • Instruction Fuzzy Hash: E9E048B071360081EE1C77B2A89533921256B59B89F44453ECB0E2B3F1EE3DD2558758
              APIs
              • EnterCriticalSection.KERNEL32 ref: 0040AC37
              • LeaveCriticalSection.KERNEL32 ref: 0040AC5E
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave
              • String ID:
              • API String ID: 3168844106-0
              • Opcode ID: 374824018d716c867d07595619a76d01fa581008388c04c54a29c88bcb63c38d
              • Instruction ID: 6926c6a9b163d29736ae1ac69ecdd78de28307c743802c9c94e6404d0092ea42
              • Opcode Fuzzy Hash: 374824018d716c867d07595619a76d01fa581008388c04c54a29c88bcb63c38d
              • Instruction Fuzzy Hash: D73130737087408BF7118F39E40039963A0E744BA8F198232DF25573D8EB38C896DB5A
              APIs
              • EnterCriticalSection.KERNEL32 ref: 0040AB07
              • LeaveCriticalSection.KERNEL32 ref: 0040AB2E
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave
              • String ID:
              • API String ID: 3168844106-0
              • Opcode ID: 17716ec90eecaa7e02d7715e93047ac81f9d33d78ee6121e417759f5cf6cb213
              • Instruction ID: b4ac7f40e183227341af15e7dc2474d82bec10291a17cfa10cf1b651cdb3bc0e
              • Opcode Fuzzy Hash: 17716ec90eecaa7e02d7715e93047ac81f9d33d78ee6121e417759f5cf6cb213
              • Instruction Fuzzy Hash: EE217FB36047018BDB04DF39D84079A33A1F744B68F088232CF158B798EB38D996DB56
              APIs
              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,0040AD6B), ref: 0040A8C0
              • LeaveCriticalSection.KERNEL32(?,?,0040AD6B,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040A8D6
              • EnterCriticalSection.KERNEL32(?,?,0040AD6B,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040A905
              • LeaveCriticalSection.KERNEL32(?,?,0040AD6B,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040A90F
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave
              • String ID:
              • API String ID: 3168844106-0
              • Opcode ID: 17853caef44ba5b5a15c4db5e32d67f59c7d81ee41d736d42615fd067cfa1c8d
              • Instruction ID: e612b589c65d6ad95af48e19e3b37c53ff38eef1ceb5de07f10e092681edd510
              • Opcode Fuzzy Hash: 17853caef44ba5b5a15c4db5e32d67f59c7d81ee41d736d42615fd067cfa1c8d
              • Instruction Fuzzy Hash: 8D01D13370461499E716EB33AC00B6A6790BBC9FE8F198022EE0917754DE3CC993C706
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.3314926766.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.3314917672.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314940029.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314952687.000000000040D000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314965375.0000000000410000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314975296.0000000000414000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.3314985101.0000000000417000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_3344.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeavefree
              • String ID:
              • API String ID: 4020351045-0
              • Opcode ID: 779815c0cdb624a0ac66ad72c0c6399530f38951d1bb563984b48ad28879ecfd
              • Instruction ID: 6433c338ca8aa27eb8d1086780a615c0d7b70ce62ce65857277531e7ca4c4323
              • Opcode Fuzzy Hash: 779815c0cdb624a0ac66ad72c0c6399530f38951d1bb563984b48ad28879ecfd
              • Instruction Fuzzy Hash: C00171B1711A04C2EF08DB61E8903AB23A5F794B41F944436DA4D83360EB7CDAC2CB88