Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1735021454574.exe

Overview

General Information

Sample name:1735021454574.exe
Analysis ID:1583250
MD5:561a88261d6c906c397723d0a484f366
SHA1:96201e0ce8a4433b9d22ae77ecc16435d34a6216
SHA256:9780d0a48df19bace1a2c6724a094db2d43bdd8925c93b30778653a70f04893e
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Allocates memory in foreign processes
Changes memory attributes in foreign processes to executable or writable
Connects to many ports of the same IP (likely port scanning)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for sample
Self deletion via cmd or bat file
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Internet Provider seen in connection with other malware
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 1735021454574.exe (PID: 5256 cmdline: "C:\Users\user\Desktop\1735021454574.exe" MD5: 561A88261D6C906C397723D0A484F366)
    • explorer.exe (PID: 4004 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
    • cmd.exe (PID: 7028 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ZP76TkMV.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 5360 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PING.EXE (PID: 1612 cmdline: ping -n 2 127.1 MD5: 2F46799D79D22AC72C241EC0322B011D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: explorer.exe PID: 4004ironshell_phpSemi-Auto-generated - file ironshell.php.txtNeo23x0 Yara BRG + customization by Stefan -dfate- Molls
  • 0x14609b:$s2: ~ Shell I
  • 0x3192ec:$s2: ~ Shell I
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 1735021454574.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: 1735021454574.exeJoe Sandbox ML: detected

Networking

barindex
Source: C:\Windows\explorer.exeDomain query: apex_rep.listw.top
Source: C:\Windows\explorer.exeNetwork Connect: 120.78.149.238 12368Jump to behavior
Source: C:\Windows\explorer.exeDomain query: apex_down.listw.top
Source: global trafficTCP traffic: 120.78.149.238 ports 1,2,3,6,8,12368
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.1
Source: global trafficTCP traffic: 192.168.2.6:49710 -> 120.78.149.238:12368
Source: global trafficUDP traffic: 192.168.2.6:52507 -> 120.79.66.71:8081
Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd
Source: Joe Sandbox ViewASN Name: CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd
Source: unknownUDP traffic detected without corresponding DNS query: 114.114.114.114
Source: unknownUDP traffic detected without corresponding DNS query: 223.5.5.5
Source: unknownUDP traffic detected without corresponding DNS query: 114.114.114.114
Source: unknownUDP traffic detected without corresponding DNS query: 223.5.5.5
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800033F0 socket,setsockopt,sendto,SleepEx,setsockopt,recvfrom,1_2_00000001800033F0
Source: global trafficDNS traffic detected: DNS query: apex_down.listw.top
Source: global trafficDNS traffic detected: DNS query: apex_rep.listw.top
Source: explorer.exe, 00000001.00000002.3393916498.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3393916498.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: explorer.exe, 00000001.00000002.3393916498.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3393916498.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: explorer.exe, 00000001.00000002.3393916498.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3393916498.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: explorer.exe, 00000001.00000002.3393916498.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3393916498.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: explorer.exe, 00000001.00000002.3393916498.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
Source: explorer.exe, 00000001.00000000.2152174541.0000000007B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.2149575447.00000000028A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000002.3392832890.0000000007B50000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
Source: explorer.exe, 00000001.00000002.3394302751.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153910424.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2979265872.00000000099AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
Source: explorer.exe, 00000001.00000000.2157386098.000000000BFDF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397461382.000000000BFDF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
Source: explorer.exe, 00000001.00000002.3393916498.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
Source: explorer.exe, 00000001.00000002.3393916498.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/I
Source: explorer.exe, 00000001.00000002.3393916498.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
Source: explorer.exe, 00000001.00000002.3393916498.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
Source: explorer.exe, 00000001.00000002.3393916498.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
Source: explorer.exe, 00000001.00000002.3393916498.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
Source: explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
Source: explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
Source: explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
Source: explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
Source: explorer.exe, 00000001.00000003.3094610682.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397816522.000000000C072000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3368014122.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3316943409.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2981313458.000000000C048000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3075092379.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2157386098.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com-
Source: explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img
Source: explorer.exe, 00000001.00000003.3094610682.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397816522.000000000C072000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3368014122.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3316943409.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2981313458.000000000C048000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3075092379.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2157386098.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.come
Source: explorer.exe, 00000001.00000000.2157386098.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397461382.000000000BFEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comEMd
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
Source: explorer.exe, 00000001.00000002.3394302751.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153910424.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2979265872.00000000099AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/e
Source: explorer.exe, 00000001.00000003.3094610682.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397816522.000000000C072000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3368014122.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3316943409.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2981313458.000000000C048000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3075092379.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2157386098.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comM
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
Source: explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed

System Summary

barindex
Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: Semi-Auto-generated - file ironshell.php.txt Author: Neo23x0 Yara BRG + customization by Stefan -dfate- Molls
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_0000000140002260 GetModuleHandleA,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,NtQueryInformationProcess,0_2_0000000140002260
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_00000001400018F00_2_00000001400018F0
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_000000014000A4180_2_000000014000A418
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_00000001400082200_2_0000000140008220
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_00000001400027100_2_0000000140002710
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_0000000140008F380_2_0000000140008F38
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_0000000140004B440_2_0000000140004B44
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_0000000140005DDC0_2_0000000140005DDC
Source: C:\Windows\explorer.exeCode function: 1_2_0868E8041_2_0868E804
Source: C:\Windows\explorer.exeCode function: 1_2_0868AFD41_2_0868AFD4
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800010001_2_0000000180001000
Source: C:\Windows\explorer.exeCode function: 1_2_0000000180001ED01_2_0000000180001ED0
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800150281_2_0000000180015028
Source: C:\Windows\explorer.exeCode function: 1_2_000000018000E89C1_2_000000018000E89C
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800110D01_2_00000001800110D0
Source: C:\Windows\explorer.exeCode function: 1_2_000000018000A9001_2_000000018000A900
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800101881_2_0000000180010188
Source: C:\Windows\explorer.exeCode function: 1_2_000000018001823C1_2_000000018001823C
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800096B01_2_00000001800096B0
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800143101_2_0000000180014310
Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: ironshell_php author = Neo23x0 Yara BRG + customization by Stefan -dfate- Molls, description = Semi-Auto-generated - file ironshell.php.txt, hash = 8bfa2eeb8a3ff6afc619258e39fded56
Source: classification engineClassification label: mal100.troj.evad.winEXE@7/2@4/3
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_0000000140003740 CreateToolhelp32Snapshot,GetLastError,Process32First,ProcessIdToSessionId,Process32Next,0_2_0000000140003740
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5360:120:WilError_03
Source: C:\Users\user\Desktop\1735021454574.exeMutant created: \Sessions\1\BaseNamedObjects\{C10811B2-10C9-4d62-9E16-FBC7EB569DD4}
Source: C:\Users\user\Desktop\1735021454574.exeFile created: C:\Users\user\AppData\Local\Temp\ZP76TkMV.batJump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ZP76TkMV.bat""
Source: 1735021454574.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\1735021454574.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 1735021454574.exeReversingLabs: Detection: 42%
Source: unknownProcess created: C:\Users\user\Desktop\1735021454574.exe "C:\Users\user\Desktop\1735021454574.exe"
Source: C:\Users\user\Desktop\1735021454574.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ZP76TkMV.bat""
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.1
Source: C:\Users\user\Desktop\1735021454574.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ZP76TkMV.bat""Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.1Jump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: workfoldersshell.dllJump to behavior
Source: C:\Windows\explorer.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dllJump to behavior
Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{F562A2C8-E850-4F05-8E7A-E7192E4E6C23}\InProcServer32Jump to behavior
Source: 1735021454574.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_00000001400099B0 LoadLibraryA,GetProcAddress,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00000001400099B0
Source: C:\Windows\explorer.exeCode function: 1_2_08659446 push rbx; ret 1_2_08659447
Source: C:\Windows\explorer.exeCode function: 1_2_0866EC4D push rax; retf 1_2_0866EC53
Source: C:\Windows\explorer.exeCode function: 1_2_0866F0E6 push 00000051h; iretd 1_2_0866F0F6
Source: C:\Windows\explorer.exeCode function: 1_2_08669CB2 push rbp; retf 1_2_08669CB3
Source: C:\Windows\explorer.exeCode function: 1_2_0866F110 push 00000051h; iretd 1_2_0866F0F6
Source: C:\Windows\explorer.exeCode function: 1_2_08669DFF push rdi; iretd 1_2_08669E00
Source: C:\Windows\explorer.exeCode function: 1_2_0866A28F push rdi; ret 1_2_0866A297
Source: C:\Windows\explorer.exeCode function: 1_2_086697BF pushfq ; ret 1_2_086697C4
Source: C:\Windows\explorer.exeCode function: 1_2_086AD44A push ebp; iretd 1_2_086AD44B
Source: C:\Windows\explorer.exeCode function: 1_2_086AEA37 push 8D48C2CDh; iretd 1_2_086AEA3F
Source: C:\Windows\explorer.exeCode function: 1_2_086AE6F0 push ds; ret 1_2_086AE6F2
Source: C:\Windows\explorer.exeCode function: 1_2_086AAEDB push cs; iretd 1_2_086AAF72
Source: C:\Windows\explorer.exeCode function: 1_2_086AB115 push es; iretd 1_2_086AB11C
Source: C:\Windows\explorer.exeCode function: 1_2_086AB1DC push esi; retf 1_2_086AB1EA
Source: C:\Windows\explorer.exeCode function: 1_2_086AB988 push edi; retf 1_2_086AB993
Source: C:\Windows\explorer.exeCode function: 1_2_000000018003F9FF push edi; iretd 1_2_000000018003FA00
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800415FC push eax; iretd 1_2_0000000180041609
Source: C:\Windows\explorer.exeCode function: 1_2_0000000180041245 push ebp; retf 1_2_0000000180041262
Source: C:\Windows\explorer.exeCode function: 1_2_0000000180041C4D pushfd ; ret 1_2_0000000180041C4E
Source: C:\Windows\explorer.exeCode function: 1_2_000000018004484D push eax; retf 1_2_0000000180044853
Source: C:\Windows\explorer.exeCode function: 1_2_000000018003FE8E push edi; ret 1_2_000000018003FE97
Source: C:\Windows\explorer.exeCode function: 1_2_000000018003F8B2 push ebp; retf 1_2_000000018003F8B3
Source: C:\Windows\explorer.exeCode function: 1_2_000000018003F3BF pushfd ; ret 1_2_000000018003F3C4
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800415D9 push eax; iretd 1_2_0000000180041609

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Users\user\Desktop\1735021454574.exeFile created: C:\Users\user\AppData\Local\Temp\ZP76TkMV.batJump to dropped file
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.1Jump to behavior
Source: C:\Windows\explorer.exeCode function: malloc,GetAdaptersInfo,malloc,swscanf,swscanf,1_2_00000001800072A0
Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 866Jump to behavior
Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 885Jump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-5411
Source: C:\Windows\explorer.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_1-13454
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\PING.EXELast function: Thread delayed
Source: explorer.exe, 00000001.00000002.3393916498.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000962B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\msmouse.inf_locv
Source: explorer.exe, 00000001.00000002.3394302751.00000000097F3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
Source: explorer.exe, 00000001.00000002.3393916498.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000973C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWws
Source: explorer.exe, 00000001.00000002.3394302751.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}RoamingCom
Source: explorer.exe, 00000001.00000000.2153130121.0000000009605000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
Source: explorer.exe, 00000001.00000000.2149116519.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000001.00000000.2149116519.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000W
Source: explorer.exe, 00000001.00000002.3393916498.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000978C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
Source: explorer.exe, 00000001.00000002.3394302751.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}lnkramW6
Source: explorer.exe, 00000001.00000000.2149116519.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
Source: explorer.exe, 00000001.00000000.2149116519.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: explorer.exe, 00000001.00000002.3394302751.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
Source: C:\Users\user\Desktop\1735021454574.exeAPI call chain: ExitProcess graph end nodegraph_0-5412
Source: C:\Windows\explorer.exeAPI call chain: ExitProcess graph end nodegraph_1-13455
Source: C:\Users\user\Desktop\1735021454574.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_000000014000456C RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000014000456C
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_00000001400099B0 LoadLibraryA,GetProcAddress,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00000001400099B0
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_000000014000B30C RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000014000B30C
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_000000014000456C RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000000014000456C
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_0000000140009170 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140009170
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_00000001400059DC SetUnhandledExceptionFilter,0_2_00000001400059DC
Source: C:\Windows\explorer.exeCode function: 1_2_086878E4 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_086878E4
Source: C:\Windows\explorer.exeCode function: 1_2_0868E3F0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0868E3F0

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\explorer.exeDomain query: apex_rep.listw.top
Source: C:\Windows\explorer.exeNetwork Connect: 120.78.149.238 12368Jump to behavior
Source: C:\Windows\explorer.exeDomain query: apex_down.listw.top
Source: C:\Users\user\Desktop\1735021454574.exeMemory allocated: C:\Windows\explorer.exe base: 8650000 protect: page read and writeJump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeMemory protected: C:\Windows\explorer.exe base: 8651000 protect: page execute readJump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeMemory protected: C:\Windows\explorer.exe base: 8650000 protect: page readonlyJump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeMemory protected: C:\Windows\explorer.exe base: 8655000 protect: page readonlyJump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeMemory protected: C:\Windows\explorer.exe base: 7FF6094DE728 protect: page read and writeJump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeMemory written: PID: 4004 base: 8650000 value: 00Jump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeMemory written: PID: 4004 base: 7FF6094DE728 value: 00Jump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeMemory written: C:\Windows\explorer.exe base: 8650000Jump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeMemory written: C:\Windows\explorer.exe base: 7FF6094DE728Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 2 127.1Jump to behavior
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_0000000140003830 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateMutexExW,GetLastError,GetCurrentThread,WaitForSingleObject,CloseHandle,0_2_0000000140003830
Source: explorer.exe, 00000001.00000002.3390838691.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.2149465351.00000000013A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
Source: explorer.exe, 00000001.00000002.3391913904.00000000048E0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3390838691.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.2149465351.00000000013A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
Source: explorer.exe, 00000001.00000002.3390838691.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.2149465351.00000000013A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
Source: explorer.exe, 00000001.00000002.3390530988.0000000000D60000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2149116519.0000000000D69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: +Progman
Source: explorer.exe, 00000001.00000002.3390838691.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.2149465351.00000000013A1000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
Source: explorer.exe, 00000001.00000000.2153910424.00000000098AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2979265872.00000000098AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3394302751.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd31A
Source: C:\Users\user\Desktop\1735021454574.exeCode function: GetLocaleInfoA,0_2_000000014000B3F8
Source: C:\Windows\explorer.exeCode function: GetLocaleInfoA,1_2_08691180
Source: C:\Users\user\Desktop\1735021454574.exeCode function: 0_2_0000000140006D94 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_0000000140006D94
Source: C:\Windows\explorer.exeCode function: 1_2_00000001800041E0 GlobalAlloc,socket,setsockopt,bind,listen,1_2_00000001800041E0
Source: C:\Windows\explorer.exeCode function: 1_2_0000000180003B40 socket,setsockopt,setsockopt,bind,setsockopt,recvfrom,1_2_0000000180003B40
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts2
Native API
1
Scripting
512
Process Injection
512
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
DLL Side-Loading
1
Obfuscated Files or Information
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager3
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
File Deletion
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Remote System Discovery
SSHKeylogging1
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials11
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
1735021454574.exe42%ReversingLabsWin32.Ransomware.Generic
1735021454574.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://excel.office.com-0%Avira URL Cloudsafe
https://powerpoint.office.comEMd0%Avira URL Cloudsafe
https://word.office.comM0%Avira URL Cloudsafe
https://outlook.come0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
apex_rep.listw.top
120.79.66.71
truetrue
    unknown
    apex_down.listw.top
    120.78.149.238
    truetrue
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000001.00000002.3393916498.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
        high
        https://api.msn.com/Iexplorer.exe, 00000001.00000002.3393916498.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
          high
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
            high
            https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngFexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000001.00000002.3393916498.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhzexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    https://excel.office.com-explorer.exe, 00000001.00000003.3094610682.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397816522.000000000C072000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3368014122.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3316943409.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2981313458.000000000C048000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3075092379.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2157386098.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://word.office.comMexplorer.exe, 00000001.00000003.3094610682.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397816522.000000000C072000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3368014122.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3316943409.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2981313458.000000000C048000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3075092379.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2157386098.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&ocexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgexplorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                            high
                            https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                              high
                              http://schemas.microexplorer.exe, 00000001.00000000.2152174541.0000000007B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000000.2149575447.00000000028A0000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000001.00000002.3392832890.0000000007B50000.00000002.00000001.00040000.00000000.sdmpfalse
                                high
                                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-darkexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameriexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                    high
                                    https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AAexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                      high
                                      https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-cexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                        high
                                        https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reveexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                          high
                                          https://powerpoint.office.comEMdexplorer.exe, 00000001.00000000.2157386098.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397461382.000000000BFEF000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                            high
                                            https://android.notify.windows.com/iOSexplorer.exe, 00000001.00000000.2157386098.000000000BFDF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397461382.000000000BFDF000.00000004.00000001.00020000.00000000.sdmpfalse
                                              high
                                              https://outlook.comeexplorer.exe, 00000001.00000003.3094610682.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3397816522.000000000C072000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3368014122.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3316943409.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2981313458.000000000C048000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.3075092379.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2157386098.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nationexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                high
                                                https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000001.00000002.3394302751.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153910424.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2979265872.00000000099AB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                    high
                                                    https://api.msn.com/explorer.exe, 00000001.00000002.3393916498.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153130121.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
                                                      high
                                                      https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-hexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-quexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                          high
                                                          https://wns.windows.com/eexplorer.exe, 00000001.00000002.3394302751.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000000.2153910424.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000003.2979265872.00000000099AB000.00000004.00000001.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                              high
                                                              https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.msn.com:443/en-us/feedexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-explorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-eiexplorer.exe, 00000001.00000000.2151376060.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000001.00000002.3392061508.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      120.79.66.71
                                                                      apex_rep.listw.topChina
                                                                      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                                                                      120.78.149.238
                                                                      apex_down.listw.topChina
                                                                      37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdtrue
                                                                      IP
                                                                      127.0.0.1
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1583250
                                                                      Start date and time:2025-01-02 09:28:08 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 5m 42s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:7
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:1
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:1735021454574.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.evad.winEXE@7/2@4/3
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 92%
                                                                      • Number of executed functions: 43
                                                                      • Number of non-executed functions: 71
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197, 4.245.163.56
                                                                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size getting too big, too many NtEnumerateKey calls found.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                      • VT rate limit hit for: 1735021454574.exe
                                                                      TimeTypeDescription
                                                                      03:29:02API Interceptor583x Sleep call for process: explorer.exe modified
                                                                      No context
                                                                      No context
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdarmv4l.elfGet hashmaliciousUnknownBrowse
                                                                      • 59.82.127.195
                                                                      armv6l.elfGet hashmaliciousUnknownBrowse
                                                                      • 39.106.221.219
                                                                      DF2.exeGet hashmaliciousUnknownBrowse
                                                                      • 59.110.52.4
                                                                      loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                                                      • 121.198.26.154
                                                                      loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                                                      • 47.103.186.206
                                                                      loligang.spc.elfGet hashmaliciousMiraiBrowse
                                                                      • 8.130.21.60
                                                                      0000000000000000.exeGet hashmaliciousNitolBrowse
                                                                      • 39.103.20.97
                                                                      0000000000000000.exeGet hashmaliciousUnknownBrowse
                                                                      • 39.103.20.97
                                                                      kwari.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                      • 42.120.21.89
                                                                      botx.sh4.elfGet hashmaliciousMiraiBrowse
                                                                      • 47.124.9.123
                                                                      CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdarmv4l.elfGet hashmaliciousUnknownBrowse
                                                                      • 59.82.127.195
                                                                      armv6l.elfGet hashmaliciousUnknownBrowse
                                                                      • 39.106.221.219
                                                                      DF2.exeGet hashmaliciousUnknownBrowse
                                                                      • 59.110.52.4
                                                                      loligang.sh4.elfGet hashmaliciousMiraiBrowse
                                                                      • 121.198.26.154
                                                                      loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                                                      • 47.103.186.206
                                                                      loligang.spc.elfGet hashmaliciousMiraiBrowse
                                                                      • 8.130.21.60
                                                                      0000000000000000.exeGet hashmaliciousNitolBrowse
                                                                      • 39.103.20.97
                                                                      0000000000000000.exeGet hashmaliciousUnknownBrowse
                                                                      • 39.103.20.97
                                                                      kwari.mpsl.elfGet hashmaliciousUnknownBrowse
                                                                      • 42.120.21.89
                                                                      botx.sh4.elfGet hashmaliciousMiraiBrowse
                                                                      • 47.124.9.123
                                                                      No context
                                                                      No context
                                                                      Process:C:\Users\user\Desktop\1735021454574.exe
                                                                      File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):293
                                                                      Entropy (8bit):5.20155858545543
                                                                      Encrypted:false
                                                                      SSDEEP:6:hmRQdzF27zLN2RUxiYMDw9FQLqIJmdUN2RUxi2HN723fCn:wu9U2yleqI2yjtaqn
                                                                      MD5:C27FBC8ACAB5695C70254E24735F8D65
                                                                      SHA1:DA5CEB780E4D216CC03CE079B40754984E00641D
                                                                      SHA-256:529E28D032C38E7FBDBB5A759919076418C8A683D5A9EA201D289FF965A94F93
                                                                      SHA-512:4DCA0CF2A95D91BCE1D569F9FCA01F0A1C711FB156A6BE463A2126245AF1D105445FF99EF28B0895611F618FC5C088EAD176D00DB5845C1697EC49BB86FCDEE4
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview:@echo off..set cnt=2..set num=0..:r1..set /a num=%num%+1..del /f /q "C:\Users\user\Desktop\1735021454574.exe"..if %cnt%==%num% goto e1..ping -n 2 127.1>nul..if exist "C:\Users\user\Desktop\1735021454574.exe" goto r1..:e1..del /f /q "C:\Users\user\AppData\Local\Temp\ZP76TkMV.bat"..
                                                                      Process:C:\Windows\System32\PING.EXE
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):331
                                                                      Entropy (8bit):4.92149009030101
                                                                      Encrypted:false
                                                                      SSDEEP:6:PzLSLzMRfmWxHLThx2LThx0sW26VY7FwAFeMmvVOIHJFxMVlmJHaVFEG1vv:PKMRJpTeT0sBSAFSkIrxMVlmJHaVzvv
                                                                      MD5:2E512EE24AAB186D09E9A1F9B72A0569
                                                                      SHA1:C5BA2E0C0338FFEE13ED1FB6DA0CC9C000824B0B
                                                                      SHA-256:DB41050CA723A06D95B73FFBE40B32DE941F5EE474F129B2B33E91C67B72674F
                                                                      SHA-512:6B4487A088155E34FE5C642E1C3D46F63CB2DDD9E4092809CE6F3BEEFDEF0D1F8AA67F8E733EDE70B07F467ED5BB6F07104EEA4C1E7AC7E1A502A772F56F7DE9
                                                                      Malicious:false
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:..Pinging 127.0.0.1 with 32 bytes of data:..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128..Reply from 127.0.0.1: bytes=32 time<1ms TTL=128....Ping statistics for 127.0.0.1:.. Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                                                      File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                      Entropy (8bit):7.190912647066544
                                                                      TrID:
                                                                      • Win64 Executable GUI (202006/5) 92.65%
                                                                      • Win64 Executable (generic) (12005/4) 5.51%
                                                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                                                      • DOS Executable Generic (2002/1) 0.92%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:1735021454574.exe
                                                                      File size:227'840 bytes
                                                                      MD5:561a88261d6c906c397723d0a484f366
                                                                      SHA1:96201e0ce8a4433b9d22ae77ecc16435d34a6216
                                                                      SHA256:9780d0a48df19bace1a2c6724a094db2d43bdd8925c93b30778653a70f04893e
                                                                      SHA512:31ce8034681f18d57a156fbecad34d920f2633de00e414c306c1f68887b17f83ce21a6bdc1e74df437a07759641721441cdb108d0e96a9ccaa1b02345bb69124
                                                                      SSDEEP:6144:zChBzIASWddnj1Yqdq+GO66EZFW6Z15bgxGE:z6ZeudBx5GXR35U
                                                                      TLSH:8624CF13E3A580FBC863C13CC9A26666F5B1B41A837487CFA7904E662F237D1793A351
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................................O..........t...................Rich....................PE..d.....=g..........#................
                                                                      Icon Hash:00928e8e8686b000
                                                                      Entrypoint:0x1400041f4
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x140000000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x673D83C7 [Wed Nov 20 06:37:59 2024 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:5
                                                                      OS Version Minor:2
                                                                      File Version Major:5
                                                                      File Version Minor:2
                                                                      Subsystem Version Major:5
                                                                      Subsystem Version Minor:2
                                                                      Import Hash:f8566657430f6381ba14c7ca1e40f06c
                                                                      Instruction
                                                                      dec eax
                                                                      sub esp, 28h
                                                                      call 00007F6F3850664Ch
                                                                      dec eax
                                                                      add esp, 28h
                                                                      jmp 00007F6F385038C7h
                                                                      int3
                                                                      int3
                                                                      dec eax
                                                                      jmp dword ptr [00007F51h]
                                                                      int3
                                                                      xor ecx, ecx
                                                                      dec eax
                                                                      jmp dword ptr [00007F47h]
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      dec eax
                                                                      jmp dword ptr [00007F45h]
                                                                      int3
                                                                      dec eax
                                                                      sub esp, 28h
                                                                      mov ecx, dword ptr [00032436h]
                                                                      cmp ecx, FFFFFFFFh
                                                                      je 00007F6F38503ABFh
                                                                      call dword ptr [00007F47h]
                                                                      or dword ptr [00032424h], FFFFFFFFh
                                                                      dec eax
                                                                      add esp, 28h
                                                                      jmp 00007F6F38506740h
                                                                      int3
                                                                      int3
                                                                      int3
                                                                      dec eax
                                                                      mov dword ptr [esp+08h], ebx
                                                                      push edi
                                                                      dec eax
                                                                      sub esp, 20h
                                                                      dec eax
                                                                      mov edi, edx
                                                                      dec eax
                                                                      mov ebx, ecx
                                                                      dec eax
                                                                      lea eax, dword ptr [00008A3Dh]
                                                                      dec eax
                                                                      mov dword ptr [ecx+000000A0h], eax
                                                                      mov dword ptr [ecx+1Ch], 00000001h
                                                                      mov dword ptr [ecx+000000C8h], 00000001h
                                                                      mov byte ptr [ecx+00000174h], 00000043h
                                                                      mov byte ptr [ecx+000001F7h], 00000043h
                                                                      dec eax
                                                                      lea eax, dword ptr [00032C60h]
                                                                      dec eax
                                                                      mov dword ptr [ecx+000000B8h], eax
                                                                      mov ecx, 0000000Dh
                                                                      call 00007F6F3850686Ch
                                                                      nop
                                                                      dec eax
                                                                      mov eax, dword ptr [ebx+000000B8h]
                                                                      lock add dword ptr [eax], 01h
                                                                      mov ecx, 0000000Dh
                                                                      call 00007F6F38506756h
                                                                      mov ecx, 0000000Ch
                                                                      Programming Language:
                                                                      • [ C ] VS2008 SP1 build 30729
                                                                      • [ASM] VS2008 SP1 build 30729
                                                                      • [IMP] VS2005 build 50727
                                                                      • [C++] VS2008 SP1 build 30729
                                                                      • [LNK] VS2008 SP1 build 30729
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xe4040x3c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x3a0000xa44.pdata
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0xc0000x320.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000xade90xae00708f78b5cd9639b4135400a06da5303cFalse0.5815822557471264data6.333185574110238IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0xc0000x2ea40x30001288c21a7e31d842404c68f524718900False0.3961588541666667data5.302044784760474IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0xf0000x2ac200x28c00e6c71238e76489d139e3667f7bc8f1dcFalse0.8114575345092024data7.418193968942779IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .pdata0x3a0000xa440xc00e236b8cd83b468044cdc9cbc64e678d3False0.4176432291666667data4.054398581850391IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      DLLImport
                                                                      KERNEL32.dllGlobalAlloc, LoadLibraryA, WideCharToMultiByte, MultiByteToWideChar, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, VirtualAllocEx, GetTempPathA, GetModuleFileNameA, GetTickCount, ReadProcessMemory, Thread32Next, Thread32First, CreateToolhelp32Snapshot, OpenThread, VirtualProtectEx, WriteProcessMemory, VirtualFreeEx, IsWow64Process, Process32Next, ProcessIdToSessionId, Process32First, GetCurrentThread, CreateMutexW, GlobalFree, SetFileAttributesA, WriteFile, SetEndOfFile, FlushFileBuffers, CreateFileA, SetFilePointerEx, GetLastError, GetNativeSystemInfo, OpenProcess, CloseHandle, GetModuleHandleA, GetProcAddress, GetCurrentProcess, GetCommandLineA, GetStartupInfoA, EncodePointer, DecodePointer, FlsGetValue, FlsSetValue, FlsFree, SetLastError, GetCurrentThreadId, FlsAlloc, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, GetModuleHandleW, Sleep, ExitProcess, GetStdHandle, RtlUnwindEx, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, DeleteCriticalSection, HeapSetInformation, HeapCreate, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, LeaveCriticalSection, EnterCriticalSection, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapFree, SetFilePointer, GetConsoleCP, GetConsoleMode, InitializeCriticalSectionAndSpinCount, GetLocaleInfoA, GetStringTypeA, GetStringTypeW, LCMapStringA, LCMapStringW, HeapAlloc, HeapReAlloc, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, HeapSize
                                                                      ADVAPI32.dllInitializeSecurityDescriptor, SetSecurityDescriptorDacl
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jan 2, 2025 09:29:06.578483105 CET4971012368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:06.583300114 CET1236849710120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:06.583398104 CET4971012368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:06.583453894 CET4971012368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:06.588238955 CET1236849710120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:07.547590017 CET1236849710120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:07.547683001 CET1236849710120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:07.547878981 CET4971012368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:07.547911882 CET4971012368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:07.552694082 CET1236849710120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:09.557245016 CET4972212368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:09.562067986 CET1236849722120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:09.562167883 CET4972212368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:09.562247038 CET4972212368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:09.567018986 CET1236849722120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:10.548669100 CET1236849722120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:10.548804045 CET1236849722120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:10.548857927 CET4972212368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:10.548950911 CET4972212368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:10.553744078 CET1236849722120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:12.620131969 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:12.625195980 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:12.626418114 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:12.626514912 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:12.631242990 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.583947897 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.583973885 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.583986998 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.583997965 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.584014893 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.584022045 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.584032059 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.584043026 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.584054947 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.584058046 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.584067106 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.584073067 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.584074974 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.584105968 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.588924885 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.588937998 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.588948965 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.588994980 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.853876114 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.853903055 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.853914976 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854008913 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.854027033 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854038954 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854057074 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854070902 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854074001 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.854084015 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854094982 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854104996 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.854114056 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854125977 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854136944 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854140043 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.854144096 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854152918 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.854154110 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854165077 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854182005 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854192019 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854192972 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.854197979 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854204893 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854211092 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854216099 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854222059 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854232073 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.854257107 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:13.859194994 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:13.859251022 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.100822926 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.100841999 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.100949049 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.100950956 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.100979090 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.100990057 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.101010084 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.101031065 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.101042032 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.101062059 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.101762056 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.101773977 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.101787090 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.101797104 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.101798058 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.101815939 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.102427006 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.102438927 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.102449894 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.102461100 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.102463007 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.102471113 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.102480888 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.102511883 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.103353024 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.103364944 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.103377104 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.103388071 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.103399992 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.103408098 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.103441000 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.104099989 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.104140997 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.104165077 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.104176044 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.104187012 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.104198933 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.104212999 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.104231119 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.104986906 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.104998112 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.105010033 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.105026007 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.105036020 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.105036974 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.105055094 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.105931044 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.105951071 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.105961084 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.105966091 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.105972052 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.105982065 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.105998039 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.106029987 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.196167946 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.196185112 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.196196079 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.196234941 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.196296930 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.196305990 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.196330070 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.196389914 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.196423054 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.196486950 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.196963072 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.196974993 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.196988106 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.197001934 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.197019100 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.197030067 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.197041988 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.197083950 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.197170973 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.197235107 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.197264910 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.359234095 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359258890 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359344006 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.359345913 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359389067 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359401941 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359414101 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359425068 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.359448910 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.359455109 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359721899 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359755993 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.359762907 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359775066 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359786034 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359810114 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.359827995 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.359859943 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.360124111 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360223055 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360234976 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360245943 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360255957 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.360256910 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360268116 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360275984 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.360279083 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360321045 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.360862970 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360882044 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360893011 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360901117 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.360903978 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360913992 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360924006 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360937119 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360940933 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.360946894 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360960960 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360970974 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.360971928 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.360991955 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.361879110 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361896038 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361908913 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361917973 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361928940 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.361931086 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361942053 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361944914 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.361953974 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361964941 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361974955 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.361974955 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361987114 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.361998081 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.362019062 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.362740040 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362783909 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.362799883 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362809896 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362823963 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362834930 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362848043 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.362859011 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362868071 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.362869024 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362879992 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362893105 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362904072 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.362906933 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.362922907 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.363732100 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363753080 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363763094 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363771915 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.363786936 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.363857031 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363867998 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363878965 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363888979 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363900900 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363910913 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363912106 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.363923073 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.363945007 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.364820004 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364836931 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364847898 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364851952 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.364857912 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364869118 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364876032 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.364881039 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364892960 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364902973 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364916086 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364922047 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.364927053 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.364948034 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.365858078 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365874052 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365885973 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365890980 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.365896940 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365907907 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365917921 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365928888 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365931034 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.365938902 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365951061 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365956068 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.365963936 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.365976095 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.378496885 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.445899963 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.445913076 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.445923090 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.445981979 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.446052074 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446099043 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.446158886 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446170092 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446177006 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446192980 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446202993 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.446204901 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446214914 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446224928 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446254969 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.446276903 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.446367025 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446377993 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446388006 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446398973 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446402073 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.446409941 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446420908 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.446420908 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.446451902 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.617803097 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.617888927 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.617899895 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.617912054 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.617924929 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.617937088 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.617935896 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.617949963 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.617963076 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.617964983 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618002892 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618109941 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618150949 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618164062 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618175983 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618185043 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618185997 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618211031 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618396997 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618408918 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618422031 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618432045 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618432999 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618446112 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618463039 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618494987 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618697882 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618715048 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618726969 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618736982 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618747950 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618747950 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618758917 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618768930 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618772030 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618782043 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618793964 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618796110 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618804932 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618815899 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.618818045 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.618838072 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.619246006 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619257927 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619277000 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619287968 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619291067 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.619301081 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619309902 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.619317055 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619340897 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.619389057 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619426012 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.619499922 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619513035 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619524002 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619534969 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619544029 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.619546890 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619558096 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619568110 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.619570971 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619590998 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.619827986 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.619860888 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.626935005 CET4974412368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.631792068 CET1236849744120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.707705975 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.712814093 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:14.712908983 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.712996006 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:14.717845917 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682276964 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682317972 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682329893 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682336092 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682347059 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682365894 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682377100 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682388067 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682398081 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682408094 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.682465076 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.682545900 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.687424898 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.687441111 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.687453032 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.687540054 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.940529108 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.940547943 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.940561056 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.940573931 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.940668106 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.940756083 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.940768003 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.940781116 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.940785885 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.940792084 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.940886021 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.941237926 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.941297054 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.941308022 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.941319942 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.941330910 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.941369057 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.941369057 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.942241907 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.942255020 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.942266941 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.942276001 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.942286968 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.942317963 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.942317963 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.942354918 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.943103075 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.943118095 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.943135977 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.943145990 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.943157911 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.943161964 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.943191051 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:15.945602894 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:15.945667982 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.198208094 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198223114 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198234081 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198329926 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198349953 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198352098 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.198363066 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198373079 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.198374987 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198411942 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.198556900 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198609114 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198649883 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.198666096 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198704004 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.198721886 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198767900 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198807955 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.198847055 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198858976 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198865891 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198872089 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198878050 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.198913097 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.199413061 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199425936 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199438095 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199448109 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199455976 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.199460030 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199486971 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.199516058 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.199887991 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199904919 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199915886 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199927092 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199938059 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199943066 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.199949980 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199960947 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.199963093 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199975014 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199985981 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.199990988 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.199995995 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200009108 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200010061 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.200035095 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.200675964 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200689077 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200704098 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200710058 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200721025 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200743914 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200757027 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.200776100 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.200797081 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200809002 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200820923 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200830936 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200835943 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.200844049 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.200865984 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.200892925 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.201637030 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.201647997 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.201667070 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.201685905 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.203284025 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.206374884 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.287595987 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.342823982 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.456217051 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456245899 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456257105 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456268072 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456279039 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456290007 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456368923 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456378937 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.456393957 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456406116 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456409931 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.456455946 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.456484079 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456496000 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456506014 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456516027 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456527948 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456542969 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.456562996 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.456594944 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.456762075 CET1236849755120.78.149.238192.168.2.6
                                                                      Jan 2, 2025 09:29:16.456799030 CET4975512368192.168.2.6120.78.149.238
                                                                      Jan 2, 2025 09:29:16.461433887 CET1236849755120.78.149.238192.168.2.6
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Jan 2, 2025 09:29:06.109770060 CET5250353192.168.2.6114.114.114.114
                                                                      Jan 2, 2025 09:29:06.233855009 CET5250453192.168.2.6223.5.5.5
                                                                      Jan 2, 2025 09:29:06.317641973 CET5352504223.5.5.5192.168.2.6
                                                                      Jan 2, 2025 09:29:06.335233927 CET5352503114.114.114.114192.168.2.6
                                                                      Jan 2, 2025 09:29:06.343422890 CET5250553192.168.2.6114.114.114.114
                                                                      Jan 2, 2025 09:29:06.468281031 CET5250653192.168.2.6223.5.5.5
                                                                      Jan 2, 2025 09:29:06.554301023 CET5352506223.5.5.5192.168.2.6
                                                                      Jan 2, 2025 09:29:06.568803072 CET5352505114.114.114.114192.168.2.6
                                                                      Jan 2, 2025 09:29:06.577665091 CET525078081192.168.2.6120.79.66.71
                                                                      Jan 2, 2025 09:29:06.578160048 CET525088081192.168.2.6120.79.66.71
                                                                      Jan 2, 2025 09:29:06.578304052 CET525098081192.168.2.6120.79.66.71
                                                                      Jan 2, 2025 09:29:16.476805925 CET629818081192.168.2.6120.79.66.71
                                                                      Jan 2, 2025 09:29:16.480376005 CET629828081192.168.2.6120.79.66.71
                                                                      Jan 2, 2025 09:29:16.518047094 CET629838081192.168.2.6120.79.66.71
                                                                      Jan 2, 2025 09:29:16.518238068 CET629848081192.168.2.6120.79.66.71
                                                                      TimestampSource IPDest IPChecksumCodeType
                                                                      Jan 2, 2025 09:29:06.335305929 CET192.168.2.6114.114.114.114a4de(Port unreachable)Destination Unreachable
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Jan 2, 2025 09:29:06.109770060 CET192.168.2.6114.114.114.1140x4a09Standard query (0)apex_down.listw.topA (IP address)IN (0x0001)false
                                                                      Jan 2, 2025 09:29:06.233855009 CET192.168.2.6223.5.5.50x4a09Standard query (0)apex_down.listw.topA (IP address)IN (0x0001)false
                                                                      Jan 2, 2025 09:29:06.343422890 CET192.168.2.6114.114.114.1140x4a09Standard query (0)apex_rep.listw.topA (IP address)IN (0x0001)false
                                                                      Jan 2, 2025 09:29:06.468281031 CET192.168.2.6223.5.5.50x4a09Standard query (0)apex_rep.listw.topA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Jan 2, 2025 09:29:06.317641973 CET223.5.5.5192.168.2.60x4a09No error (0)apex_down.listw.top120.78.149.238A (IP address)IN (0x0001)false
                                                                      Jan 2, 2025 09:29:06.335233927 CET114.114.114.114192.168.2.60x4a09No error (0)apex_down.listw.top120.78.149.238A (IP address)IN (0x0001)false
                                                                      Jan 2, 2025 09:29:06.554301023 CET223.5.5.5192.168.2.60x4a09No error (0)apex_rep.listw.top120.79.66.71A (IP address)IN (0x0001)false
                                                                      Jan 2, 2025 09:29:06.568803072 CET114.114.114.114192.168.2.60x4a09No error (0)apex_rep.listw.top120.79.66.71A (IP address)IN (0x0001)false

                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:03:29:01
                                                                      Start date:02/01/2025
                                                                      Path:C:\Users\user\Desktop\1735021454574.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Users\user\Desktop\1735021454574.exe"
                                                                      Imagebase:0x140000000
                                                                      File size:227'840 bytes
                                                                      MD5 hash:561A88261D6C906C397723D0A484F366
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:03:29:01
                                                                      Start date:02/01/2025
                                                                      Path:C:\Windows\explorer.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\Explorer.EXE
                                                                      Imagebase:0x7ff609140000
                                                                      File size:5'141'208 bytes
                                                                      MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:3
                                                                      Start time:03:29:04
                                                                      Start date:02/01/2025
                                                                      Path:C:\Windows\System32\cmd.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ZP76TkMV.bat""
                                                                      Imagebase:0x7ff602080000
                                                                      File size:289'792 bytes
                                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:4
                                                                      Start time:03:29:04
                                                                      Start date:02/01/2025
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff66e660000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:5
                                                                      Start time:03:29:05
                                                                      Start date:02/01/2025
                                                                      Path:C:\Windows\System32\PING.EXE
                                                                      Wow64 process (32bit):false
                                                                      Commandline:ping -n 2 127.1
                                                                      Imagebase:0x7ff6986f0000
                                                                      File size:22'528 bytes
                                                                      MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:15.7%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:26%
                                                                        Total number of Nodes:1337
                                                                        Total number of Limit Nodes:50
                                                                        execution_graph 5441 140008c64 5446 14000b1a8 5441->5446 5447 14000b0b4 5446->5447 5448 140007058 _lock 45 API calls 5447->5448 5454 14000b0dd 5448->5454 5449 14000b17a 5485 140006f58 LeaveCriticalSection 5449->5485 5454->5449 5465 140008cec 5454->5465 5470 14000b06c 5454->5470 5480 140008d74 5454->5480 5466 140008d09 EnterCriticalSection 5465->5466 5467 140008cfa 5465->5467 5469 140008d02 5466->5469 5468 140007058 _lock 45 API calls 5467->5468 5468->5469 5469->5454 5471 14000b081 5470->5471 5472 14000b07a 5470->5472 5495 14000aff0 5471->5495 5486 14000b0b4 5472->5486 5476 140008d9c _flush 45 API calls 5477 14000b09e 5476->5477 5501 14000b850 5477->5501 5479 14000b07f 5479->5454 5481 140008d8c LeaveCriticalSection 5480->5481 5482 140008d7d 5480->5482 5484 140008d8a 5481->5484 5529 140006f58 LeaveCriticalSection 5482->5529 5484->5454 5487 140007058 _lock 45 API calls 5486->5487 5493 14000b0dd 5487->5493 5488 14000b17a 5527 140006f58 LeaveCriticalSection 5488->5527 5491 140008cec 46 API calls 5491->5493 5492 140008d74 2 API calls 5492->5493 5493->5488 5493->5491 5493->5492 5494 14000b06c 81 API calls 5493->5494 5494->5493 5496 14000b00d 5495->5496 5500 14000b032 5495->5500 5497 140008d9c _flush 45 API calls 5496->5497 5496->5500 5498 14000b024 5497->5498 5499 140008980 _flush 77 API calls 5498->5499 5499->5500 5500->5476 5500->5479 5502 14000b869 5501->5502 5505 14000b87c 5501->5505 5503 140004764 _errno 45 API calls 5502->5503 5508 14000b86e 5503->5508 5504 14000b932 5507 140004764 _errno 45 API calls 5504->5507 5505->5504 5506 14000b890 5505->5506 5509 14000b8b6 5506->5509 5510 14000b8db 5506->5510 5511 14000b937 5507->5511 5508->5479 5512 140004764 _errno 45 API calls 5509->5512 5513 14000ad5c _flush 46 API calls 5510->5513 5514 140004694 _FF_MSGBANNER 7 API calls 5511->5514 5515 14000b8bb 5512->5515 5516 14000b8e2 5513->5516 5514->5508 5517 140004694 _FF_MSGBANNER 7 API calls 5515->5517 5518 14000b917 5516->5518 5520 14000acd8 _close_nolock 45 API calls 5516->5520 5517->5508 5519 140004764 _errno 45 API calls 5518->5519 5521 14000b91e 5519->5521 5522 14000b8f5 FlushFileBuffers 5520->5522 5528 14000ae04 LeaveCriticalSection 5521->5528 5523 14000b902 GetLastError 5522->5523 5524 14000b90c 5522->5524 5523->5524 5524->5521 5526 140004784 __doserrno 45 API calls 5524->5526 5526->5518 5630 14000bc67 LeaveCriticalSection 5631 1400043a8 5632 1400043b1 5631->5632 5660 1400044d2 5631->5660 5633 1400043cc 5632->5633 5634 140007c84 free 45 API calls 5632->5634 5635 1400043da 5633->5635 5636 140007c84 free 45 API calls 5633->5636 5634->5633 5637 1400043e8 5635->5637 5638 140007c84 free 45 API calls 5635->5638 5636->5635 5639 1400043f6 5637->5639 5640 140007c84 free 45 API calls 5637->5640 5638->5637 5641 140004404 5639->5641 5642 140007c84 free 45 API calls 5639->5642 5640->5639 5643 140007c84 free 45 API calls 5641->5643 5644 140004412 5641->5644 5642->5641 5643->5644 5645 140007c84 free 45 API calls 5644->5645 5646 140004423 5644->5646 5645->5646 5647 14000443b 5646->5647 5648 140007c84 free 45 API calls 5646->5648 5649 140007058 _lock 45 API calls 5647->5649 5648->5647 5652 140004445 5649->5652 5650 140004473 5663 140006f58 LeaveCriticalSection 5650->5663 5652->5650 5654 140007c84 free 45 API calls 5652->5654 5654->5650 5415 140005bb0 5416 140007058 _lock 45 API calls 5415->5416 5417 140005bde 5416->5417 5419 140005c05 DecodePointer 5417->5419 5423 140005cc1 _initterm 5417->5423 5418 140005cf7 5421 140005d22 5418->5421 5433 140006f58 LeaveCriticalSection 5418->5433 5422 140005c22 DecodePointer 5419->5422 5419->5423 5431 140005c46 5422->5431 5423->5418 5436 140006f58 LeaveCriticalSection 5423->5436 5425 140005d10 5428 140005a24 malloc GetModuleHandleW GetProcAddress 5425->5428 5427 140005c65 DecodePointer 5435 140004210 EncodePointer 5427->5435 5430 140005d18 ExitProcess 5428->5430 5431->5423 5431->5427 5432 140005c7a DecodePointer DecodePointer 5431->5432 5434 140004210 EncodePointer 5431->5434 5432->5431 5668 14000bbf0 5671 1400061f0 5668->5671 5672 140004300 _getptd 45 API calls 5671->5672 5673 14000620e 5672->5673 5674 14000bd71 5675 140008d74 2 API calls 5674->5675 5676 14000bd91 5675->5676 5677 1400041f4 5680 140006d94 5677->5680 5681 140006dc6 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 5680->5681 5682 1400041fd 5680->5682 5681->5682 5683 14000bcb5 5686 14000ae04 LeaveCriticalSection 5683->5686 5694 140008b80 5695 140008b95 5694->5695 5696 140007d30 _getptd 45 API calls 5695->5696 5697 140008bb4 5696->5697 5698 140007d30 _getptd 45 API calls 5697->5698 5699 140008bd1 5697->5699 5698->5699 5709 14000bc45 5710 14000bc61 5709->5710 5711 14000bc57 5709->5711 5713 140006f58 LeaveCriticalSection 5711->5713 5714 140006048 5715 140006161 5714->5715 5716 140006089 _cinit 5714->5716 5716->5715 5717 140006125 RtlUnwindEx 5716->5717 5717->5716 5718 14000bc0c 5721 140006f58 LeaveCriticalSection 5718->5721 5722 14000994f 5723 140009961 5722->5723 5724 140009956 SetLastError 5722->5724 5724->5723 5725 14000b710 5726 14000b721 5725->5726 5727 14000b72d 5725->5727 5726->5727 5728 14000b727 CloseHandle 5726->5728 5729 14000b746 5727->5729 5730 14000b740 CloseHandle 5727->5730 5728->5727 5730->5729 4071 140004018 GetStartupInfoA 4074 140004044 4071->4074 4113 140006d48 HeapCreate 4074->4113 4075 1400040e7 4116 1400044e0 4075->4116 4076 1400040d3 4229 140005ddc 4076->4229 4077 1400040ce 4220 140006004 4077->4220 4083 140004111 _RTC_Initialize 4132 1400069e8 GetStartupInfoA 4083->4132 4085 1400040f8 4088 140006004 _FF_MSGBANNER 45 API calls 4085->4088 4086 1400040fd 4087 140005ddc malloc 45 API calls 4086->4087 4089 140004107 4087->4089 4088->4086 4091 140005a60 malloc 3 API calls 4089->4091 4091->4083 4093 14000412a GetCommandLineA 4145 140006834 4093->4145 4099 140004156 4181 14000643c 4099->4181 4100 1400059f4 _getptd 45 API calls 4100->4099 4103 140004169 4196 140005b00 4103->4196 4104 1400059f4 _getptd 45 API calls 4104->4103 4106 140004170 4107 14000417b 4106->4107 4108 1400059f4 _getptd 45 API calls 4106->4108 4202 1400063c0 4107->4202 4108->4107 4112 1400041a1 4114 140006d6c HeapSetInformation 4113->4114 4115 1400040c2 4113->4115 4114->4115 4115->4075 4115->4076 4115->4077 4270 140005d74 4116->4270 4118 1400044eb 4275 140006e48 4118->4275 4121 140004554 4293 140004224 4121->4293 4122 1400044f4 FlsAlloc 4122->4121 4124 14000450c 4122->4124 4279 140007d30 4124->4279 4128 140004523 FlsSetValue 4128->4121 4129 140004536 4128->4129 4284 14000424c 4129->4284 4133 140007d30 _getptd 45 API calls 4132->4133 4143 140006a25 4133->4143 4134 14000411c 4134->4093 4265 1400059f4 4134->4265 4135 140006c11 GetStdHandle 4139 140006beb 4135->4139 4136 140006c40 GetFileType 4136->4139 4137 140007d30 _getptd 45 API calls 4137->4143 4138 140006ca0 SetHandleCount 4138->4134 4139->4134 4139->4135 4139->4136 4139->4138 4142 14000993c _lock InitializeCriticalSectionAndSpinCount 4139->4142 4140 140006b54 4140->4134 4140->4139 4141 140006b87 GetFileType 4140->4141 4144 14000993c _lock InitializeCriticalSectionAndSpinCount 4140->4144 4141->4140 4142->4139 4143->4134 4143->4137 4143->4139 4143->4140 4144->4140 4146 140006863 GetEnvironmentStringsW 4145->4146 4147 140006895 4145->4147 4148 140006871 4146->4148 4149 14000687d GetLastError 4146->4149 4147->4148 4151 140006958 4147->4151 4152 1400068a3 GetEnvironmentStringsW 4148->4152 4153 1400068b8 WideCharToMultiByte 4148->4153 4149->4147 4150 140006965 GetEnvironmentStrings 4154 14000413c 4150->4154 4155 140006977 4150->4155 4151->4150 4151->4154 4152->4153 4152->4154 4157 140006906 4153->4157 4158 140006947 4153->4158 4170 14000673c 4154->4170 4161 140007cc4 __setargv 45 API calls 4155->4161 4159 140007cc4 __setargv 45 API calls 4157->4159 4160 14000694a FreeEnvironmentStringsW 4158->4160 4163 14000690e 4159->4163 4160->4154 4162 14000699b 4161->4162 4164 1400069b1 __initmbctable 4162->4164 4165 1400069a3 FreeEnvironmentStringsA 4162->4165 4163->4158 4166 140006916 WideCharToMultiByte 4163->4166 4168 1400069bf FreeEnvironmentStringsA 4164->4168 4165->4154 4166->4160 4167 14000693f 4166->4167 4169 140007c84 free 45 API calls 4167->4169 4168->4154 4169->4158 4171 140006754 4170->4171 4172 140006759 GetModuleFileNameA 4170->4172 4404 140007c5c 4171->4404 4174 14000678b 4172->4174 4398 14000656c 4174->4398 4176 140004148 4176->4099 4176->4100 4178 140007cc4 __setargv 45 API calls 4179 1400067df 4178->4179 4179->4176 4180 14000656c __setargv 45 API calls 4179->4180 4180->4176 4182 140006459 4181->4182 4184 14000645e malloc 4181->4184 4183 140007c5c __initmbctable 83 API calls 4182->4183 4183->4184 4185 140007d30 _getptd 45 API calls 4184->4185 4188 14000415b 4184->4188 4190 14000649d malloc 4185->4190 4186 140006516 4187 140007c84 free 45 API calls 4186->4187 4187->4188 4188->4103 4188->4104 4189 140007d30 _getptd 45 API calls 4189->4190 4190->4186 4190->4188 4190->4189 4191 140006552 4190->4191 4194 1400064f2 4190->4194 4788 140007e44 4190->4788 4193 140007c84 free 45 API calls 4191->4193 4193->4188 4195 14000456c malloc 6 API calls 4194->4195 4195->4190 4198 140005b16 _cinit 4196->4198 4797 140008ee8 4198->4797 4199 140005b33 _initterm_e 4201 140005b56 _cinit 4199->4201 4800 1400095a4 4199->4800 4201->4106 4203 1400063d4 4202->4203 4205 1400063d9 4202->4205 4204 140007c5c __initmbctable 83 API calls 4203->4204 4204->4205 4206 140004180 4205->4206 4207 140009d70 _wincmdln 45 API calls 4205->4207 4208 140003830 InitializeSecurityDescriptor SetSecurityDescriptorDacl CreateMutexExW GetLastError 4206->4208 4207->4205 4209 1400038ee 4208->4209 4212 1400038a1 4208->4212 4833 1400015f0 4209->4833 4211 1400038e5 CloseHandle 4211->4209 4212->4211 4817 140003740 4212->4817 4215 1400038ad 4216 1400038b1 GetCurrentThread WaitForSingleObject 4215->4216 4217 1400038ce 4215->4217 4218 140003740 4 API calls 4216->4218 4827 1400036b0 OpenProcess 4217->4827 4218->4215 5369 140009c30 4220->5369 4223 140006021 4225 140005ddc malloc 45 API calls 4223->4225 4227 140006042 4223->4227 4224 140009c30 _FF_MSGBANNER 45 API calls 4224->4223 4226 140006038 4225->4226 4228 140005ddc malloc 45 API calls 4226->4228 4227->4076 4228->4227 4230 140005dff 4229->4230 4231 140009c30 _FF_MSGBANNER 42 API calls 4230->4231 4261 1400040dd 4230->4261 4232 140005e21 4231->4232 4233 140005fa6 GetStdHandle 4232->4233 4234 140009c30 _FF_MSGBANNER 42 API calls 4232->4234 4235 140005fb9 malloc 4233->4235 4233->4261 4237 140005e34 4234->4237 4238 140005fcf WriteFile 4235->4238 4235->4261 4236 140005e45 4239 140007e44 malloc 42 API calls 4236->4239 4236->4261 4237->4233 4237->4236 4238->4261 4240 140005e70 4239->4240 4241 140005e89 GetModuleFileNameA 4240->4241 4243 14000456c malloc 6 API calls 4240->4243 4242 140005ea9 4241->4242 4247 140005eda malloc 4241->4247 4244 140007e44 malloc 42 API calls 4242->4244 4243->4241 4245 140005ec1 4244->4245 4245->4247 4249 14000456c malloc 6 API calls 4245->4249 4246 140005f35 5384 140009ba4 4246->5384 4247->4246 5375 140007eb8 4247->5375 4249->4247 4251 140005f60 4254 140009ba4 malloc 42 API calls 4251->4254 4253 14000456c malloc 6 API calls 4253->4251 4256 140005f76 4254->4256 4257 140005f8f 4256->4257 4259 14000456c malloc 6 API calls 4256->4259 5393 1400099b0 4257->5393 4258 14000456c malloc 6 API calls 4258->4246 4259->4257 4262 140005a60 4261->4262 5411 140005a24 GetModuleHandleW 4262->5411 4266 140006004 _FF_MSGBANNER 44 API calls 4265->4266 4267 140005a01 4266->4267 4268 140005ddc malloc 44 API calls 4267->4268 4269 140005a08 DecodePointer 4268->4269 4301 140004210 EncodePointer 4270->4301 4272 140005d7f _initp_misc_winsig 4273 14000943c EncodePointer 4272->4273 4274 140005dc2 EncodePointer 4273->4274 4274->4118 4276 140006e6b 4275->4276 4278 1400044f0 4276->4278 4302 14000993c InitializeCriticalSectionAndSpinCount 4276->4302 4278->4121 4278->4122 4282 140007d55 4279->4282 4281 14000451b 4281->4121 4281->4128 4282->4281 4283 140007d73 Sleep 4282->4283 4304 14000aaa8 4282->4304 4283->4281 4283->4282 4347 140007058 4284->4347 4294 140004233 FlsFree 4293->4294 4295 140004240 4293->4295 4294->4295 4296 140006f07 DeleteCriticalSection 4295->4296 4297 140006f25 4295->4297 4298 140007c84 free 45 API calls 4296->4298 4299 140006f33 DeleteCriticalSection 4297->4299 4300 1400040ec 4297->4300 4298->4295 4299->4297 4300->4083 4300->4085 4300->4086 4303 140009969 4302->4303 4303->4276 4305 14000aabd 4304->4305 4311 14000aaef realloc 4304->4311 4306 14000aacb 4305->4306 4305->4311 4313 140004764 4306->4313 4308 14000ab07 HeapAlloc 4310 14000aaeb 4308->4310 4308->4311 4310->4282 4311->4308 4311->4310 4320 140004300 GetLastError FlsGetValue 4313->4320 4315 14000476d 4316 140004694 DecodePointer 4315->4316 4317 1400046c5 4316->4317 4318 1400046df malloc 4316->4318 4317->4310 4338 14000456c 4318->4338 4321 140004326 4320->4321 4322 14000436e SetLastError 4320->4322 4323 140007d30 _getptd 40 API calls 4321->4323 4322->4315 4324 140004333 4323->4324 4324->4322 4325 14000433b FlsSetValue 4324->4325 4326 140004351 4325->4326 4327 140004367 4325->4327 4328 14000424c _getptd 40 API calls 4326->4328 4332 140007c84 4327->4332 4330 140004358 GetCurrentThreadId 4328->4330 4330->4322 4331 14000436c 4331->4322 4333 140007c89 HeapFree 4332->4333 4334 140007cb9 realloc 4332->4334 4333->4334 4335 140007ca4 4333->4335 4334->4331 4336 140004764 _errno 43 API calls 4335->4336 4337 140007ca9 GetLastError 4336->4337 4337->4334 4345 140003a20 4338->4345 4340 14000458c RtlCaptureContext 4341 1400045c9 4340->4341 4342 140004629 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4341->4342 4343 140004674 GetCurrentProcess TerminateProcess 4342->4343 4344 140004668 malloc 4342->4344 4343->4317 4344->4343 4346 140003a29 4345->4346 4346->4340 4346->4346 4348 140007076 4347->4348 4349 140007087 EnterCriticalSection 4347->4349 4353 140006f70 4348->4353 4352 1400059f4 _getptd 44 API calls 4352->4349 4354 140006f97 4353->4354 4355 140006fae 4353->4355 4356 140006004 _FF_MSGBANNER 44 API calls 4354->4356 4367 140006fc3 4355->4367 4379 140007cc4 4355->4379 4358 140006f9c 4356->4358 4360 140005ddc malloc 44 API calls 4358->4360 4363 140006fa4 4360->4363 4361 140006fe8 4366 140007058 _lock 44 API calls 4361->4366 4362 140006fd9 4365 140004764 _errno 44 API calls 4362->4365 4364 140005a60 malloc 3 API calls 4363->4364 4364->4355 4365->4367 4368 140006ff2 4366->4368 4367->4349 4367->4352 4369 14000702a 4368->4369 4370 140006ffb 4368->4370 4371 140007c84 free 44 API calls 4369->4371 4372 14000993c _lock InitializeCriticalSectionAndSpinCount 4370->4372 4373 140007019 LeaveCriticalSection 4371->4373 4374 140007008 4372->4374 4373->4367 4374->4373 4376 140007c84 free 44 API calls 4374->4376 4377 140007014 4376->4377 4378 140004764 _errno 44 API calls 4377->4378 4378->4373 4380 140007ce0 4379->4380 4382 140006fd1 4380->4382 4383 140007cf8 Sleep 4380->4383 4384 14000a9f0 4380->4384 4382->4361 4382->4362 4383->4380 4383->4382 4385 14000aa84 realloc 4384->4385 4393 14000aa08 realloc 4384->4393 4388 140004764 _errno 44 API calls 4385->4388 4386 14000aa40 HeapAlloc 4389 14000aa79 4386->4389 4386->4393 4387 140006004 _FF_MSGBANNER 44 API calls 4395 14000aa20 4387->4395 4388->4389 4389->4380 4390 14000aa69 4391 140004764 _errno 44 API calls 4390->4391 4394 14000aa6e 4391->4394 4392 140005ddc malloc 44 API calls 4392->4395 4393->4386 4393->4390 4393->4394 4393->4395 4397 140004764 _errno 44 API calls 4394->4397 4395->4386 4395->4387 4395->4392 4396 140005a60 malloc 3 API calls 4395->4396 4396->4395 4397->4389 4400 1400065ab 4398->4400 4403 140006613 4400->4403 4408 140009d70 4400->4408 4401 14000670f 4401->4176 4401->4178 4402 140009d70 _wincmdln 45 API calls 4402->4403 4403->4401 4403->4402 4405 140007c69 4404->4405 4406 140007c73 4404->4406 4596 140007a64 4405->4596 4406->4172 4409 140009cf4 4408->4409 4412 14000497c 4409->4412 4413 140004992 4412->4413 4419 1400049f6 4412->4419 4420 140004384 4413->4420 4416 1400049cf 4416->4419 4439 1400076a0 4416->4439 4419->4400 4421 140004300 _getptd 45 API calls 4420->4421 4422 14000438f 4421->4422 4423 14000439f 4422->4423 4424 1400059f4 _getptd 45 API calls 4422->4424 4423->4416 4425 1400073b0 4423->4425 4424->4423 4426 140004384 _getptd 45 API calls 4425->4426 4428 1400073bb 4426->4428 4427 1400073e4 4430 140007058 _lock 45 API calls 4427->4430 4428->4427 4429 1400073d6 4428->4429 4431 140004384 _getptd 45 API calls 4429->4431 4432 1400073ee 4430->4432 4433 1400073db 4431->4433 4450 140007358 4432->4450 4437 14000741c 4433->4437 4438 1400059f4 _getptd 45 API calls 4433->4438 4437->4416 4438->4437 4440 140004384 _getptd 45 API calls 4439->4440 4441 1400076af 4440->4441 4442 1400076ca 4441->4442 4443 140007058 _lock 45 API calls 4441->4443 4446 14000774e 4442->4446 4448 1400059f4 _getptd 45 API calls 4442->4448 4444 1400076dd 4443->4444 4445 140007714 4444->4445 4449 140007c84 free 45 API calls 4444->4449 4595 140006f58 LeaveCriticalSection 4445->4595 4446->4419 4448->4446 4449->4445 4451 1400073a2 4450->4451 4452 140007366 _wincmdln _getptd 4450->4452 4454 140006f58 LeaveCriticalSection 4451->4454 4452->4451 4455 14000709c 4452->4455 4456 140007133 4455->4456 4458 1400070ba 4455->4458 4457 140007186 4456->4457 4459 140007c84 free 45 API calls 4456->4459 4467 1400071b3 4457->4467 4507 140009d84 4457->4507 4458->4456 4466 140007c84 free 45 API calls 4458->4466 4469 1400070f9 4458->4469 4460 140007157 4459->4460 4462 140007c84 free 45 API calls 4460->4462 4468 14000716b 4462->4468 4463 14000711b 4471 140007c84 free 45 API calls 4463->4471 4465 140007c84 free 45 API calls 4465->4467 4472 1400070ed 4466->4472 4470 1400071ff 4467->4470 4480 140007c84 45 API calls free 4467->4480 4473 140007c84 free 45 API calls 4468->4473 4469->4463 4474 140007c84 free 45 API calls 4469->4474 4475 140007127 4471->4475 4483 140009fb8 4472->4483 4478 14000717a 4473->4478 4479 14000710f 4474->4479 4476 140007c84 free 45 API calls 4475->4476 4476->4456 4481 140007c84 free 45 API calls 4478->4481 4499 140009f70 4479->4499 4480->4467 4481->4457 4484 140009fc1 4483->4484 4497 14000a047 4483->4497 4485 140007c84 free 45 API calls 4484->4485 4486 140009fdb 4484->4486 4485->4486 4487 140009fed 4486->4487 4488 140007c84 free 45 API calls 4486->4488 4489 140009fff 4487->4489 4490 140007c84 free 45 API calls 4487->4490 4488->4487 4491 14000a011 4489->4491 4492 140007c84 free 45 API calls 4489->4492 4490->4489 4493 14000a023 4491->4493 4494 140007c84 free 45 API calls 4491->4494 4492->4491 4495 14000a035 4493->4495 4496 140007c84 free 45 API calls 4493->4496 4494->4493 4495->4497 4498 140007c84 free 45 API calls 4495->4498 4496->4495 4497->4469 4498->4497 4500 140009f75 4499->4500 4501 140009fb2 4499->4501 4502 140009f8e 4500->4502 4503 140007c84 free 45 API calls 4500->4503 4501->4463 4504 140009fa0 4502->4504 4505 140007c84 free 45 API calls 4502->4505 4503->4502 4504->4501 4506 140007c84 free 45 API calls 4504->4506 4505->4504 4506->4501 4508 1400071a7 4507->4508 4509 140009d8d 4507->4509 4508->4465 4510 140007c84 free 45 API calls 4509->4510 4511 140009d9e 4510->4511 4512 140007c84 free 45 API calls 4511->4512 4513 140009da7 4512->4513 4514 140007c84 free 45 API calls 4513->4514 4515 140009db0 4514->4515 4516 140007c84 free 45 API calls 4515->4516 4517 140009db9 4516->4517 4518 140007c84 free 45 API calls 4517->4518 4519 140009dc2 4518->4519 4520 140007c84 free 45 API calls 4519->4520 4521 140009dcb 4520->4521 4522 140007c84 free 45 API calls 4521->4522 4523 140009dd3 4522->4523 4524 140007c84 free 45 API calls 4523->4524 4525 140009ddc 4524->4525 4526 140007c84 free 45 API calls 4525->4526 4527 140009de5 4526->4527 4528 140007c84 free 45 API calls 4527->4528 4529 140009dee 4528->4529 4530 140007c84 free 45 API calls 4529->4530 4531 140009df7 4530->4531 4532 140007c84 free 45 API calls 4531->4532 4533 140009e00 4532->4533 4534 140007c84 free 45 API calls 4533->4534 4535 140009e09 4534->4535 4536 140007c84 free 45 API calls 4535->4536 4537 140009e12 4536->4537 4538 140007c84 free 45 API calls 4537->4538 4539 140009e1b 4538->4539 4540 140007c84 free 45 API calls 4539->4540 4541 140009e24 4540->4541 4542 140007c84 free 45 API calls 4541->4542 4543 140009e30 4542->4543 4544 140007c84 free 45 API calls 4543->4544 4545 140009e3c 4544->4545 4546 140007c84 free 45 API calls 4545->4546 4547 140009e48 4546->4547 4548 140007c84 free 45 API calls 4547->4548 4549 140009e54 4548->4549 4550 140007c84 free 45 API calls 4549->4550 4551 140009e60 4550->4551 4552 140007c84 free 45 API calls 4551->4552 4553 140009e6c 4552->4553 4554 140007c84 free 45 API calls 4553->4554 4555 140009e78 4554->4555 4556 140007c84 free 45 API calls 4555->4556 4557 140009e84 4556->4557 4558 140007c84 free 45 API calls 4557->4558 4559 140009e90 4558->4559 4560 140007c84 free 45 API calls 4559->4560 4561 140009e9c 4560->4561 4562 140007c84 free 45 API calls 4561->4562 4563 140009ea8 4562->4563 4564 140007c84 free 45 API calls 4563->4564 4565 140009eb4 4564->4565 4566 140007c84 free 45 API calls 4565->4566 4567 140009ec0 4566->4567 4568 140007c84 free 45 API calls 4567->4568 4569 140009ecc 4568->4569 4570 140007c84 free 45 API calls 4569->4570 4571 140009ed8 4570->4571 4572 140007c84 free 45 API calls 4571->4572 4573 140009ee4 4572->4573 4574 140007c84 free 45 API calls 4573->4574 4575 140009ef0 4574->4575 4576 140007c84 free 45 API calls 4575->4576 4577 140009efc 4576->4577 4578 140007c84 free 45 API calls 4577->4578 4579 140009f08 4578->4579 4580 140007c84 free 45 API calls 4579->4580 4581 140009f14 4580->4581 4582 140007c84 free 45 API calls 4581->4582 4583 140009f20 4582->4583 4584 140007c84 free 45 API calls 4583->4584 4585 140009f2c 4584->4585 4586 140007c84 free 45 API calls 4585->4586 4587 140009f38 4586->4587 4588 140007c84 free 45 API calls 4587->4588 4589 140009f44 4588->4589 4590 140007c84 free 45 API calls 4589->4590 4591 140009f50 4590->4591 4592 140007c84 free 45 API calls 4591->4592 4593 140009f5c 4592->4593 4594 140007c84 free 45 API calls 4593->4594 4594->4508 4597 140004384 _getptd 45 API calls 4596->4597 4598 140007a88 4597->4598 4599 1400076a0 __initmbctable 45 API calls 4598->4599 4600 140007a90 4599->4600 4620 14000775c 4600->4620 4603 140007cc4 __setargv 45 API calls 4604 140007ab4 __initmbctable 4603->4604 4613 140007c11 4604->4613 4627 1400077ec 4604->4627 4607 140007c13 4609 140007c2c 4607->4609 4612 140007c84 free 45 API calls 4607->4612 4607->4613 4608 140007aef 4611 140007c84 free 45 API calls 4608->4611 4614 140007b14 4608->4614 4610 140004764 _errno 45 API calls 4609->4610 4610->4613 4611->4614 4612->4609 4613->4406 4614->4613 4615 140007058 _lock 45 API calls 4614->4615 4616 140007b4c 4615->4616 4617 140007bfc 4616->4617 4619 140007c84 free 45 API calls 4616->4619 4637 140006f58 LeaveCriticalSection 4617->4637 4619->4617 4621 14000497c _wincmdln 45 API calls 4620->4621 4622 140007770 4621->4622 4623 1400077a1 4622->4623 4624 14000777c GetOEMCP 4622->4624 4625 1400077a6 GetACP 4623->4625 4626 14000778c 4623->4626 4624->4626 4625->4626 4626->4603 4626->4613 4628 14000775c __initmbctable 47 API calls 4627->4628 4629 140007813 4628->4629 4630 14000781b __initmbctable 4629->4630 4632 14000786c IsValidCodePage 4629->4632 4636 140007892 malloc 4629->4636 4648 140009170 4630->4648 4632->4630 4633 14000787d GetCPInfo 4632->4633 4633->4630 4633->4636 4634 140007a4f 4634->4607 4634->4608 4638 1400074bc GetCPInfo 4636->4638 4639 1400075ea 4638->4639 4640 1400074fe malloc 4638->4640 4643 140009170 _flush 8 API calls 4639->4643 4659 14000a2bc 4640->4659 4645 14000768a 4643->4645 4645->4630 4647 14000a958 __initmbctable 78 API calls 4647->4639 4649 140009179 4648->4649 4650 140009184 4649->4650 4651 14000b1c0 RtlCaptureContext RtlLookupFunctionEntry 4649->4651 4650->4634 4652 14000b204 RtlVirtualUnwind 4651->4652 4653 14000b245 4651->4653 4654 14000b267 IsDebuggerPresent 4652->4654 4653->4654 4787 140007e3c 4654->4787 4656 14000b2c6 SetUnhandledExceptionFilter UnhandledExceptionFilter 4657 14000b2e4 malloc 4656->4657 4658 14000b2ee GetCurrentProcess TerminateProcess 4656->4658 4657->4658 4658->4634 4660 14000497c _wincmdln 45 API calls 4659->4660 4661 14000a2e0 4660->4661 4669 14000a050 4661->4669 4664 14000a958 4665 14000497c _wincmdln 45 API calls 4664->4665 4666 14000a97c 4665->4666 4740 14000a418 4666->4740 4670 14000a0dd 4669->4670 4671 14000a0a0 GetStringTypeW 4669->4671 4672 14000a20c 4670->4672 4674 14000a0ba 4670->4674 4673 14000a0c2 GetLastError 4671->4673 4671->4674 4693 14000b3f8 GetLocaleInfoA 4672->4693 4673->4670 4675 14000a205 4674->4675 4676 14000a106 MultiByteToWideChar 4674->4676 4678 140009170 _flush 8 API calls 4675->4678 4676->4675 4682 14000a134 4676->4682 4680 140007581 4678->4680 4680->4664 4681 14000a267 GetStringTypeA 4681->4675 4686 14000a28a 4681->4686 4683 14000a9f0 malloc 45 API calls 4682->4683 4684 14000a159 malloc _flush 4682->4684 4683->4684 4684->4675 4687 14000a1c0 MultiByteToWideChar 4684->4687 4689 140007c84 free 45 API calls 4686->4689 4690 14000a1e2 GetStringTypeW 4687->4690 4691 14000a1f7 4687->4691 4689->4675 4690->4691 4691->4675 4692 140007c84 free 45 API calls 4691->4692 4692->4675 4694 14000b42a 4693->4694 4695 14000b42f 4693->4695 4697 140009170 _flush 8 API calls 4694->4697 4724 140003f30 4695->4724 4698 14000a236 4697->4698 4698->4675 4698->4681 4699 14000b44c 4698->4699 4700 14000b576 4699->4700 4701 14000b49e GetCPInfo 4699->4701 4704 140009170 _flush 8 API calls 4700->4704 4702 14000b54f MultiByteToWideChar 4701->4702 4703 14000b4b0 4701->4703 4702->4700 4708 14000b4d5 malloc 4702->4708 4703->4702 4705 14000b4ba GetCPInfo 4703->4705 4706 14000a25c 4704->4706 4705->4702 4707 14000b4cf 4705->4707 4706->4675 4706->4681 4707->4702 4707->4708 4709 14000b511 malloc _flush 4708->4709 4710 14000a9f0 malloc 45 API calls 4708->4710 4709->4700 4711 14000b5ad MultiByteToWideChar 4709->4711 4710->4709 4712 14000b5d7 4711->4712 4716 14000b60f 4711->4716 4713 14000b617 4712->4713 4714 14000b5dc WideCharToMultiByte 4712->4714 4717 14000b649 4713->4717 4718 14000b61d WideCharToMultiByte 4713->4718 4714->4716 4715 140007c84 free 45 API calls 4715->4700 4716->4700 4716->4715 4719 140007d30 _getptd 45 API calls 4717->4719 4718->4716 4718->4717 4720 14000b656 4719->4720 4720->4716 4721 14000b65e WideCharToMultiByte 4720->4721 4721->4716 4722 14000b687 4721->4722 4723 140007c84 free 45 API calls 4722->4723 4723->4716 4725 1400058b0 4724->4725 4728 14000562c 4725->4728 4729 14000497c _wincmdln 45 API calls 4728->4729 4732 14000565e 4729->4732 4730 14000566c 4731 140004764 _errno 45 API calls 4730->4731 4733 140005671 4731->4733 4732->4730 4736 1400056a7 4732->4736 4734 140004694 _FF_MSGBANNER 7 API calls 4733->4734 4737 14000568c 4734->4737 4735 140009190 __initmbctable 67 API calls 4735->4736 4736->4735 4738 1400056f7 4736->4738 4737->4694 4738->4737 4739 140004764 _errno 45 API calls 4738->4739 4739->4737 4741 14000a470 LCMapStringW 4740->4741 4744 14000a494 4740->4744 4742 14000a4a0 GetLastError 4741->4742 4741->4744 4742->4744 4743 14000a762 4747 14000b3f8 __initmbctable 67 API calls 4743->4747 4744->4743 4745 14000a50f 4744->4745 4746 14000a75b 4745->4746 4748 14000a52d MultiByteToWideChar 4745->4748 4749 140009170 _flush 8 API calls 4746->4749 4750 14000a790 4747->4750 4748->4746 4758 14000a55c 4748->4758 4751 1400075b4 4749->4751 4750->4746 4752 14000a8eb LCMapStringA 4750->4752 4753 14000a7af 4750->4753 4751->4647 4764 14000a7f7 4752->4764 4755 14000b44c __initmbctable 60 API calls 4753->4755 4754 14000a5d8 MultiByteToWideChar 4756 14000a602 LCMapStringW 4754->4756 4757 14000a74d 4754->4757 4761 14000a7c7 4755->4761 4756->4757 4762 14000a62c 4756->4762 4757->4746 4766 140007c84 free 45 API calls 4757->4766 4759 14000a58d _flush 4758->4759 4760 14000a9f0 malloc 45 API calls 4758->4760 4759->4746 4759->4754 4760->4759 4761->4746 4763 14000a7cf LCMapStringA 4761->4763 4767 14000a672 4762->4767 4768 14000a637 4762->4768 4763->4764 4773 14000a7fe 4763->4773 4765 14000a91b 4764->4765 4769 140007c84 free 45 API calls 4764->4769 4765->4746 4771 140007c84 free 45 API calls 4765->4771 4766->4746 4776 14000a9f0 malloc 45 API calls 4767->4776 4784 14000a690 _flush 4767->4784 4768->4757 4770 14000a64e LCMapStringW 4768->4770 4769->4765 4770->4757 4771->4746 4772 14000a6df LCMapStringW 4774 14000a73f 4772->4774 4775 14000a700 WideCharToMultiByte 4772->4775 4777 14000a9f0 malloc 45 API calls 4773->4777 4785 14000a81f malloc _flush 4773->4785 4774->4757 4782 140007c84 free 45 API calls 4774->4782 4775->4774 4776->4784 4777->4785 4778 14000a881 LCMapStringA 4779 14000a8a9 4778->4779 4780 14000a8ad 4778->4780 4779->4764 4786 140007c84 free 45 API calls 4779->4786 4783 14000b44c __initmbctable 60 API calls 4780->4783 4782->4757 4783->4779 4784->4757 4784->4772 4785->4764 4785->4778 4786->4764 4787->4656 4789 140007e59 4788->4789 4790 140007e4f 4788->4790 4791 140004764 _errno 45 API calls 4789->4791 4790->4789 4793 140007e85 4790->4793 4796 140007e61 4791->4796 4792 140004694 _FF_MSGBANNER 7 API calls 4794 140007e7d 4792->4794 4793->4794 4795 140004764 _errno 45 API calls 4793->4795 4794->4190 4795->4796 4796->4792 4798 140008efe EncodePointer 4797->4798 4798->4798 4799 140008f13 4798->4799 4799->4199 4803 14000949c 4800->4803 4816 140005a78 4803->4816 4818 140003a20 malloc 4817->4818 4819 140003765 CreateToolhelp32Snapshot 4818->4819 4820 140003791 4819->4820 4821 140003778 GetLastError 4819->4821 4820->4821 4822 1400037aa 4820->4822 4821->4215 4823 1400037c5 ProcessIdToSessionId 4822->4823 4824 1400037e7 Process32Next 4822->4824 4823->4824 4825 14000380b 4823->4825 4824->4822 4826 1400037f8 4824->4826 4825->4215 4826->4215 4828 1400036f5 4827->4828 4829 1400036ed GetLastError 4827->4829 4860 140003160 WaitForSingleObject 4828->4860 4830 14000371f 4829->4830 4830->4211 4832 140003712 CloseHandle 4832->4830 4834 140003a20 malloc 4833->4834 4835 140001638 GetTickCount 4834->4835 5063 140003b0c 4835->5063 4842 140001694 malloc 4844 1400016b4 GetModuleFileNameA GetTempPathA 4842->4844 4843 14000168c 4843->4112 4845 1400016e7 4844->4845 5073 140003e94 4845->5073 4847 14000174e 4848 140003e94 82 API calls 4847->4848 4849 140001785 4848->4849 4850 140003e94 82 API calls 4849->4850 4851 1400017bc 4850->4851 4852 140003e94 82 API calls 4851->4852 4853 1400017dd 4852->4853 5084 140001340 4853->5084 4856 140003e94 82 API calls 4857 140001824 4856->4857 5087 140001470 4857->5087 4861 14000319e 4860->4861 4862 14000318f 4860->4862 4901 140001120 4861->4901 4862->4832 4865 1400031b7 IsWow64Process 4866 1400031cf 4865->4866 4867 1400031ff 4865->4867 4868 140003226 GlobalAlloc 4866->4868 4888 14000368d 4866->4888 4867->4868 4867->4888 4869 140003269 4868->4869 4871 140003277 malloc __initmbctable 4868->4871 4870 1400033c4 GlobalFree 4869->4870 4869->4888 4870->4832 4872 140003296 VirtualAllocEx 4871->4872 4873 1400032e1 4872->4873 4874 1400032ba GetLastError 4872->4874 4875 1400033f3 4873->4875 4876 14000330f 4873->4876 4877 1400032ce 4874->4877 4905 140002260 GetModuleHandleA 4875->4905 4920 140002540 4876->4920 4877->4869 4880 14000339d VirtualFreeEx 4877->4880 4880->4869 4885 140003357 4885->4877 4886 140003432 __initmbctable 4885->4886 4887 140003393 4885->4887 4886->4877 4886->4888 4889 140003487 WriteProcessMemory 4886->4889 4887->4877 4890 1400034b4 GetLastError 4889->4890 4891 1400034c5 VirtualProtectEx 4889->4891 4890->4891 4893 140003504 GetLastError 4891->4893 4894 140003515 VirtualProtectEx VirtualProtectEx 4891->4894 4893->4894 4895 140003605 VirtualProtectEx WriteProcessMemory 4894->4895 4896 14000356d VirtualProtectEx WriteProcessMemory 4894->4896 4897 140003653 VirtualProtectEx 4895->4897 4898 140003649 GetLastError 4895->4898 4899 1400035b1 GetLastError VirtualProtectEx 4896->4899 4900 1400035e0 VirtualProtectEx 4896->4900 4897->4877 4898->4897 4899->4900 4900->4895 4902 140003a20 malloc 4901->4902 4903 14000113c GetNativeSystemInfo 4902->4903 4904 140001154 4903->4904 4904->4865 4904->4867 4906 1400022b3 GetProcAddress 4905->4906 4907 1400022ab GetLastError 4905->4907 4908 1400022d8 GetProcAddress 4906->4908 4909 1400022d0 GetLastError 4906->4909 4912 140002310 4907->4912 4910 1400022f5 NtQueryInformationProcess 4908->4910 4911 1400022ed GetLastError 4908->4911 4909->4912 4910->4912 4911->4912 4912->4877 4913 140002160 4912->4913 4914 1400021a9 malloc 4913->4914 4915 1400021b9 ReadProcessMemory 4914->4915 4916 1400021f1 4915->4916 4917 1400021e9 GetLastError 4915->4917 4919 1400021fb 4916->4919 4946 1400018f0 4916->4946 4917->4919 4919->4886 4994 140002350 4920->4994 4923 140002572 OpenThread 4925 140002595 malloc 4923->4925 4926 140002588 GetLastError 4923->4926 4924 1400026da 4924->4877 4939 140002f40 4924->4939 5004 1400024c0 GetModuleHandleA 4925->5004 4933 1400025d1 4926->4933 4927 1400026cf CloseHandle 4927->4924 4932 140002642 GlobalAlloc 4934 140002662 4932->4934 4935 140002667 malloc 4932->4935 4933->4924 4933->4927 4934->4933 4937 1400026b1 GlobalFree 4934->4937 4936 140002677 ReadProcessMemory 4935->4936 4936->4934 4938 14000269f GetLastError 4936->4938 4937->4933 4938->4934 4940 140002f81 malloc 4939->4940 4941 140002f91 ReadProcessMemory 4940->4941 4942 140002fc1 GetLastError 4941->4942 4943 140002fc9 4941->4943 4945 140002fd1 4942->4945 4943->4945 5016 140002710 4943->5016 4945->4885 4947 140003a20 malloc 4946->4947 4948 14000194f GlobalAlloc 4947->4948 4949 140001968 4948->4949 4950 140001970 ReadProcessMemory 4948->4950 4949->4919 4951 140001998 GetLastError 4950->4951 4954 1400019a5 4950->4954 4952 14000210f GlobalFree 4951->4952 4952->4949 4953 1400019b4 4953->4952 4954->4953 4955 140001a1a GlobalAlloc GlobalAlloc 4954->4955 4973 140001d16 4954->4973 4960 140001a51 malloc 4955->4960 4975 140001d49 4955->4975 4956 140001d82 GlobalAlloc 4957 140001da0 4956->4957 4961 140001da8 malloc 4956->4961 4964 1400020a2 4957->4964 4965 14000208d GlobalFree 4957->4965 4958 1400020e2 4958->4953 4962 1400020e7 GlobalFree 4958->4962 4959 1400020d9 GlobalFree 4959->4958 4963 140001a67 ReadProcessMemory 4960->4963 4960->4975 4966 140001db5 ReadProcessMemory 4961->4966 4962->4953 4967 140001a94 GetLastError 4963->4967 4991 140001aa1 malloc 4963->4991 4964->4975 4965->4975 4968 140001ddc GetLastError 4966->4968 4993 140001de9 malloc 4966->4993 4967->4975 4968->4957 4969 140001ad2 ReadProcessMemory 4970 140001d34 GetLastError 4969->4970 4969->4991 4970->4973 4971 140001e1d ReadProcessMemory 4974 140002066 GetLastError 4971->4974 4971->4993 4972 140001b26 ReadProcessMemory 4976 140001b71 ReadProcessMemory 4972->4976 4977 140001d2a GetLastError 4972->4977 4973->4956 4973->4975 4974->4957 4975->4958 4975->4959 4978 140001d18 GetLastError 4976->4978 4976->4991 4977->4973 4978->4973 4979 140001ea5 ReadProcessMemory 4980 140001fe1 GetLastError 4979->4980 4979->4993 4980->4993 4981 140001c43 ReadProcessMemory 4984 140001c81 ReadProcessMemory 4981->4984 4985 140001ce4 GetLastError 4981->4985 4982 140001ee0 ReadProcessMemory 4983 14000202c GetLastError 4982->4983 4982->4993 4983->4993 4987 140001cda GetLastError 4984->4987 4984->4991 4985->4991 4986 140001be6 ReadProcessMemory 4988 140001cd0 GetLastError 4986->4988 4986->4991 4987->4991 4988->4991 4989 140001fa1 ReadProcessMemory 4989->4980 4989->4982 4990 140001f49 ReadProcessMemory 4992 140002022 GetLastError 4990->4992 4990->4993 4991->4969 4991->4972 4991->4973 4991->4975 4991->4981 4991->4986 4992->4993 4993->4957 4993->4971 4993->4979 4993->4982 4993->4989 4993->4990 4995 140002376 4994->4995 4996 14000238b GlobalAlloc 4995->4996 4997 14000237e GetLastError 4995->4997 4999 1400023ab 4996->4999 5003 1400023a6 4996->5003 4998 14000241e 4997->4998 4998->4923 4998->4924 5002 1400023d4 GetLastError 4999->5002 4999->5003 5000 140002407 GlobalFree 5001 140002410 CloseHandle 5000->5001 5001->4998 5002->5003 5003->5000 5003->5001 5005 1400024e9 GetLastError 5004->5005 5006 1400024ff GetProcAddress 5004->5006 5005->5006 5006->5005 5007 140002514 5006->5007 5008 140002528 5007->5008 5009 140002520 GetLastError 5007->5009 5008->4933 5010 140002440 GetModuleHandleA 5008->5010 5009->5008 5011 140002478 GetProcAddress 5010->5011 5012 140002470 GetLastError 5010->5012 5011->5012 5013 14000248d 5011->5013 5014 1400024a3 5012->5014 5013->5014 5015 14000249b GetLastError 5013->5015 5014->4932 5014->4933 5015->5014 5017 140003a20 malloc 5016->5017 5018 140002769 GlobalAlloc 5017->5018 5019 140002783 5018->5019 5020 14000278b ReadProcessMemory 5018->5020 5019->4945 5021 1400027c1 GetLastError 5020->5021 5023 1400027ce 5020->5023 5022 140002ee8 GlobalFree 5021->5022 5022->5019 5024 14000283d GlobalAlloc GlobalAlloc 5023->5024 5030 1400027dd 5023->5030 5046 140002b33 5023->5046 5025 140002874 malloc 5024->5025 5051 140002b63 5024->5051 5032 14000288a ReadProcessMemory 5025->5032 5025->5051 5026 140002b9c GlobalAlloc 5029 140002bc1 malloc 5026->5029 5049 140002bb9 5026->5049 5027 140002eb7 5027->5030 5031 140002ebc GlobalFree 5027->5031 5028 140002eae GlobalFree 5028->5027 5034 140002bce ReadProcessMemory 5029->5034 5030->5022 5031->5030 5036 1400028b6 GetLastError 5032->5036 5062 1400028c3 malloc 5032->5062 5033 140002e6c GlobalFree 5033->5051 5035 140002bf3 GetLastError 5034->5035 5037 140002c00 malloc 5034->5037 5035->5049 5036->5051 5039 140002c31 ReadProcessMemory 5037->5039 5047 140002cb3 ReadProcessMemory 5037->5047 5037->5049 5052 140002cf0 ReadProcessMemory 5037->5052 5058 140002d9f ReadProcessMemory 5037->5058 5060 140002d4b ReadProcessMemory 5037->5060 5038 1400028f2 ReadProcessMemory 5040 140002b4c GetLastError 5038->5040 5038->5062 5039->5037 5041 140002e45 GetLastError 5039->5041 5040->5046 5041->5049 5042 140002945 ReadProcessMemory 5043 140002b42 GetLastError 5042->5043 5044 14000298c ReadProcessMemory 5042->5044 5043->5046 5045 140002b35 GetLastError 5044->5045 5044->5062 5045->5046 5046->5026 5046->5051 5047->5037 5048 140002dda GetLastError 5047->5048 5048->5037 5049->5033 5049->5051 5050 140002a4f ReadProcessMemory 5054 140002af9 GetLastError 5050->5054 5055 140002a8c ReadProcessMemory 5050->5055 5051->5027 5051->5028 5052->5037 5053 140002e16 GetLastError 5052->5053 5053->5037 5054->5062 5056 140002aef GetLastError 5055->5056 5055->5062 5056->5062 5057 1400029ec ReadProcessMemory 5059 140002ae5 GetLastError 5057->5059 5057->5062 5058->5048 5058->5052 5059->5062 5060->5037 5061 140002e0c GetLastError 5060->5061 5061->5037 5062->5038 5062->5042 5062->5046 5062->5050 5062->5051 5062->5057 5064 140004384 _getptd 45 API calls 5063->5064 5065 140001645 5064->5065 5066 140003b24 5065->5066 5067 140004384 _getptd 45 API calls 5066->5067 5068 14000164a 5067->5068 5069 140001370 5068->5069 5072 1400013c2 malloc 5069->5072 5070 14000145a GlobalAlloc 5070->4842 5070->4843 5071 140003b24 rand 45 API calls 5071->5072 5072->5070 5072->5071 5074 140003ed2 5073->5074 5075 140003ead 5073->5075 5074->5075 5077 140003ed7 5074->5077 5076 140004764 _errno 45 API calls 5075->5076 5078 140003eb2 5076->5078 5099 140004b44 5077->5099 5080 140004694 _FF_MSGBANNER 7 API calls 5078->5080 5082 140003ecd 5080->5082 5082->4847 5333 140001170 5084->5333 5088 1400014ae malloc 5087->5088 5089 1400014ee CreateProcessA 5088->5089 5090 14000153a CloseHandle 5089->5090 5091 14000152f GetLastError 5089->5091 5092 14000154a 5090->5092 5093 1400015d0 GlobalFree 5091->5093 5094 1400015a6 5092->5094 5095 140001567 WaitForSingleObject 5092->5095 5093->4843 5094->5093 5098 1400015be CloseHandle 5094->5098 5095->5094 5096 140001580 GetExitCodeProcess 5095->5096 5096->5094 5097 140001597 GetLastError 5096->5097 5097->5094 5098->5093 5100 14000497c _wincmdln 45 API calls 5099->5100 5101 140004ba4 5100->5101 5102 140004bac 5101->5102 5103 140004bed 5101->5103 5104 140004764 _errno 45 API calls 5102->5104 5126 140004c0a malloc 5103->5126 5151 140008d9c 5103->5151 5107 140004bb1 5104->5107 5106 140004c78 5109 140004764 _errno 45 API calls 5106->5109 5108 140004694 _FF_MSGBANNER 7 API calls 5107->5108 5112 140004bcd 5108->5112 5110 140004c7d 5109->5110 5111 140004694 _FF_MSGBANNER 7 API calls 5110->5111 5111->5112 5113 140009170 _flush 8 API calls 5112->5113 5114 140003f06 5113->5114 5114->5082 5130 1400047ec 5114->5130 5116 140004a28 77 API calls write_multi_char 5116->5126 5117 140004764 _errno 45 API calls 5118 140005602 5117->5118 5120 140004694 _FF_MSGBANNER 7 API calls 5118->5120 5119 1400055b4 5119->5117 5120->5112 5121 14000517d DecodePointer 5121->5126 5122 140007c84 free 45 API calls 5122->5126 5123 140007cc4 __setargv 45 API calls 5123->5126 5124 1400051dc DecodePointer 5124->5126 5125 1400051fe DecodePointer 5125->5126 5126->5106 5126->5112 5126->5116 5126->5119 5126->5121 5126->5122 5126->5123 5126->5124 5126->5125 5127 140004a70 77 API calls write_multi_char 5126->5127 5128 140009148 47 API calls 5126->5128 5129 140004ac4 77 API calls 5126->5129 5157 140008e58 5126->5157 5127->5126 5128->5126 5129->5126 5131 140008d9c _flush 45 API calls 5130->5131 5132 14000480e 5131->5132 5133 140004819 5132->5133 5134 140004830 5132->5134 5135 140004764 _errno 45 API calls 5133->5135 5136 140004835 5134->5136 5145 140004842 write_multi_char 5134->5145 5144 14000481e 5135->5144 5137 140004764 _errno 45 API calls 5136->5137 5137->5144 5138 1400048a7 5139 140004941 5138->5139 5140 1400048b4 5138->5140 5141 140008980 _flush 77 API calls 5139->5141 5142 1400048d0 5140->5142 5147 1400048e9 5140->5147 5141->5144 5171 140008980 5142->5171 5144->5082 5145->5138 5145->5144 5148 14000489b 5145->5148 5160 140008b08 5145->5160 5147->5144 5202 1400080e8 5147->5202 5148->5138 5168 140008ab4 5148->5168 5152 140008da5 5151->5152 5153 140008dc5 5151->5153 5154 140004764 _errno 45 API calls 5152->5154 5153->5126 5155 140008daa 5154->5155 5156 140004694 _FF_MSGBANNER 7 API calls 5155->5156 5156->5153 5158 14000497c _wincmdln 45 API calls 5157->5158 5159 140008e6a 5158->5159 5159->5126 5161 140008b11 5160->5161 5162 140008b1e 5160->5162 5163 140004764 _errno 45 API calls 5161->5163 5164 140008b16 5162->5164 5165 140004764 _errno 45 API calls 5162->5165 5163->5164 5164->5148 5166 140008b55 5165->5166 5167 140004694 _FF_MSGBANNER 7 API calls 5166->5167 5167->5164 5169 140007cc4 __setargv 45 API calls 5168->5169 5170 140008acd 5169->5170 5170->5138 5172 1400089c5 5171->5172 5173 1400089a9 5171->5173 5175 140008a70 5172->5175 5178 1400089db 5172->5178 5233 140004784 5173->5233 5176 140004784 __doserrno 45 API calls 5175->5176 5179 140008a75 5176->5179 5181 140008a01 5178->5181 5182 140008a2c 5178->5182 5183 140004764 _errno 45 API calls 5179->5183 5180 140004764 _errno 45 API calls 5185 1400089b7 5180->5185 5186 140004784 __doserrno 45 API calls 5181->5186 5236 14000ad5c 5182->5236 5187 140008a7c 5183->5187 5185->5144 5189 140008a06 5186->5189 5190 140004694 _FF_MSGBANNER 7 API calls 5187->5190 5193 140004764 _errno 45 API calls 5189->5193 5190->5185 5191 140008a3f 5246 140008220 5191->5246 5192 140008a50 5195 140004764 _errno 45 API calls 5192->5195 5196 140008a0d 5193->5196 5199 140008a55 5195->5199 5197 140004694 _FF_MSGBANNER 7 API calls 5196->5197 5197->5185 5198 140008a4c 5300 14000ae04 LeaveCriticalSection 5198->5300 5200 140004784 __doserrno 45 API calls 5199->5200 5200->5198 5203 140008111 5202->5203 5204 14000812e 5202->5204 5205 140004784 __doserrno 45 API calls 5203->5205 5206 1400081dd 5204->5206 5209 140008144 5204->5209 5208 140008116 5205->5208 5207 140004784 __doserrno 45 API calls 5206->5207 5212 1400081e2 5207->5212 5213 140004764 _errno 45 API calls 5208->5213 5210 140008196 5209->5210 5211 14000816a 5209->5211 5215 14000ad5c _flush 46 API calls 5210->5215 5214 140004784 __doserrno 45 API calls 5211->5214 5216 140004764 _errno 45 API calls 5212->5216 5217 14000811f 5213->5217 5218 14000816f 5214->5218 5219 14000819d 5215->5219 5220 1400081e9 5216->5220 5217->5144 5221 140004764 _errno 45 API calls 5218->5221 5222 1400081a9 5219->5222 5223 1400081bb 5219->5223 5224 140004694 _FF_MSGBANNER 7 API calls 5220->5224 5225 140008176 5221->5225 5226 140008050 _flush 47 API calls 5222->5226 5227 140004764 _errno 45 API calls 5223->5227 5224->5217 5228 140004694 _FF_MSGBANNER 7 API calls 5225->5228 5229 1400081b6 5226->5229 5230 1400081c0 5227->5230 5228->5217 5332 14000ae04 LeaveCriticalSection 5229->5332 5231 140004784 __doserrno 45 API calls 5230->5231 5231->5229 5234 140004300 _getptd 45 API calls 5233->5234 5235 14000478d 5234->5235 5235->5180 5237 14000add1 5236->5237 5238 14000ad9e 5236->5238 5240 140008a33 5237->5240 5241 14000add5 EnterCriticalSection 5237->5241 5239 140007058 _lock 45 API calls 5238->5239 5242 14000ada6 5239->5242 5240->5191 5240->5192 5241->5240 5243 14000993c _lock InitializeCriticalSectionAndSpinCount 5242->5243 5245 14000adbd 5242->5245 5243->5245 5301 140006f58 LeaveCriticalSection 5245->5301 5248 14000823a _flush 5246->5248 5247 140008271 5249 140004784 __doserrno 45 API calls 5247->5249 5248->5247 5253 1400082e1 5248->5253 5278 140008265 5248->5278 5251 140008276 5249->5251 5250 140009170 _flush 8 API calls 5252 140008963 5250->5252 5254 140004764 _errno 45 API calls 5251->5254 5252->5198 5255 1400082f6 5253->5255 5302 140008050 5253->5302 5257 14000827d 5254->5257 5256 140008b08 _flush 45 API calls 5255->5256 5259 1400082fd 5256->5259 5260 140004694 _FF_MSGBANNER 7 API calls 5257->5260 5261 1400085f6 5259->5261 5264 140004384 _getptd 45 API calls 5259->5264 5260->5278 5262 1400088d7 WriteFile 5261->5262 5263 14000860d 5261->5263 5265 1400088f5 5262->5265 5266 140008900 GetLastError 5262->5266 5267 1400086eb 5263->5267 5272 14000861b 5263->5272 5268 140008321 GetConsoleMode 5264->5268 5265->5266 5271 14000890d 5266->5271 5279 1400086f5 5267->5279 5289 1400087c9 5267->5289 5268->5261 5270 140008352 5268->5270 5269 140008919 5273 140004764 _errno 45 API calls 5269->5273 5269->5278 5270->5261 5274 14000835f GetConsoleCP 5270->5274 5315 1400047a4 5271->5315 5272->5269 5276 140008666 WriteFile 5272->5276 5287 140008582 5272->5287 5277 14000893c 5273->5277 5274->5287 5298 140008379 _flush 5274->5298 5276->5272 5281 1400086de GetLastError 5276->5281 5280 140004784 __doserrno 45 API calls 5277->5280 5278->5250 5279->5269 5283 14000874d WriteFile 5279->5283 5279->5287 5280->5278 5281->5287 5282 140008817 WideCharToMultiByte 5285 1400085e6 GetLastError 5282->5285 5282->5289 5283->5279 5283->5281 5284 14000859f 5284->5271 5286 1400085a8 5284->5286 5285->5287 5291 140004764 _errno 45 API calls 5286->5291 5287->5269 5287->5278 5287->5284 5288 140008868 WriteFile 5288->5289 5290 1400088ad GetLastError 5288->5290 5289->5269 5289->5282 5289->5287 5289->5288 5290->5289 5293 1400085ad 5291->5293 5294 140004784 __doserrno 45 API calls 5293->5294 5294->5278 5295 14000ae2c 14 API calls _flush 5295->5298 5296 14000842d WideCharToMultiByte 5296->5287 5297 14000846f WriteFile 5296->5297 5297->5285 5297->5298 5298->5285 5298->5287 5298->5295 5298->5296 5299 1400084c5 WriteFile 5298->5299 5312 140008ea0 5298->5312 5299->5285 5299->5298 5320 14000acd8 5302->5320 5305 140008072 5307 140004764 _errno 45 API calls 5305->5307 5306 140008083 SetFilePointer 5308 1400080a1 GetLastError 5306->5308 5309 140008077 5306->5309 5307->5309 5308->5309 5310 1400080ab 5308->5310 5309->5255 5311 1400047a4 _close_nolock 45 API calls 5310->5311 5311->5309 5313 14000497c _wincmdln 45 API calls 5312->5313 5314 140008eb4 5313->5314 5314->5298 5316 140004300 _getptd 45 API calls 5315->5316 5317 1400047b1 5316->5317 5318 140004300 _getptd 45 API calls 5317->5318 5319 1400047ca realloc 5318->5319 5319->5278 5321 14000ace1 5320->5321 5322 14000acf6 5320->5322 5323 140004784 __doserrno 45 API calls 5321->5323 5324 140004784 __doserrno 45 API calls 5322->5324 5328 14000806c 5322->5328 5325 14000ace6 5323->5325 5327 14000ad30 5324->5327 5326 140004764 _errno 45 API calls 5325->5326 5326->5328 5329 140004764 _errno 45 API calls 5327->5329 5328->5305 5328->5306 5330 14000ad38 5329->5330 5331 140004694 _FF_MSGBANNER 7 API calls 5330->5331 5331->5328 5334 140001240 5333->5334 5335 14000119f 5333->5335 5334->4856 5335->5334 5336 1400011b6 5335->5336 5337 1400011bb SetFileAttributesA CreateFileA 5335->5337 5357 140001000 GetModuleHandleA 5336->5357 5339 140001226 5337->5339 5340 1400011f9 CreateFileA 5337->5340 5341 140001234 5339->5341 5342 14000122f 5339->5342 5340->5339 5344 14000125a 5341->5344 5345 14000123a GetLastError 5341->5345 5363 140001090 GetModuleHandleA 5342->5363 5346 14000128c SetFilePointerEx 5344->5346 5347 140001260 SetFilePointerEx 5344->5347 5345->5334 5348 1400012b7 WriteFile 5346->5348 5350 1400012a2 GetLastError CloseHandle 5346->5350 5347->5348 5349 140001277 GetLastError CloseHandle 5347->5349 5351 1400012d4 GetLastError CloseHandle 5348->5351 5352 1400012ec 5348->5352 5349->5334 5350->5334 5351->5334 5353 1400012f3 CloseHandle 5352->5353 5354 140001308 5352->5354 5353->5334 5355 140001311 SetEndOfFile 5354->5355 5356 14000131a FlushFileBuffers CloseHandle 5354->5356 5355->5356 5356->5334 5358 140001074 5357->5358 5359 140001023 GetProcAddress 5357->5359 5358->5337 5359->5358 5360 140001040 GetCurrentProcess 5359->5360 5361 140001058 5360->5361 5361->5358 5362 14000105f GetProcAddress 5361->5362 5362->5358 5364 1400010b3 GetProcAddress 5363->5364 5368 140001104 5363->5368 5365 1400010d0 GetCurrentProcess 5364->5365 5364->5368 5366 1400010e8 5365->5366 5367 1400010ef GetProcAddress 5366->5367 5366->5368 5367->5368 5368->5341 5370 140009c38 5369->5370 5371 140004764 _errno 45 API calls 5370->5371 5372 140006012 5370->5372 5373 140009c5d 5371->5373 5372->4223 5372->4224 5374 140004694 _FF_MSGBANNER 7 API calls 5373->5374 5374->5372 5376 140007ec6 5375->5376 5379 140005f1c 5376->5379 5380 140007ecb 5376->5380 5382 140007f19 5376->5382 5377 140004764 _errno 45 API calls 5378 140007ef5 5377->5378 5381 140004694 _FF_MSGBANNER 7 API calls 5378->5381 5379->4246 5379->4258 5380->5377 5380->5379 5381->5379 5382->5379 5383 140004764 _errno 45 API calls 5382->5383 5383->5378 5386 140009bb2 5384->5386 5388 140009bbc 5384->5388 5385 140004764 _errno 45 API calls 5392 140009bc4 5385->5392 5386->5388 5389 140009c00 5386->5389 5387 140004694 _FF_MSGBANNER 7 API calls 5390 140005f47 5387->5390 5388->5385 5389->5390 5391 140004764 _errno 45 API calls 5389->5391 5390->4251 5390->4253 5391->5392 5392->5387 5410 140004210 EncodePointer 5393->5410 5412 140005a57 ExitProcess 5411->5412 5413 140005a3e GetProcAddress 5411->5413 5413->5412 5414 140005a53 5413->5414 5414->5412 5735 140009458 5736 140007d30 _getptd 45 API calls 5735->5736 5737 14000946b EncodePointer 5736->5737 5738 140009489 5737->5738 5743 140005998 5744 1400059a7 5743->5744 5746 1400059d1 5743->5746 5744->5746 5747 140009418 5744->5747 5748 140004384 _getptd 45 API calls 5747->5748 5749 140009421 5748->5749 5752 14000b30c 5749->5752 5753 14000b31c 5752->5753 5756 14000b326 5752->5756 5754 140005ddc malloc 45 API calls 5753->5754 5754->5756 5755 14000b33a 5758 14000b3a2 5755->5758 5759 14000b343 RtlCaptureContext 5755->5759 5756->5755 5762 1400096b0 5756->5762 5760 140003a20 malloc 5759->5760 5761 14000b363 SetUnhandledExceptionFilter UnhandledExceptionFilter 5760->5761 5761->5758 5763 140009736 DecodePointer 5762->5763 5764 1400096dc 5762->5764 5769 14000978c 5763->5769 5764->5763 5766 140009787 5764->5766 5768 140009700 5764->5768 5767 140004300 _getptd 45 API calls 5766->5767 5767->5769 5768->5763 5771 14000970f 5768->5771 5770 140007058 _lock 45 API calls 5769->5770 5773 14000982b 5769->5773 5779 14000972e 5769->5779 5770->5773 5772 140004764 _errno 45 API calls 5771->5772 5774 140009714 5772->5774 5777 14000987d 5773->5777 5780 140004210 EncodePointer 5773->5780 5776 140004694 _FF_MSGBANNER 7 API calls 5774->5776 5776->5779 5777->5779 5781 140006f58 LeaveCriticalSection 5777->5781 5779->5755 5782 14000929c 5783 1400092c0 5782->5783 5786 1400092ca 5782->5786 5784 14000497c _wincmdln 45 API calls 5783->5784 5783->5786 5785 1400092f6 5784->5785 5785->5786 5787 140008e58 __initmbctable 45 API calls 5785->5787 5788 140009333 5787->5788 5789 1400093d7 MultiByteToWideChar 5788->5789 5790 14000933b 5788->5790 5789->5786 5791 14000937d 5789->5791 5790->5791 5792 140009352 MultiByteToWideChar 5790->5792 5791->5786 5793 140004764 _errno 45 API calls 5791->5793 5792->5786 5792->5791 5793->5786 5798 1400059dc SetUnhandledExceptionFilter

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 1400018f0-140001966 call 140003a20 GlobalAlloc 3 140001968-14000196b 0->3 4 140001970-140001996 ReadProcessMemory 0->4 5 140002129-14000214c 3->5 6 1400019a5-1400019b2 call 140001890 4->6 7 140001998-1400019a0 GetLastError 4->7 8 14000214e 5->8 9 140002150-14000215d 5->9 14 1400019b4-1400019b7 6->14 15 1400019bc-1400019f3 6->15 10 14000210f-14000211c GlobalFree 7->10 8->9 10->5 12 14000211e-140002126 10->12 12->5 14->10 16 1400019f5-1400019f7 15->16 17 1400019f9-1400019fb 15->17 16->17 18 140001a0a-140001a0c 16->18 19 140001a01-140001a04 17->19 20 1400020f2 17->20 21 140001d71-140001d73 18->21 22 140001a12-140001a14 18->22 19->18 19->20 23 1400020f7-140002107 20->23 24 1400020b5-1400020ba 21->24 25 140001d79-140001d7c 21->25 22->21 26 140001a1a-140001a4b GlobalAlloc * 2 22->26 23->10 29 1400020cf-1400020d7 24->29 27 140001d82-140001d9e GlobalAlloc 25->27 28 1400020ae-1400020b3 25->28 30 140001a51-140001a54 26->30 31 140001d53-140001d58 26->31 32 140001da8-140001dda call 140003a20 ReadProcessMemory 27->32 33 140001da0-140001da3 27->33 28->29 34 1400020e2-1400020e5 29->34 35 1400020d9-1400020dc GlobalFree 29->35 30->31 36 140001a5a-140001a92 call 140003a20 ReadProcessMemory 30->36 31->29 47 140001de9-140001df3 32->47 48 140001ddc-140001de4 GetLastError 32->48 38 140002088-14000208b 33->38 34->23 40 1400020e7-1400020f0 GlobalFree 34->40 35->34 45 140001aa1-140001aa9 36->45 46 140001a94-140001a9c GetLastError 36->46 42 1400020a2-1400020ac 38->42 43 14000208d-1400020a0 GlobalFree 38->43 40->23 42->29 43->29 49 140001d66-140001d6e 45->49 50 140001aaf-140001ab9 45->50 46->29 47->38 51 140001df9-140001dfd 47->51 48->38 49->21 52 140001ac0-140001afe call 140003a20 ReadProcessMemory 50->52 53 140001e00-140001e05 51->53 59 140001d34-140001d3a GetLastError 52->59 60 140001b04-140001b0f 52->60 55 140002075-14000207a 53->55 56 140001e0b-140001e4b call 140003a20 ReadProcessMemory 53->56 55->38 65 140001e51-140001e5c 56->65 66 140002066-140002073 GetLastError 56->66 64 140001d3c-140001d3e 59->64 62 140001b11-140001b20 call 140003990 60->62 63 140001b26-140001b6b ReadProcessMemory 60->63 62->63 83 140001d07-140001d10 62->83 70 140001b71-140001ba0 ReadProcessMemory 63->70 71 140001d2a-140001d32 GetLastError 63->71 68 140001d44-140001d47 64->68 69 1400020bc-1400020c1 64->69 72 140001e73-140001ed7 call 140003a20 ReadProcessMemory 65->72 73 140001e5e-140001e6d call 140003990 65->73 66->38 77 140001d49-140001d4e 68->77 78 140001d5d-140001d64 68->78 69->29 79 140001ba6-140001bac 70->79 80 140001d18-140001d28 GetLastError 70->80 71->64 90 140001fe1-140001fe7 GetLastError 72->90 91 140001edd 72->91 73->72 87 140002036-14000203b 73->87 77->29 78->21 84 140001bb2 79->84 85 140001cf4-140001cf7 79->85 80->64 83->52 92 140001d16 83->92 86 140001bc0-140001bd2 84->86 88 1400020c3-1400020c8 85->88 89 140001cfd-140001d05 85->89 93 140001c43-140001c7f ReadProcessMemory 86->93 94 140001bd4-140001c19 call 140003a20 ReadProcessMemory 86->94 97 14000204a-14000204d 87->97 88->29 89->83 95 140001fe9-140001feb 90->95 96 140001ee0-140001f08 ReadProcessMemory 91->96 92->68 103 140001c81-140001ca7 ReadProcessMemory 93->103 104 140001ce4-140001cea GetLastError 93->104 115 140001c1f-140001c3c call 140003990 94->115 116 140001cd0-140001cd8 GetLastError 94->116 99 140001ff1-140001ffe 95->99 100 140002083 95->100 101 14000202c-140002034 GetLastError 96->101 102 140001f0e-140001f16 96->102 105 14000207c-140002081 97->105 106 14000204f-140002059 97->106 99->97 100->38 101->95 109 140001f1c-140001f29 102->109 110 14000203d-140002042 102->110 111 140001ca9-140001cae 103->111 112 140001cda-140001ce2 GetLastError 103->112 107 140001cec-140001cee 104->107 105->38 106->53 113 14000205f-140002064 106->113 107->85 114 1400020ca 107->114 117 140001fa1-140001fdb ReadProcessMemory 109->117 118 140001f2b-140001f78 call 140003a20 ReadProcessMemory 109->118 110->97 111->86 119 140001cb4 111->119 112->107 113->38 114->29 115->93 124 140001c3e-140001c41 115->124 116->107 117->90 117->96 125 140002022-14000202a GetLastError 118->125 126 140001f7e-140001f95 call 140003990 118->126 119->85 124->93 127 140001cb6-140001cc1 124->127 125->95 126->117 132 140001f97-140001f9f 126->132 129 140001cc3 127->129 130 140001cc6-140001cce 127->130 129->130 130->85 132->117 133 140002000-14000200b 132->133 134 14000200d 133->134 135 140002010-140002020 133->135 134->135 135->97
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocErrorFreeLastMemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 880132777-0
                                                                        • Opcode ID: e3b8513d77d3e064aeb048b915a17d23cd5dc3dc9ced802016e47662d4b719bc
                                                                        • Instruction ID: 5b8d6f292d32b47b0dc033eca4e293d4dbe89354321a4122699c0ddb99020d3d
                                                                        • Opcode Fuzzy Hash: e3b8513d77d3e064aeb048b915a17d23cd5dc3dc9ced802016e47662d4b719bc
                                                                        • Instruction Fuzzy Hash: 8F3259B2619B8182EA62DF52B4447DAB7A4FB8DBC4F444125FF8A43BA9DF38C445C740

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 136 140003160-14000318d WaitForSingleObject 137 14000319e-1400031b5 call 140001120 136->137 138 14000318f-14000319d 136->138 141 1400031b7-1400031cd IsWow64Process 137->141 142 1400031ff 137->142 143 140003207-14000320a 141->143 144 1400031cf-1400031da 141->144 142->143 145 14000369e 143->145 147 140003210-140003212 143->147 144->145 146 1400031e0-1400031e9 144->146 146->145 148 1400031ef-1400031fd 146->148 147->145 149 140003218-14000321f 147->149 150 140003226-140003267 GlobalAlloc 148->150 149->150 151 140003277-1400032b8 call 140003a20 call 140003b60 VirtualAllocEx 150->151 152 140003269-140003272 150->152 160 1400032e1-140003309 151->160 161 1400032ba-1400032c8 GetLastError 151->161 153 1400033b6-1400033be 152->153 156 1400033c4-1400033f2 GlobalFree 153->156 157 140003697 153->157 157->145 164 1400033f3-140003403 call 140002260 160->164 165 14000330f-140003328 call 140002540 160->165 162 140003683-140003688 161->162 163 1400032ce-1400032dc 161->163 166 140003398-14000339b 162->166 163->166 172 140003675-140003679 164->172 173 140003409-14000342d call 140002160 164->173 165->172 174 14000332e-14000335b call 140002f40 165->174 166->153 169 14000339d-1400033b2 VirtualFreeEx 166->169 169->153 172->162 177 140003432-140003438 173->177 174->172 180 140003361-14000338d call 140003030 174->180 177->172 179 14000343e-14000346d call 140003090 177->179 185 140003473-1400034b2 call 140003b60 WriteProcessMemory 179->185 187 14000368d 179->187 180->185 186 140003393 180->186 190 1400034b4-1400034bc GetLastError 185->190 191 1400034c5-1400034ca 185->191 186->166 187->157 190->191 192 1400034da-140003502 VirtualProtectEx 191->192 193 1400034cc-1400034d1 191->193 194 140003504-14000350c GetLastError 192->194 195 140003515-140003567 VirtualProtectEx * 2 192->195 193->192 194->195 196 140003605-140003647 VirtualProtectEx WriteProcessMemory 195->196 197 14000356d-1400035af VirtualProtectEx WriteProcessMemory 195->197 198 140003653-14000366c VirtualProtectEx 196->198 199 140003649-14000364f GetLastError 196->199 200 1400035b1-1400035d7 GetLastError VirtualProtectEx 197->200 201 1400035e0-1400035fc VirtualProtectEx 197->201 198->172 199->198 200->201 201->196
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocFreeObjectProcessSingleWaitWow64
                                                                        • String ID: TranslateMessage
                                                                        • API String ID: 1285448613-1574555156
                                                                        • Opcode ID: b841879be43e50d66bb224894e4c1356849f29788031f2846d79fd9ca5ae7eb5
                                                                        • Instruction ID: 7174fe85d50acdaac7ebb6ef4fc703fd64b259ce32da63d26d972c31c026e7c1
                                                                        • Opcode Fuzzy Hash: b841879be43e50d66bb224894e4c1356849f29788031f2846d79fd9ca5ae7eb5
                                                                        • Instruction Fuzzy Hash: 81D11CB2219B8186E762DB13B54479AB7A8F78DBC4F404125BF8A47BA9DF3CC544CB00

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$AddressHandleModuleProc
                                                                        • String ID: NtQueryInformationProcess$RtlNtStatusToDosError$ntdll.dll
                                                                        • API String ID: 1762409328-513407355
                                                                        • Opcode ID: 5149749498f2dce902f1c34ca5229fe6b1970cf0fb8f2d4bac61122ba6365c95
                                                                        • Instruction ID: cd2a3950a3659bf530bc54333ab6332fd89062f5493819bed32ec8037b801953
                                                                        • Opcode Fuzzy Hash: 5149749498f2dce902f1c34ca5229fe6b1970cf0fb8f2d4bac61122ba6365c95
                                                                        • Instruction Fuzzy Hash: AA2125B132AB4085EB56DB16B844B9C73A5B74CBC0F594139EB9D83764EF38CA558700

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: CreateDescriptorErrorLastSecurity$CloseCurrentDaclHandleInitializeMutexNextObjectProcessProcess32SessionSingleSnapshotThreadToolhelp32Wait
                                                                        • String ID: {C10811B2-10C9-4d62-9E16-FBC7EB569DD4}
                                                                        • API String ID: 285606942-888163077
                                                                        • Opcode ID: dd4009fd458aba5dca69b0312a42940688917f5221cde77a963d658099a9cc82
                                                                        • Instruction ID: 4299be9f1f3fbda4284126c42162f4657a4ed364a8083925df42765a6c30eefe
                                                                        • Opcode Fuzzy Hash: dd4009fd458aba5dca69b0312a42940688917f5221cde77a963d658099a9cc82
                                                                        • Instruction Fuzzy Hash: 15219DB1224A4182FB52EB26F804BDA63A4FB8D788F548024F70A476B5EF3DC449CB40

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: CreateErrorLastNextProcessProcess32SessionSnapshotToolhelp32
                                                                        • String ID: explorer.exe
                                                                        • API String ID: 1033712966-3187896405
                                                                        • Opcode ID: 2e169a929fc2d2e009f530b01c7f8142b94bd2eda747f8ba25c0d8239db225c7
                                                                        • Instruction ID: 33c71a43016fddc915274e0a6c88ac49dedbbb02ad0916507a264ae314eb1e10
                                                                        • Opcode Fuzzy Hash: 2e169a929fc2d2e009f530b01c7f8142b94bd2eda747f8ba25c0d8239db225c7
                                                                        • Instruction Fuzzy Hash: BE2142B170868086EB72DF16F8413DAA295F78C7D8F844325B79D476E9DB38C544CB00

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: Global_getptdrand$AllocCountFileFreeModuleNamePathTempTick
                                                                        • String ID: "%s"$.bat$:e1del /f /q "%s"$@echo off$del /f /q "%s"$gfff$if %cnt%==%num% goto e1ping -n 2 127.1>nul$if exist "%s" goto r1$set cnt=%u$set num=0:r1set /a num=%num%+1
                                                                        • API String ID: 354991171-3703372875
                                                                        • Opcode ID: eee4d7ca2a32e14d08948c02aa48e857aa9d5f9e8ef851e839f3359dadce8009
                                                                        • Instruction ID: b6c1ad529da0dd87c8ede0c7be3bd254542353f21f2d4b17b3b05bf17b333e96
                                                                        • Opcode Fuzzy Hash: eee4d7ca2a32e14d08948c02aa48e857aa9d5f9e8ef851e839f3359dadce8009
                                                                        • Instruction Fuzzy Hash: 4F518FB131568185EB22EF26F8517D96365F7897C8F845026BB4E4BBAADF78C205C700

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: File$Handle$Close$ErrorLast$AddressCreatePointerProc$AttributesBuffersCurrentFlushModuleProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 1685627637-0
                                                                        • Opcode ID: c6f06c55810ae676b242f0391958e7d96c1ddbd1831598c62583220653be55d7
                                                                        • Instruction ID: bc2adb5c83cad6cf6b328863d0be11b741e8eec7635037984136a93185dd692a
                                                                        • Opcode Fuzzy Hash: c6f06c55810ae676b242f0391958e7d96c1ddbd1831598c62583220653be55d7
                                                                        • Instruction Fuzzy Hash: 18413DB161568087E762DF63B954BEA7295B78DBE4F044225FFA643BF5CF38C4488600

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 299 140001470-1400014b8 call 140003a20 302 1400014ba-1400014c5 299->302 303 1400014ce-1400014d9 299->303 302->303 304 1400014db 303->304 305 1400014de-1400014e9 303->305 304->305 306 1400014eb 305->306 307 1400014ee-14000152d CreateProcessA 305->307 306->307 308 14000153a-140001548 CloseHandle 307->308 309 14000152f-140001535 GetLastError 307->309 310 14000154a-14000154e 308->310 311 140001550-140001553 308->311 312 1400015d0-1400015ec 309->312 310->311 313 140001555-14000155a 311->313 314 14000155d-140001565 311->314 313->314 315 1400015b2 314->315 316 140001567-14000157e WaitForSingleObject 314->316 317 1400015b9-1400015bc 315->317 316->317 318 140001580-140001595 GetExitCodeProcess 316->318 317->312 321 1400015be-1400015c9 CloseHandle 317->321 319 1400015a6-1400015b0 318->319 320 140001597-1400015a4 GetLastError 318->320 319->317 320->317 321->312
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: CloseErrorHandleLastProcess$CodeCreateExitObjectSingleWait
                                                                        • String ID: $h
                                                                        • API String ID: 3196704372-1972213566
                                                                        • Opcode ID: e6b51890dc114c2b89d13f2e69252f4d912c5b222b4ea4394b7fa6e8da15a4a5
                                                                        • Instruction ID: 8859876685ca2badcadd4aaf4b8bdc0f5709351d06a8d1345d8bddfaf805c54f
                                                                        • Opcode Fuzzy Hash: e6b51890dc114c2b89d13f2e69252f4d912c5b222b4ea4394b7fa6e8da15a4a5
                                                                        • Instruction Fuzzy Hash: 41411BB2214A80C6E762DF16F8407CAB7A4F7C8BD8F144125EB8947B68DF78C454CB40

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide$ErrorLastfree
                                                                        • String ID:
                                                                        • API String ID: 994105223-0
                                                                        • Opcode ID: a45ebe0291e735118433d79ffa4501a3f33e74e4a86f275abaf88588a9a04c7a
                                                                        • Instruction ID: 939949a212f292ece65122cbe4d063cb36a4dcf17b2de409e7152f0680b642df
                                                                        • Opcode Fuzzy Hash: a45ebe0291e735118433d79ffa4501a3f33e74e4a86f275abaf88588a9a04c7a
                                                                        • Instruction Fuzzy Hash: 6441BEB260539082FA66DB23B5587A977A6B74CBD0F188514EF4A27BB5CF38D495C300

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: DecodePointer$_initterm$ExitProcess_lock
                                                                        • String ID:
                                                                        • API String ID: 2551688548-0
                                                                        • Opcode ID: 2e2d85d98de262d786742f13c3a61dd02443fc06b479274f9426870222821cf0
                                                                        • Instruction ID: a7c215c06efc56645062d57f0c9971c0f0cfcc1f76108284ec0c264d9ead9588
                                                                        • Opcode Fuzzy Hash: 2e2d85d98de262d786742f13c3a61dd02443fc06b479274f9426870222821cf0
                                                                        • Instruction Fuzzy Hash: 3B419CB1226B8185FA53EB13F880BDA6294B78D7C4F444029BB4E47BB6EF38C491C704

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: CommandInfoInitializeLineStartup__setargv_cinit_wincmdln
                                                                        • String ID:
                                                                        • API String ID: 1081043060-0
                                                                        • Opcode ID: 0e525a029f3c9379bc667cf13eb564230b6b773ff7a43c10802f93299b43159c
                                                                        • Instruction ID: 5e116b9988e8f961825a1c3e745da8700499624d8fdae5a4e9b6fd0bba04d3cf
                                                                        • Opcode Fuzzy Hash: 0e525a029f3c9379bc667cf13eb564230b6b773ff7a43c10802f93299b43159c
                                                                        • Instruction Fuzzy Hash: 43415DF160478186FB63EBA3B4413EA22A1AB8D7C5F544039B749536F3EF38C9818746

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: CloseErrorHandleLastOpenProcess
                                                                        • String ID:
                                                                        • API String ID: 3453201768-0
                                                                        • Opcode ID: ba3bdd8d4b6520c47544b77885bc5682f226bda47c0f6702306fc36d4afcf9ff
                                                                        • Instruction ID: 29c36edad4cbe4456c1e5d56e1e489f9a7f3070941572f87b43ba1d2570c8cd5
                                                                        • Opcode Fuzzy Hash: ba3bdd8d4b6520c47544b77885bc5682f226bda47c0f6702306fc36d4afcf9ff
                                                                        • Instruction Fuzzy Hash: 9B014476318B8082E315DB17B80078AB6A5F78DBC0F484428FF8843B69DA38C5418B04

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 490 140002160-1400021b4 call 140003a20 493 1400021b6 490->493 494 1400021b9-1400021e7 ReadProcessMemory 490->494 493->494 495 1400021f1-1400021f9 494->495 496 1400021e9-1400021ef GetLastError 494->496 498 1400021fb-1400021fe 495->498 499 140002200-140002218 call 1400018f0 495->499 497 140002224-14000222f 496->497 501 140002231 497->501 502 140002233-140002252 497->502 498->497 503 14000221d-140002220 499->503 501->502 503->497
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastMemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 2417666006-0
                                                                        • Opcode ID: 738e364ac98b109d1f902aed40cd010b936bad501335c4d62d388d32040120af
                                                                        • Instruction ID: d0824b595194ae0f816e219e88f91e526c91884c79d853c1c97cfcba69b48e09
                                                                        • Opcode Fuzzy Hash: 738e364ac98b109d1f902aed40cd010b936bad501335c4d62d388d32040120af
                                                                        • Instruction Fuzzy Hash: 42213D72319B8096E766CF52B440BDAB7A8F399BC0F584125BF8943B19DB38C605CB40

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 504 140006d48-140006d6a HeapCreate 505 140006d6c-140006d8a HeapSetInformation 504->505 506 140006d8f-140006d93 504->506 505->506
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$CreateInformation
                                                                        • String ID:
                                                                        • API String ID: 1774340351-0
                                                                        • Opcode ID: 27e44b1b6268c0d544476f1fec22c4af1d438eeb43799487ba81ee6cadacc236
                                                                        • Instruction ID: 246af1013d14c5667408807a7657882260a7fa6da917086fc4c36d72adaf5ecd
                                                                        • Opcode Fuzzy Hash: 27e44b1b6268c0d544476f1fec22c4af1d438eeb43799487ba81ee6cadacc236
                                                                        • Instruction Fuzzy Hash: A1E048B572278043E75ADB26A8157956250F74C3C0F505019FB4903BA4DF3CC1858B00

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 507 140007cc4-140007cdd 508 140007ce0-140007ce3 call 14000a9f0 507->508 510 140007ce8-140007cee 508->510 511 140007d18-140007d2f 510->511 512 140007cf0-140007cf6 510->512 512->511 513 140007cf8-140007d16 Sleep 512->513 513->508 513->511
                                                                        APIs
                                                                        • malloc.LIBCMT ref: 0000000140007CE3
                                                                          • Part of subcall function 000000014000A9F0: _FF_MSGBANNER.LIBCMT ref: 000000014000AA20
                                                                          • Part of subcall function 000000014000A9F0: HeapAlloc.KERNEL32(?,?,00000000,0000000140007CE8,?,?,00000000,0000000140006FD1,?,?,?,000000014000707B), ref: 000000014000AA45
                                                                          • Part of subcall function 000000014000A9F0: _errno.LIBCMT ref: 000000014000AA69
                                                                          • Part of subcall function 000000014000A9F0: _errno.LIBCMT ref: 000000014000AA74
                                                                        • Sleep.KERNEL32(?,?,00000000,0000000140006FD1,?,?,?,000000014000707B,?,?,?,?,?,?,00000000,0000000140004358), ref: 0000000140007CFA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: _errno$AllocHeapSleepmalloc
                                                                        • String ID:
                                                                        • API String ID: 496785850-0
                                                                        • Opcode ID: 31c6dfb5965236465b61a71dc8a1373e5855104e6cf83bc14204ef1d40353bea
                                                                        • Instruction ID: cadc7b0da79966dee7169d7bbb693cfb5829486343461f55473eb18a9ac76907
                                                                        • Opcode Fuzzy Hash: 31c6dfb5965236465b61a71dc8a1373e5855104e6cf83bc14204ef1d40353bea
                                                                        • Instruction Fuzzy Hash: 0AF0C27260078486EA12DF17B4403AE73A0E78CBE0F580125FF5903765DF38C9918740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: InfoNativeSystem
                                                                        • String ID:
                                                                        • API String ID: 1721193555-0
                                                                        • Opcode ID: 9cf46646d2e420a71669caba6a41cd8cc1c440e01bff2c30a90047ae0998cef5
                                                                        • Instruction ID: 7c25440c2d9f27fab6620d7f1cabdf187c938c27d88307f51b1f67d8d778176e
                                                                        • Opcode Fuzzy Hash: 9cf46646d2e420a71669caba6a41cd8cc1c440e01bff2c30a90047ae0998cef5
                                                                        • Instruction Fuzzy Hash: 80E01AB6B2088082E777EB16E8013DA72E2F388B05FC40111B78D435A4EB7CCA598A01
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocErrorFreeLastMemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 880132777-0
                                                                        • Opcode ID: 75454d54b03a707dbd19c3a3bd70313273ca086a0fbc7868067fe0d4610f207f
                                                                        • Instruction ID: 81354d4f257917a37da6dd762d8a5476d34b10bf18e12a88d3df297ff6f2d5c3
                                                                        • Opcode Fuzzy Hash: 75454d54b03a707dbd19c3a3bd70313273ca086a0fbc7868067fe0d4610f207f
                                                                        • Instruction Fuzzy Hash: 6F325EB221978186EB66CF12F44479AB7A4F78DBC4F544125FB8A47BA8DF78C805CB40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: write_multi_char$_errno$DecodePointer_getptdfree
                                                                        • String ID: $ $#$*$*$+$-$0$I$g$g$h$l$w
                                                                        • API String ID: 2009448492-3944679695
                                                                        • Opcode ID: 2c5abf9b0b4c08a6a9a1677c765fa438a297132eee6d0e445cd7707e86a33db0
                                                                        • Instruction ID: 3bacf8e6c19835c22ee3f6538b96c29f08dd7b6e4daf596977e36d57f445fdfa
                                                                        • Opcode Fuzzy Hash: 2c5abf9b0b4c08a6a9a1677c765fa438a297132eee6d0e445cd7707e86a33db0
                                                                        • Instruction Fuzzy Hash: 9E52F3F260868086FB76DB1AB4447EF6AA1B34E7C2F145102FB86476F6DB78C940CB45
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID: U
                                                                        • API String ID: 921712934-4171548499
                                                                        • Opcode ID: 808deaefe2d6cd0a218e93e2d5ce9eb759426b00709d33f764fdc08eb11d8729
                                                                        • Instruction ID: 794b7f660c7422d05297fe134f04c9b39660634bb6bc888d27084810b462f6c3
                                                                        • Opcode Fuzzy Hash: 808deaefe2d6cd0a218e93e2d5ce9eb759426b00709d33f764fdc08eb11d8729
                                                                        • Instruction Fuzzy Hash: EF12CEB2618A4186EB32CF26F4443EAA7A0F78CBD4F554116FF8A47AB5DB39C445CB10
                                                                        APIs
                                                                        • LoadLibraryA.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 00000001400099ED
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009A09
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009A31
                                                                        • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009A3A
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009A50
                                                                        • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009A59
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009A6F
                                                                        • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009A78
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009A96
                                                                        • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009A9F
                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009AD1
                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009AE0
                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009B38
                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009B58
                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140005FA4,?,?,?,?,?,0000000140006038), ref: 0000000140009B71
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: Pointer$AddressDecodeProc$Encode$LibraryLoad
                                                                        • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                        • API String ID: 3085332118-232180764
                                                                        • Opcode ID: 89fd190075050803a35edbb28543260a80664b7a662d37c1aa6185e818745589
                                                                        • Instruction ID: b7837e25fa8e4133561d70a377a6854f52ae32e062f3aea15f68cdba0d26677a
                                                                        • Opcode Fuzzy Hash: 89fd190075050803a35edbb28543260a80664b7a662d37c1aa6185e818745589
                                                                        • Instruction Fuzzy Hash: 655113B0612B4180FE67EB67B9547EA2390AB8DBD0F484425BF1E037B6EF38C5428304
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: String$free$ByteCharMultiWidemalloc$ErrorLast
                                                                        • String ID:
                                                                        • API String ID: 1837315383-0
                                                                        • Opcode ID: bdf5a1e736310f6e372902e92e2ddc645e4c21aba5b2d7a55352fca4c3d966d6
                                                                        • Instruction ID: 8d627de3f1b2d73944fbc154439a19398d0f4fb3f17c7e2dccda3afa044f94d5
                                                                        • Opcode Fuzzy Hash: bdf5a1e736310f6e372902e92e2ddc645e4c21aba5b2d7a55352fca4c3d966d6
                                                                        • Instruction Fuzzy Hash: EAF1AEB66046808AE722CF26E8407D977E1F74DBE8F588615FB5A57BE4DB3CC9418700
                                                                        APIs
                                                                        • GetModuleFileNameA.KERNEL32(?,?,?,?,?,0000000140006038,?,?,?,?,000000014000AA25,?,?,00000000,0000000140007CE8), ref: 0000000140005E9F
                                                                        • GetStdHandle.KERNEL32(?,?,?,?,?,0000000140006038,?,?,?,?,000000014000AA25,?,?,00000000,0000000140007CE8), ref: 0000000140005FAB
                                                                        • WriteFile.KERNEL32 ref: 0000000140005FE5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: File$HandleModuleNameWrite
                                                                        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                        • API String ID: 3784150691-4022980321
                                                                        • Opcode ID: 0ceec01d8c333b141f4b82ff0657e1cafac80972adc543a3f0d9512e02458eef
                                                                        • Instruction ID: 8d928fbe2ade2b8b3ae8c5896f7180599bc73582f8a9fdd6434d485f36250013
                                                                        • Opcode Fuzzy Hash: 0ceec01d8c333b141f4b82ff0657e1cafac80972adc543a3f0d9512e02458eef
                                                                        • Instruction Fuzzy Hash: 36518AB172068242FB26EB27F955BEB6351A78E7C5F804126BF4947AF6CF3CC6058600
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                        • String ID:
                                                                        • API String ID: 3778485334-0
                                                                        • Opcode ID: 219e5dc446c90ba60384ea3552e70986c1d6d9b5fe4d5b9d517e246cf82529eb
                                                                        • Instruction ID: 1553a30eb809cbffc94ae2ae4c9c86a1ff96820af2c00abc0a0e08ad949171e4
                                                                        • Opcode Fuzzy Hash: 219e5dc446c90ba60384ea3552e70986c1d6d9b5fe4d5b9d517e246cf82529eb
                                                                        • Instruction Fuzzy Hash: 7F31DDB5205B8486EA62DB52F8443DA73A4F78D7D4F904126EB8E43BB5DF78C488CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: _errno$ByteCharErrorLastMultiWide
                                                                        • String ID:
                                                                        • API String ID: 3895584640-0
                                                                        • Opcode ID: bc39cb7de233fd1076975311eea11e326537b08a0bdf20d4de56e3e651922f6c
                                                                        • Instruction ID: b8ccbf75a7a3123a83c227fd7fc7ef8e803bf567e45700fe883bf6aeb152de4e
                                                                        • Opcode Fuzzy Hash: bc39cb7de233fd1076975311eea11e326537b08a0bdf20d4de56e3e651922f6c
                                                                        • Instruction Fuzzy Hash: F45194B26086C18AE772DF66F4407EEB791F3897D0F148125BBC947AE5DA78C8818B05
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                                                        • String ID:
                                                                        • API String ID: 1269745586-0
                                                                        • Opcode ID: f46059cc0bcce0b9e6999a34a8f764e4a15e684d21dd2957faa906e7da174232
                                                                        • Instruction ID: 4f6d0079a559d92c241cf3e642a76d2944cade44a99d9c2723f7c975cea0b16c
                                                                        • Opcode Fuzzy Hash: f46059cc0bcce0b9e6999a34a8f764e4a15e684d21dd2957faa906e7da174232
                                                                        • Instruction Fuzzy Hash: 30314DB2619B8082EB25CB56F4447DBB3A0F79D784F500116EB8943AAAEF7CC548CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                        • String ID:
                                                                        • API String ID: 1445889803-0
                                                                        • Opcode ID: cc165a4ed93d64c16e46a4671fb9b08fbbceab76091860af4e49f47541c7ee00
                                                                        • Instruction ID: a1b6a4cb67b744add7fe9da93ead17269b0cfcd476237b6353619a950a33e428
                                                                        • Opcode Fuzzy Hash: cc165a4ed93d64c16e46a4671fb9b08fbbceab76091860af4e49f47541c7ee00
                                                                        • Instruction Fuzzy Hash: 18012971265A4482EB62CF23F954B9663A0F74DBD0F446620FF5E477B4DA78C9998300
                                                                        APIs
                                                                        • RtlCaptureContext.KERNEL32 ref: 000000014000B34B
                                                                        • SetUnhandledExceptionFilter.KERNEL32 ref: 000000014000B391
                                                                        • UnhandledExceptionFilter.KERNEL32 ref: 000000014000B39C
                                                                          • Part of subcall function 0000000140005DDC: GetModuleFileNameA.KERNEL32(?,?,?,?,?,0000000140006038,?,?,?,?,000000014000AA25,?,?,00000000,0000000140007CE8), ref: 0000000140005E9F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled$CaptureContextFileModuleName
                                                                        • String ID:
                                                                        • API String ID: 2731829486-0
                                                                        • Opcode ID: a51d8c525d07e11825b3c84e58694be9d6a1edb38c030c757f794c76dfd35615
                                                                        • Instruction ID: 5d5014a21f042bcd58ac3dfd577f52dc968c08060984530065600db6fc2ff14e
                                                                        • Opcode Fuzzy Hash: a51d8c525d07e11825b3c84e58694be9d6a1edb38c030c757f794c76dfd35615
                                                                        • Instruction Fuzzy Hash: D3012971225A8442E626EB52F4557EB63A0FB8D384F40012AB78E076B6DF3CC505CB01
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: InfoLocale
                                                                        • String ID:
                                                                        • API String ID: 2299586839-0
                                                                        • Opcode ID: fee34a3b222b80d1ba74ae3f68dfa49f184afed886897a001e9cd5a72e608383
                                                                        • Instruction ID: 72e2b37dd600a55fb0185217343bfc49f80374dfe24c7cc55e28c821e7b11029
                                                                        • Opcode Fuzzy Hash: fee34a3b222b80d1ba74ae3f68dfa49f184afed886897a001e9cd5a72e608383
                                                                        • Instruction Fuzzy Hash: 67E039B161868181E632EB22B4013DA67A0A79C798FC00202FB8D476B5DE3CC2058A00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled
                                                                        • String ID:
                                                                        • API String ID: 3192549508-0
                                                                        • Opcode ID: 52fe1ce489ed374420583670e6deaac3fc9466084de3074ece4b878ac935a5b6
                                                                        • Instruction ID: b86a72362f74594de1b952b7962156e727b8b35ca69e42723a1e80cf026fdd7e
                                                                        • Opcode Fuzzy Hash: 52fe1ce489ed374420583670e6deaac3fc9466084de3074ece4b878ac935a5b6
                                                                        • Instruction Fuzzy Hash: 6AB012B0B23440C1D605FB23FC853C212A0775E351FC00415D20D82130DB7CC5DB8B00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: free$ErrorFreeHeapLast_errno
                                                                        • String ID:
                                                                        • API String ID: 1012874770-0
                                                                        • Opcode ID: 0b7bbb66fcf70451c0ebf028c3e1c2a61768ede2dd98f2416a31560f336c69ba
                                                                        • Instruction ID: 24dc9cead91f978a6b9e4c6b567b51fd2451137c36279258074564716f454595
                                                                        • Opcode Fuzzy Hash: 0b7bbb66fcf70451c0ebf028c3e1c2a61768ede2dd98f2416a31560f336c69ba
                                                                        • Instruction Fuzzy Hash: 204175B2A115C181FE8AEF37D851BEC1320AB88B88F044175BB4D4B1B7CE24C945C391
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: free$ErrorFreeHeapLast_errno
                                                                        • String ID: set cnt=%u
                                                                        • API String ID: 1012874770-2828257716
                                                                        • Opcode ID: a7204f641fd888543ebccd5a300dc037583feb6d28fc0ac9f0ff31aa7df69560
                                                                        • Instruction ID: 7a6db6a2343e5dd5c0e9816ab56062e0f075227aa9347ab99c1b5310c34c24cd
                                                                        • Opcode Fuzzy Hash: a7204f641fd888543ebccd5a300dc037583feb6d28fc0ac9f0ff31aa7df69560
                                                                        • Instruction Fuzzy Hash: 8E41EEB2A0168584FEA6DF66E451BE82361A788BC4F480435AB0D4B6E5CF7C8991C351
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: free$_lock$ErrorFreeHeapLast_errno
                                                                        • String ID:
                                                                        • API String ID: 1575098132-0
                                                                        • Opcode ID: 0e8482407633a7921117a23cf237df3ad36ba258f9077fbf120b108d3a69a6b4
                                                                        • Instruction ID: d2f13f909b34aacd1498618138174f5b232319266cf79c858414d8288f07a6f7
                                                                        • Opcode Fuzzy Hash: 0e8482407633a7921117a23cf237df3ad36ba258f9077fbf120b108d3a69a6b4
                                                                        • Instruction Fuzzy Hash: F131E8B160258185FF9BEEA3B091BF91351AB88BC4F481225BB0E076E7CF3889418256
                                                                        APIs
                                                                        • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B4A2
                                                                        • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B4C1
                                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B566
                                                                        • malloc.LIBCMT ref: 000000014000B57D
                                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B5C5
                                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B600
                                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B63C
                                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B67C
                                                                        • free.LIBCMT ref: 000000014000B68A
                                                                        • free.LIBCMT ref: 000000014000B6AC
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$Infofree$malloc
                                                                        • String ID:
                                                                        • API String ID: 1309074677-0
                                                                        • Opcode ID: a0f4a3ba1ed18510eac19daeb87d654ac03dc1a802101e499c438ba8f6897839
                                                                        • Instruction ID: b8c244fe979aed404efefedd5fd6aca1a07b76cce841ec919e7ea618817f1f65
                                                                        • Opcode Fuzzy Hash: a0f4a3ba1ed18510eac19daeb87d654ac03dc1a802101e499c438ba8f6897839
                                                                        • Instruction Fuzzy Hash: D661B1B2214A8086EB26DF27B8407DA73E5F78C7E8F544625FB5A47BF4DB38C5818600
                                                                        APIs
                                                                        • GetStringTypeW.KERNEL32(?,?,?,?,00000000,0000000A,00000008,000000014000A322), ref: 000000014000A0B0
                                                                        • GetLastError.KERNEL32(?,?,?,?,00000000,0000000A,00000008,000000014000A322), ref: 000000014000A0C2
                                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,0000000A,00000008,000000014000A322), ref: 000000014000A122
                                                                        • malloc.LIBCMT ref: 000000014000A18E
                                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,0000000A,00000008,000000014000A322), ref: 000000014000A1D8
                                                                        • GetStringTypeW.KERNEL32(?,?,?,?,00000000,0000000A,00000008,000000014000A322), ref: 000000014000A1EF
                                                                        • free.LIBCMT ref: 000000014000A200
                                                                        • GetStringTypeA.KERNEL32(?,?,?,?,00000000,0000000A,00000008,000000014000A322), ref: 000000014000A27D
                                                                        • free.LIBCMT ref: 000000014000A28D
                                                                          • Part of subcall function 000000014000B44C: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B4A2
                                                                          • Part of subcall function 000000014000B44C: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B4C1
                                                                          • Part of subcall function 000000014000B44C: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B5C5
                                                                          • Part of subcall function 000000014000B44C: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 000000014000B600
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$StringType$Infofree$ErrorLastmalloc
                                                                        • String ID:
                                                                        • API String ID: 3804003340-0
                                                                        • Opcode ID: 39fec09fe7d862a5082dd06ab3aee44626303477938a03265c05d06889bf9834
                                                                        • Instruction ID: f8a428f8f1c27eb13ca814c4eb41f29db3e9b51ec7c871c10cb5126b7a8d9394
                                                                        • Opcode Fuzzy Hash: 39fec09fe7d862a5082dd06ab3aee44626303477938a03265c05d06889bf9834
                                                                        • Instruction Fuzzy Hash: BA618DB22006808AEB22DF66F840BD977E5F74EBE8F544225FF1953BE4DA78C9458740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$CurrentHandleModuleProcess
                                                                        • String ID: IsWow64Process$Wow64DisableWow64FsRedirection$kernel32.dll
                                                                        • API String ID: 977827838-2164305346
                                                                        • Opcode ID: f10d2ad565f41914e2be0011ed248bd1c70d6dcddcc56e2f69a12dbe984a9b4d
                                                                        • Instruction ID: b8c1b6a9da65b661df1d773be3d9d5e39ffad0629026e022e46448475c6f277a
                                                                        • Opcode Fuzzy Hash: f10d2ad565f41914e2be0011ed248bd1c70d6dcddcc56e2f69a12dbe984a9b4d
                                                                        • Instruction Fuzzy Hash: 0601ECB123678081EA8ADB56B4547D563A0BB8C7C5F445015FB4E037B4EF7CC184C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$CurrentHandleModuleProcess
                                                                        • String ID: IsWow64Process$Wow64RevertWow64FsRedirection$kernel32.dll
                                                                        • API String ID: 977827838-3015363329
                                                                        • Opcode ID: 8ca9e9ffaf6c02ee1d1ef1e8e0790e373e52147c569e813085291193a4d0f7d3
                                                                        • Instruction ID: 8f047146c1362feecd576a1a9e3fb2dfad68f5d87360168ea563691e7ac91dee
                                                                        • Opcode Fuzzy Hash: 8ca9e9ffaf6c02ee1d1ef1e8e0790e373e52147c569e813085291193a4d0f7d3
                                                                        • Instruction Fuzzy Hash: 3001D6B523674082EE8ADB96B894BE963A0AB8C7C1F481015FB4E037B4EF78C184C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 921712934-0
                                                                        • Opcode ID: 8cde325aed96a0fb36415dc33ff2919d5dbae84baa299f2d9ac9992a17a0aff2
                                                                        • Instruction ID: 833a92ed06525261f85501f91e41295ba4668f681d28abd4caeb0473ac624520
                                                                        • Opcode Fuzzy Hash: 8cde325aed96a0fb36415dc33ff2919d5dbae84baa299f2d9ac9992a17a0aff2
                                                                        • Instruction Fuzzy Hash: FB31BAB2214B8081E723DB27B8417DE2655B789BF0F118315BF7907BE3CA7884028B04
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 921712934-0
                                                                        • Opcode ID: 1de3bbbdb22082daae01e57830c4a7bd3f7a96b8caa6de5e8735a83879859248
                                                                        • Instruction ID: 8424a48825bb3466cd1346276ea2c3b8a090cf49eab6c9960a89ffcd0f361eb3
                                                                        • Opcode Fuzzy Hash: 1de3bbbdb22082daae01e57830c4a7bd3f7a96b8caa6de5e8735a83879859248
                                                                        • Instruction Fuzzy Hash: 0631AFF2614A8081F723DF67B84179E3A55B78A7E0F55861ABF6907BF3CB7884028705
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 921712934-0
                                                                        • Opcode ID: e0491ad91fd7e2e89972cd83df9fa3de1c3cd71b0fb9db2b585291e16f70db89
                                                                        • Instruction ID: 4c1ba423e9b1515642a5736ef90e986451ae5e5c71fbe5095b918d5efc03b9f4
                                                                        • Opcode Fuzzy Hash: e0491ad91fd7e2e89972cd83df9fa3de1c3cd71b0fb9db2b585291e16f70db89
                                                                        • Instruction Fuzzy Hash: 5131BFB2604B8086E723EF77B8417EE3651A78A790F558215FB6507BF7CB78C4018709
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: _errno$_getptd
                                                                        • String ID: +$-$0$0
                                                                        • API String ID: 3432092939-699404926
                                                                        • Opcode ID: 7063b99684df259daf2a0fdf98b76d5b2af511295cac328950ad2bf15cd811ac
                                                                        • Instruction ID: baffb331a24d6b8c2e32fcc4bf3e9bdabe17c9363f40f8e18ad6796579cd6fab
                                                                        • Opcode Fuzzy Hash: 7063b99684df259daf2a0fdf98b76d5b2af511295cac328950ad2bf15cd811ac
                                                                        • Instruction Fuzzy Hash: 2D71E6B2908A8485F7B7E617B4053EB2691E74EBD6F298211FF5A036F1EB78C840D701
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$CloseHandleOpenThread
                                                                        • String ID:
                                                                        • API String ID: 855557445-0
                                                                        • Opcode ID: 1903bb7913e4aea3f2645cd8ed0401ab8ebb9ae3850a1c3baa194e9efaabe59a
                                                                        • Instruction ID: bf355b4118d7872fb6bc1152d8101654e1e0fdf0c3d4e378df032b9cf9cb1093
                                                                        • Opcode Fuzzy Hash: 1903bb7913e4aea3f2645cd8ed0401ab8ebb9ae3850a1c3baa194e9efaabe59a
                                                                        • Instruction Fuzzy Hash: FE417CB2315B8087E766DB23B4407EA63A4F78DBC4F588024EF8A47B64EF39C9458710
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: _errno
                                                                        • String ID:
                                                                        • API String ID: 2918714741-0
                                                                        • Opcode ID: 3cf68246be9c877594333203b08bd2f58b68355280d1b2f6723eba62a9fcac42
                                                                        • Instruction ID: a9312902c278db3e4ee2b7a77a38ccf619f2542b57743fdf6879dc2ab7cf5c7f
                                                                        • Opcode Fuzzy Hash: 3cf68246be9c877594333203b08bd2f58b68355280d1b2f6723eba62a9fcac42
                                                                        • Instruction Fuzzy Hash: 3C31A5B2A14A8045F723EF77B5557EE2651A7997D0F154219BB15076F3CF7CC8018704
                                                                        APIs
                                                                        • _FF_MSGBANNER.LIBCMT ref: 0000000140006F97
                                                                          • Part of subcall function 0000000140005DDC: GetModuleFileNameA.KERNEL32(?,?,?,?,?,0000000140006038,?,?,?,?,000000014000AA25,?,?,00000000,0000000140007CE8), ref: 0000000140005E9F
                                                                          • Part of subcall function 0000000140005A60: ExitProcess.KERNEL32 ref: 0000000140005A6F
                                                                          • Part of subcall function 0000000140007CC4: malloc.LIBCMT ref: 0000000140007CE3
                                                                          • Part of subcall function 0000000140007CC4: Sleep.KERNEL32(?,?,00000000,0000000140006FD1,?,?,?,000000014000707B,?,?,?,?,?,?,00000000,0000000140004358), ref: 0000000140007CFA
                                                                        • _errno.LIBCMT ref: 0000000140006FD9
                                                                        • _lock.LIBCMT ref: 0000000140006FED
                                                                        • free.LIBCMT ref: 000000014000700F
                                                                        • _errno.LIBCMT ref: 0000000140007014
                                                                        • LeaveCriticalSection.KERNEL32(?,?,?,000000014000707B,?,?,?,?,?,?,00000000,0000000140004358), ref: 000000014000703A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: _errno$CriticalExitFileLeaveModuleNameProcessSectionSleep_lockfreemalloc
                                                                        • String ID:
                                                                        • API String ID: 1024173049-0
                                                                        • Opcode ID: 73d27a1774517e93bf437b1f2b58e27f5abb258e5d02c370d3f7d45c9b4a55c6
                                                                        • Instruction ID: 4c003e722e6021a59286af514f49aaf45584b6305e10afc2c06660b354eb13d9
                                                                        • Opcode Fuzzy Hash: 73d27a1774517e93bf437b1f2b58e27f5abb258e5d02c370d3f7d45c9b4a55c6
                                                                        • Instruction Fuzzy Hash: 132189B1A1468182F667EB23F414BEA63A5F78DBC0F049125BB4A876F2CF7CC8408755
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$AddressHandleModuleProc
                                                                        • String ID: Kernel32.dll$Wow64GetThreadSelectorEntry
                                                                        • API String ID: 1762409328-2935370172
                                                                        • Opcode ID: 0c170b1e50661bb785bc0e7b074cd89f9d5189518034bd7e827e41a0d61ebc71
                                                                        • Instruction ID: 65a2fef7c9c7bd11d1424d8a1ffaf0e1e2c786880bc4d901ef0d3cb58c77d6bd
                                                                        • Opcode Fuzzy Hash: 0c170b1e50661bb785bc0e7b074cd89f9d5189518034bd7e827e41a0d61ebc71
                                                                        • Instruction Fuzzy Hash: 5F016DB1716B4086FB06CF57B84079562A0AB8DBC0F584025FF5943765EF38C9448740
                                                                        APIs
                                                                        • _getptd.LIBCMT ref: 0000000140007A83
                                                                          • Part of subcall function 000000014000775C: GetOEMCP.KERNEL32(?,?,?,?,?,?,?,0000000140007A9E,?,?,?,?,?,0000000140007C73), ref: 0000000140007786
                                                                          • Part of subcall function 0000000140007CC4: malloc.LIBCMT ref: 0000000140007CE3
                                                                          • Part of subcall function 0000000140007CC4: Sleep.KERNEL32(?,?,00000000,0000000140006FD1,?,?,?,000000014000707B,?,?,?,?,?,?,00000000,0000000140004358), ref: 0000000140007CFA
                                                                        • free.LIBCMT ref: 0000000140007B0F
                                                                          • Part of subcall function 0000000140007C84: HeapFree.KERNEL32(?,?,00000000,000000014000436C,?,?,?,000000014000438F,?,?,?,0000000140003B2D), ref: 0000000140007C9A
                                                                          • Part of subcall function 0000000140007C84: _errno.LIBCMT ref: 0000000140007CA4
                                                                          • Part of subcall function 0000000140007C84: GetLastError.KERNEL32(?,?,00000000,000000014000436C,?,?,?,000000014000438F,?,?,?,0000000140003B2D), ref: 0000000140007CAC
                                                                        • _lock.LIBCMT ref: 0000000140007B47
                                                                        • free.LIBCMT ref: 0000000140007BF7
                                                                        • free.LIBCMT ref: 0000000140007C27
                                                                        • _errno.LIBCMT ref: 0000000140007C2C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: free$_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
                                                                        • String ID:
                                                                        • API String ID: 2878544890-0
                                                                        • Opcode ID: 4fceae20e418f77ce842c2886a37afb857d33c3242fd6813837a55a49e38de46
                                                                        • Instruction ID: c74b7cd7b19c86bb7a40a56e2e44e72fd1ff0ca267c357e1dc4b18f709be9327
                                                                        • Opcode Fuzzy Hash: 4fceae20e418f77ce842c2886a37afb857d33c3242fd6813837a55a49e38de46
                                                                        • Instruction Fuzzy Hash: 6A517CB2A0068086E767DB26B440BE9B7A1F788BD4F54821AFB5E473B6CB7CC541C710
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide__initconout
                                                                        • String ID:
                                                                        • API String ID: 2210154019-0
                                                                        • Opcode ID: 3847cebf34ef8fe519bc520f1609f5bc5eea0f70f2317f58bd4716ff20f0b23a
                                                                        • Instruction ID: f36b571148acb9c5d6000f2f95e86bff99f7230f9e002f7abd88b473779a5dab
                                                                        • Opcode Fuzzy Hash: 3847cebf34ef8fe519bc520f1609f5bc5eea0f70f2317f58bd4716ff20f0b23a
                                                                        • Instruction Fuzzy Hash: 373159B2614A8582EB22CB62F4547EA63B0F78A7B4F501315F76A07AF4DBBCC545CB00
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,?,000000014000438F,?,?,?,0000000140003B2D), ref: 000000014000430A
                                                                        • FlsGetValue.KERNEL32(?,?,?,000000014000438F,?,?,?,0000000140003B2D), ref: 0000000140004318
                                                                        • SetLastError.KERNEL32(?,?,?,000000014000438F,?,?,?,0000000140003B2D), ref: 0000000140004370
                                                                          • Part of subcall function 0000000140007D30: Sleep.KERNEL32(?,?,?,0000000140004333,?,?,?,000000014000438F,?,?,?,0000000140003B2D), ref: 0000000140007D75
                                                                        • FlsSetValue.KERNEL32(?,?,?,000000014000438F,?,?,?,0000000140003B2D), ref: 0000000140004344
                                                                        • free.LIBCMT ref: 0000000140004367
                                                                        • GetCurrentThreadId.KERNEL32 ref: 0000000140004358
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                                        • String ID:
                                                                        • API String ID: 3106088686-0
                                                                        • Opcode ID: 5f34e0fd3207d4ff2146838a1e53426339c71e6239ce123d3b31858fa5f9c4de
                                                                        • Instruction ID: b33bdc97385f1d3ae81a4e8d48b6232c058a88b06399b4de1021089595fda490
                                                                        • Opcode Fuzzy Hash: 5f34e0fd3207d4ff2146838a1e53426339c71e6239ce123d3b31858fa5f9c4de
                                                                        • Instruction Fuzzy Hash: 9B017CB461170182FB07DF77B445BE922A1AB8DBE0F488224BB29033E2EE3CC4448210
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: free$ErrorFreeHeapLast_errno
                                                                        • String ID:
                                                                        • API String ID: 1012874770-0
                                                                        • Opcode ID: fd71f77c5fc6cc53e258529c3f890ae0fd389e9c3dc19fe08a82801181395f5f
                                                                        • Instruction ID: 9248dbb57dd8c8fc79b1ff29f36c26379173841e9b7f7a914ac2dcea7de45e6a
                                                                        • Opcode Fuzzy Hash: fd71f77c5fc6cc53e258529c3f890ae0fd389e9c3dc19fe08a82801181395f5f
                                                                        • Instruction Fuzzy Hash: B9019BB260088591FEA7DF53E492FF91361A7CC7C4F440445B70E879B28E38D9809352
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: AddressErrorHandleLastModuleProc
                                                                        • String ID: Kernel32.dll$Wow64GetThreadContext
                                                                        • API String ID: 4275029093-4075402077
                                                                        • Opcode ID: ca73d05068edcfbd0bff73a568805ca1fd9e49e37523435a8671861ab56e8b98
                                                                        • Instruction ID: 1dcb106765e76c2e13f812d0b265d989c1120e1d05e8e1d1a619d470a1bc4f27
                                                                        • Opcode Fuzzy Hash: ca73d05068edcfbd0bff73a568805ca1fd9e49e37523435a8671861ab56e8b98
                                                                        • Instruction Fuzzy Hash: 06F031B1726B8082FB56CB57B94479563A0EB8DBC0F085035FF49477A9EE3CC5858700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: FileInfoSleepStartupType
                                                                        • String ID:
                                                                        • API String ID: 1527402494-0
                                                                        • Opcode ID: a2103ee4e726047675d0c6192c066eef2d827095f8b9b8fb57a4085d6ff0d321
                                                                        • Instruction ID: 1bb0e84d5a69706c1b8391882ee1a8bfd5a0b5189e7c9238e51be9d2ad983df0
                                                                        • Opcode Fuzzy Hash: a2103ee4e726047675d0c6192c066eef2d827095f8b9b8fb57a4085d6ff0d321
                                                                        • Instruction Fuzzy Hash: 0791B4B260468081E722CB3AE4487A937A6F3097F4F658725E7B9573F1DB39C882C711
                                                                        APIs
                                                                        • DecodePointer.KERNEL32(?,?,?,00000001400095AD,?,?,?,?,0000000140005B56,?,?,00000001,0000000140004170), ref: 00000001400094C5
                                                                        • DecodePointer.KERNEL32(?,?,?,00000001400095AD,?,?,?,?,0000000140005B56,?,?,00000001,0000000140004170), ref: 00000001400094D4
                                                                        • EncodePointer.KERNEL32(?,?,?,00000001400095AD,?,?,?,?,0000000140005B56,?,?,00000001,0000000140004170), ref: 0000000140009551
                                                                          • Part of subcall function 0000000140007DB4: realloc.LIBCMT ref: 0000000140007DDF
                                                                          • Part of subcall function 0000000140007DB4: Sleep.KERNEL32(?,?,00000000,0000000140009541,?,?,?,00000001400095AD,?,?,?,?,0000000140005B56,?,?,00000001), ref: 0000000140007DFB
                                                                        • EncodePointer.KERNEL32(?,?,?,00000001400095AD,?,?,?,?,0000000140005B56,?,?,00000001,0000000140004170), ref: 0000000140009560
                                                                        • EncodePointer.KERNEL32(?,?,?,00000001400095AD,?,?,?,?,0000000140005B56,?,?,00000001,0000000140004170), ref: 000000014000956C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: Pointer$Encode$Decode$Sleep_errnorealloc
                                                                        • String ID:
                                                                        • API String ID: 1310268301-0
                                                                        • Opcode ID: c52e4e8e026aee856f407a725959238e4c881c56461040fb35984d7096aff257
                                                                        • Instruction ID: 9f09be78bdf5cfc8267acd02f70f9dd9e2d8387c15e7eceb79b2464c211f60b7
                                                                        • Opcode Fuzzy Hash: c52e4e8e026aee856f407a725959238e4c881c56461040fb35984d7096aff257
                                                                        • Instruction Fuzzy Hash: 96214FB1715A4480EE13EBA3F9853DAA3A1B74D7C1F844825BB5E0B7B6DA78C181C304
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: _errno$_getbuf
                                                                        • String ID: set cnt=%u
                                                                        • API String ID: 606515832-2828257716
                                                                        • Opcode ID: e7fc0ddcd09eab2da87f3c2bad6808c806f1cf937b796ec0826f76bb8fb079ea
                                                                        • Instruction ID: 49f0b93bb06c02d154b754d2e5af7588712a26fede5e5ae1126c66b4597f8180
                                                                        • Opcode Fuzzy Hash: e7fc0ddcd09eab2da87f3c2bad6808c806f1cf937b796ec0826f76bb8fb079ea
                                                                        • Instruction Fuzzy Hash: 4341C2F2604B8086EB66DF2AE4413AD37A0E78CBD4F148615EBA9473F6DB34C851C784
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: _getptd_lockfree
                                                                        • String ID: set cnt=%u
                                                                        • API String ID: 3892346632-2828257716
                                                                        • Opcode ID: 7201dcab26361b89bf4b1f02a74abce189312c501766974eb0ef828ea51235dd
                                                                        • Instruction ID: 077c2f06a8f8e2f1e701c720c4ea063f1f3f1cad55ac26694a35d2bff8db9782
                                                                        • Opcode Fuzzy Hash: 7201dcab26361b89bf4b1f02a74abce189312c501766974eb0ef828ea51235dd
                                                                        • Instruction Fuzzy Hash: F9116A72A15A8482EBAADB16F840BEA63A1F74CBD0F484125FB5D077B6CF38C844C710
                                                                        APIs
                                                                        • GetModuleHandleW.KERNEL32(?,?,000000FF,0000000140005A6D,?,?,00000028,000000014000AA39,?,?,00000000,0000000140007CE8,?,?,00000000,0000000140006FD1), ref: 0000000140005A33
                                                                        • GetProcAddress.KERNEL32(?,?,000000FF,0000000140005A6D,?,?,00000028,000000014000AA39,?,?,00000000,0000000140007CE8,?,?,00000000,0000000140006FD1), ref: 0000000140005A48
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: AddressHandleModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 1646373207-1276376045
                                                                        • Opcode ID: 8077aba52962df8e4d485bd96ff3894c33d407a2b986854ee18d980751494c19
                                                                        • Instruction ID: 87174268823635a215ecc10db649d8f05eb1742a8762b6cbdbb3abb8cd5430dd
                                                                        • Opcode Fuzzy Hash: 8077aba52962df8e4d485bd96ff3894c33d407a2b986854ee18d980751494c19
                                                                        • Instruction Fuzzy Hash: 47E062B076370081FF1BDB53B894BE51250AB5E7C1F4864299A1E173B1EE3CC559C711
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocCloseErrorFreeHandleLast
                                                                        • String ID:
                                                                        • API String ID: 318044929-0
                                                                        • Opcode ID: 2c5b20160dcf21fb234f315528d8a483d4c26ce78fda4b9213d5795856ffa910
                                                                        • Instruction ID: c5339e6e2736b2c829b631b9b268efe1e11b22059db58e845c5f07aff5815358
                                                                        • Opcode Fuzzy Hash: 2c5b20160dcf21fb234f315528d8a483d4c26ce78fda4b9213d5795856ffa910
                                                                        • Instruction Fuzzy Hash: C5219FB26046408BEB66DF27B40179AB6E0F75CBC4F198035EF49873A4EB78C841CB50
                                                                        APIs
                                                                        • FlsFree.KERNEL32(?,?,?,?,0000000140004559,?,?,00000000,00000001400040EC), ref: 0000000140004233
                                                                        • DeleteCriticalSection.KERNEL32(?,?,?,00000001,?,?,?,?,?,?,?,?,?,0000000140004559), ref: 0000000140006F0A
                                                                        • free.LIBCMT ref: 0000000140006F13
                                                                        • DeleteCriticalSection.KERNEL32(?,?,?,00000001,?,?,?,?,?,?,?,?,?,0000000140004559), ref: 0000000140006F33
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalDeleteSection$Freefree
                                                                        • String ID:
                                                                        • API String ID: 1250194111-0
                                                                        • Opcode ID: 9e3f091b3ea5a1d378a1554f26e070b7ae859130acd6805bd7c77b43d306a3dc
                                                                        • Instruction ID: 14a49594b6673744a7b44bc32c36412160dedd67d22af4ee2d75b8b639badb6f
                                                                        • Opcode Fuzzy Hash: 9e3f091b3ea5a1d378a1554f26e070b7ae859130acd6805bd7c77b43d306a3dc
                                                                        • Instruction Fuzzy Hash: 35119AB1A12A80C2FA1ACF27F4503A97361F749BD0F588225FB5517AB5CB38C591CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: DecodePointer_errno_flush_freebuf
                                                                        • String ID:
                                                                        • API String ID: 1889905870-0
                                                                        • Opcode ID: 46d97551379b156b172757c588fd4fb91044ee41b0987b47a08c04e6079ca8c9
                                                                        • Instruction ID: 84fa225897bd9138b8fbde7c84776147ae61ea1c7cbdf24ef90eb8d51bbe758f
                                                                        • Opcode Fuzzy Hash: 46d97551379b156b172757c588fd4fb91044ee41b0987b47a08c04e6079ca8c9
                                                                        • Instruction Fuzzy Hash: 9F0124F2B1864102FB26EA7BB4113E956919BDDBE8F290328BF19472F3CE38C4018200
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.2178814033.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                                                                        • Associated: 00000000.00000002.2178791295.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178836865.000000014000C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178859162.000000014000F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2178966135.0000000140036000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.2179016621.000000014003A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_140000000_1735021454574.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 921712934-0
                                                                        • Opcode ID: ce9995388a960a9417bc2e9f6effb4c96c8a69ce434933a1a541bf1e6afaddb7
                                                                        • Instruction ID: 001ef56c74c5d3a5e1f4db13c3c8e5f6ab4c98c85571580cfaf58bb19c0e9a60
                                                                        • Opcode Fuzzy Hash: ce9995388a960a9417bc2e9f6effb4c96c8a69ce434933a1a541bf1e6afaddb7
                                                                        • Instruction Fuzzy Hash: EF01D4F2614A4445FB17EB26E4513D8369197AA7A2F518306FB2E076F2CB7C44018605

                                                                        Execution Graph

                                                                        Execution Coverage:9.2%
                                                                        Dynamic/Decrypted Code Coverage:99.2%
                                                                        Signature Coverage:1.4%
                                                                        Total number of Nodes:1780
                                                                        Total number of Limit Nodes:81
                                                                        execution_graph 13332 8687138 13333 86871cc realloc 13332->13333 13341 8687150 realloc 13332->13341 13335 8687adc _errno 36 API calls 13333->13335 13334 8687188 RtlAllocateHeap 13336 86871c1 13334->13336 13334->13341 13335->13336 13338 86871b1 13388 8687adc 13338->13388 13341->13334 13341->13338 13342 86871b6 13341->13342 13343 8687168 13341->13343 13345 8687adc _errno 36 API calls 13342->13345 13343->13334 13346 868b1fc 13343->13346 13355 868afd4 13343->13355 13385 868ac74 13343->13385 13345->13336 13391 868fc48 13346->13391 13349 868b219 13351 868afd4 _FF_MSGBANNER 37 API calls 13349->13351 13353 868b23a 13349->13353 13350 868fc48 _FF_MSGBANNER 37 API calls 13350->13349 13352 868b230 13351->13352 13354 868afd4 _FF_MSGBANNER 37 API calls 13352->13354 13353->13343 13354->13353 13356 868aff7 13355->13356 13357 868fc48 _FF_MSGBANNER 36 API calls 13356->13357 13361 868b19c _FF_MSGBANNER 13356->13361 13358 868b019 13357->13358 13359 868b19e GetStdHandle 13358->13359 13360 868fc48 _FF_MSGBANNER 36 API calls 13358->13360 13359->13361 13362 868b02c 13360->13362 13361->13343 13362->13359 13363 868b03d 13362->13363 13363->13361 13410 868d0bc 13363->13410 13366 86878e4 _FF_MSGBANNER 4 API calls 13367 868b081 __setargv 13366->13367 13368 868b0d2 _FF_MSGBANNER 13367->13368 13369 868d0bc _FF_MSGBANNER 36 API calls 13367->13369 13371 868b12d 13368->13371 13419 868d130 13368->13419 13370 868b0b9 13369->13370 13370->13368 13373 86878e4 _FF_MSGBANNER 4 API calls 13370->13373 13428 868f3a0 13371->13428 13373->13368 13376 868b158 13379 868f3a0 _FF_MSGBANNER 36 API calls 13376->13379 13378 86878e4 _FF_MSGBANNER 4 API calls 13378->13376 13380 868b16e 13379->13380 13382 868b187 13380->13382 13383 86878e4 _FF_MSGBANNER 4 API calls 13380->13383 13381 86878e4 _FF_MSGBANNER 4 API calls 13381->13371 13437 868fa54 13382->13437 13383->13382 13454 868ac38 GetModuleHandleW 13385->13454 13457 8687638 GetLastError FlsGetValue 13388->13457 13390 8687ae5 13390->13342 13392 868fc50 13391->13392 13393 868b20a 13392->13393 13394 8687adc _errno 37 API calls 13392->13394 13393->13349 13393->13350 13395 868fc75 13394->13395 13397 8687a0c RtlDecodePointer 13395->13397 13398 8687a3d 13397->13398 13399 8687a57 _FF_MSGBANNER 13397->13399 13398->13393 13401 86878e4 13399->13401 13408 86867b0 13401->13408 13404 8687941 13405 86879a1 IsDebuggerPresent 13404->13405 13406 86879d1 _FF_MSGBANNER 13405->13406 13407 86879ec GetCurrentProcess TerminateProcess 13406->13407 13407->13398 13409 86867b9 RtlCaptureContext 13408->13409 13409->13404 13411 868d0d1 13410->13411 13412 868d0c7 13410->13412 13413 8687adc _errno 37 API calls 13411->13413 13412->13411 13415 868d0fd 13412->13415 13418 868d0d9 13413->13418 13414 8687a0c _FF_MSGBANNER 5 API calls 13416 868b068 13414->13416 13415->13416 13417 8687adc _errno 37 API calls 13415->13417 13416->13366 13416->13367 13417->13418 13418->13414 13424 868d13e 13419->13424 13420 868d143 13421 8687adc _errno 37 API calls 13420->13421 13422 868b114 13420->13422 13423 868d16d 13421->13423 13422->13371 13422->13381 13425 8687a0c _FF_MSGBANNER 5 API calls 13423->13425 13424->13420 13424->13422 13426 868d191 13424->13426 13425->13422 13426->13422 13427 8687adc _errno 37 API calls 13426->13427 13427->13423 13429 868f3b8 13428->13429 13432 868f3ae 13428->13432 13430 8687adc _errno 37 API calls 13429->13430 13431 868f3c0 13430->13431 13433 8687a0c _FF_MSGBANNER 5 API calls 13431->13433 13432->13429 13434 868f3fc 13432->13434 13435 868b13f 13433->13435 13434->13435 13436 8687adc _errno 37 API calls 13434->13436 13435->13376 13435->13378 13436->13431 13452 8687544 RtlEncodePointer 13437->13452 13453 8692198 13452->13453 13455 868ac67 ExitProcess 13454->13455 13456 868ac52 GetProcAddress 13454->13456 13456->13455 13458 868765e 13457->13458 13459 86876a6 SetLastError 13457->13459 13467 868bf08 13458->13467 13459->13390 13461 868766b _getptd 13461->13459 13462 8687689 13461->13462 13463 868769f 13461->13463 13472 8687584 13462->13472 13477 86870f8 13463->13477 13466 8687690 _getptd 13466->13459 13470 868bf2d 13467->13470 13469 868bf6d 13469->13461 13470->13469 13471 868bf4b Sleep 13470->13471 13483 868fe80 13470->13483 13471->13469 13471->13470 13492 868d070 13472->13492 13478 86870fd HeapFree 13477->13478 13482 868712d realloc 13477->13482 13479 8687118 13478->13479 13478->13482 13480 8687adc _errno 35 API calls 13479->13480 13481 868711d GetLastError 13480->13481 13481->13482 13482->13466 13484 868fe95 13483->13484 13491 868fec7 realloc 13483->13491 13485 868fea3 13484->13485 13484->13491 13486 8687adc _errno 36 API calls 13485->13486 13488 868fea8 13486->13488 13487 868fedf RtlAllocateHeap 13490 868fec3 13487->13490 13487->13491 13489 8687a0c _FF_MSGBANNER 5 API calls 13488->13489 13489->13490 13490->13470 13491->13487 13491->13490 13493 868d08e 13492->13493 13494 868d09f RtlEnterCriticalSection 13492->13494 13497 868cf88 13493->13497 13496 86922b8 13494->13496 13498 868cfaf 13497->13498 13499 868cfc6 13497->13499 13500 868b1fc _FF_MSGBANNER 36 API calls 13498->13500 13511 868cfdb 13499->13511 13523 868be9c 13499->13523 13502 868cfb4 13500->13502 13504 868afd4 _FF_MSGBANNER 36 API calls 13502->13504 13507 868cfbc 13504->13507 13505 868d000 13510 868d070 _lock 36 API calls 13505->13510 13506 868cff1 13509 8687adc _errno 36 API calls 13506->13509 13508 868ac74 malloc 3 API calls 13507->13508 13508->13499 13509->13511 13512 868d00a 13510->13512 13511->13494 13513 868d042 13512->13513 13514 868d013 13512->13514 13515 86870f8 free 36 API calls 13513->13515 13528 868fa1c InitializeCriticalSectionAndSpinCount 13514->13528 13517 868d031 RtlLeaveCriticalSection 13515->13517 13517->13511 13520 86870f8 free 36 API calls 13521 868d02c 13520->13521 13522 8687adc _errno 36 API calls 13521->13522 13522->13517 13524 868beb8 13523->13524 13526 868bef0 13524->13526 13527 868bed0 Sleep 13524->13527 13530 8687138 13524->13530 13526->13505 13526->13506 13527->13524 13527->13526 13529 868d020 13528->13529 13529->13517 13529->13520 13531 86871cc realloc 13530->13531 13539 8687150 realloc 13530->13539 13533 8687adc _errno 36 API calls 13531->13533 13532 8687188 RtlAllocateHeap 13534 86871c1 13532->13534 13532->13539 13533->13534 13534->13524 13535 868b1fc _FF_MSGBANNER 36 API calls 13541 8687168 13535->13541 13536 86871b1 13537 8687adc _errno 36 API calls 13536->13537 13540 86871b6 13537->13540 13538 868afd4 _FF_MSGBANNER 36 API calls 13538->13541 13539->13532 13539->13536 13539->13540 13539->13541 13543 8687adc _errno 36 API calls 13540->13543 13541->13532 13541->13535 13541->13538 13542 868ac74 malloc 3 API calls 13541->13542 13542->13541 13543->13534 13544 8651000 13545 865101e 13544->13545 13546 865106b 13545->13546 13548 8651090 13545->13548 13550 86510a1 13548->13550 13549 86510b6 13549->13546 13550->13549 13552 86510f3 VirtualProtect VirtualProtect 13550->13552 13553 8653d50 13550->13553 13552->13550 13556 8653d88 13553->13556 13554 8653d9e 13554->13550 13556->13554 13557 86528f0 13556->13557 13560 865293c 13557->13560 13558 8652a26 VirtualAlloc 13558->13560 13559 8652947 13559->13556 13560->13558 13560->13559 13561 180012928 13562 18001293d 13561->13562 13564 180012950 malloc _FF_MSGBANNER 13561->13564 13562->13564 13565 18000e568 13562->13565 13568 18000e0c4 13565->13568 13569 18000e0d4 13568->13569 13570 18000e11c 13569->13570 13577 180012d7c 13569->13577 13570->13564 13573 18000e115 13581 18000e010 13573->13581 13574 18000e12b 13586 18000d830 13574->13586 13580 180012da1 13577->13580 13579 18000e0f7 13579->13570 13579->13573 13579->13574 13580->13579 13589 180012928 13580->13589 13593 180013ee4 13581->13593 13587 18000d835 RtlFreeHeap 13586->13587 13588 18000d850 _errno realloc 13586->13588 13587->13588 13588->13570 13590 18001293d 13589->13590 13592 180012950 malloc _FF_MSGBANNER 13589->13592 13591 18000e568 _errno RtlFreeHeap 13590->13591 13590->13592 13591->13592 13592->13580 13594 180013f02 13593->13594 13595 180013f13 13593->13595 13599 180013dfc 13594->13599 13600 180013e23 13599->13600 13606 180013e30 malloc 13599->13606 13624 1800112f8 13600->13624 13614 180013e4f 13606->13614 13649 180012d10 13606->13649 13607 180013e74 13609 180013ee4 _lock RtlFreeHeap 13607->13609 13608 180013e65 13610 18000e568 _errno RtlFreeHeap 13608->13610 13611 180013e7e 13609->13611 13610->13614 13612 180013eb6 13611->13612 13615 180013e87 _lock 13611->13615 13613 18000d830 _freebuf RtlFreeHeap 13612->13613 13613->13614 13614->13595 13619 180010d04 13614->13619 13615->13614 13616 18000d830 _freebuf RtlFreeHeap 13615->13616 13617 180013ea0 13616->13617 13618 18000e568 _errno RtlFreeHeap 13617->13618 13618->13614 13620 1800112f8 _FF_MSGBANNER RtlFreeHeap 13619->13620 13621 180010d11 13620->13621 13622 1800110d0 malloc RtlFreeHeap 13621->13622 13623 180010d18 malloc 13622->13623 13653 1800168c8 13624->13653 13626 180011306 13628 1800168c8 _FF_MSGBANNER RtlFreeHeap 13626->13628 13629 180011315 13626->13629 13627 1800110d0 malloc RtlFreeHeap 13630 18001132c 13627->13630 13628->13629 13629->13627 13631 180011336 13629->13631 13632 1800110d0 malloc RtlFreeHeap 13630->13632 13633 1800110d0 13631->13633 13632->13631 13634 1800110f3 13633->13634 13635 1800168c8 _FF_MSGBANNER RtlFreeHeap 13634->13635 13648 18001126a malloc 13634->13648 13636 180011115 13635->13636 13637 1800168c8 _FF_MSGBANNER RtlFreeHeap 13636->13637 13636->13648 13638 180011128 13637->13638 13638->13648 13657 180013f30 13638->13657 13640 180011164 malloc 13641 180013f30 malloc RtlFreeHeap 13640->13641 13642 1800111b5 malloc 13640->13642 13641->13642 13643 180011210 malloc 13642->13643 13664 180013fa4 13642->13664 13671 180015e1c 13643->13671 13645 18001123b malloc 13647 180015e1c malloc RtlFreeHeap 13645->13647 13647->13648 13648->13606 13651 180012d2c 13649->13651 13652 180012d64 13651->13652 13678 18000d870 13651->13678 13652->13607 13652->13608 13654 1800168d0 13653->13654 13655 18000e568 _errno RtlFreeHeap 13654->13655 13656 1800168da _FF_MSGBANNER 13654->13656 13655->13656 13656->13626 13658 180013f45 13657->13658 13659 180013f3b 13657->13659 13660 18000e568 _errno RtlFreeHeap 13658->13660 13659->13658 13661 180013f71 13659->13661 13663 180013f4d _FF_MSGBANNER 13660->13663 13662 18000e568 _errno RtlFreeHeap 13661->13662 13661->13663 13662->13663 13663->13640 13667 180013fb2 13664->13667 13665 180013fb7 13666 18000e568 _errno RtlFreeHeap 13665->13666 13668 180013fbc _FF_MSGBANNER 13665->13668 13666->13668 13667->13665 13667->13668 13669 180014005 13667->13669 13668->13643 13669->13668 13670 18000e568 _errno RtlFreeHeap 13669->13670 13670->13668 13672 180015e34 13671->13672 13674 180015e2a 13671->13674 13673 18000e568 _errno RtlFreeHeap 13672->13673 13676 180015e3c _FF_MSGBANNER 13673->13676 13674->13672 13675 180015e78 13674->13675 13675->13676 13677 18000e568 _errno RtlFreeHeap 13675->13677 13676->13645 13677->13676 13679 18000d904 malloc 13678->13679 13683 18000d888 malloc 13678->13683 13680 18000e568 _errno RtlFreeHeap 13679->13680 13682 18000d8f9 13680->13682 13681 1800112f8 _FF_MSGBANNER RtlFreeHeap 13681->13683 13682->13651 13683->13681 13683->13682 13684 1800110d0 malloc RtlFreeHeap 13683->13684 13685 18000d8e9 13683->13685 13687 18000d8ee 13683->13687 13684->13683 13686 18000e568 _errno RtlFreeHeap 13685->13686 13686->13687 13688 18000e568 _errno RtlFreeHeap 13687->13688 13688->13682 13689 866f678 13692 86873fa 13689->13692 13690 8687412 13691 8687453 13744 8686720 13691->13744 13692->13690 13692->13691 13693 8687447 13692->13693 13703 86872a8 13692->13703 13693->13690 13693->13691 13697 8687489 13698 86874b6 13697->13698 13699 86872a8 105 API calls 13697->13699 13698->13690 13699->13698 13700 8686720 2 API calls 13701 868747c 13700->13701 13702 86872a8 105 API calls 13701->13702 13702->13697 13704 8687335 13703->13704 13705 86872b6 13703->13705 13707 8687372 13704->13707 13711 8687339 13704->13711 13748 868ab9c HeapCreate 13705->13748 13708 86873cd 13707->13708 13709 8687377 13707->13709 13728 86872c1 13708->13728 13844 8687818 13708->13844 13716 868bf08 _getptd 37 API calls 13709->13716 13715 868c38c 38 API calls 13711->13715 13711->13728 13714 86872cd _RTC_Initialize 13717 86872d1 13714->13717 13722 86872dd GetCommandLineA 13714->13722 13718 8687366 13715->13718 13723 868738b _getptd 13716->13723 13765 868abe8 HeapDestroy 13717->13765 13720 868755c 40 API calls 13718->13720 13721 868736b 13720->13721 13843 868abe8 HeapDestroy 13721->13843 13766 868c7f0 13722->13766 13726 86873ad 13723->13726 13727 86873c3 13723->13727 13723->13728 13730 8687584 _getptd 37 API calls 13726->13730 13731 86870f8 free 37 API calls 13727->13731 13728->13693 13733 86873b4 _getptd 13730->13733 13731->13733 13733->13728 13735 86872ff 13800 868755c 13735->13800 13739 868731f 13739->13728 13838 868c38c 13739->13838 13745 8686728 13744->13745 13746 8686765 13745->13746 13747 8686745 TerminateThread CloseHandle 13745->13747 13746->13697 13746->13700 13747->13746 13749 868abc0 HeapSetInformation 13748->13749 13750 86872bd 13748->13750 13749->13750 13750->13728 13751 8687858 13750->13751 13850 868af6c 13751->13850 13753 8687863 13854 868ce60 13753->13854 13756 86878cc 13758 868755c 40 API calls 13756->13758 13757 868786c FlsAlloc 13757->13756 13759 8687884 13757->13759 13764 86878b8 _getptd 13758->13764 13760 868bf08 _getptd 37 API calls 13759->13760 13761 8687893 _getptd 13760->13761 13761->13756 13762 86878ae 13761->13762 13763 8687584 _getptd 37 API calls 13762->13763 13763->13764 13764->13714 13765->13728 13767 868c81f GetEnvironmentStringsW 13766->13767 13768 868c851 13766->13768 13769 868c82d 13767->13769 13771 868c839 GetLastError 13767->13771 13768->13769 13770 868c914 13768->13770 13772 868c85f GetEnvironmentStringsW 13769->13772 13776 868c874 __initmbctable 13769->13776 13773 868c921 GetEnvironmentStrings 13770->13773 13774 86872ef 13770->13774 13771->13768 13772->13774 13772->13776 13773->13774 13775 868c933 13773->13775 13787 868c09c GetStartupInfoA 13774->13787 13777 868be9c __setargv 37 API calls 13775->13777 13778 868c903 13776->13778 13781 868be9c __setargv 37 API calls 13776->13781 13779 868c957 13777->13779 13780 868c906 FreeEnvironmentStringsW 13778->13780 13782 868c96d __initmbctable 13779->13782 13783 868c95f FreeEnvironmentStringsA 13779->13783 13780->13774 13785 868c8ca __initmbctable 13781->13785 13784 868c97b FreeEnvironmentStringsA 13782->13784 13783->13774 13784->13774 13785->13778 13785->13780 13786 86870f8 free 37 API calls 13785->13786 13786->13778 13788 868bf08 _getptd 37 API calls 13787->13788 13789 868c0d9 13788->13789 13791 868c29f 13789->13791 13793 868bf08 _getptd 37 API calls 13789->13793 13798 86872fb 13789->13798 13799 868c208 13789->13799 13790 868c2c5 GetStdHandle 13790->13791 13791->13790 13792 868c2f4 GetFileType 13791->13792 13794 868c354 SetHandleCount 13791->13794 13796 868fa1c _lock InitializeCriticalSectionAndSpinCount 13791->13796 13791->13798 13792->13791 13793->13789 13794->13798 13795 868c23b GetFileType 13795->13799 13796->13791 13797 868fa1c _lock InitializeCriticalSectionAndSpinCount 13797->13799 13798->13735 13808 868c6f8 13798->13808 13799->13791 13799->13795 13799->13797 13799->13798 13801 8687578 13800->13801 13802 868756b FlsFree 13800->13802 13803 868cf3d 13801->13803 13804 868cf1f RtlDeleteCriticalSection 13801->13804 13802->13801 13806 868cf4b RtlDeleteCriticalSection 13803->13806 13807 868cf5a 13803->13807 13805 86870f8 free 37 API calls 13804->13805 13805->13801 13806->13803 13807->13717 13809 868c710 13808->13809 13811 868c715 __setargv 13808->13811 13858 868a6dc 13809->13858 13862 868c528 13811->13862 13813 868730b 13813->13739 13818 868c3f8 13813->13818 13815 868be9c __setargv 37 API calls 13816 868c79b 13815->13816 13816->13813 13817 868c528 __setargv 38 API calls 13816->13817 13817->13813 13819 868c415 13818->13819 13821 868c41a _FF_MSGBANNER 13818->13821 13820 868a6dc __initmbctable 70 API calls 13819->13820 13820->13821 13822 868bf08 _getptd 37 API calls 13821->13822 13825 8687314 13821->13825 13823 868c459 _FF_MSGBANNER 13822->13823 13823->13825 13826 868bf08 _getptd 37 API calls 13823->13826 13827 868c4d2 13823->13827 13828 868c50e 13823->13828 13830 868d0bc _FF_MSGBANNER 37 API calls 13823->13830 13831 86878e4 _FF_MSGBANNER 4 API calls 13823->13831 13824 86870f8 free 37 API calls 13824->13825 13825->13739 13832 868ad14 13825->13832 13826->13823 13827->13824 13829 86870f8 free 37 API calls 13828->13829 13829->13825 13830->13823 13831->13823 13833 868ad2a _cinit 13832->13833 14221 868e168 13833->14221 13835 868ad47 _cinit 13837 868ad6a _cinit 13835->13837 14224 868f644 13835->14224 13837->13739 13840 868c39d 13838->13840 13839 868c3ec 13839->13735 13840->13839 13841 868c3b4 RtlDeleteCriticalSection 13840->13841 13842 86870f8 free 37 API calls 13840->13842 13841->13840 13842->13840 13843->13728 13845 868782c 13844->13845 13846 8687850 13844->13846 13847 8687840 _getptd 13845->13847 13848 8687831 FlsGetValue 13845->13848 13846->13728 14245 86876e0 13847->14245 13848->13847 13851 8687544 _FF_MSGBANNER RtlEncodePointer 13850->13851 13852 868af77 _initp_misc_winsig 13851->13852 13853 868afba RtlEncodePointer 13852->13853 13853->13753 13855 868ce83 13854->13855 13856 8687868 13855->13856 13857 868fa1c _lock InitializeCriticalSectionAndSpinCount 13855->13857 13856->13756 13856->13757 13857->13855 13859 868a6e9 13858->13859 13860 868a6f3 13858->13860 13868 868a4e4 13859->13868 13860->13811 13864 868c567 13862->13864 13866 868c5cf 13864->13866 14217 869011c 13864->14217 13865 868c6cb 13865->13813 13865->13815 13866->13865 13867 869011c __setargv 38 API calls 13866->13867 13867->13866 13890 86876bc 13868->13890 13875 868a67c 13875->13860 13876 868be9c __setargv 37 API calls 13877 868a534 __initmbctable 13876->13877 13877->13875 13911 868a26c 13877->13911 13880 868a56f 13883 86870f8 free 37 API calls 13880->13883 13886 868a594 13880->13886 13881 868a693 13881->13875 13882 868a6ac 13881->13882 13884 86870f8 free 37 API calls 13881->13884 13885 8687adc _errno 37 API calls 13882->13885 13883->13886 13884->13882 13885->13875 13886->13875 13887 868d070 _lock 37 API calls 13886->13887 13888 868a5cc 13887->13888 13888->13875 13889 86870f8 free 37 API calls 13888->13889 13889->13875 13891 8687638 _getptd 37 API calls 13890->13891 13892 86876c7 13891->13892 13893 86876d7 13892->13893 13921 868ac08 13892->13921 13895 868a120 13893->13895 13896 86876bc _getptd 38 API calls 13895->13896 13897 868a12f 13896->13897 13898 868d070 _lock 37 API calls 13897->13898 13900 868a14a 13897->13900 13902 868a15d 13898->13902 13899 868a1ce 13904 868a1dc 13899->13904 13900->13899 13901 868ac08 _getptd 38 API calls 13900->13901 13901->13899 13902->13900 13903 86870f8 free 37 API calls 13902->13903 13903->13900 13926 8686e44 13904->13926 13907 868a1fc GetOEMCP 13909 868a20c 13907->13909 13908 868a221 13908->13909 13910 868a226 GetACP 13908->13910 13909->13875 13909->13876 13910->13909 13912 868a1dc __initmbctable 40 API calls 13911->13912 13913 868a293 13912->13913 13914 868a29b __initmbctable 13913->13914 13915 868a2ec IsValidCodePage 13913->13915 13920 868a312 _FF_MSGBANNER 13913->13920 14100 868e3f0 13914->14100 13915->13914 13917 868a2fd GetCPInfo 13915->13917 13917->13914 13917->13920 13918 868a4cf 13918->13880 13918->13881 14090 8689f3c GetCPInfo 13920->14090 13922 868b1fc _FF_MSGBANNER 37 API calls 13921->13922 13923 868ac15 13922->13923 13924 868afd4 _FF_MSGBANNER 37 API calls 13923->13924 13925 868ac1c RtlDecodePointer 13924->13925 13927 8686e5a 13926->13927 13933 8686ebe 13926->13933 13928 86876bc _getptd 38 API calls 13927->13928 13929 8686e5f 13928->13929 13930 8686e97 13929->13930 13934 868aa18 13929->13934 13932 868a120 __initmbctable 38 API calls 13930->13932 13930->13933 13932->13933 13933->13907 13933->13908 13935 86876bc _getptd 38 API calls 13934->13935 13936 868aa23 13935->13936 13937 868aa4c 13936->13937 13938 868aa3e 13936->13938 13939 868d070 _lock 37 API calls 13937->13939 13940 86876bc _getptd 38 API calls 13938->13940 13941 868aa56 13939->13941 13943 868aa43 13940->13943 13946 868a9c0 13941->13946 13944 868aa84 13943->13944 13945 868ac08 _getptd 38 API calls 13943->13945 13944->13930 13945->13944 13947 868aa0a 13946->13947 13948 868a9ce __setargv _getptd 13946->13948 13947->13943 13948->13947 13950 868a704 13948->13950 13951 868a79b 13950->13951 13953 868a722 13950->13953 13952 868a7ee 13951->13952 13954 86870f8 free 37 API calls 13951->13954 13966 868a81b 13952->13966 14002 868f0d4 13952->14002 13953->13951 13956 868a761 13953->13956 13965 86870f8 free 37 API calls 13953->13965 13957 868a7bf 13954->13957 13958 868a783 13956->13958 13968 86870f8 free 37 API calls 13956->13968 13960 86870f8 free 37 API calls 13957->13960 13963 86870f8 free 37 API calls 13958->13963 13961 868a7d3 13960->13961 13967 86870f8 free 37 API calls 13961->13967 13962 868a867 13969 868a78f 13963->13969 13964 86870f8 free 37 API calls 13964->13966 13970 868a755 13965->13970 13966->13962 13971 86870f8 37 API calls free 13966->13971 13972 868a7e2 13967->13972 13973 868a777 13968->13973 13974 86870f8 free 37 API calls 13969->13974 13978 868f308 13970->13978 13971->13966 13976 86870f8 free 37 API calls 13972->13976 13994 868f2c0 13973->13994 13974->13951 13976->13952 13979 868f397 13978->13979 13980 868f311 13978->13980 13979->13956 13981 868f32b 13980->13981 13982 86870f8 free 37 API calls 13980->13982 13983 868f33d 13981->13983 13984 86870f8 free 37 API calls 13981->13984 13982->13981 13985 868f34f 13983->13985 13986 86870f8 free 37 API calls 13983->13986 13984->13983 13987 868f361 13985->13987 13988 86870f8 free 37 API calls 13985->13988 13986->13985 13989 868f373 13987->13989 13991 86870f8 free 37 API calls 13987->13991 13988->13987 13990 868f385 13989->13990 13992 86870f8 free 37 API calls 13989->13992 13990->13979 13993 86870f8 free 37 API calls 13990->13993 13991->13989 13992->13990 13993->13979 13995 868f302 13994->13995 13996 868f2c5 13994->13996 13995->13958 13997 868f2de 13996->13997 13998 86870f8 free 37 API calls 13996->13998 13999 868f2f0 13997->13999 14000 86870f8 free 37 API calls 13997->14000 13998->13997 13999->13995 14001 86870f8 free 37 API calls 13999->14001 14000->13999 14001->13995 14003 868f0dd 14002->14003 14089 868a80f 14002->14089 14004 86870f8 free 37 API calls 14003->14004 14005 868f0ee 14004->14005 14006 86870f8 free 37 API calls 14005->14006 14007 868f0f7 14006->14007 14008 86870f8 free 37 API calls 14007->14008 14009 868f100 14008->14009 14010 86870f8 free 37 API calls 14009->14010 14011 868f109 14010->14011 14012 86870f8 free 37 API calls 14011->14012 14013 868f112 14012->14013 14014 86870f8 free 37 API calls 14013->14014 14015 868f11b 14014->14015 14016 86870f8 free 37 API calls 14015->14016 14017 868f123 14016->14017 14018 86870f8 free 37 API calls 14017->14018 14019 868f12c 14018->14019 14020 86870f8 free 37 API calls 14019->14020 14021 868f135 14020->14021 14022 86870f8 free 37 API calls 14021->14022 14023 868f13e 14022->14023 14024 86870f8 free 37 API calls 14023->14024 14025 868f147 14024->14025 14026 86870f8 free 37 API calls 14025->14026 14027 868f150 14026->14027 14028 86870f8 free 37 API calls 14027->14028 14029 868f159 14028->14029 14030 86870f8 free 37 API calls 14029->14030 14031 868f162 14030->14031 14032 86870f8 free 37 API calls 14031->14032 14033 868f16b 14032->14033 14034 86870f8 free 37 API calls 14033->14034 14035 868f174 14034->14035 14036 86870f8 free 37 API calls 14035->14036 14037 868f180 14036->14037 14038 86870f8 free 37 API calls 14037->14038 14039 868f18c 14038->14039 14040 86870f8 free 37 API calls 14039->14040 14041 868f198 14040->14041 14042 86870f8 free 37 API calls 14041->14042 14043 868f1a4 14042->14043 14044 86870f8 free 37 API calls 14043->14044 14045 868f1b0 14044->14045 14046 86870f8 free 37 API calls 14045->14046 14047 868f1bc 14046->14047 14048 86870f8 free 37 API calls 14047->14048 14049 868f1c8 14048->14049 14050 86870f8 free 37 API calls 14049->14050 14051 868f1d4 14050->14051 14052 86870f8 free 37 API calls 14051->14052 14053 868f1e0 14052->14053 14054 86870f8 free 37 API calls 14053->14054 14055 868f1ec 14054->14055 14056 86870f8 free 37 API calls 14055->14056 14057 868f1f8 14056->14057 14058 86870f8 free 37 API calls 14057->14058 14059 868f204 14058->14059 14060 86870f8 free 37 API calls 14059->14060 14061 868f210 14060->14061 14062 86870f8 free 37 API calls 14061->14062 14063 868f21c 14062->14063 14064 86870f8 free 37 API calls 14063->14064 14065 868f228 14064->14065 14066 86870f8 free 37 API calls 14065->14066 14067 868f234 14066->14067 14068 86870f8 free 37 API calls 14067->14068 14069 868f240 14068->14069 14070 86870f8 free 37 API calls 14069->14070 14071 868f24c 14070->14071 14072 86870f8 free 37 API calls 14071->14072 14073 868f258 14072->14073 14074 86870f8 free 37 API calls 14073->14074 14075 868f264 14074->14075 14076 86870f8 free 37 API calls 14075->14076 14077 868f270 14076->14077 14078 86870f8 free 37 API calls 14077->14078 14079 868f27c 14078->14079 14080 86870f8 free 37 API calls 14079->14080 14081 868f288 14080->14081 14082 86870f8 free 37 API calls 14081->14082 14083 868f294 14082->14083 14084 86870f8 free 37 API calls 14083->14084 14085 868f2a0 14084->14085 14086 86870f8 free 37 API calls 14085->14086 14087 868f2ac 14086->14087 14088 86870f8 free 37 API calls 14087->14088 14088->14089 14089->13964 14091 8689f7e _FF_MSGBANNER 14090->14091 14099 868a06a 14090->14099 14109 868f048 14091->14109 14094 868e3f0 __initmbctable 6 API calls 14096 868a10a 14094->14096 14096->13914 14098 868ed44 __initmbctable 65 API calls 14098->14099 14099->14094 14101 868e3f9 14100->14101 14102 868e404 14101->14102 14103 8690740 RtlCaptureContext RtlLookupFunctionEntry 14101->14103 14102->13918 14104 86907c5 14103->14104 14105 8690784 RtlVirtualUnwind 14103->14105 14106 86907e7 IsDebuggerPresent 14104->14106 14105->14106 14108 8690846 _FF_MSGBANNER 14106->14108 14107 869086e GetCurrentProcess TerminateProcess 14107->13918 14108->14107 14110 8686e44 __setargv 38 API calls 14109->14110 14111 868f06c 14110->14111 14119 868eddc 14111->14119 14114 868ed44 14115 8686e44 __setargv 38 API calls 14114->14115 14116 868ed68 14115->14116 14172 868e804 14116->14172 14120 868ee69 14119->14120 14121 868ee2c GetStringTypeW 14119->14121 14122 868ef98 14120->14122 14124 868ee46 14120->14124 14123 868ee4e GetLastError 14121->14123 14121->14124 14143 8691180 GetLocaleInfoA 14122->14143 14123->14120 14125 868ee92 MultiByteToWideChar 14124->14125 14141 868ef91 14124->14141 14131 868eec0 14125->14131 14125->14141 14127 868e3f0 __initmbctable 6 API calls 14129 868a001 14127->14129 14129->14114 14130 868eff3 GetStringTypeA 14135 868f016 14130->14135 14130->14141 14132 8687138 malloc 37 API calls 14131->14132 14133 868eee5 __initmbctable _FF_MSGBANNER 14131->14133 14132->14133 14136 868ef4c MultiByteToWideChar 14133->14136 14133->14141 14138 86870f8 free 37 API calls 14135->14138 14139 868ef6e GetStringTypeW 14136->14139 14140 868ef83 14136->14140 14138->14141 14139->14140 14140->14141 14142 86870f8 free 37 API calls 14140->14142 14141->14127 14142->14141 14144 86911b2 14143->14144 14145 86911b7 14143->14145 14147 868e3f0 __initmbctable 6 API calls 14144->14147 14168 8686c80 14145->14168 14148 868efc2 14147->14148 14148->14130 14148->14141 14149 86911d4 14148->14149 14150 86912fe 14149->14150 14151 8691226 GetCPInfo 14149->14151 14154 868e3f0 __initmbctable 6 API calls 14150->14154 14152 8691238 14151->14152 14153 86912d7 MultiByteToWideChar 14151->14153 14152->14153 14155 8691242 GetCPInfo 14152->14155 14153->14150 14158 869125d _FF_MSGBANNER 14153->14158 14157 868efe8 14154->14157 14155->14153 14156 8691257 14155->14156 14156->14153 14156->14158 14157->14130 14157->14141 14159 8687138 malloc 37 API calls 14158->14159 14160 8691299 __initmbctable _FF_MSGBANNER 14158->14160 14159->14160 14160->14150 14161 8691335 MultiByteToWideChar 14160->14161 14162 8691364 __initmbctable 14161->14162 14164 869135f __initmbctable 14161->14164 14162->14150 14163 86870f8 free 37 API calls 14162->14163 14163->14150 14164->14162 14165 868bf08 _getptd 37 API calls 14164->14165 14166 86913de __initmbctable 14165->14166 14166->14162 14167 86870f8 free 37 API calls 14166->14167 14167->14162 14169 8688b7c 14168->14169 14170 86888f8 __initmbctable 55 API calls 14169->14170 14171 8688ba7 14170->14171 14171->14144 14173 868e85c LCMapStringW 14172->14173 14176 868e880 14172->14176 14174 868e88c GetLastError 14173->14174 14173->14176 14174->14176 14175 868eb4e 14179 8691180 __initmbctable 55 API calls 14175->14179 14176->14175 14177 868e8fb 14176->14177 14178 868eb47 14177->14178 14180 868e919 MultiByteToWideChar 14177->14180 14181 868e3f0 __initmbctable 6 API calls 14178->14181 14182 868eb7c 14179->14182 14180->14178 14189 868e948 14180->14189 14183 868a034 14181->14183 14182->14178 14185 868eb9b 14182->14185 14186 868ecd7 LCMapStringA 14182->14186 14183->14098 14184 868e9c4 MultiByteToWideChar 14187 868eb39 14184->14187 14188 868e9ee LCMapStringW 14184->14188 14190 86911d4 __initmbctable 47 API calls 14185->14190 14201 868ebe3 14186->14201 14187->14178 14197 86870f8 free 37 API calls 14187->14197 14188->14187 14192 868ea18 14188->14192 14193 868e979 __initmbctable 14189->14193 14194 8687138 malloc 37 API calls 14189->14194 14191 868ebb3 14190->14191 14191->14178 14195 868ebbb LCMapStringA 14191->14195 14198 868ea23 14192->14198 14204 868ea5e 14192->14204 14193->14178 14193->14184 14194->14193 14195->14201 14207 868ebea 14195->14207 14196 868ed07 14196->14178 14202 86870f8 free 37 API calls 14196->14202 14197->14178 14198->14187 14200 868ea3a LCMapStringW 14198->14200 14199 86870f8 free 37 API calls 14199->14196 14200->14187 14201->14196 14201->14199 14202->14178 14203 868eacb LCMapStringW 14209 868eaec __initmbctable 14203->14209 14205 8687138 malloc 37 API calls 14204->14205 14210 868ea7c __initmbctable 14204->14210 14205->14210 14206 868ec0b __initmbctable _FF_MSGBANNER 14206->14201 14208 868ec6d LCMapStringA 14206->14208 14207->14206 14211 8687138 malloc 37 API calls 14207->14211 14213 868ec99 14208->14213 14214 868ec95 14208->14214 14209->14187 14212 86870f8 free 37 API calls 14209->14212 14210->14187 14210->14203 14211->14206 14212->14187 14215 86911d4 __initmbctable 47 API calls 14213->14215 14214->14201 14216 86870f8 free 37 API calls 14214->14216 14215->14214 14216->14201 14218 86900a0 14217->14218 14219 8686e44 __setargv 38 API calls 14218->14219 14220 86900c4 14219->14220 14220->13864 14222 868e17e RtlEncodePointer 14221->14222 14222->14222 14223 868e193 14222->14223 14223->13835 14227 868f53c 14224->14227 14240 868ac8c 14227->14240 14241 868d070 14240->14241 14242 868d09f RtlEnterCriticalSection 14241->14242 14243 868cf88 _lock 37 API calls 14241->14243 14244 86922b8 14242->14244 14243->14242 14246 86876e9 14245->14246 14270 868780a 14245->14270 14247 8687704 14246->14247 14248 86870f8 free 37 API calls 14246->14248 14249 8687712 14247->14249 14250 86870f8 free 37 API calls 14247->14250 14248->14247 14251 8687720 14249->14251 14252 86870f8 free 37 API calls 14249->14252 14250->14249 14253 86870f8 free 37 API calls 14251->14253 14255 868772e 14251->14255 14252->14251 14253->14255 14254 868773c 14257 868774a 14254->14257 14259 86870f8 free 37 API calls 14254->14259 14255->14254 14256 86870f8 free 37 API calls 14255->14256 14256->14254 14258 868775b 14257->14258 14260 86870f8 free 37 API calls 14257->14260 14261 8687773 14258->14261 14262 86870f8 free 37 API calls 14258->14262 14259->14257 14260->14258 14263 868d070 _lock 37 API calls 14261->14263 14262->14261 14265 868777d 14263->14265 14264 86877ab 14266 868d070 _lock 37 API calls 14264->14266 14265->14264 14267 86870f8 free 37 API calls 14265->14267 14271 86877c0 __setargv 14266->14271 14267->14264 14268 86877f7 14269 86870f8 free 37 API calls 14268->14269 14269->14270 14270->13846 14271->14268 14272 868a704 __setargv 37 API calls 14271->14272 14272->14268 14273 18000de70 14275 18000de96 14273->14275 14274 18000de9e 14275->14274 14279 18000ded3 14275->14279 14281 18000dd34 14275->14281 14277 18000df15 14277->14274 14278 18000dd34 2 API calls 14277->14278 14278->14274 14279->14274 14279->14277 14280 18000dd34 2 API calls 14279->14280 14280->14277 14282 18000ddc1 14281->14282 14283 18000dd42 14281->14283 14285 18000ddfe 14282->14285 14291 18000ddc5 14282->14291 14316 180010c98 HeapCreate 14283->14316 14286 18000de03 14285->14286 14287 18000de59 14285->14287 14292 180012d7c _errno RtlFreeHeap 14286->14292 14298 18000dd4d 14287->14298 14356 18000e2a4 14287->14356 14291->14298 14352 180013200 14291->14352 14294 18000de17 14292->14294 14294->14298 14299 18000de39 14294->14299 14300 18000de4f 14294->14300 14296 18000dfe8 RtlFreeHeap 14296->14298 14297 18000dd59 _RTC_Initialize 14297->14298 14327 180013664 14297->14327 14298->14279 14303 18000e010 _errno RtlFreeHeap 14299->14303 14301 18000d830 _freebuf RtlFreeHeap 14300->14301 14301->14298 14303->14298 14304 18000dd7b 14336 180012f10 14304->14336 14306 18000dd87 14307 18000dd8b 14306->14307 14346 18001356c 14306->14346 14342 18000dfe8 14307->14342 14317 18000dd49 14316->14317 14317->14298 14318 18000e2e4 14317->14318 14322 18000e2ef 14318->14322 14319 18000e358 14320 18000dfe8 RtlFreeHeap 14319->14320 14321 18000e344 14320->14321 14321->14297 14322->14319 14323 180012d7c _errno RtlFreeHeap 14322->14323 14324 18000e31f 14323->14324 14324->14319 14325 18000e33a 14324->14325 14326 18000e010 _errno RtlFreeHeap 14325->14326 14326->14321 14328 180013693 14327->14328 14329 180013788 14328->14329 14330 1800136a1 14328->14330 14331 180012d10 _getbuf RtlFreeHeap 14329->14331 14333 1800136e1 __initmbctable 14329->14333 14332 180012d10 _getbuf RtlFreeHeap 14330->14332 14330->14333 14331->14333 14334 18001373e 14332->14334 14333->14304 14334->14333 14335 18000d830 _freebuf RtlFreeHeap 14334->14335 14335->14333 14337 180012f3b 14336->14337 14338 180012d7c _errno RtlFreeHeap 14337->14338 14340 180012f4d 14338->14340 14339 180012d7c _errno RtlFreeHeap 14339->14340 14340->14339 14340->14340 14341 180012f58 _lock 14340->14341 14341->14306 14344 18000dff7 14342->14344 14343 180013db1 14343->14298 14344->14343 14345 18000d830 _freebuf RtlFreeHeap 14344->14345 14345->14344 14347 180013584 14346->14347 14349 180013589 14346->14349 14360 18000fbb8 14347->14360 14364 18001339c 14349->14364 14353 180013211 14352->14353 14354 18000ddf2 14353->14354 14355 18000d830 _freebuf RtlFreeHeap 14353->14355 14354->14296 14355->14353 14357 18000e2b8 14356->14357 14358 18000e2dc 14356->14358 14643 18000e16c 14357->14643 14358->14298 14361 18000fbc5 14360->14361 14362 18000fbcf 14360->14362 14370 18000f9c0 14361->14370 14362->14349 14366 1800133db 14364->14366 14369 180013443 14366->14369 14639 180016e38 14366->14639 14367 18001353f 14368 180016e38 __setargv RtlFreeHeap 14368->14369 14369->14367 14369->14368 14392 18000e148 14370->14392 14377 180012d10 _getbuf RtlFreeHeap 14378 18000fa10 __initmbctable 14377->14378 14390 18000fb58 __initmbctable 14378->14390 14409 18000f748 14378->14409 14380 18000fa40 14381 18000fa4b 14380->14381 14382 18000fb6f 14380->14382 14386 18000d830 _freebuf RtlFreeHeap 14381->14386 14387 18000fa70 14381->14387 14383 18000fb88 14382->14383 14384 18000d830 _freebuf RtlFreeHeap 14382->14384 14382->14390 14385 18000e568 _errno RtlFreeHeap 14383->14385 14384->14383 14385->14390 14386->14387 14388 180013ee4 _lock RtlFreeHeap 14387->14388 14387->14390 14389 18000faa8 14388->14389 14389->14390 14391 18000d830 _freebuf RtlFreeHeap 14389->14391 14390->14362 14391->14390 14393 18000e0c4 _errno RtlFreeHeap 14392->14393 14394 18000e153 14393->14394 14395 18000e163 14394->14395 14396 180010d04 _getptd RtlFreeHeap 14394->14396 14397 18000f5fc 14395->14397 14396->14395 14398 18000e148 _getptd RtlFreeHeap 14397->14398 14399 18000f60b 14398->14399 14400 180013ee4 _lock RtlFreeHeap 14399->14400 14402 18000f626 __initmbctable 14399->14402 14404 18000f639 14400->14404 14401 18000f6aa 14406 18000f6b8 14401->14406 14402->14401 14403 180010d04 _getptd RtlFreeHeap 14402->14403 14403->14401 14404->14402 14405 18000d830 _freebuf RtlFreeHeap 14404->14405 14405->14402 14414 18000d360 14406->14414 14410 18000f6b8 __initmbctable RtlFreeHeap 14409->14410 14413 18000f76f malloc 14410->14413 14411 18000f777 write_char __initmbctable 14411->14380 14413->14411 14578 18000f418 14413->14578 14415 18000d376 14414->14415 14419 18000d3da 14414->14419 14416 18000e148 _getptd RtlFreeHeap 14415->14416 14417 18000d37b 14416->14417 14420 18000d3b3 14417->14420 14422 18000fef4 14417->14422 14419->14377 14419->14390 14420->14419 14421 18000f5fc __initmbctable RtlFreeHeap 14420->14421 14421->14419 14423 18000e148 _getptd RtlFreeHeap 14422->14423 14424 18000feff 14423->14424 14425 18000ff28 14424->14425 14426 18000ff1a 14424->14426 14427 180013ee4 _lock RtlFreeHeap 14425->14427 14428 18000e148 _getptd RtlFreeHeap 14426->14428 14429 18000ff32 14427->14429 14431 18000ff1f __initmbctable 14428->14431 14434 18000fe9c 14429->14434 14432 18000ff60 14431->14432 14433 180010d04 _getptd RtlFreeHeap 14431->14433 14432->14420 14433->14432 14435 18000fee6 14434->14435 14436 18000feaa _errno __initmbctable 14434->14436 14435->14431 14436->14435 14438 18000fbe0 14436->14438 14439 18000fc77 14438->14439 14441 18000fbfe 14438->14441 14440 18000fcca 14439->14440 14442 18000d830 _freebuf RtlFreeHeap 14439->14442 14457 18000fcf7 14440->14457 14490 180015b50 14440->14490 14441->14439 14443 18000fc3d 14441->14443 14449 18000d830 _freebuf RtlFreeHeap 14441->14449 14444 18000fc9b 14442->14444 14447 18000fc5f 14443->14447 14456 18000d830 _freebuf RtlFreeHeap 14443->14456 14446 18000d830 _freebuf RtlFreeHeap 14444->14446 14450 18000fcaf 14446->14450 14452 18000d830 _freebuf RtlFreeHeap 14447->14452 14454 18000fc31 14449->14454 14455 18000d830 _freebuf RtlFreeHeap 14450->14455 14451 18000fd43 14458 18000fc6b 14452->14458 14453 18000d830 _freebuf RtlFreeHeap 14453->14457 14466 180015d84 14454->14466 14460 18000fcbe 14455->14460 14461 18000fc53 14456->14461 14457->14451 14462 18000d830 RtlFreeHeap _freebuf 14457->14462 14463 18000d830 _freebuf RtlFreeHeap 14458->14463 14464 18000d830 _freebuf RtlFreeHeap 14460->14464 14482 180015d3c 14461->14482 14462->14457 14463->14439 14464->14440 14467 180015d8d 14466->14467 14480 180015e13 14466->14480 14468 180015da7 14467->14468 14469 18000d830 _freebuf RtlFreeHeap 14467->14469 14470 180015db9 14468->14470 14471 18000d830 _freebuf RtlFreeHeap 14468->14471 14469->14468 14472 180015dcb 14470->14472 14473 18000d830 _freebuf RtlFreeHeap 14470->14473 14471->14470 14474 180015ddd 14472->14474 14475 18000d830 _freebuf RtlFreeHeap 14472->14475 14473->14472 14476 180015def 14474->14476 14477 18000d830 _freebuf RtlFreeHeap 14474->14477 14475->14474 14478 180015e01 14476->14478 14479 18000d830 _freebuf RtlFreeHeap 14476->14479 14477->14476 14478->14480 14481 18000d830 _freebuf RtlFreeHeap 14478->14481 14479->14478 14480->14443 14481->14480 14483 180015d41 14482->14483 14487 180015d7e 14482->14487 14484 180015d5a 14483->14484 14485 18000d830 _freebuf RtlFreeHeap 14483->14485 14486 180015d6c 14484->14486 14488 18000d830 _freebuf RtlFreeHeap 14484->14488 14485->14484 14486->14487 14489 18000d830 _freebuf RtlFreeHeap 14486->14489 14487->14447 14488->14486 14489->14487 14491 18000fceb 14490->14491 14492 180015b59 14490->14492 14491->14453 14493 18000d830 _freebuf RtlFreeHeap 14492->14493 14494 180015b6a 14493->14494 14495 18000d830 _freebuf RtlFreeHeap 14494->14495 14496 180015b73 14495->14496 14497 18000d830 _freebuf RtlFreeHeap 14496->14497 14498 180015b7c 14497->14498 14499 18000d830 _freebuf RtlFreeHeap 14498->14499 14500 180015b85 14499->14500 14501 18000d830 _freebuf RtlFreeHeap 14500->14501 14502 180015b8e 14501->14502 14503 18000d830 _freebuf RtlFreeHeap 14502->14503 14504 180015b97 14503->14504 14505 18000d830 _freebuf RtlFreeHeap 14504->14505 14506 180015b9f 14505->14506 14507 18000d830 _freebuf RtlFreeHeap 14506->14507 14508 180015ba8 14507->14508 14509 18000d830 _freebuf RtlFreeHeap 14508->14509 14510 180015bb1 14509->14510 14511 18000d830 _freebuf RtlFreeHeap 14510->14511 14512 180015bba 14511->14512 14513 18000d830 _freebuf RtlFreeHeap 14512->14513 14514 180015bc3 14513->14514 14515 18000d830 _freebuf RtlFreeHeap 14514->14515 14516 180015bcc 14515->14516 14517 18000d830 _freebuf RtlFreeHeap 14516->14517 14518 180015bd5 14517->14518 14519 18000d830 _freebuf RtlFreeHeap 14518->14519 14520 180015bde 14519->14520 14521 18000d830 _freebuf RtlFreeHeap 14520->14521 14522 180015be7 14521->14522 14523 18000d830 _freebuf RtlFreeHeap 14522->14523 14524 180015bf0 14523->14524 14525 18000d830 _freebuf RtlFreeHeap 14524->14525 14526 180015bfc 14525->14526 14527 18000d830 _freebuf RtlFreeHeap 14526->14527 14528 180015c08 14527->14528 14529 18000d830 _freebuf RtlFreeHeap 14528->14529 14530 180015c14 14529->14530 14531 18000d830 _freebuf RtlFreeHeap 14530->14531 14532 180015c20 14531->14532 14533 18000d830 _freebuf RtlFreeHeap 14532->14533 14534 180015c2c 14533->14534 14535 18000d830 _freebuf RtlFreeHeap 14534->14535 14536 180015c38 14535->14536 14537 18000d830 _freebuf RtlFreeHeap 14536->14537 14538 180015c44 14537->14538 14539 18000d830 _freebuf RtlFreeHeap 14538->14539 14540 180015c50 14539->14540 14541 18000d830 _freebuf RtlFreeHeap 14540->14541 14542 180015c5c 14541->14542 14543 18000d830 _freebuf RtlFreeHeap 14542->14543 14544 180015c68 14543->14544 14545 18000d830 _freebuf RtlFreeHeap 14544->14545 14546 180015c74 14545->14546 14547 18000d830 _freebuf RtlFreeHeap 14546->14547 14548 180015c80 14547->14548 14549 18000d830 _freebuf RtlFreeHeap 14548->14549 14550 180015c8c 14549->14550 14551 18000d830 _freebuf RtlFreeHeap 14550->14551 14552 180015c98 14551->14552 14553 18000d830 _freebuf RtlFreeHeap 14552->14553 14554 180015ca4 14553->14554 14555 18000d830 _freebuf RtlFreeHeap 14554->14555 14556 180015cb0 14555->14556 14557 18000d830 _freebuf RtlFreeHeap 14556->14557 14558 180015cbc 14557->14558 14559 18000d830 _freebuf RtlFreeHeap 14558->14559 14560 180015cc8 14559->14560 14561 18000d830 _freebuf RtlFreeHeap 14560->14561 14562 180015cd4 14561->14562 14563 18000d830 _freebuf RtlFreeHeap 14562->14563 14564 180015ce0 14563->14564 14565 18000d830 _freebuf RtlFreeHeap 14564->14565 14566 180015cec 14565->14566 14567 18000d830 _freebuf RtlFreeHeap 14566->14567 14568 180015cf8 14567->14568 14569 18000d830 _freebuf RtlFreeHeap 14568->14569 14570 180015d04 14569->14570 14571 18000d830 _freebuf RtlFreeHeap 14570->14571 14572 180015d10 14571->14572 14573 18000d830 _freebuf RtlFreeHeap 14572->14573 14574 180015d1c 14573->14574 14575 18000d830 _freebuf RtlFreeHeap 14574->14575 14576 180015d28 14575->14576 14577 18000d830 _freebuf RtlFreeHeap 14576->14577 14577->14491 14579 18000f44d malloc 14578->14579 14585 18000f546 write_char 14579->14585 14586 180015ac4 14579->14586 14584 1800157c0 __initmbctable RtlFreeHeap 14584->14585 14585->14411 14587 18000d360 __initmbctable RtlFreeHeap 14586->14587 14588 180015ae8 14587->14588 14596 180015858 14588->14596 14590 18000f4dd 14591 1800157c0 14590->14591 14592 18000d360 __initmbctable RtlFreeHeap 14591->14592 14593 1800157e4 14592->14593 14623 180015280 14593->14623 14595 18000f510 14595->14584 14598 1800158a8 14596->14598 14597 180015a14 14607 1800175ac 14597->14607 14598->14597 14605 1800158c2 malloc 14598->14605 14600 180015a3e 14601 180015a0d write_char 14600->14601 14602 180015a64 14600->14602 14611 180017600 14600->14611 14601->14590 14602->14601 14604 18000d830 _freebuf RtlFreeHeap 14602->14604 14604->14601 14605->14601 14606 18000d830 _freebuf RtlFreeHeap 14605->14606 14606->14601 14608 1800175da 14607->14608 14610 1800175de write_char 14608->14610 14619 18000d928 14608->14619 14610->14600 14612 18001772a write_char 14611->14612 14614 180017652 malloc 14611->14614 14612->14602 14613 180017790 14613->14612 14615 18000d830 _freebuf RtlFreeHeap 14613->14615 14614->14612 14614->14613 14616 180012d7c _errno RtlFreeHeap 14614->14616 14615->14612 14617 18001780a 14616->14617 14617->14613 14618 18000d830 _freebuf RtlFreeHeap 14617->14618 14618->14613 14620 1800115fc 14619->14620 14621 180011378 __initmbctable RtlFreeHeap 14620->14621 14622 180011627 14621->14622 14622->14610 14624 1800152d8 14623->14624 14625 1800175ac __initmbctable RtlFreeHeap 14624->14625 14626 180015600 write_char 14624->14626 14627 1800155f8 14625->14627 14626->14595 14627->14626 14628 180017600 __initmbctable RtlFreeHeap 14627->14628 14629 18001565f 14627->14629 14633 18001562f 14628->14633 14630 180015783 14629->14630 14631 18000d830 _freebuf RtlFreeHeap 14629->14631 14630->14626 14632 18000d830 _freebuf RtlFreeHeap 14630->14632 14631->14630 14632->14626 14633->14626 14633->14629 14634 18000d870 malloc RtlFreeHeap 14633->14634 14635 180015687 malloc 14633->14635 14634->14635 14635->14629 14636 180015711 14635->14636 14637 180017600 __initmbctable RtlFreeHeap 14635->14637 14636->14629 14638 18000d830 _freebuf RtlFreeHeap 14636->14638 14637->14636 14638->14629 14640 180016dbc 14639->14640 14641 18000d360 __initmbctable RtlFreeHeap 14640->14641 14642 180016de0 14641->14642 14642->14366 14644 18000e175 14643->14644 14645 18000e296 14643->14645 14646 18000e190 14644->14646 14647 18000d830 _freebuf RtlFreeHeap 14644->14647 14645->14358 14648 18000e19e 14646->14648 14649 18000d830 _freebuf RtlFreeHeap 14646->14649 14647->14646 14650 18000e1ac 14648->14650 14651 18000d830 _freebuf RtlFreeHeap 14648->14651 14649->14648 14652 18000e1ba 14650->14652 14653 18000d830 _freebuf RtlFreeHeap 14650->14653 14651->14650 14654 18000e1c8 14652->14654 14656 18000d830 _freebuf RtlFreeHeap 14652->14656 14653->14652 14655 18000e1d6 14654->14655 14657 18000d830 _freebuf RtlFreeHeap 14654->14657 14658 18000e1e7 14655->14658 14659 18000d830 _freebuf RtlFreeHeap 14655->14659 14656->14654 14657->14655 14660 18000e1ff 14658->14660 14661 18000d830 _freebuf RtlFreeHeap 14658->14661 14659->14658 14662 180013ee4 _lock RtlFreeHeap 14660->14662 14661->14660 14664 18000e209 14662->14664 14663 18000e237 __initmbctable 14665 180013ee4 _lock RtlFreeHeap 14663->14665 14664->14663 14666 18000d830 _freebuf RtlFreeHeap 14664->14666 14669 18000e24c __initmbctable 14665->14669 14666->14663 14667 18000e283 __initmbctable 14668 18000d830 _freebuf RtlFreeHeap 14667->14668 14668->14645 14669->14667 14670 18000fbe0 __initmbctable RtlFreeHeap 14669->14670 14670->14667 14671 180001000 14672 180002b70 14671->14672 14703 18000cf5c 14672->14703 14674 180002bcf malloc 14701 180002f30 14674->14701 14706 1800010e0 14674->14706 14675 1800039a0 RegQueryValueExA 14676 180002f41 14675->14676 14678 1800039a0 RegQueryValueExA 14676->14678 14679 180002f50 14676->14679 14678->14679 14681 180002f7b 14679->14681 14816 1800085d0 14679->14816 14682 1800072a0 RtlFreeHeap 14683 180002c7a malloc 14682->14683 14683->14682 14684 180002d5c __initmbctable 14683->14684 14710 1800019c0 14684->14710 14686 180002d85 malloc 14686->14701 14722 18000d2c4 14686->14722 14688 180002e0b 14731 180008390 14688->14731 14692 180002e2f malloc 14743 180004bc0 14692->14743 14696 180002ecc 14697 180002f21 14696->14697 14698 18000d2c4 RtlFreeHeap 14696->14698 14696->14701 14748 180001ed0 14697->14748 14700 180002f04 14698->14700 14702 180008390 4 API calls 14700->14702 14701->14675 14701->14679 14702->14697 14704 18000e148 _getptd RtlFreeHeap 14703->14704 14705 18000cf69 14704->14705 14705->14674 14824 18000ce70 14706->14824 14708 1800010fc GetNativeSystemInfo 14709 180001114 14708->14709 14709->14683 14712 1800019d4 14710->14712 14711 180001ae9 14711->14686 14712->14711 14713 180001a54 14712->14713 14714 180001a68 14712->14714 14715 180001a66 14712->14715 14826 180007160 14713->14826 14833 1800036e0 14714->14833 14715->14711 14718 180001ad7 14715->14718 14719 180001aeb 14715->14719 14721 180007160 RtlFreeHeap 14718->14721 14720 1800036e0 7 API calls 14719->14720 14720->14711 14721->14711 14723 18000d302 14722->14723 14724 18000d2dd 14722->14724 14723->14724 14726 18000d307 14723->14726 14725 18000e568 _errno RtlFreeHeap 14724->14725 14727 18000d2e2 _FF_MSGBANNER 14725->14727 14876 18000e89c 14726->14876 14727->14688 14729 18000d336 14729->14727 14896 18000e5f0 14729->14896 14732 180008399 14731->14732 14738 180002e25 14731->14738 14733 1800010e0 GetNativeSystemInfo 14732->14733 14734 1800083e4 malloc 14733->14734 14735 18000d2c4 RtlFreeHeap 14734->14735 14734->14738 14736 18000857b 14735->14736 15040 1800060d0 14736->15040 14739 1800039a0 14738->14739 14740 1800039fc 14739->14740 14742 180003a42 14740->14742 15054 1800011b0 14740->15054 14742->14692 15058 1800049d0 14743->15058 14745 180004bdf 15062 180004b10 14745->15062 14749 180001f09 malloc 14748->14749 14750 18000d2c4 RtlFreeHeap 14749->14750 14751 180001f24 14750->14751 14752 180008390 4 API calls 14751->14752 14753 180001f43 14752->14753 14754 1800010e0 GetNativeSystemInfo 14753->14754 14756 180001fdd malloc 14754->14756 14755 18000201d 14755->14701 14756->14755 15092 1800065e0 14756->15092 14758 180002069 14759 180002074 14758->14759 14762 1800020b8 14758->14762 14760 18000d2c4 RtlFreeHeap 14759->14760 14761 180002092 14760->14761 14764 180008390 4 API calls 14761->14764 14763 180002ade 14762->14763 14772 1800020e5 14762->14772 14765 18000d2c4 RtlFreeHeap 14763->14765 14811 1800020b3 14764->14811 14766 180002af9 14765->14766 14767 180008390 4 API calls 14766->14767 14767->14811 14768 180002b57 14768->14701 14769 180002b4e GlobalFree 14769->14768 14770 180002a92 14771 18000d2c4 RtlFreeHeap 14770->14771 14773 180002aad 14771->14773 14772->14770 14775 18000215c malloc 14772->14775 14774 180008390 4 API calls 14773->14774 14774->14811 14778 180002231 malloc 14775->14778 14775->14811 15122 180004930 14775->15122 14777 1800022d4 14779 1800022ea 14777->14779 14784 180002345 __initmbctable 14777->14784 14778->14777 15128 180006490 14778->15128 14781 18000d2c4 RtlFreeHeap 14779->14781 14782 18000231f 14781->14782 14783 180008390 4 API calls 14782->14783 14783->14811 14785 1800023b0 GlobalAlloc 14784->14785 14786 1800023dc malloc 14785->14786 14785->14811 14787 180002439 malloc 14786->14787 14789 180004930 8 API calls 14786->14789 14788 1800024db 14787->14788 14792 180006490 7 API calls 14787->14792 14790 1800024f0 14788->14790 14791 18000254b 14788->14791 14789->14787 14793 18000d2c4 RtlFreeHeap 14790->14793 14795 18000d2c4 RtlFreeHeap 14791->14795 14792->14788 14794 180002525 14793->14794 14796 180008390 4 API calls 14794->14796 14797 180002577 14795->14797 14796->14811 14798 180008390 4 API calls 14797->14798 14799 180002598 14798->14799 15096 180004e90 14799->15096 14801 18000269e 14802 180008390 4 API calls 14801->14802 14814 1800026e6 malloc __initmbctable 14802->14814 14803 1800025ce __initmbctable 14803->14801 14804 180004e90 3 API calls 14803->14804 14805 18000265b 14804->14805 14806 180004e90 3 API calls 14805->14806 14806->14801 14807 180002924 GlobalAlloc 14808 180002a31 14807->14808 14807->14814 14809 180008390 4 API calls 14808->14809 14809->14811 14811->14768 14811->14769 14813 18000d2c4 RtlFreeHeap 14813->14814 14814->14807 14814->14808 14814->14813 14815 180008390 4 API calls 14814->14815 15104 180006ff0 14814->15104 15116 180005940 14814->15116 14815->14814 14817 1800085d9 14816->14817 14819 1800087c5 14816->14819 14818 1800010e0 GetNativeSystemInfo 14817->14818 14817->14819 14820 18000862b malloc 14818->14820 14819->14681 14820->14819 14821 18000d2c4 RtlFreeHeap 14820->14821 14822 1800087b6 14821->14822 14823 1800060d0 2 API calls 14822->14823 14823->14819 14825 18000ce79 14824->14825 14825->14708 14825->14825 14827 180007189 14826->14827 14828 1800071f2 14827->14828 14829 1800071b6 14827->14829 14831 18000d9d8 swscanf RtlFreeHeap 14828->14831 14842 18000d9d8 14829->14842 14832 1800071e3 14831->14832 14832->14715 14849 1800033f0 14833->14849 14835 18000375b 14836 180003880 14835->14836 14837 1800033f0 6 API calls 14835->14837 14836->14715 14838 1800037d7 14837->14838 14838->14836 14839 1800033f0 6 API calls 14838->14839 14840 18000384c 14839->14840 14840->14836 14856 180003620 14840->14856 14845 18000d934 14842->14845 14844 18000da08 14844->14832 14846 18000d95c 14845->14846 14847 18000e568 _errno RtlFreeHeap 14846->14847 14848 18000d966 _FF_MSGBANNER 14846->14848 14847->14848 14848->14844 14850 180003435 malloc 14849->14850 14851 180003498 socket 14850->14851 14852 18000343d 14850->14852 14851->14852 14853 1800034c3 setsockopt sendto 14851->14853 14852->14835 14853->14852 14855 180003544 SleepEx setsockopt recvfrom 14853->14855 14855->14852 14857 18000364c 14856->14857 14859 180003650 14857->14859 14860 18000d40c 14857->14860 14859->14836 14861 18000d430 14860->14861 14864 18000d41e 14860->14864 14862 18000d360 __initmbctable RtlFreeHeap 14861->14862 14863 18000d43c 14862->14863 14863->14864 14866 18000ff6c 14863->14866 14864->14859 14867 18000d360 __initmbctable RtlFreeHeap 14866->14867 14868 18000ff8d 14867->14868 14872 18000ff9a 14868->14872 14873 180014f48 14868->14873 14871 180015ac4 __initmbctable RtlFreeHeap 14871->14872 14872->14864 14874 18000d360 __initmbctable RtlFreeHeap 14873->14874 14875 18000ffc2 14874->14875 14875->14871 14877 18000d360 __initmbctable RtlFreeHeap 14876->14877 14878 18000e8fc 14877->14878 14879 18000e904 14878->14879 14880 18000e945 14878->14880 14881 18000e568 _errno RtlFreeHeap 14879->14881 14887 18000e962 malloc 14880->14887 14917 180014e8c 14880->14917 14890 18000e909 write_char _FF_MSGBANNER 14881->14890 14883 18000e9d0 14884 18000e568 _errno RtlFreeHeap 14883->14884 14884->14890 14885 180014f48 __initmbctable RtlFreeHeap 14885->14887 14886 18000f30c 14889 18000e568 _errno RtlFreeHeap 14886->14889 14887->14883 14887->14885 14887->14886 14888 18000e780 RtlFreeHeap write_multi_char 14887->14888 14887->14890 14891 18000d830 _freebuf RtlFreeHeap 14887->14891 14892 180012d10 _getbuf RtlFreeHeap 14887->14892 14893 18000e81c RtlFreeHeap 14887->14893 14894 180015238 RtlFreeHeap write_char 14887->14894 14895 18000e7c8 RtlFreeHeap write_multi_char 14887->14895 14888->14887 14889->14890 14890->14729 14891->14887 14892->14887 14893->14887 14894->14887 14895->14887 14897 180014e8c _flush RtlFreeHeap 14896->14897 14898 18000e612 14897->14898 14899 18000e634 14898->14899 14900 18000e61d 14898->14900 14902 18000e639 14899->14902 14906 18000e646 write_multi_char 14899->14906 14901 18000e568 _errno RtlFreeHeap 14900->14901 14905 18000e622 14901->14905 14903 18000e568 _errno RtlFreeHeap 14902->14903 14903->14905 14904 18000e6ab 14907 18000e745 14904->14907 14908 18000e6b8 14904->14908 14905->14727 14906->14904 14906->14905 14914 18000e69f 14906->14914 14921 180014bf8 14906->14921 14909 180014a70 _flush RtlFreeHeap 14907->14909 14910 18000e6d4 14908->14910 14912 18000e6ed 14908->14912 14909->14905 14930 180014a70 14910->14930 14912->14905 14955 1800141d8 14912->14955 14914->14904 14927 180014ba4 14914->14927 14918 180014e95 14917->14918 14920 180014e9a _FF_MSGBANNER 14917->14920 14919 18000e568 _errno RtlFreeHeap 14918->14919 14919->14920 14920->14887 14922 180014c01 14921->14922 14923 180014c0e 14921->14923 14924 18000e568 _errno RtlFreeHeap 14922->14924 14925 18000e568 _errno RtlFreeHeap 14923->14925 14926 180014c06 _FF_MSGBANNER 14923->14926 14924->14926 14925->14926 14926->14914 14928 180012d10 _getbuf RtlFreeHeap 14927->14928 14929 180014bbd 14928->14929 14929->14904 14931 180014ab5 14930->14931 14932 180014a99 14930->14932 14934 180014b60 14931->14934 14937 180014acb 14931->14937 14980 18000e588 14932->14980 14935 18000e588 __doserrno RtlFreeHeap 14934->14935 14938 180014b65 14935->14938 14940 180014af1 14937->14940 14941 180014b1c 14937->14941 14942 18000e568 _errno RtlFreeHeap 14938->14942 14939 18000e568 _errno RtlFreeHeap 14952 180014aa7 _flush _FF_MSGBANNER 14939->14952 14944 18000e588 __doserrno RtlFreeHeap 14940->14944 14983 180016ff4 14941->14983 14942->14952 14946 180014af6 14944->14946 14945 180014b23 14948 180014b40 14945->14948 14949 180014b2f 14945->14949 14947 18000e568 _errno RtlFreeHeap 14946->14947 14947->14952 14951 18000e568 _errno RtlFreeHeap 14948->14951 14987 180014310 14949->14987 14953 180014b45 14951->14953 14952->14905 14954 18000e588 __doserrno RtlFreeHeap 14953->14954 14954->14952 14956 180014201 14955->14956 14957 18001421e 14955->14957 14958 18000e588 __doserrno RtlFreeHeap 14956->14958 14959 1800142cd 14957->14959 14961 180014234 14957->14961 14960 180014206 14958->14960 14962 18000e588 __doserrno RtlFreeHeap 14959->14962 14963 18000e568 _errno RtlFreeHeap 14960->14963 14964 180014286 14961->14964 14965 18001425a 14961->14965 14966 1800142d2 14962->14966 14977 18001420f _flush _FF_MSGBANNER 14963->14977 14967 180016ff4 _flush RtlFreeHeap 14964->14967 14969 18000e588 __doserrno RtlFreeHeap 14965->14969 14968 18000e568 _errno RtlFreeHeap 14966->14968 14970 18001428d 14967->14970 14968->14977 14971 18001425f 14969->14971 14972 180014299 14970->14972 14973 1800142ab 14970->14973 14974 18000e568 _errno RtlFreeHeap 14971->14974 14975 180014140 _flush RtlFreeHeap 14972->14975 14976 18000e568 _errno RtlFreeHeap 14973->14976 14974->14977 14975->14977 14978 1800142b0 14976->14978 14977->14905 14979 18000e588 __doserrno RtlFreeHeap 14978->14979 14979->14977 14981 18000e0c4 _errno RtlFreeHeap 14980->14981 14982 18000e591 14981->14982 14982->14939 14984 180017036 14983->14984 14985 18001703e _lock __initmbctable 14983->14985 14986 180013ee4 _lock RtlFreeHeap 14984->14986 14985->14945 14986->14985 14989 18001432a 14987->14989 14988 180014361 14990 18000e588 __doserrno RtlFreeHeap 14988->14990 14989->14988 14991 1800143d1 14989->14991 14997 180014355 write_char _FF_MSGBANNER 14989->14997 14992 180014366 14990->14992 14993 1800143e6 14991->14993 15014 180014140 14991->15014 14994 18000e568 _errno RtlFreeHeap 14992->14994 14996 180014bf8 write_multi_char RtlFreeHeap 14993->14996 14994->14997 14998 1800143ed 14996->14998 14997->14952 14999 18000e148 _getptd RtlFreeHeap 14998->14999 15006 180014672 14998->15006 15013 180014411 _flush 14999->15013 15000 180014a09 15000->14997 15001 18000e568 _errno RtlFreeHeap 15000->15001 15002 180014a2c 15001->15002 15004 18000e588 __doserrno RtlFreeHeap 15002->15004 15003 1800149c7 15025 18000e5a8 15003->15025 15004->14997 15006->14997 15006->15000 15006->15003 15007 18001468f 15006->15007 15007->15003 15008 180014698 15007->15008 15009 18000e568 _errno RtlFreeHeap 15008->15009 15011 18001469d 15009->15011 15012 18000e588 __doserrno RtlFreeHeap 15011->15012 15012->14997 15013->15006 15022 180014f90 15013->15022 15030 180016f70 15014->15030 15016 18001415c 15017 180014162 15016->15017 15020 180014173 15016->15020 15018 18000e568 _errno RtlFreeHeap 15017->15018 15019 180014167 15018->15019 15019->14993 15020->15019 15021 18000e5a8 _close_nolock RtlFreeHeap 15020->15021 15021->15019 15023 18000d360 __initmbctable RtlFreeHeap 15022->15023 15024 180014fa4 15023->15024 15024->15013 15026 18000e0c4 _errno RtlFreeHeap 15025->15026 15027 18000e5b5 15026->15027 15028 18000e0c4 _errno RtlFreeHeap 15027->15028 15029 18000e5ce realloc 15028->15029 15029->14997 15031 180016f79 15030->15031 15032 180016f8e 15030->15032 15033 18000e588 __doserrno RtlFreeHeap 15031->15033 15034 18000e588 __doserrno RtlFreeHeap 15032->15034 15039 180016f86 _FF_MSGBANNER 15032->15039 15035 180016f7e 15033->15035 15036 180016fc8 15034->15036 15037 18000e568 _errno RtlFreeHeap 15035->15037 15038 18000e568 _errno RtlFreeHeap 15036->15038 15037->15039 15038->15039 15039->15016 15041 1800060ec malloc 15040->15041 15042 1800060fd 15040->15042 15041->15042 15044 180005d00 15041->15044 15042->14738 15045 180005d29 15044->15045 15046 180005d3a socket 15045->15046 15049 180005d2f 15045->15049 15047 180005d75 15046->15047 15046->15049 15050 180005b90 15047->15050 15049->15042 15051 180005bbd 15050->15051 15053 180005bf8 15050->15053 15052 180005bc2 sendto 15051->15052 15051->15053 15052->15051 15052->15053 15053->15049 15055 1800011d8 15054->15055 15057 180001241 15054->15057 15056 180001216 RegQueryValueExA 15055->15056 15055->15057 15056->15057 15057->14742 15059 180004a2e 15058->15059 15060 18000d2c4 RtlFreeHeap 15059->15060 15061 180004a6b 15060->15061 15061->14745 15065 180004ae0 15062->15065 15068 18000d824 15065->15068 15067 180002e72 CreateMutexExW 15067->14696 15069 18000d778 15068->15069 15070 18000d783 15069->15070 15072 18000d7ad 15069->15072 15071 18000e568 _errno RtlFreeHeap 15070->15071 15076 18000d788 _FF_MSGBANNER 15071->15076 15079 180010188 15072->15079 15074 18000d7d1 15075 18000e5f0 write_multi_char RtlFreeHeap 15074->15075 15077 18000d7da 15074->15077 15075->15077 15076->15067 15077->15076 15078 18000e5f0 write_multi_char RtlFreeHeap 15077->15078 15078->15076 15080 18000d360 __initmbctable RtlFreeHeap 15079->15080 15090 1800101eb malloc 15080->15090 15081 1800101f3 15082 18000e568 _errno RtlFreeHeap 15081->15082 15083 1800101f8 write_char _FF_MSGBANNER 15082->15083 15083->15074 15084 180016160 RtlFreeHeap 15084->15090 15085 180012d10 _getbuf RtlFreeHeap 15085->15090 15086 18000d830 _freebuf RtlFreeHeap 15086->15090 15087 1800100b0 RtlFreeHeap write_multi_char 15087->15090 15088 180010104 RtlFreeHeap 15088->15090 15089 180014f48 __initmbctable RtlFreeHeap 15089->15090 15090->15081 15090->15083 15090->15084 15090->15085 15090->15086 15090->15087 15090->15088 15090->15089 15091 180010078 RtlFreeHeap write_char 15090->15091 15091->15090 15093 180006600 malloc 15092->15093 15095 180006728 __initmbctable 15093->15095 15132 180005e00 15093->15132 15095->14758 15098 180004ebb 15096->15098 15097 180004f13 CreateThread 15102 180004f54 15097->15102 15098->15097 15099 180004fc8 15101 180005038 ResumeThread 15099->15101 15103 180004fae 15099->15103 15101->15103 15102->15099 15102->15103 15149 180004df0 15102->15149 15103->14803 15105 1800070d0 15104->15105 15106 18000701c malloc 15104->15106 15105->14814 15106->15105 15153 18000cd00 15106->15153 15108 180007066 15115 18000706e 15108->15115 15163 18000af30 15108->15163 15111 180007086 15112 1800070d4 15111->15112 15113 18000af30 RtlFreeHeap 15111->15113 15111->15115 15112->15115 15175 18000cd70 15112->15175 15113->15111 15115->15105 15169 18000cd90 15115->15169 15117 18000596a 15116->15117 15118 180005972 15116->15118 15117->14814 15118->15117 15296 180005090 15118->15296 15120 1800059e5 15120->15117 15302 180005920 15120->15302 15123 18000495f 15122->15123 15346 180004460 15123->15346 15125 180004978 15126 18000497c 15125->15126 15353 180004750 15125->15353 15126->14778 15129 1800064e0 15128->15129 15131 18000658f 15129->15131 15357 180006280 15129->15357 15131->14777 15133 180005e2f 15132->15133 15134 180005e33 15133->15134 15135 180005e48 socket 15133->15135 15134->15095 15136 180005e84 connect 15135->15136 15137 180005e77 15135->15137 15136->15137 15139 180005ec4 15136->15139 15137->15095 15145 180005c20 15139->15145 15141 180005edc malloc 15141->15137 15142 180005f77 recv 15141->15142 15142->15137 15143 180005f9b 15142->15143 15143->15137 15144 180006045 recv 15143->15144 15144->15137 15144->15143 15146 180005c55 15145->15146 15148 180005c89 15145->15148 15147 180005c60 send 15146->15147 15146->15148 15147->15146 15147->15148 15148->15141 15150 180004e21 malloc 15149->15150 15151 180004e4d SetThreadContext 15150->15151 15152 180004e3b 15150->15152 15151->15152 15152->15099 15154 18000cc30 15153->15154 15178 18000dc90 15154->15178 15157 18000cc69 15191 18000ca90 15157->15191 15160 18000cc81 15161 18000dc90 RtlFreeHeap 15160->15161 15162 18000cc8b 15160->15162 15161->15162 15162->15108 15164 18000af49 15163->15164 15165 18000af5d 15163->15165 15164->15111 15166 18000af62 15165->15166 15242 18000a900 15165->15242 15166->15111 15168 18000af7f 15168->15111 15170 18000cdb3 15169->15170 15171 18000cd9e 15169->15171 15172 18000cdb8 15170->15172 15255 18000cbf0 15170->15255 15171->15105 15172->15105 15174 18000cdde 15174->15105 15268 18000cd10 15175->15268 15177 18000cd81 15177->15115 15181 18000dc9b malloc 15178->15181 15179 18000d870 malloc RtlFreeHeap 15179->15181 15180 18000cc59 15180->15157 15187 18000a880 15180->15187 15181->15179 15181->15180 15184 18000dcba 15181->15184 15182 18000dd01 15202 1800129f4 15182->15202 15184->15182 15199 180012c64 15184->15199 15185 18000dd12 15188 18000a8b9 15187->15188 15189 18000a8cf 15187->15189 15190 18000dc90 RtlFreeHeap 15188->15190 15189->15157 15190->15189 15192 18000caa8 15191->15192 15193 18000caf0 15191->15193 15192->15193 15223 180009bf0 15192->15223 15193->15160 15195 18000cac1 15196 18000cac6 15195->15196 15228 18000c3d0 15195->15228 15196->15160 15198 18000cad8 15198->15160 15208 180012b5c 15199->15208 15203 180012a1d 15202->15203 15207 180012a50 15202->15207 15204 18000d870 malloc RtlFreeHeap 15203->15204 15203->15207 15205 180012a37 15204->15205 15206 180013f30 malloc RtlFreeHeap 15205->15206 15205->15207 15206->15207 15207->15185 15217 180010d88 15208->15217 15218 180013ee4 15217->15218 15219 180013f13 15218->15219 15220 180013dfc _lock RtlFreeHeap 15218->15220 15221 180013f07 15220->15221 15221->15219 15222 180010d04 _getptd RtlFreeHeap 15221->15222 15222->15219 15224 180009c26 15223->15224 15225 180009c0d 15223->15225 15226 18000dc90 RtlFreeHeap 15224->15226 15225->15195 15227 180009c38 15226->15227 15227->15195 15229 18000c3e1 15228->15229 15230 18000c3ec 15228->15230 15229->15198 15235 180009ef0 15230->15235 15232 18000c409 15233 18000d870 malloc RtlFreeHeap 15232->15233 15234 18000c53c __initmbctable 15232->15234 15233->15234 15234->15198 15237 180009f06 15235->15237 15236 180009f0a 15236->15232 15237->15236 15238 18000d870 malloc RtlFreeHeap 15237->15238 15241 180009f43 15238->15241 15239 180009f4b 15239->15232 15240 18000d830 _freebuf RtlFreeHeap 15240->15239 15241->15239 15241->15240 15243 18000a91e 15242->15243 15247 18000a94d __initmbctable 15242->15247 15245 18000a935 15243->15245 15243->15247 15248 18000a720 15243->15248 15246 18000dc90 RtlFreeHeap 15245->15246 15245->15247 15246->15247 15247->15168 15249 18000a73b 15248->15249 15251 18000a74e 15248->15251 15249->15245 15250 18000a75f 15250->15245 15251->15250 15252 18000a787 15251->15252 15253 18000d830 _freebuf RtlFreeHeap 15251->15253 15254 18000d830 _freebuf RtlFreeHeap 15252->15254 15253->15252 15254->15250 15256 18000cc07 15255->15256 15257 18000cbff 15255->15257 15259 18000cc1b 15256->15259 15261 18000c590 15256->15261 15258 18000a720 RtlFreeHeap 15257->15258 15258->15256 15259->15174 15262 18000c5a7 15261->15262 15263 18000c59e 15261->15263 15264 18000c5b6 15262->15264 15265 18000a720 RtlFreeHeap 15262->15265 15263->15259 15266 18000d830 _freebuf RtlFreeHeap 15264->15266 15265->15264 15267 18000c5c6 15266->15267 15267->15259 15269 18000cd19 15268->15269 15270 18000cd2d 15268->15270 15269->15177 15271 18000cd32 15270->15271 15274 18000cb00 15270->15274 15271->15177 15275 18000cb30 15274->15275 15278 18000cb26 15274->15278 15276 18000a720 RtlFreeHeap 15275->15276 15277 18000cb85 15275->15277 15280 18000cb44 15275->15280 15276->15280 15277->15278 15279 18000a720 RtlFreeHeap 15277->15279 15278->15177 15279->15278 15280->15278 15282 18000c5d0 15280->15282 15283 18000c5e2 15282->15283 15284 18000c5ee 15282->15284 15283->15277 15284->15283 15285 18000a720 RtlFreeHeap 15284->15285 15286 18000c603 15284->15286 15285->15286 15287 18000c61e 15286->15287 15288 18000d870 malloc RtlFreeHeap 15286->15288 15287->15277 15290 18000c639 15288->15290 15289 18000c641 15289->15277 15290->15289 15291 18000d870 malloc RtlFreeHeap 15290->15291 15292 18000c65f 15291->15292 15293 18000d830 _freebuf RtlFreeHeap 15292->15293 15295 18000c696 15292->15295 15294 18000c682 15293->15294 15294->15277 15295->15277 15297 1800050c7 15296->15297 15301 1800050bf malloc __initmbctable 15296->15301 15298 18000513d VirtualAllocEx 15297->15298 15297->15301 15299 180005167 VirtualAllocEx 15298->15299 15298->15301 15299->15301 15301->15120 15303 180005937 15302->15303 15304 180005929 15302->15304 15303->15117 15304->15303 15306 180007d90 15304->15306 15308 180007db8 15306->15308 15307 180007bc0 VirtualProtectEx VirtualProtectEx 15307->15308 15308->15307 15311 180007e30 15308->15311 15309 180007eaa 15310 180007f1f 15309->15310 15320 180007bc0 VirtualProtectEx VirtualProtectEx 15309->15320 15312 180007f65 15310->15312 15329 180007bc0 15310->15329 15311->15309 15318 180007bc0 VirtualProtectEx VirtualProtectEx 15311->15318 15325 180007c50 15312->15325 15316 180007f41 15316->15312 15319 180007bc0 2 API calls 15316->15319 15317 180007f7f VirtualProtectEx 15323 18000ce70 malloc 15317->15323 15318->15311 15319->15316 15320->15309 15321 180007bc0 2 API calls 15321->15317 15324 180007fbf VirtualProtectEx 15323->15324 15324->15303 15326 180007c74 15325->15326 15328 180007d60 15326->15328 15335 180007540 15326->15335 15328->15317 15328->15321 15330 180007bd2 15329->15330 15331 180007c3e 15330->15331 15332 180007be5 VirtualProtectEx 15330->15332 15331->15316 15333 18000ce70 malloc 15332->15333 15334 180007c1c VirtualProtectEx 15333->15334 15334->15331 15339 180007562 15335->15339 15336 180007597 15336->15328 15337 1800075a9 15337->15328 15339->15336 15339->15337 15340 18000d614 15339->15340 15341 18000d626 15340->15341 15342 18000d638 15340->15342 15341->15339 15343 18000d360 __initmbctable RtlFreeHeap 15342->15343 15344 18000d644 15343->15344 15344->15341 15345 18000ff6c __initmbctable RtlFreeHeap 15344->15345 15345->15341 15347 180004486 malloc __initmbctable 15346->15347 15348 180004521 socket 15347->15348 15352 180004516 malloc 15347->15352 15349 180004548 setsockopt 15348->15349 15348->15352 15350 180004586 sendto 15349->15350 15349->15352 15350->15352 15352->15125 15354 180004789 malloc __initmbctable 15353->15354 15355 180005e00 5 API calls 15354->15355 15356 1800047c4 malloc __initmbctable 15354->15356 15355->15356 15356->15126 15358 1800062b8 15357->15358 15360 1800062ae 15357->15360 15359 1800062cd GlobalAlloc 15358->15359 15358->15360 15362 1800062f2 malloc 15359->15362 15364 1800062ea __initmbctable 15359->15364 15360->15129 15361 180006460 GlobalFree 15361->15360 15363 180005e00 5 API calls 15362->15363 15363->15364 15364->15360 15364->15361 15365 180007d90 15367 180007db8 15365->15367 15366 180007bc0 VirtualProtectEx VirtualProtectEx 15366->15367 15367->15366 15370 180007e30 15367->15370 15368 180007eaa 15369 180007f1f 15368->15369 15379 180007bc0 VirtualProtectEx VirtualProtectEx 15368->15379 15371 180007f65 15369->15371 15373 180007bc0 2 API calls 15369->15373 15370->15368 15377 180007bc0 VirtualProtectEx VirtualProtectEx 15370->15377 15372 180007c50 RtlFreeHeap 15371->15372 15374 180007f72 15372->15374 15375 180007f41 15373->15375 15376 180007f7f VirtualProtectEx 15374->15376 15380 180007bc0 2 API calls 15374->15380 15375->15371 15378 180007bc0 2 API calls 15375->15378 15382 18000ce70 malloc 15376->15382 15377->15370 15378->15375 15379->15368 15380->15376 15383 180007fbf VirtualProtectEx 15382->15383 15384 1800017b0 15385 1800017ef malloc 15384->15385 15386 18000180b LoadLibraryA 15385->15386 15387 18000181c malloc 15385->15387 15386->15387 15388 180001bb0 15389 180001e46 15388->15389 15390 180001bcc malloc 15388->15390 15391 180001be7 GetWindowTextA 15390->15391 15392 180001c12 malloc 15391->15392 15392->15389 15393 18000d2c4 RtlFreeHeap 15392->15393 15394 180001d08 malloc 15393->15394 15395 180001de4 15394->15395 15398 18000d2c4 RtlFreeHeap 15394->15398 15399 180008180 15395->15399 15398->15395 15400 180001e21 15399->15400 15401 180008189 malloc 15399->15401 15401->15400 15402 18000d2c4 RtlFreeHeap 15401->15402 15403 18000832e 15402->15403 15404 1800060d0 2 API calls 15403->15404 15404->15400 15405 180003b40 15406 180003b6a 15405->15406 15407 180003baa socket 15406->15407 15413 180003b72 15406->15413 15408 180003be3 setsockopt 15407->15408 15407->15413 15410 180003c31 15408->15410 15411 180003c37 setsockopt bind 15408->15411 15410->15411 15412 180003c8c setsockopt 15411->15412 15411->15413 15412->15413 15415 180003ccc malloc 15412->15415 15414 180003ce0 recvfrom 15414->15415 15415->15413 15415->15414 15416 1800041e0 GlobalAlloc 15417 18000423c 15416->15417 15418 18000424f 15416->15418 15419 18000427d socket 15418->15419 15425 180004270 15418->15425 15420 1800042b9 setsockopt 15419->15420 15419->15425 15422 180004304 bind 15420->15422 15423 1800042fe 15420->15423 15424 18000432a listen 15422->15424 15422->15425 15423->15422 15424->15425

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 0 180001ed0-18000201b call 18000ce70 call 18000d2c4 call 180008390 call 180001130 call 1800010e0 call 180001b50 14 18000201d-18000202d 0->14 15 18000202e-180002072 call 18000ce70 call 1800065e0 0->15 20 180002074-1800020b3 call 18000d2c4 call 180008390 15->20 21 1800020b8-1800020d5 call 180001b50 15->21 34 180002b30-180002b4c 20->34 26 1800020db-1800020df 21->26 27 180002ade-180002b21 call 18000d2c4 call 180008390 21->27 26->27 29 1800020e5-1800020fd call 180001b50 26->29 43 180002b28-180002b29 27->43 37 180002137-180002138 29->37 38 1800020ff-18000210a 29->38 44 180002b57-180002b6b 34->44 45 180002b4e-180002b51 GlobalFree 34->45 42 18000213e-180002141 37->42 38->37 41 18000210c-180002135 38->41 41->37 41->42 46 180002a92-180002adc call 18000d2c4 call 180008390 42->46 47 180002147-18000214c 42->47 43->34 45->44 46->43 47->46 49 180002152-180002156 47->49 49->46 51 18000215c-1800021a2 call 180001b50 49->51 58 180002a82-180002a8d 51->58 59 1800021a8-1800021ab 51->59 58->43 59->58 60 1800021b1-1800021d4 call 18000ce70 59->60 63 1800021d6-180002244 call 18000ce70 call 180004930 60->63 64 18000224b-180002266 call 180001b50 60->64 63->64 70 1800022f7-1800022f8 64->70 71 18000226c-1800022e8 call 18000ce70 call 180006490 64->71 72 1800022ff-180002302 70->72 71->72 84 1800022ea-1800022f5 71->84 76 180002304-180002340 call 18000d2c4 call 180008390 72->76 77 180002345-1800023ca call 180001b50 call 18000cf90 call 1800014c0 call 1800069b0 call 180001b50 GlobalAlloc 72->77 76->43 95 1800023dc-1800023e2 77->95 96 1800023cc-1800023d7 77->96 84->76 97 180002451-18000246b call 180001b50 95->97 98 1800023e4-18000244a call 18000ce70 call 180004930 95->98 96->43 103 180002471-1800024ee call 18000ce70 call 180006490 97->103 104 1800024fd-1800024fe 97->104 98->97 107 180002505-180002508 103->107 119 1800024f0-1800024fb 103->119 104->107 110 18000250a-180002546 call 18000d2c4 call 180008390 107->110 111 18000254b-1800025d1 call 180001b50 call 18000d2c4 call 180008390 call 180001b50 call 180004e90 107->111 110->43 129 1800025d3-1800025d9 111->129 130 1800025db-1800025dc 111->130 119->110 132 1800025e4-1800025fb call 180001b50 129->132 130->132 135 180002601-18000265e call 18000cf90 * 2 call 180004e90 132->135 136 1800026b4-180002883 call 180001b50 call 180008390 call 180001b70 call 180006830 call 18000cf90 call 180006830 132->136 149 180002668-180002669 135->149 150 180002660-180002666 135->150 163 180002885-180002919 call 18000d2c4 call 180006af0 136->163 154 180002671-1800026a1 call 180004e90 149->154 150->154 161 1800026a3-1800026a9 154->161 162 1800026ab-1800026ac 154->162 161->136 162->136 169 180002a28-180002a2b 163->169 170 18000291f-180002922 163->170 169->163 173 180002a31-180002a7d call 180008390 call 180001b50 * 2 169->173 171 180002924-180002938 GlobalAlloc 170->171 172 18000293e-18000299d call 18000ce70 call 180006ff0 170->172 171->172 171->173 172->169 182 1800029a3-1800029aa 172->182 173->43 184 1800029b9-1800029de call 180005940 182->184 185 1800029ac-1800029b7 182->185 189 1800029e3-180002a23 call 18000d2c4 call 180008390 184->189 185->169 189->169
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: FreeGlobalInfoNativeSystem_errno
                                                                        • String ID: $MD1$?$gfff
                                                                        • API String ID: 2278041733-2078118166
                                                                        • Opcode ID: 5f2c421c6a07a3e3d2963dd4ef7b1b1f3b5fb676400d10221e93a7127a9de650
                                                                        • Instruction ID: ecc6feac4f5bf1ea090c30f3f77c46783113d54330767a366e4feff81798c637
                                                                        • Opcode Fuzzy Hash: 5f2c421c6a07a3e3d2963dd4ef7b1b1f3b5fb676400d10221e93a7127a9de650
                                                                        • Instruction Fuzzy Hash: 12722F71518B488FD7A5EF24D4957EAB7E1FB98341F00892EE49EC3291DF30A649CB42

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 193 180003b40-180003b70 195 180003b72-180003b7e 193->195 196 180003b7f-180003b9b 193->196 198 180003baa-180003bd4 socket 196->198 199 180003b9d-180003ba5 196->199 200 180003be3-180003c2f setsockopt 198->200 201 180003bd6-180003bde 198->201 203 180003e89-180003ea5 199->203 207 180003c31 200->207 208 180003c37-180003c7d setsockopt bind 200->208 206 180003e64-180003e70 201->206 211 180003e72-180003e73 206->211 212 180003e7b-180003e82 206->212 207->208 209 180003c8c-180003cc6 setsockopt 208->209 210 180003c7f-180003c87 208->210 214 180003e5c-180003e5d 209->214 215 180003ccc 209->215 210->214 211->212 212->203 214->206 217 180003cd0-180003d33 call 18000ce70 recvfrom 215->217 221 180003d35-180003d42 217->221 222 180003d47-180003d4a 217->222 225 180003e4f-180003e56 221->225 223 180003e48-180003e49 222->223 224 180003d50-180003d61 call 180006220 222->224 223->225 224->223 229 180003d67-180003d6e 224->229 225->214 225->217 230 180003d80-180003d87 229->230 231 180003d70-180003d75 229->231 230->223 233 180003d8d-180003d93 230->233 231->230 232 180003d77-180003d7b call 180005b60 231->232 232->230 233->223 235 180003d99-180003da0 233->235 235->223 236 180003da6-180003dc5 call 18000d6b0 235->236 239 180003dc7-180003dd0 236->239 240 180003ddd-180003df5 call 18000d6b0 236->240 239->225 241 180003dd2-180003dd9 239->241 240->225 246 180003df7-180003e00 240->246 241->225 243 180003ddb 241->243 245 180003e0b-180003e46 243->245 245->225 246->225 247 180003e02-180003e09 246->247 247->225 247->245
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 32558bb850f3c2cf0c2c254cb496f08563158198c610a8a7e6cf4217b97d4969
                                                                        • Instruction ID: e6aaa3197967bcab7a907498de6e5c90361519e2e5ad383921ca128c56c941b7
                                                                        • Opcode Fuzzy Hash: 32558bb850f3c2cf0c2c254cb496f08563158198c610a8a7e6cf4217b97d4969
                                                                        • Instruction Fuzzy Hash: 80A1C430218B49CFE796DF15D8897E973E5FB8C301F508629E49AC72D1DF3499458B82

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 249 1800033f0-18000343b 251 180003445-180003469 call 18000ce70 call 180003080 249->251 252 18000343d-180003440 249->252 258 1800035cc-1800035d9 251->258 259 18000346f-180003473 251->259 253 1800035f0-180003611 252->253 263 1800035e4-1800035e6 258->263 264 1800035db-1800035dc 258->264 259->258 260 180003479-18000348b 259->260 265 180003498-1800034b6 socket 260->265 266 18000348d-180003493 260->266 267 1800035e8 263->267 268 1800035ee 263->268 264->263 269 1800034c3-180003537 setsockopt sendto 265->269 270 1800034b8-1800034be 265->270 272 1800035ca 266->272 267->268 268->253 275 180003544-1800035ad SleepEx setsockopt recvfrom 269->275 276 180003539-18000353f 269->276 270->272 272->258 277 1800035b7-1800035c5 call 1800031b0 275->277 278 1800035af-1800035b5 275->278 276->272 277->272 278->272
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 94ad83c775c8780dee623aa14b5bf85c92dac3e650c1fc36ae3a69b7e3bf6c61
                                                                        • Instruction ID: e5ab5392bafa2c0cb17684c8847db0583a7c5f652f8bd16428fb4abaf0f55954
                                                                        • Opcode Fuzzy Hash: 94ad83c775c8780dee623aa14b5bf85c92dac3e650c1fc36ae3a69b7e3bf6c61
                                                                        • Instruction Fuzzy Hash: 9F51C530218B488FE799DF2998493AAB6E5FBD8352F10462DF48AC32D1DF74C9458B41

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 282 1800041e0-18000423a GlobalAlloc 283 18000423c-18000424e 282->283 284 18000424f-18000426e 282->284 286 18000427d-1800042aa socket 284->286 287 180004270-180004278 284->287 288 1800042b9-1800042fc setsockopt 286->288 289 1800042ac-1800042b4 286->289 292 18000443e-18000445f 287->292 294 180004304-18000431b bind 288->294 295 1800042fe 288->295 296 180004419-180004425 289->296 299 18000432a-18000433b listen 294->299 300 18000431d-180004325 294->300 295->294 297 180004427-180004428 296->297 298 180004430-180004437 296->298 297->298 298->292 302 18000434a-180004358 299->302 303 18000433d-180004345 299->303 300->296 302->296 306 18000435e 302->306 303->296 308 180004360-180004393 306->308 309 1800043a1-1800043a3 308->309 310 180004411-180004417 309->310 311 1800043a5-1800043a7 309->311 310->296 312 1800043a9-1800043d1 311->312 313 1800043fb-180004409 311->313 317 1800043d3-1800043db 312->317 318 1800043dd-1800043f3 call 180003eb0 312->318 313->308 314 18000440f 313->314 314->296 317->313 318->313
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AllocGlobal
                                                                        • String ID:
                                                                        • API String ID: 3761449716-0
                                                                        • Opcode ID: 5a7d9b673715129d7dfc5d83c03f8af6f580d029298280c7dd7525f5ea0ee178
                                                                        • Instruction ID: 53657cd98644d0d9de41157b0052dda7fda9864db0bd37cc4d4d23f3e79dafbf
                                                                        • Opcode Fuzzy Hash: 5a7d9b673715129d7dfc5d83c03f8af6f580d029298280c7dd7525f5ea0ee178
                                                                        • Instruction Fuzzy Hash: 5161B771208A08CFE795DB68D8487E973E0FB8C315F10462DE59BC72A1DF7499458B86

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _errnomalloc
                                                                        • String ID:
                                                                        • API String ID: 2517923351-0
                                                                        • Opcode ID: 6c33eb6669c5131f3041ce7ad3721dfc3906b75e30d0b0a9a87bdc77bd911f28
                                                                        • Instruction ID: f440a108dd4c415892b3a95d4f69082f88541561dbb3acf8a3b6132d9ff71d4b
                                                                        • Opcode Fuzzy Hash: 6c33eb6669c5131f3041ce7ad3721dfc3906b75e30d0b0a9a87bdc77bd911f28
                                                                        • Instruction Fuzzy Hash: AD81663051CB898ED792EB2884417EAB7E0FBA9750F40856AF88DC7242DF34D65987D3
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CreateMutex_getptd
                                                                        • String ID:
                                                                        • API String ID: 1218354264-0
                                                                        • Opcode ID: 5e6b32911e7ee468a59e9446b280a4272ab6e43e8edd2c9d85040de1e0de09a1
                                                                        • Instruction ID: a99c7b89faaa1c2ef3ef6a318bdc800b181dcc30f134879d3f458adf00d043a4
                                                                        • Opcode Fuzzy Hash: 5e6b32911e7ee468a59e9446b280a4272ab6e43e8edd2c9d85040de1e0de09a1
                                                                        • Instruction Fuzzy Hash: 4BD18530218A4D8FF79AEB14D8957EA73E1FB98340F44C529F44AC7192DE78DA498782

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 322 180004460-18000448c 324 180004492-180004514 call 18000ce70 call 18000cf90 call 180005b60 call 180005cd0 322->324 325 180004737-18000474c 322->325 336 180004521-18000453b socket 324->336 337 180004516-18000451c 324->337 338 180004548-180004579 setsockopt 336->338 339 18000453d-180004543 336->339 343 180004726-180004730 337->343 341 180004586-1800045ce sendto 338->341 342 18000457b-180004581 338->342 345 180004711-180004715 339->345 351 1800045db-1800045e0 341->351 352 1800045d0-1800045d6 341->352 342->345 343->325 348 180004717-180004718 345->348 349 180004720 345->349 348->349 349->343 353 1800045e2-1800045e8 351->353 354 1800045ed-18000460a 351->354 352->345 353->345 354->345 358 180004610-18000461e 354->358 358->345 360 180004624-180004665 358->360 361 180004673-180004675 360->361 362 1800046f2-1800046ff 361->362 363 180004677-18000467a 361->363 362->358 366 180004705 362->366 364 18000470b 363->364 365 180004680-1800046c8 call 18000ce70 363->365 364->345 370 1800046d2-1800046d9 365->370 371 1800046ca-1800046d0 365->371 366->345 370->362 372 1800046db-1800046e7 call 180006220 370->372 371->362 372->362 376 1800046e9-1800046f0 372->376 376->362 377 180004707-180004709 376->377 377->345
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: socket
                                                                        • String ID:
                                                                        • API String ID: 98920635-3916222277
                                                                        • Opcode ID: b59f23568b84737825a868cdef9583452c88605ccc0962b6b265924643991b9b
                                                                        • Instruction ID: 11fca29627decc8c492dfb51485c437d1ac4c8b16eabfe4dc4435d9760ff9385
                                                                        • Opcode Fuzzy Hash: b59f23568b84737825a868cdef9583452c88605ccc0962b6b265924643991b9b
                                                                        • Instruction Fuzzy Hash: A181D27020864C8FEB95DF28D8487EA77E1FB89355F508629F48AC72E0DF74C5098B86

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 378 180005e00-180005e31 380 180005e33-180005e47 378->380 381 180005e48-180005e75 socket 378->381 382 180005e84-180005eb5 connect 381->382 383 180005e77-180005e7f 381->383 388 180005ec4-180005ede call 180005c20 382->388 389 180005eb7-180005ebf 382->389 387 18000608e-18000609a 383->387 390 1800060a5-1800060c3 387->390 391 18000609c-18000609d 387->391 395 180005eea-180005f43 388->395 396 180005ee0-180005ee5 388->396 389->387 391->390 399 180005f45-180005f4a 395->399 400 180005f4f-180005f51 395->400 396->387 401 180006086-180006087 399->401 402 180005f53-180005f58 400->402 403 180005f5d-180005f8c call 18000ce70 recv 400->403 401->387 402->401 406 180005f9b-180005f9d 403->406 407 180005f8e-180005f96 403->407 408 180005fa9-180005fac 406->408 409 180005f9f-180005fa4 406->409 407->401 410 180005fb8-180005fbd 408->410 411 180005fae-180005fb3 408->411 409->401 413 180005fc9-180005fd0 410->413 414 180005fbf-180005fc4 410->414 411->401 415 180005fd2-180005fd4 413->415 416 180005fd9-180005fe0 413->416 414->401 415->401 416->401 417 180005fe6-180005fe9 416->417 418 180005ff0-18000603f 417->418 420 180006081 418->420 421 180006041-180006043 418->421 420->401 422 180006045-18000605b recv 421->422 423 18000607a-18000607f 421->423 424 180006065-180006067 422->424 425 18000605d-180006061 422->425 423->401 427 180006069-18000606e 424->427 428 180006070-180006078 424->428 425->418 426 180006063 425->426 426->401 427->401 428->401
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: socket
                                                                        • String ID:
                                                                        • API String ID: 98920635-0
                                                                        • Opcode ID: c33227f78def897f2c7caf3e69340f8da9958d197893add00dce4bbebc9ef3a3
                                                                        • Instruction ID: 83a06cd48bcf39f01f2f57712c6f9a50f8f0c87e883da1e53fdbc21f24aff36a
                                                                        • Opcode Fuzzy Hash: c33227f78def897f2c7caf3e69340f8da9958d197893add00dce4bbebc9ef3a3
                                                                        • Instruction Fuzzy Hash: D981833161C6488FE7A5DF6498487EB73D2EB88391F15852EF4CAC3290DF7596068B42

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 477 180005090-1800050bd 478 1800050c7-1800050da call 180007670 477->478 479 1800050bf-1800050c2 477->479 485 1800050e9-1800050f2 478->485 486 1800050dc-1800050e4 478->486 480 180005233-18000524d 479->480 482 180005252-18000525d 480->482 483 18000524f-180005250 480->483 487 180005261-18000526a 482->487 488 18000525f 482->488 483->482 490 180005101-180005129 call 180007780 485->490 491 1800050f4-1800050fc 485->491 489 18000522e-18000522f 486->489 488->487 489->480 494 18000512b-180005138 490->494 495 18000513d-180005165 VirtualAllocEx 490->495 491->489 496 180005224-18000522a 494->496 497 180005167-180005194 VirtualAllocEx 495->497 498 1800051a8-1800051cc call 18000ce70 call 18000cf90 495->498 496->489 497->498 502 180005196-1800051a6 497->502 506 18000521c-18000521d 498->506 507 1800051ce-1800051d5 498->507 502->496 506->496 508 1800051e0-1800051ee 507->508 509 180005212-18000521a 508->509 510 1800051f0-1800051f8 508->510 509->506 509->508 510->509 511 1800051fa-1800051fc 510->511 511->509 512 1800051fe-180005200 511->512 512->509 513 180005202-18000520d call 18000cf90 512->513 513->509
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: @
                                                                        • API String ID: 0-2766056989
                                                                        • Opcode ID: 2f24683230256da73a92b6224230259aa85e01a71729dac1983cd3ef2052a618
                                                                        • Instruction ID: 0bf000bdbbda505982e9fd7a727475adda7faee7407101d1370ee34e629a68cd
                                                                        • Opcode Fuzzy Hash: 2f24683230256da73a92b6224230259aa85e01a71729dac1983cd3ef2052a618
                                                                        • Instruction Fuzzy Hash: 1C517034618B4C8BEBE5EB5C98457AA77E1FB9C341F04816DF889C3285DE34ED498782

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Global$AllocFree
                                                                        • String ID: 0
                                                                        • API String ID: 3394109436-4108050209
                                                                        • Opcode ID: d06942922e6316174bae75cca06d025bd43f05bc2cea1e9d519623ef70e7dd9d
                                                                        • Instruction ID: f0303d85ea469aeeebc3348abf99e3bfcc9f21014176600010c6c02529bc85a4
                                                                        • Opcode Fuzzy Hash: d06942922e6316174bae75cca06d025bd43f05bc2cea1e9d519623ef70e7dd9d
                                                                        • Instruction Fuzzy Hash: 86615F70618B088FEB95DF18C0957A677E2FB9C340F50856DE88AC73A6DF34D9458B82

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 555 180007d90-180007dcb call 180007b40 558 180007dcd 555->558 559 180007e30-180007e4a call 180007b40 555->559 561 180007dd0-180007dd5 558->561 564 180007eaa-180007ec2 call 180007b40 559->564 565 180007e4c-180007e54 559->565 561->559 563 180007dd7-180007ddb 561->563 563->559 566 180007ddd-180007df5 call 180007bc0 563->566 576 180007ec4-180007ec5 564->576 577 180007f1f-180007f34 call 180007b40 564->577 565->564 569 180007e56-180007e60 565->569 574 180007df7-180007df8 566->574 575 180007dfa-180007dfd 566->575 569->564 570 180007e62-180007e63 569->570 573 180007e66-180007e6a 570->573 573->564 578 180007e6c-180007e81 call 180007bc0 573->578 574->575 579 180007e2a-180007e2e 575->579 580 180007dff-180007e02 575->580 582 180007ec7-180007ece 576->582 593 180007f65-180007f75 call 180007c50 577->593 594 180007f36-180007f4e call 180007bc0 577->594 597 180007e83-180007e86 578->597 598 180007e9f-180007ea8 578->598 579->559 579->561 580->579 584 180007e04-180007e07 580->584 586 180007edd-180007ef0 call 180007bc0 582->586 587 180007ed0-180007ed5 582->587 591 180007e09-180007e0c 584->591 592 180007e0e-180007e1c call 180007bc0 584->592 602 180007ef2-180007ef9 586->602 603 180007f15-180007f1d 586->603 587->586 588 180007ed7-180007edb 587->588 588->577 588->586 599 180007e21-180007e28 591->599 592->599 609 180007f77-180007f7a call 180007bc0 593->609 610 180007f7f-180007ff1 VirtualProtectEx call 18000ce70 VirtualProtectEx 593->610 594->593 612 180007f50-180007f63 call 180007bc0 594->612 605 180007e92-180007e9d 597->605 606 180007e88-180007e8d call 180007bc0 597->606 598->564 598->573 599->579 599->584 608 180007f00-180007f13 call 180007bc0 602->608 603->582 605->597 605->598 606->605 608->603 609->610 612->593
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 544645111-0
                                                                        • Opcode ID: 0824e74d374687fc9302544f1a5b5840816b4953a06dc48ebe33bdb9c8aaef13
                                                                        • Instruction ID: f94f2fb0f02f161d660a8c8ab4c8f384c1912499dff43cf7e5f71e5084719fe7
                                                                        • Opcode Fuzzy Hash: 0824e74d374687fc9302544f1a5b5840816b4953a06dc48ebe33bdb9c8aaef13
                                                                        • Instruction Fuzzy Hash: FD819630B15B4D8BE7A6EB14D8817F972D1FB6C390F448169F84AC2287DE28DE4587C2

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 621 180004e90-180004ed2 call 180004cd0 626 180004ef1-180004f00 621->626 627 180004ed4-180004ee9 621->627 628 180004f02-180004f0b 626->628 629 180004f13-180004f52 CreateThread 626->629 627->626 628->629 630 180004f0d-180004f11 628->630 631 180004f54-180004f5b 629->631 632 180004f5d-180004f60 629->632 630->629 631->632 634 180004f62-180004f9e 632->634 635 180004fb9-180004fbb 632->635 648 180004fa9-180004fac 634->648 649 180004fa0-180004fa7 634->649 636 180004fbd-180004fc3 call 180004df0 635->636 637 18000502e-180005031 635->637 643 180004fc8-180004fca 636->643 640 180005041-180005044 637->640 641 180005033-180005036 637->641 644 180005046-18000504d 640->644 645 18000504f-180005066 640->645 641->640 642 180005038-18000503b ResumeThread 641->642 642->640 643->637 646 180004fcc-180005016 643->646 644->645 655 180005021-180005024 646->655 656 180005018-18000501f 646->656 648->635 651 180004fae-180004fb4 648->651 649->648 651->640 655->641 657 180005026-18000502c 655->657 656->655 657->640
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$CreateResume
                                                                        • String ID:
                                                                        • API String ID: 3373111408-0
                                                                        • Opcode ID: 4b4ac41434d37a412c23c756dd5a2fba4875ac3c510041d012472bc4ae7f0eee
                                                                        • Instruction ID: 80157a5e435ccfdc3fee8a7353cc9d9c67aba6f8308dc70f7bc577631c7baed2
                                                                        • Opcode Fuzzy Hash: 4b4ac41434d37a412c23c756dd5a2fba4875ac3c510041d012472bc4ae7f0eee
                                                                        • Instruction Fuzzy Hash: 32519871208B0E4BF7A5EF1994587BAB7D4FBA8341F00852EF889C3261DF74D9498785

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 659 8651090-8651099 660 86510a1-86510b4 call 8651fc0 659->660 663 86510b6-86510ca call 8654310 660->663 664 86510cf-86510d9 660->664 671 8651191-8651199 663->671 666 865114f-8651162 call 8653d50 664->666 667 86510db-86510e5 664->667 673 8651167-8651171 666->673 667->666 669 86510e7-86510f1 667->669 669->666 672 86510f3-865114c VirtualProtect * 2 669->672 672->666 674 8651187-865118b 673->674 675 8651173-8651182 call 8654310 673->675 674->660 674->671 675->674
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393371360.0000000008651000.00000020.00000001.00020000.00000000.sdmp, Offset: 08651000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8651000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 544645111-0
                                                                        • Opcode ID: a8e21e152b0876bbf318a5bec3f137bfd16194ce79e1ed3a4551575268d3ff46
                                                                        • Instruction ID: 572502e62b4b27e059cde9ff61e6349e7d0389c4dd9ed5f13f6a9d31ad72e20a
                                                                        • Opcode Fuzzy Hash: a8e21e152b0876bbf318a5bec3f137bfd16194ce79e1ed3a4551575268d3ff46
                                                                        • Instruction Fuzzy Hash: 3031A87421CA888FDB98EF58C494F1AF3E1FB99309F51496CA48AC7391C7B8D941CB46

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ProtectVirtual
                                                                        • String ID:
                                                                        • API String ID: 544645111-0
                                                                        • Opcode ID: 01f01cd444ce0dfde906d49b1b91e451c9cf1412b7cbcb49f6b6fddb18aeaae7
                                                                        • Instruction ID: c8e58c12fe52381085f5dc7afef6c93ea3a5ba39779d121c77299f3db4e58779
                                                                        • Opcode Fuzzy Hash: 01f01cd444ce0dfde906d49b1b91e451c9cf1412b7cbcb49f6b6fddb18aeaae7
                                                                        • Instruction Fuzzy Hash: 99015A3071CA1C4FEB94EB2CA84879ABBE2FBDD750F00465EB54AC3255CE38C9058782

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 685 18000d830-18000d833 686 18000d835-18000d84e RtlFreeHeap 685->686 687 18000d86c 685->687 688 18000d867-18000d86b 686->688 689 18000d850-18000d865 call 18000e568 call 18000e520 686->689 688->687 689->688
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: FreeHeap_errno
                                                                        • String ID:
                                                                        • API String ID: 1418752586-0
                                                                        • Opcode ID: fc300658bdf66316156499e7dd14fb9cdc132b3844eee78bfcbee5951fafe97c
                                                                        • Instruction ID: c72e4b8b0c6b6fcab5919b8e303c146a01e1ab12737662dc4635c5dfb3b8006b
                                                                        • Opcode Fuzzy Hash: fc300658bdf66316156499e7dd14fb9cdc132b3844eee78bfcbee5951fafe97c
                                                                        • Instruction Fuzzy Hash: B3E08C30702E0E4BFB9AA7B65C8D3B536E0EB5C356F00C429B401C7291FE68C9448341

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 695 868ab9c-868abbe HeapCreate 696 868abc0-868abde HeapSetInformation 695->696 697 868abe3-868abe7 695->697 696->697
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$CreateInformation
                                                                        • String ID:
                                                                        • API String ID: 1774340351-0
                                                                        • Opcode ID: d8ac970067d45cc6b8ca6f04f620d81849d1d9a637adec4463d69dc87cbded27
                                                                        • Instruction ID: 6d117573ba922c73ab79aafcd68a53b615af543aa8de04dc82d5c0bdb7ba4341
                                                                        • Opcode Fuzzy Hash: d8ac970067d45cc6b8ca6f04f620d81849d1d9a637adec4463d69dc87cbded27
                                                                        • Instruction Fuzzy Hash: 3FE086B572279096E74D9B21E8567566291F78C741F919029ED8902794DF3EC1458F00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: TextWindow_errno
                                                                        • String ID:
                                                                        • API String ID: 3019145358-0
                                                                        • Opcode ID: b677f81b3f2ffa560ebbccea1017e9ed6b394e3674843ad288ac0304c4cb9e2f
                                                                        • Instruction ID: 77d6d3ec35cdb7c7ed6e7881458c7ec6d7553eb18d2ce4b3cc22b0b01fb80f72
                                                                        • Opcode Fuzzy Hash: b677f81b3f2ffa560ebbccea1017e9ed6b394e3674843ad288ac0304c4cb9e2f
                                                                        • Instruction Fuzzy Hash: 3D71197151CB888FD7A5DF28D4957DAB7E1FB99300F004A2EE58EC3251DB7496488B83
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 092771797dd8eeeaa591b19d176f86b44a84155633dc7582d88bcd735b576e88
                                                                        • Instruction ID: 7dc838926c74155d805a2f47bc1461b4899a4e8620b95bf709a320a01489e7ae
                                                                        • Opcode Fuzzy Hash: 092771797dd8eeeaa591b19d176f86b44a84155633dc7582d88bcd735b576e88
                                                                        • Instruction Fuzzy Hash: 4331653051CA0D8FE795EF2894497A676E1FB9C341F50822EF84EC3291EF34C9448782
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: socket
                                                                        • String ID:
                                                                        • API String ID: 98920635-0
                                                                        • Opcode ID: e788f23cd038b3535f6c5993ff3036ce3a079d437048379db1c28a76881289bc
                                                                        • Instruction ID: 4bb6f6e6b6edcf02f823851ce2042b61fd4ee6284707f8234e1b68f0e6e7e58a
                                                                        • Opcode Fuzzy Hash: e788f23cd038b3535f6c5993ff3036ce3a079d437048379db1c28a76881289bc
                                                                        • Instruction Fuzzy Hash: E021C770208B0D4FE7A9AF1898493FA77D0EB9C315F10852FF89AC3391DA7499058782
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: QueryValue
                                                                        • String ID:
                                                                        • API String ID: 3660427363-0
                                                                        • Opcode ID: 9ac3b8b0ba84d999f9f914ef0e93d3836a84e3ed6c0e900450fc8296a8502626
                                                                        • Instruction ID: fecf059f4c156b18543093ed06e905ddefa737dbb1d2fe88a2e13eccfb9803fb
                                                                        • Opcode Fuzzy Hash: 9ac3b8b0ba84d999f9f914ef0e93d3836a84e3ed6c0e900450fc8296a8502626
                                                                        • Instruction Fuzzy Hash: 6E21843461CB4DCFEB91DB68A45876AB7E1FBA8342F04452DF84AC3290EF74C9458B42
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: send
                                                                        • String ID:
                                                                        • API String ID: 2809346765-0
                                                                        • Opcode ID: 090b19a6b471cf81c26862f0c2c3a13d27bff1be5bb1431a09aea9f676972aa6
                                                                        • Instruction ID: 1773db1c7cf9f9e2fec702992df419f326b66ac2e99562e9bd9b513adb97b3c6
                                                                        • Opcode Fuzzy Hash: 090b19a6b471cf81c26862f0c2c3a13d27bff1be5bb1431a09aea9f676972aa6
                                                                        • Instruction Fuzzy Hash: 5B11037060CB0C4FF668AE98A84A77A77D0E74D352F10462EE4CAC3291EA609D468786
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _errno
                                                                        • String ID:
                                                                        • API String ID: 2918714741-0
                                                                        • Opcode ID: ffcca2f477c90883bfcac22c8be04dfff8cb4a3c7fa26df7db4bc107e273938e
                                                                        • Instruction ID: 5cb6f55356bcff33271e580b6eebc380a5b34fe508eaaca57b63d56fb82afccf
                                                                        • Opcode Fuzzy Hash: ffcca2f477c90883bfcac22c8be04dfff8cb4a3c7fa26df7db4bc107e273938e
                                                                        • Instruction Fuzzy Hash: 2711C431224E4E4BFB9ADB2C88587B972D2EB9C395F44C629A806C31D4FF74C6694701
                                                                        APIs
                                                                        • sendto.WS2_32(?,?,?,?,00000002,?,-00000001,0000000180005DA8), ref: 0000000180005BE0
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: sendto
                                                                        • String ID:
                                                                        • API String ID: 1876886790-0
                                                                        • Opcode ID: 45cf40861cfc29e66c7ef7be70d01dc55af5cf6328e33f610eb24d80ae721409
                                                                        • Instruction ID: 520a613ef59b2123309eedf36ce1b3cac54b7af707208aa9371330aa6756cf75
                                                                        • Opcode Fuzzy Hash: 45cf40861cfc29e66c7ef7be70d01dc55af5cf6328e33f610eb24d80ae721409
                                                                        • Instruction Fuzzy Hash: 5F110C7060C70C4FE754DE5C684E77A77D0E79C352F51462EF4DAC32E1DA6099464386
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: 3f1b10e0ec4a9d93bc79e0e9caa9f245b55638458df9a8c05351cc1a84ca907d
                                                                        • Instruction ID: 080694349685a7129626e5ca01faff713315f58f34c37ec5ffa0c5819a21b8bb
                                                                        • Opcode Fuzzy Hash: 3f1b10e0ec4a9d93bc79e0e9caa9f245b55638458df9a8c05351cc1a84ca907d
                                                                        • Instruction Fuzzy Hash: 89115E7160CB488FE7A5DF18E4883AAB7E1FBDC345F40862EF489C3155DB748A048786
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: InfoNativeSystem
                                                                        • String ID:
                                                                        • API String ID: 1721193555-0
                                                                        • Opcode ID: b739bf00b84cea278dbb1ac31ffff928a817d804d6718e2123ef48c8cafd9643
                                                                        • Instruction ID: 031dedfee65ecc0cca533cb4c18a43a3bfa0cab118393cd8ed21de31d5ced106
                                                                        • Opcode Fuzzy Hash: b739bf00b84cea278dbb1ac31ffff928a817d804d6718e2123ef48c8cafd9643
                                                                        • Instruction Fuzzy Hash: F0E09231024A4C4BE38BE724CC897EA72E2F78C705F944215FC8A80090FE3C479E8682
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CreateHeap
                                                                        • String ID:
                                                                        • API String ID: 10892065-0
                                                                        • Opcode ID: 4fdca9c5319175416e55ca5f323eb5680ab12a2b7b3c541f9ce4627eaf74460a
                                                                        • Instruction ID: e393395ee21a50b72b190f916765b2d1fef929cfb6792be4ae3ef835fa29265b
                                                                        • Opcode Fuzzy Hash: 4fdca9c5319175416e55ca5f323eb5680ab12a2b7b3c541f9ce4627eaf74460a
                                                                        • Instruction Fuzzy Hash: 9FE04F70614A094BE78CAF38DC5E36676E1F7C8341F54C53EB88AC2290EE7DC4458742
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393371360.0000000008651000.00000020.00000001.00020000.00000000.sdmp, Offset: 08651000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8651000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 65533fe2a296d722abbbfd6d5a33d892bd8917294aa977f88cedc82edc4c8fd1
                                                                        • Instruction ID: 16c2c9a30b6ef923867d874fd6cf2e8c127f490b31b01987d1ecd6717cd4d892
                                                                        • Opcode Fuzzy Hash: 65533fe2a296d722abbbfd6d5a33d892bd8917294aa977f88cedc82edc4c8fd1
                                                                        • Instruction Fuzzy Hash: 0C91B3746187888FD794DF18C098B1ABBE1FB98346F51596DF88AC3360DB74D885CB06
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: String$free$ByteCharMultiWidemalloc$ErrorLast
                                                                        • String ID:
                                                                        • API String ID: 1837315383-0
                                                                        • Opcode ID: 3313e138b9a74a3a53528cd811aef4569a513fe9d63799613f2a3a5c62c307db
                                                                        • Instruction ID: 69bbaa673484c0332cd69372c64cd0809e498ab8d208a9c75b831ceb79d37059
                                                                        • Opcode Fuzzy Hash: 3313e138b9a74a3a53528cd811aef4569a513fe9d63799613f2a3a5c62c307db
                                                                        • Instruction Fuzzy Hash: 7FE1F436600780CBCB20EF25E84079D77A6F748BE9F5A8719EA6E57B98DB39C541C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 921712934-0
                                                                        • Opcode ID: 43601c8c7b2f4b0f1200a7d9cd53ab2c4e33ed5c1cc4ba5399e24b4865e30923
                                                                        • Instruction ID: 3fa480570c39a7c0e17123c0f307b66eb67b7debe144f2a528cddf566df7f509
                                                                        • Opcode Fuzzy Hash: 43601c8c7b2f4b0f1200a7d9cd53ab2c4e33ed5c1cc4ba5399e24b4865e30923
                                                                        • Instruction Fuzzy Hash: 9641E530518A484EF39AEF3888423AD77C0EB4B364F558B2DF062A71D3EE749B059391
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: File$HandleModuleNameWrite
                                                                        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                        • API String ID: 3784150691-4022980321
                                                                        • Opcode ID: bdc9c95267300ace858b7450ec9648f501c3d30a68fdde1652205f4c1f4fad29
                                                                        • Instruction ID: 882beede90e597fd571f57c0c5e879cfe4dee8d8f93976ac004ae0e92dd4e99b
                                                                        • Opcode Fuzzy Hash: bdc9c95267300ace858b7450ec9648f501c3d30a68fdde1652205f4c1f4fad29
                                                                        • Instruction Fuzzy Hash: 405102A6710741C2EB28EB21E96076E2352B788795F92832EDE9D4ABD4CF3DC109C704
                                                                        APIs
                                                                        • RtlCaptureContext.KERNEL32 ref: 08690753
                                                                        • RtlLookupFunctionEntry.KERNEL32(?,0868A6F3,?,?,?,?,0868C715,?,?,?,?,00000000,0868730B), ref: 08690772
                                                                        • RtlVirtualUnwind.KERNEL32 ref: 086907BE
                                                                        • IsDebuggerPresent.KERNEL32 ref: 08690830
                                                                        • SetUnhandledExceptionFilter.KERNEL32 ref: 08690848
                                                                        • UnhandledExceptionFilter.KERNEL32 ref: 08690855
                                                                        • GetCurrentProcess.KERNEL32 ref: 0869086E
                                                                        • TerminateProcess.KERNEL32 ref: 0869087C
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                        • String ID:
                                                                        • API String ID: 3778485334-0
                                                                        • Opcode ID: 8faf1e7a9eb732325bdfecd12948fc0ed64e85396adfb56f4871c3fbfa7df72c
                                                                        • Instruction ID: c552de6c28c05b23423906abbd4c0dab5d1e7d83fefa5ea14a533bfe8a309780
                                                                        • Opcode Fuzzy Hash: 8faf1e7a9eb732325bdfecd12948fc0ed64e85396adfb56f4871c3fbfa7df72c
                                                                        • Instruction Fuzzy Hash: BB314935104F80D5EB94AB14F86435A73A8F784755F42812ADACE53BA4EF7EC095CB01
                                                                        APIs
                                                                        • RtlCaptureContext.KERNEL32 ref: 08687923
                                                                        • IsDebuggerPresent.KERNEL32 ref: 086879C1
                                                                        • SetUnhandledExceptionFilter.KERNEL32 ref: 086879CB
                                                                        • UnhandledExceptionFilter.KERNEL32 ref: 086879D6
                                                                        • GetCurrentProcess.KERNEL32 ref: 086879EC
                                                                        • TerminateProcess.KERNEL32 ref: 086879FA
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerPresentTerminate
                                                                        • String ID:
                                                                        • API String ID: 1269745586-0
                                                                        • Opcode ID: ec36631e149f57fc21c0e52b31c3a8b1ed30f491ca2df94c0dcef3bfa982b701
                                                                        • Instruction ID: 2ac579f90e5f7f237f3f17c8b1b7106d1ade736bc80d6755e13d73f131141c08
                                                                        • Opcode Fuzzy Hash: ec36631e149f57fc21c0e52b31c3a8b1ed30f491ca2df94c0dcef3bfa982b701
                                                                        • Instruction Fuzzy Hash: 0F214836608B85C2DB24DB60F45439AB3A8F789745F51412ADBCD43BA8EF7DC199CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _errno
                                                                        • String ID:
                                                                        • API String ID: 2918714741-0
                                                                        • Opcode ID: d14f15ac672a53c34aa39881308cd2f140cbcb15642c4c589e3670614f47f2f1
                                                                        • Instruction ID: d133ae7be4c53a2dfdc60fe052dd8832499520743795b990ff23e35164a2d277
                                                                        • Opcode Fuzzy Hash: d14f15ac672a53c34aa39881308cd2f140cbcb15642c4c589e3670614f47f2f1
                                                                        • Instruction Fuzzy Hash: 2A514430614A9C8FE3E6EFA894847AE76D1F78E351F54851DF0DACB1D1DE3045498741
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: free$ErrorFreeHeapLast_errno
                                                                        • String ID:
                                                                        • API String ID: 1012874770-0
                                                                        • Opcode ID: f279103992dd5ad4dc59d123879ae7c91c13eff5f13c0979e33fa35bac6552c5
                                                                        • Instruction ID: 156cc8abfbab2b542e7d599e1af104007f6790d18a2c81bad8724f74b11e9ab4
                                                                        • Opcode Fuzzy Hash: f279103992dd5ad4dc59d123879ae7c91c13eff5f13c0979e33fa35bac6552c5
                                                                        • Instruction Fuzzy Hash: 534188A6215680C1CB45FF79C8D46EC1320EBC5FC5F65423D8A6D6B3E4CE91C849935C
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
                                                                        • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                        • API String ID: 2643518689-232180764
                                                                        • Opcode ID: 39f71b1e01be3e7598b01ecc797e56604442c4232cf5213920280205f3dded74
                                                                        • Instruction ID: 596a0654be0d3605e722f3ead5cbdd46cb57281a78c99cdfc11d8bbb14b4198a
                                                                        • Opcode Fuzzy Hash: 39f71b1e01be3e7598b01ecc797e56604442c4232cf5213920280205f3dded74
                                                                        • Instruction Fuzzy Hash: BE416D25242B01D0EE15FB66B97032A2395BB89BD1F478629CD9E03B64FF3DC142C701
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: free$_lock$ErrorFreeHeapLast_errno
                                                                        • String ID:
                                                                        • API String ID: 1575098132-0
                                                                        • Opcode ID: 376d596e6fbea7d518b28a71cdc31c2903fe193648389720dca1a098e9054f15
                                                                        • Instruction ID: 1d825e54da61ed5efda14d765e3f045d41033b261143708cd02dad59f5310b52
                                                                        • Opcode Fuzzy Hash: 376d596e6fbea7d518b28a71cdc31c2903fe193648389720dca1a098e9054f15
                                                                        • Instruction Fuzzy Hash: 7F212C29307640C4EE19FBA5D1A0B7C2321AF82BC6F6A572D8A1E177D4CF59C445D329
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$Infofree$malloc
                                                                        • String ID:
                                                                        • API String ID: 1309074677-0
                                                                        • Opcode ID: 0446cdde5fa73f2dffd72d7a99b777e9e2f9cf30c9086f4fab62af80e8be8df1
                                                                        • Instruction ID: 3a831d01deb39e55a1256d2acd645c06fcec2f0d1d2ad102121abb9a8dd189a8
                                                                        • Opcode Fuzzy Hash: 0446cdde5fa73f2dffd72d7a99b777e9e2f9cf30c9086f4fab62af80e8be8df1
                                                                        • Instruction Fuzzy Hash: 1151D672200781C6DF249F25E44035D77E9F786BE9F6A4A29DAAA47BD4DF3CC1868300
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 0868C81F
                                                                        • GetLastError.KERNEL32 ref: 0868C839
                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 0868C85F
                                                                        • WideCharToMultiByte.KERNEL32 ref: 0868C8B4
                                                                        • WideCharToMultiByte.KERNEL32 ref: 0868C8F0
                                                                        • free.LIBCMT ref: 0868C8FE
                                                                        • FreeEnvironmentStringsW.KERNEL32 ref: 0868C909
                                                                        • GetEnvironmentStrings.KERNEL32 ref: 0868C921
                                                                        • FreeEnvironmentStringsA.KERNEL32 ref: 0868C962
                                                                        • FreeEnvironmentStringsA.KERNEL32 ref: 0868C97E
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide$ErrorLastfree
                                                                        • String ID:
                                                                        • API String ID: 994105223-0
                                                                        • Opcode ID: d393557732c112ddf0894083fdc387bb45cca2a0d0bdfcb51c60485ec16ba4b3
                                                                        • Instruction ID: bf43b3ec40c8d41e37ab15dec079a99f37f8bfd70749128c99c8c58d97b87479
                                                                        • Opcode Fuzzy Hash: d393557732c112ddf0894083fdc387bb45cca2a0d0bdfcb51c60485ec16ba4b3
                                                                        • Instruction Fuzzy Hash: 0441E072649744C2DE64BF22A958328B765F788FD2F0A8219CAAF17B14DF3CD092C754
                                                                        APIs
                                                                        • free.LIBCMT ref: 0868A750
                                                                          • Part of subcall function 086870F8: HeapFree.KERNEL32 ref: 0868710E
                                                                          • Part of subcall function 086870F8: _errno.LIBCMT ref: 08687118
                                                                          • Part of subcall function 086870F8: GetLastError.KERNEL32 ref: 08687120
                                                                          • Part of subcall function 0868F308: free.LIBCMT ref: 0868F326
                                                                          • Part of subcall function 0868F308: free.LIBCMT ref: 0868F338
                                                                          • Part of subcall function 0868F308: free.LIBCMT ref: 0868F34A
                                                                          • Part of subcall function 0868F308: free.LIBCMT ref: 0868F35C
                                                                          • Part of subcall function 0868F308: free.LIBCMT ref: 0868F36E
                                                                          • Part of subcall function 0868F308: free.LIBCMT ref: 0868F380
                                                                          • Part of subcall function 0868F308: free.LIBCMT ref: 0868F392
                                                                        • free.LIBCMT ref: 0868A772
                                                                        • free.LIBCMT ref: 0868A78A
                                                                        • free.LIBCMT ref: 0868A796
                                                                        • free.LIBCMT ref: 0868A7BA
                                                                        • free.LIBCMT ref: 0868A7CE
                                                                        • free.LIBCMT ref: 0868A7DD
                                                                        • free.LIBCMT ref: 0868A7E9
                                                                        • free.LIBCMT ref: 0868A816
                                                                        • free.LIBCMT ref: 0868A83E
                                                                        • free.LIBCMT ref: 0868A858
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: free$ErrorFreeHeapLast_errno
                                                                        • String ID:
                                                                        • API String ID: 1012874770-0
                                                                        • Opcode ID: becd643ee524bd9784f9e06b01e95822b90b3266b9ed5f6fbb1eece3059595a2
                                                                        • Instruction ID: 3936ccbf92bbd38bc572519abab984ce4ac212d7849dc9d68308c483919ca467
                                                                        • Opcode Fuzzy Hash: becd643ee524bd9784f9e06b01e95822b90b3266b9ed5f6fbb1eece3059595a2
                                                                        • Instruction Fuzzy Hash: C0314E7A602690C4DF15FFA5C4947AC2320EB84B97F5A463ACF1E5A794CF68C092D326
                                                                        APIs
                                                                        • GetStringTypeW.KERNEL32 ref: 0868EE3C
                                                                        • GetLastError.KERNEL32 ref: 0868EE4E
                                                                        • MultiByteToWideChar.KERNEL32 ref: 0868EEAE
                                                                        • malloc.LIBCMT ref: 0868EF1A
                                                                        • MultiByteToWideChar.KERNEL32 ref: 0868EF64
                                                                        • GetStringTypeW.KERNEL32 ref: 0868EF7B
                                                                        • free.LIBCMT ref: 0868EF8C
                                                                        • GetStringTypeA.KERNEL32 ref: 0868F009
                                                                        • free.LIBCMT ref: 0868F019
                                                                          • Part of subcall function 086911D4: GetCPInfo.KERNEL32 ref: 0869122A
                                                                          • Part of subcall function 086911D4: GetCPInfo.KERNEL32 ref: 08691249
                                                                          • Part of subcall function 086911D4: MultiByteToWideChar.KERNEL32 ref: 0869134D
                                                                          • Part of subcall function 086911D4: WideCharToMultiByte.KERNEL32 ref: 08691388
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$StringType$Infofree$ErrorLastmalloc
                                                                        • String ID:
                                                                        • API String ID: 3804003340-0
                                                                        • Opcode ID: 32208ec6c202189c7dd212cbee53c089e66ac4da055353748e56a9f0b2fe217a
                                                                        • Instruction ID: 567dd44760be0614ae723a074bff436905e8c4cd0ce58b48301c72ab6a42db12
                                                                        • Opcode Fuzzy Hash: 32208ec6c202189c7dd212cbee53c089e66ac4da055353748e56a9f0b2fe217a
                                                                        • Instruction Fuzzy Hash: CB51AD323007D0CBCB20AF25E4447597BA6F748BE9F5A4729EE6D53B98DB7AC4418740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 921712934-0
                                                                        • Opcode ID: 7498d157698b7746850beff3fd2e829e48bf732930855a58c519cf1a8e397565
                                                                        • Instruction ID: 38bc18eaac75e1555d8fbb1c523b8b4abda5b6477ca50980ab2acc1a7ffb61ff
                                                                        • Opcode Fuzzy Hash: 7498d157698b7746850beff3fd2e829e48bf732930855a58c519cf1a8e397565
                                                                        • Instruction Fuzzy Hash: 6A31E631118E484EF39AEF2888423F976D0EB8B360FD18719F456D71E3DE7099468791
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 921712934-0
                                                                        • Opcode ID: 7e7b2030ab5781a99dcd3cb582a0ad324e8d866afa0755c9bcd99179dfbf31d4
                                                                        • Instruction ID: ffd5e09e35865f82dca7ee5424638edfcc46553956dfcebd4d13adf6d73d7197
                                                                        • Opcode Fuzzy Hash: 7e7b2030ab5781a99dcd3cb582a0ad324e8d866afa0755c9bcd99179dfbf31d4
                                                                        • Instruction Fuzzy Hash: EE31E971508E4C8EF39ADF289C423B976D0EB8A360F918A1DF4569B1E3DF70D9064751
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 921712934-0
                                                                        • Opcode ID: 294244c60f646f5cbe51277ac12688e761e17f52b157ebf124e9b4b5352406c2
                                                                        • Instruction ID: cb0d40c4daa3642e78e311ec45b8ceee09d4b347cec2a76e0119e49c0e98f8a8
                                                                        • Opcode Fuzzy Hash: 294244c60f646f5cbe51277ac12688e761e17f52b157ebf124e9b4b5352406c2
                                                                        • Instruction Fuzzy Hash: 8E31C631518E4C4EF39ADF248C423AD7690FF4A3A4F918629F466971D3DF34CA099742
                                                                        APIs
                                                                        • GetStartupInfoA.KERNEL32 ref: 0868C0C1
                                                                          • Part of subcall function 0868BF08: Sleep.KERNEL32 ref: 0868BF4D
                                                                        • GetFileType.KERNEL32 ref: 0868C23E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: FileInfoSleepStartupType
                                                                        • String ID: @
                                                                        • API String ID: 1527402494-2766056989
                                                                        • Opcode ID: c128dbd6632ffd4248ad9e379446d5093a9cea490d8b2a16af4a0e249b3aac7a
                                                                        • Instruction ID: e3c56c9d1e9cdc7ac782e87dfcc88b3f711902e49434bb12999c5274c5003cc4
                                                                        • Opcode Fuzzy Hash: c128dbd6632ffd4248ad9e379446d5093a9cea490d8b2a16af4a0e249b3aac7a
                                                                        • Instruction Fuzzy Hash: 5A81AF72204780C5D754AB28E8987283BA9F3067B5F578729CABE473D0DF79C846C726
                                                                        APIs
                                                                          • Part of subcall function 0868AB9C: HeapCreate.KERNEL32 ref: 0868ABAE
                                                                          • Part of subcall function 0868AB9C: HeapSetInformation.KERNEL32 ref: 0868ABD8
                                                                        • _RTC_Initialize.LIBCMT ref: 086872D8
                                                                        • GetCommandLineA.KERNEL32 ref: 086872DD
                                                                          • Part of subcall function 0868C7F0: GetEnvironmentStringsW.KERNEL32 ref: 0868C81F
                                                                          • Part of subcall function 0868C7F0: GetEnvironmentStringsW.KERNEL32 ref: 0868C85F
                                                                          • Part of subcall function 0868C09C: GetStartupInfoA.KERNEL32 ref: 0868C0C1
                                                                        • __setargv.LIBCMT ref: 08687306
                                                                        • _cinit.LIBCMT ref: 0868731A
                                                                          • Part of subcall function 0868755C: FlsFree.KERNEL32 ref: 0868756B
                                                                          • Part of subcall function 0868755C: RtlDeleteCriticalSection.NTDLL ref: 0868CF22
                                                                          • Part of subcall function 0868755C: free.LIBCMT ref: 0868CF2B
                                                                          • Part of subcall function 0868755C: RtlDeleteCriticalSection.NTDLL ref: 0868CF4B
                                                                          • Part of subcall function 0868C38C: free.LIBCMT ref: 0868C3D3
                                                                          • Part of subcall function 0868BF08: Sleep.KERNEL32 ref: 0868BF4D
                                                                        • FlsSetValue.KERNEL32 ref: 086873A0
                                                                        • GetCurrentThreadId.KERNEL32 ref: 086873B4
                                                                        • free.LIBCMT ref: 086873C3
                                                                          • Part of subcall function 086870F8: HeapFree.KERNEL32 ref: 0868710E
                                                                          • Part of subcall function 086870F8: _errno.LIBCMT ref: 08687118
                                                                          • Part of subcall function 086870F8: GetLastError.KERNEL32 ref: 08687120
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Heapfree$CriticalDeleteEnvironmentFreeSectionStrings$CommandCreateCurrentErrorInfoInformationInitializeLastLineSleepStartupThreadValue__setargv_cinit_errno
                                                                        • String ID:
                                                                        • API String ID: 1549890855-0
                                                                        • Opcode ID: 283c50d896a9d63658f4f00dc5de43a054881fe9a129636bfa1b9e81bab13372
                                                                        • Instruction ID: 6f8a4a9c874d5dcf0a393f9d78228ee523bd02721fab9e28341cc8d28eb57f55
                                                                        • Opcode Fuzzy Hash: 283c50d896a9d63658f4f00dc5de43a054881fe9a129636bfa1b9e81bab13372
                                                                        • Instruction Fuzzy Hash: 7B218E68600702C7EB58B7B1A86132D2195AF95353F37C72DDD6EA6390FF69C042872B
                                                                        APIs
                                                                        • _FF_MSGBANNER.LIBCMT ref: 0868CFAF
                                                                          • Part of subcall function 0868AFD4: GetModuleFileNameA.KERNEL32 ref: 0868B097
                                                                          • Part of subcall function 0868AC74: ExitProcess.KERNEL32 ref: 0868AC83
                                                                          • Part of subcall function 0868BE9C: malloc.LIBCMT ref: 0868BEBB
                                                                          • Part of subcall function 0868BE9C: Sleep.KERNEL32 ref: 0868BED2
                                                                        • _errno.LIBCMT ref: 0868CFF1
                                                                        • _lock.LIBCMT ref: 0868D005
                                                                        • free.LIBCMT ref: 0868D027
                                                                        • _errno.LIBCMT ref: 0868D02C
                                                                        • RtlLeaveCriticalSection.NTDLL ref: 0868D052
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _errno$CriticalExitFileLeaveModuleNameProcessSectionSleep_lockfreemalloc
                                                                        • String ID:
                                                                        • API String ID: 1024173049-0
                                                                        • Opcode ID: 283bd625c8364f752987b89d34cabbe9ebeec6f66fb256fd47e402271791c09f
                                                                        • Instruction ID: 34a4a7279899b078985ae042f56d2fe91e112649f0ffacc1d9a117daa9cdb9bd
                                                                        • Opcode Fuzzy Hash: 283bd625c8364f752987b89d34cabbe9ebeec6f66fb256fd47e402271791c09f
                                                                        • Instruction Fuzzy Hash: A511BB25705740C6E764BF21E84472A3264FB86796F478239DA8E8B7C4CF7CC8478729
                                                                        APIs
                                                                        • _getptd.LIBCMT ref: 0868A503
                                                                          • Part of subcall function 0868A120: _getptd.LIBCMT ref: 0868A12A
                                                                          • Part of subcall function 0868A1DC: GetOEMCP.KERNEL32 ref: 0868A206
                                                                          • Part of subcall function 0868BE9C: malloc.LIBCMT ref: 0868BEBB
                                                                          • Part of subcall function 0868BE9C: Sleep.KERNEL32 ref: 0868BED2
                                                                        • free.LIBCMT ref: 0868A58F
                                                                          • Part of subcall function 086870F8: HeapFree.KERNEL32 ref: 0868710E
                                                                          • Part of subcall function 086870F8: _errno.LIBCMT ref: 08687118
                                                                          • Part of subcall function 086870F8: GetLastError.KERNEL32 ref: 08687120
                                                                        • _lock.LIBCMT ref: 0868A5C7
                                                                        • free.LIBCMT ref: 0868A677
                                                                        • free.LIBCMT ref: 0868A6A7
                                                                        • _errno.LIBCMT ref: 0868A6AC
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: free$_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
                                                                        • String ID:
                                                                        • API String ID: 2878544890-0
                                                                        • Opcode ID: 580b649d5609bd17aeb9ea713830221fdc699fcba30a52baa2cb33095edf5949
                                                                        • Instruction ID: 8ff095dd14495630f3ca2d412db9a7cdc024e13d535e75e2564eaee10927405c
                                                                        • Opcode Fuzzy Hash: 580b649d5609bd17aeb9ea713830221fdc699fcba30a52baa2cb33095edf5949
                                                                        • Instruction Fuzzy Hash: E1512376600740C6D315BFA5E440369B7A1F785B96F1A831BCEAE473A8DF38C082CB16
                                                                        APIs
                                                                        • GetLastError.KERNEL32 ref: 08687642
                                                                        • FlsGetValue.KERNEL32 ref: 08687650
                                                                        • SetLastError.KERNEL32 ref: 086876A8
                                                                          • Part of subcall function 0868BF08: Sleep.KERNEL32 ref: 0868BF4D
                                                                        • FlsSetValue.KERNEL32 ref: 0868767C
                                                                        • free.LIBCMT ref: 0868769F
                                                                          • Part of subcall function 08687584: _lock.LIBCMT ref: 086875D4
                                                                          • Part of subcall function 08687584: _lock.LIBCMT ref: 086875F4
                                                                        • GetCurrentThreadId.KERNEL32 ref: 08687690
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                                        • String ID:
                                                                        • API String ID: 3106088686-0
                                                                        • Opcode ID: 37ad6029f9974726fbbb501f797784d54179e855ebd20c38894f830b3584d9fe
                                                                        • Instruction ID: d220bb47058d89a438d79b7a9779a204473a75ef9fd93f2d89eee531a7452358
                                                                        • Opcode Fuzzy Hash: 37ad6029f9974726fbbb501f797784d54179e855ebd20c38894f830b3584d9fe
                                                                        • Instruction Fuzzy Hash: 6A016724201701D6EB05BF65E454B286292BB4CB61F1B8328CAA9023D4FE3DC4558711
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: free$ErrorFreeHeapLast_errno
                                                                        • String ID:
                                                                        • API String ID: 1012874770-0
                                                                        • Opcode ID: ba785d1238c982941d140903edaecbae51a63fc984231ccd6f56899fb4e0d745
                                                                        • Instruction ID: 94d0506aec19393bb877dbf213a6414f2c9846a0716136c69e99f6e14491144a
                                                                        • Opcode Fuzzy Hash: ba785d1238c982941d140903edaecbae51a63fc984231ccd6f56899fb4e0d745
                                                                        • Instruction Fuzzy Hash: 66014F67240540D2DB54FB65D4E17381330F7C4B82F974209CB5EA7B90CF66D8C497AA
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _errno
                                                                        • String ID:
                                                                        • API String ID: 2918714741-0
                                                                        • Opcode ID: 66e38eb1e5d66ecc368760ba28c7464eab6b20168ac38c0cfa2f5cdc5c2698cc
                                                                        • Instruction ID: 7eaa298a39d5edb1a091d49c89841dc9be7c21f829c64403009eb85fb0032ddf
                                                                        • Opcode Fuzzy Hash: 66e38eb1e5d66ecc368760ba28c7464eab6b20168ac38c0cfa2f5cdc5c2698cc
                                                                        • Instruction Fuzzy Hash: 0531D330614E484BF39AEB3898813EE7691FF4A368F41862CB416871D3DF748A089741
                                                                        APIs
                                                                        • RtlDecodePointer.NTDLL ref: 0868F565
                                                                        • RtlDecodePointer.NTDLL ref: 0868F574
                                                                          • Part of subcall function 0869145C: _errno.LIBCMT ref: 08691465
                                                                        • RtlEncodePointer.NTDLL ref: 0868F5F1
                                                                          • Part of subcall function 0868BF8C: realloc.LIBCMT ref: 0868BFB7
                                                                          • Part of subcall function 0868BF8C: Sleep.KERNEL32 ref: 0868BFD3
                                                                        • RtlEncodePointer.NTDLL ref: 0868F600
                                                                        • RtlEncodePointer.NTDLL ref: 0868F60C
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: Pointer$Encode$Decode$Sleep_errnorealloc
                                                                        • String ID:
                                                                        • API String ID: 1310268301-0
                                                                        • Opcode ID: 0cc20bc375ed2b9f610671fd6a6de7abce82c7d909c4fdaef63fdc2765df7a7b
                                                                        • Instruction ID: 926548600e5b0e6b9aedff284167da8e2c28730539b8d23b2a41e984cdb34dc8
                                                                        • Opcode Fuzzy Hash: 0cc20bc375ed2b9f610671fd6a6de7abce82c7d909c4fdaef63fdc2765df7a7b
                                                                        • Instruction Fuzzy Hash: ED21C325702740C1CA05FB62F94421AB3A1B745BC2F465A3ADA5E0B728EEB8C4C68749
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _errno$_getptd
                                                                        • String ID: $$$
                                                                        • API String ID: 3432092939-233714265
                                                                        • Opcode ID: 628abe1c37211aa1e69a6a3a5b0f5158e21bd252ecc63f90f0ca9b436314b50e
                                                                        • Instruction ID: 719a013db85181580619d3f18e3ccd385cc2ff7d98486f2603fb3e4d842d2cf1
                                                                        • Opcode Fuzzy Hash: 628abe1c37211aa1e69a6a3a5b0f5158e21bd252ecc63f90f0ca9b436314b50e
                                                                        • Instruction Fuzzy Hash: 56911830418E5C8EF7FE9A1894453F536D6FB8D796F55825DF8E7870C2DE208A4A4382
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: AddressHandleModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 1646373207-1276376045
                                                                        • Opcode ID: 7b4cb664fb2ab5645f0be5aeebf7c8d4f91b51fef83cf398051d408f8a539b73
                                                                        • Instruction ID: 5371183d73b026162ad6636a765b45113155fd92743edb945f4a085964734118
                                                                        • Opcode Fuzzy Hash: 7b4cb664fb2ab5645f0be5aeebf7c8d4f91b51fef83cf398051d408f8a539b73
                                                                        • Instruction Fuzzy Hash: D2D01210753B00A2EE199B91A8E433423547B4CB02F49502DC9BE063E0EE3985598300
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: _errno$_lockmalloc
                                                                        • String ID:
                                                                        • API String ID: 1671854079-0
                                                                        • Opcode ID: 381b43b2b8868dfcb9f7b802502813704024486d86e8a58bb0aeecdb47f1f8d8
                                                                        • Instruction ID: 888981d36ae89b3067ddb48cb700251f1a868c6ce81f92e328970524db5aa5b3
                                                                        • Opcode Fuzzy Hash: 381b43b2b8868dfcb9f7b802502813704024486d86e8a58bb0aeecdb47f1f8d8
                                                                        • Instruction Fuzzy Hash: B1214A30614E0D8FF7E6EB64D8463E9B2D0EB8C384F509929B44AC32D6DE78DA488741
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3400453857.0000000180001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000180001000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_180001000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: __doserrno_errno
                                                                        • String ID:
                                                                        • API String ID: 921712934-0
                                                                        • Opcode ID: 3c138d0b8e5f6388ccef93b597e4149f16349683ddef87cac72fa958e73bcdba
                                                                        • Instruction ID: 7fb6307f630c15b9362d7ee8c26be92a3507078568b3bbf3d38f2e14c59678f4
                                                                        • Opcode Fuzzy Hash: 3c138d0b8e5f6388ccef93b597e4149f16349683ddef87cac72fa958e73bcdba
                                                                        • Instruction Fuzzy Hash: D201B531524D4C4EF39BDB649C117E83690FB4A36AF81C66CB406D70F2DF7846098311
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000001.00000002.3393425629.0000000008681000.00000020.00000001.00020000.00000000.sdmp, Offset: 08655000, based on PE: true
                                                                        • Associated: 00000001.00000002.3393388164.0000000008655000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393404640.0000000008659000.00000004.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393444515.0000000008692000.00000002.00000001.00020000.00000000.sdmpDownload File
                                                                        • Associated: 00000001.00000002.3393461383.0000000008696000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_1_2_8655000_explorer.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalDeleteSection$Freefree
                                                                        • String ID:
                                                                        • API String ID: 1250194111-0
                                                                        • Opcode ID: 31135a0a69f803a47937673d2efa7490800c990632010fab1e98cc66b807944b
                                                                        • Instruction ID: 04cf6a09182378cb8983db5b994a257a398082c7f29ccd8c8d052ed4d7495f9e
                                                                        • Opcode Fuzzy Hash: 31135a0a69f803a47937673d2efa7490800c990632010fab1e98cc66b807944b
                                                                        • Instruction Fuzzy Hash: 7611E131A06A40C6FF18AF25F8543187320FB44B91F9A8319EBAD03795CF39C0A6CB12