Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cbot.exe

Overview

General Information

Sample name:cbot.exe
Analysis ID:1587731
MD5:800dcb9f93715f5ed7189be2e35aebd9
SHA1:5d0a60c1e85bed844bb98a864c04d87e1b66c76d
SHA256:cff151ab7a8c0d221278758e76f71fc6c120d22bc39bf98daabfe1f450642a6f
Tags:DDoSexeuser-NDA0E
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory

Classification

  • System is w10x64
  • cbot.exe (PID: 3356 cmdline: "C:\Users\user\Desktop\cbot.exe" MD5: 800DCB9F93715F5ED7189BE2E35AEBD9)
  • svchost.exe (PID: 1084 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" MD5: 800DCB9F93715F5ED7189BE2E35AEBD9)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , ProcessId: 1084, ProcessName: svchost.exe
Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\cbot.exe, ProcessId: 3356, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe
Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , ProcessId: 1084, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeReversingLabs: Detection: 21%
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeVirustotal: Detection: 23%Perma Link
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)ReversingLabs: Detection: 21%
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)Virustotal: Detection: 23%Perma Link
Source: cbot.exeReversingLabs: Detection: 21%
Source: cbot.exeVirustotal: Detection: 23%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJoe Sandbox ML: detected
Source: cbot.exeJoe Sandbox ML: detected
Source: cbot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

Networking

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeNetwork Connect: 154.213.192.42 3778Jump to behavior
Source: global trafficTCP traffic: 192.168.2.5:49704 -> 154.213.192.42:3778
Source: Joe Sandbox ViewASN Name: POWERLINE-AS-APPOWERLINEDATACENTERHK POWERLINE-AS-APPOWERLINEDATACENTERHK
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6DF563D58 htons,inet_addr,Sleep,send,send,send,send,send,memset,recv,recv,perror,closesocket,Sleep,0_2_00007FF6DF563D58
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6DF567DF00_2_00007FF6DF567DF0
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF77CFC7DF02_2_00007FF77CFC7DF0
Source: classification engineClassification label: mal88.adwa.evad.winEXE@2/3@0/1
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6DF5633E2 CreateToolhelp32Snapshot,GetLastError,Process32First,strcmp,Process32Next,CloseHandle,CloseHandle,Sleep,SleepEx,0_2_00007FF6DF5633E2
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to behavior
Source: C:\Users\user\Desktop\cbot.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: cbot.exeReversingLabs: Detection: 21%
Source: cbot.exeVirustotal: Detection: 23%
Source: C:\Users\user\Desktop\cbot.exeFile read: C:\Users\user\Desktop\cbot.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\cbot.exe "C:\Users\user\Desktop\cbot.exe"
Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
Source: C:\Users\user\Desktop\cbot.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\cbot.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\cbot.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\cbot.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\cbot.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: cbot.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: cbot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: cbot.exeStatic PE information: section name: UPX2
Source: cbot.exe.0.drStatic PE information: section name: UPX2
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to dropped file
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)Jump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to dropped file
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to behavior
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to behavior
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe\:Zone.Identifier:$DATAJump to behavior

Malware Analysis System Evasion

barindex
Source: cbot.exe, cbot.exe, 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: PROCESSHACKER.EXE
Source: cbot.exe, cbot.exe, 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: X64DBG.EXE
Source: svchost.exe, 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: NLCLIENTAPP.EXEWIRESHARK.EXEDUMPCAP.EXEX64DBG.EXEX32DBG.EXEPROCESSHACKER.EXEBOT.EXEBOT.EXECREATETOOLHELP32SNAPSHOT FAILED. ERROR: %LU
Source: cbot.exe, cbot.exe, 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: DUMPCAP.EXE
Source: cbot.exe, cbot.exe, 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\cbot.exeWindow / User API: threadDelayed 3898Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeWindow / User API: threadDelayed 3759Jump to behavior
Source: C:\Users\user\Desktop\cbot.exe TID: 6640Thread sleep count: 3898 > 30Jump to behavior
Source: C:\Users\user\Desktop\cbot.exe TID: 6640Thread sleep time: -7796000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\cbot.exe TID: 6640Thread sleep count: 230 > 30Jump to behavior
Source: C:\Users\user\Desktop\cbot.exe TID: 6640Thread sleep time: -460000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe TID: 1248Thread sleep count: 3759 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe TID: 1248Thread sleep time: -7518000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe TID: 1248Thread sleep count: 72 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe TID: 1248Thread sleep time: -144000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\cbot.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\cbot.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeLast function: Thread delayed
Source: cbot.exe, 00000000.00000002.4534881440.000002CBDBFB4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.4534899848.000002151E213000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\cbot.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6DF561190 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,exit,0_2_00007FF6DF561190
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6DF56AA8A SetUnhandledExceptionFilter,0_2_00007FF6DF56AA8A
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF77CFC1190 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,exit,2_2_00007FF77CFC1190
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF77CFCAA8A SetUnhandledExceptionFilter,2_2_00007FF77CFCAA8A

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeNetwork Connect: 154.213.192.42 3778Jump to behavior
Source: cbot.exe, cbot.exe, 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Wireshark.exe
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6DF562666 socket,free,memset,htons,bind,closesocket,free,memset,htons,inet_addr,sendto,closesocket,free,0_2_00007FF6DF562666
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6DF56241D socket,free,memset,htons,bind,closesocket,free,memset,htons,inet_addr,sendto,closesocket,free,0_2_00007FF6DF56241D
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF77CFC241D socket,free,memset,htons,bind,closesocket,free,memset,htons,inet_addr,sendto,closesocket,free,2_2_00007FF77CFC241D
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF77CFC2666 socket,free,memset,htons,bind,closesocket,free,memset,htons,inet_addr,sendto,closesocket,free,2_2_00007FF77CFC2666
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation12
Registry Run Keys / Startup Folder
11
Process Injection
1
Masquerading
OS Credential Dumping211
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
12
Registry Run Keys / Startup Folder
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA Secrets1
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
cbot.exe21%ReversingLabs
cbot.exe24%VirustotalBrowse
cbot.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe21%ReversingLabs
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe24%VirustotalBrowse
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)21%ReversingLabs
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)24%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
154.213.192.42
unknownSeychelles
132839POWERLINE-AS-APPOWERLINEDATACENTERHKtrue
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1587731
Start date and time:2025-01-10 17:30:35 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 19s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:cbot.exe
Detection:MAL
Classification:mal88.adwa.evad.winEXE@2/3@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 97%
  • Number of executed functions: 12
  • Number of non-executed functions: 44
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240000 for current running targets taking high CPU consumption
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
TimeTypeDescription
11:32:03API Interceptor4113x Sleep call for process: cbot.exe modified
11:32:15API Interceptor3816x Sleep call for process: svchost.exe modified
17:31:31AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
POWERLINE-AS-APPOWERLINEDATACENTERHKNWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
  • 154.213.39.66
armv4l.elfGet hashmaliciousUnknownBrowse
  • 156.253.200.172
https://199.188.109.181Get hashmaliciousUnknownBrowse
  • 154.203.26.164
Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
  • 156.243.249.53
sora.arm7.elfGet hashmaliciousUnknownBrowse
  • 154.216.35.228
DHL-DOC83972025-1.exeGet hashmaliciousFormBookBrowse
  • 154.215.72.110
gompsl.elfGet hashmaliciousMiraiBrowse
  • 156.251.7.182
garm5.elfGet hashmaliciousMiraiBrowse
  • 156.242.206.46
garm7.elfGet hashmaliciousMiraiBrowse
  • 156.242.206.54
gmips.elfGet hashmaliciousMiraiBrowse
  • 156.251.7.140
No context
No context
Process:C:\Users\user\Desktop\cbot.exe
File Type:PE32+ executable (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):154772
Entropy (8bit):7.054263895609286
Encrypted:false
SSDEEP:1536:/LtDu076JchveHZHAsFXGDDkDNsJQ337Tcxg3cXf3NsMpphw6p0HP94Y8udRivy:TtD9+dHNAe2v8Ns67wg3af9skh4eS/i6
MD5:800DCB9F93715F5ED7189BE2E35AEBD9
SHA1:5D0A60C1E85BED844BB98A864C04D87E1B66C76D
SHA-256:CFF151AB7A8C0D221278758E76F71FC6C120D22BC39BF98DAABFE1F450642A6F
SHA-512:F8BFBB0AF933AD0F4CF96B27811CBA1520AC436D3A511D26D1A005813B0B19FBC4B613BEBECB2F847A072CD59002F489F81AC98EE34DD84125706BBE6AC215F2
Malicious:true
Antivirus:
  • Antivirus: Joe Sandbox ML, Detection: 100%
  • Antivirus: ReversingLabs, Detection: 21%
  • Antivirus: Virustotal, Detection: 24%, Browse
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g.B........&....&.........p.............@............................. ............`... .................................................P...............x...........P...................................(...................................................UPX0.....p..............................UPX1................................@...UPX2................................@...3.94.UPX!.$...5........{......I..R...a.z.....f.....kx...KQc...D....>o.\%Qx..?o!.>......A%..#:V.,Wb.;%.U}.....t^.|..:.....r...e_H..g.....F.Ju.X......I.P%........pe..l....M.<.Gskoa.5&)7..A.1.w.'`.J..E.}..T!.RjH-/o...8A.....1...Y.wp%..S.x'...)k.... Kx.......uj.Dg.~...]7..%.)..7@O$...R....7..m..1..Z..G\j.>.;^.<..]t..h.F..=...oMv..u....\k............,..}."....8..F.....6..yRbT)....l?....(..[`.=B...!ADMo..5V.P....}l...%N.H..i.P_.l..'r....H&..kcO..g.4...Lx.o.8zJJ......
Process:C:\Users\user\Desktop\cbot.exe
File Type:ASCII text, with CRLF line terminators
Category:modified
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
SSDEEP:3:ggPYV:rPYV
MD5:187F488E27DB4AF347237FE461A079AD
SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
Malicious:true
Reputation:high, very likely benign file
Preview:[ZoneTransfer]....ZoneId=0
Process:C:\Users\user\Desktop\cbot.exe
File Type:PE32+ executable (GUI) x86-64, for MS Windows
Category:dropped
Size (bytes):154772
Entropy (8bit):7.054263895609286
Encrypted:false
SSDEEP:1536:/LtDu076JchveHZHAsFXGDDkDNsJQ337Tcxg3cXf3NsMpphw6p0HP94Y8udRivy:TtD9+dHNAe2v8Ns67wg3af9skh4eS/i6
MD5:800DCB9F93715F5ED7189BE2E35AEBD9
SHA1:5D0A60C1E85BED844BB98A864C04D87E1B66C76D
SHA-256:CFF151AB7A8C0D221278758E76F71FC6C120D22BC39BF98DAABFE1F450642A6F
SHA-512:F8BFBB0AF933AD0F4CF96B27811CBA1520AC436D3A511D26D1A005813B0B19FBC4B613BEBECB2F847A072CD59002F489F81AC98EE34DD84125706BBE6AC215F2
Malicious:true
Antivirus:
  • Antivirus: ReversingLabs, Detection: 21%
  • Antivirus: Virustotal, Detection: 24%, Browse
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g.B........&....&.........p.............@............................. ............`... .................................................P...............x...........P...................................(...................................................UPX0.....p..............................UPX1................................@...UPX2................................@...3.94.UPX!.$...5........{......I..R...a.z.....f.....kx...KQc...D....>o.\%Qx..?o!.>......A%..#:V.,Wb.;%.U}.....t^.|..:.....r...e_H..g.....F.Ju.X......I.P%........pe..l....M.<.Gskoa.5&)7..A.1.w.'`.J..E.}..T!.RjH-/o...8A.....1...Y.wp%..S.x'...)k.... Kx.......uj.Dg.~...]7..%.)..7@O$...R....7..m..1..Z..G\j.>.;^.<..]t..h.F..=...oMv..u....\k............,..}."....8..F.....6..yRbT)....l?....(..[`.=B...!ADMo..5V.P....}l...%N.H..i.P_.l..'r....H&..kcO..g.4...Lx.o.8zJJ......
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):7.054263895609286
TrID:
  • Win64 Executable GUI (202006/5) 81.26%
  • UPX compressed Win32 Executable (30571/9) 12.30%
  • Win64 Executable (generic) (12005/4) 4.83%
  • Generic Win/DOS Executable (2004/3) 0.81%
  • DOS Executable Generic (2002/1) 0.81%
File name:cbot.exe
File size:154'772 bytes
MD5:800dcb9f93715f5ed7189be2e35aebd9
SHA1:5d0a60c1e85bed844bb98a864c04d87e1b66c76d
SHA256:cff151ab7a8c0d221278758e76f71fc6c120d22bc39bf98daabfe1f450642a6f
SHA512:f8bfbb0af933ad0f4cf96b27811cba1520ac436d3a511d26d1a005813b0b19fbc4b613bebecb2f847a072cd59002f489f81ac98ee34dd84125706bbe6ac215f2
SSDEEP:1536:/LtDu076JchveHZHAsFXGDDkDNsJQ337Tcxg3cXf3NsMpphw6p0HP94Y8udRivy:TtD9+dHNAe2v8Ns67wg3af9skh4eS/i6
TLSH:BAE34AE066E85D86FA24527D41C7D222273CFBE1C7434B07493476362E63BD27DC266A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g.B........&....&.........p.............@............................. ............`... ............................
Icon Hash:00928e8e8686b000
Entrypoint:0x14007fbd0
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x677FF49E [Thu Jan 9 16:09:02 2025 UTC]
TLS Callbacks:0x400807b4, 0x1
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f09dfdec43a86f0214209d98673dd7a5
Instruction
push ebx
push esi
push edi
push ebp
dec eax
lea esi, dword ptr [FFFE844Ah]
dec eax
lea edi, dword ptr [esi-00067025h]
push edi
mov eax, 0007D898h
push eax
dec eax
mov ecx, esp
dec eax
mov edx, edi
dec eax
mov edi, esi
mov esi, 00017BA9h
push ebp
dec eax
mov ebp, esp
inc esp
mov ecx, dword ptr [ecx]
dec ecx
mov eax, edx
dec eax
mov edx, esi
dec eax
lea esi, dword ptr [edi+02h]
push esi
mov al, byte ptr [edi]
dec edx
mov cl, al
and al, 07h
shr cl, 00000003h
dec eax
mov ebx, FFFFFD00h
dec eax
shl ebx, cl
mov cl, al
dec eax
lea ebx, dword ptr [esp+ebx*2-00000E78h]
dec eax
and ebx, FFFFFFC0h
push 00000000h
dec eax
cmp esp, ebx
jne 00007FF2F8EB7F2Bh
push ebx
dec eax
lea edi, dword ptr [ebx+08h]
mov cl, byte ptr [esi-01h]
dec edx
mov byte ptr [edi+02h], al
mov al, cl
shr cl, 00000004h
mov byte ptr [edi+01h], cl
and al, 0Fh
mov byte ptr [edi], al
dec eax
lea ecx, dword ptr [edi-04h]
push eax
inc ecx
push edi
dec eax
lea eax, dword ptr [edi+04h]
inc ebp
xor edi, edi
inc ecx
push esi
inc ecx
mov esi, 00000001h
inc ecx
push ebp
inc ebp
xor ebp, ebp
inc ecx
push esp
push ebp
push ebx
dec eax
mov dword ptr [esp-10h], ecx
dec eax
mov dword ptr [esp-28h], eax
mov eax, 00000001h
dec eax
mov dword ptr [esp-08h], esi
dec esp
mov dword ptr [esp-18h], eax
mov ebx, eax
inc esp
mov dword ptr [esp-1Ch], ecx
movzx ecx, byte ptr [edi+02h]
shl ebx, cl
mov ecx, ebx
dec eax
mov ebx, dword ptr [esp+38h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x810000x150UPX2
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe0000x678UPX0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x811500x14UPX2
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x807e00x28UPX1
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x670000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX10x680000x190000x18a00f41f1ea65f943a5bd10b513b61e18c03False0.9843849143401016data7.988732441146602IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX20x810000x10000x2007d6ce4d078252eaccdfee320f323b357False0.40234375data2.962088078182722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
DLLImport
KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
msvcrt.dllatoi
SHELL32.dllSHGetSpecialFolderPathA
WS2_32.dllbind
TimestampSource PortDest PortSource IPDest IP
Jan 10, 2025 17:31:29.184557915 CET497043778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:29.189996958 CET377849704154.213.192.42192.168.2.5
Jan 10, 2025 17:31:29.190090895 CET497043778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:29.190756083 CET497043778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:29.197690964 CET377849704154.213.192.42192.168.2.5
Jan 10, 2025 17:31:29.198656082 CET497043778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:29.203567028 CET377849704154.213.192.42192.168.2.5
Jan 10, 2025 17:31:29.814238071 CET377849704154.213.192.42192.168.2.5
Jan 10, 2025 17:31:29.856040001 CET497043778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:29.947685003 CET377849704154.213.192.42192.168.2.5
Jan 10, 2025 17:31:29.996642113 CET497043778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:40.977214098 CET497053778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:40.982199907 CET377849705154.213.192.42192.168.2.5
Jan 10, 2025 17:31:40.982295990 CET497053778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:40.983053923 CET497053778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:40.987875938 CET377849705154.213.192.42192.168.2.5
Jan 10, 2025 17:31:40.987926960 CET497053778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:40.992767096 CET377849705154.213.192.42192.168.2.5
Jan 10, 2025 17:31:41.607908964 CET377849705154.213.192.42192.168.2.5
Jan 10, 2025 17:31:41.652678967 CET497053778192.168.2.5154.213.192.42
Jan 10, 2025 17:31:41.743381023 CET377849705154.213.192.42192.168.2.5
Jan 10, 2025 17:31:41.793317080 CET497053778192.168.2.5154.213.192.42

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:11:31:27
Start date:10/01/2025
Path:C:\Users\user\Desktop\cbot.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\cbot.exe"
Imagebase:0x7ff6df560000
File size:154'772 bytes
MD5 hash:800DCB9F93715F5ED7189BE2E35AEBD9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:2
Start time:11:31:39
Start date:10/01/2025
Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
Imagebase:0x7ff77cfc0000
File size:154'772 bytes
MD5 hash:800DCB9F93715F5ED7189BE2E35AEBD9
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:6.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:16.4%
    Total number of Nodes:489
    Total number of Limit Nodes:3
    execution_graph 3245 7ff6df56241d 3246 7ff6df56244d 3245->3246 3247 7ff6df562458 free 3246->3247 3248 7ff6df56246e 3246->3248 3249 7ff6df56265d 3247->3249 3258 7ff6df562110 rand 3248->3258 3251 7ff6df562473 memset 3252 7ff6df5624a4 3251->3252 3253 7ff6df5624f4 memset 3252->3253 3254 7ff6df5624ce free 3252->3254 3256 7ff6df562526 3253->3256 3254->3249 3257 7ff6df56264c free 3256->3257 3257->3249 3258->3251 2897 7ff6df564f99 signal 2898 7ff6df565010 signal 2897->2898 2899 7ff6df564f0d 2897->2899 2900 7ff6df5674a3 2901 7ff6df5674ba 2900->2901 2904 7ff6df5674ca 2900->2904 2906 7ff6df565b00 2901->2906 2903 7ff6df5679ce 2904->2903 2909 7ff6df5658e0 2904->2909 2907 7ff6df565b40 strlen 2906->2907 2908 7ff6df565b26 2906->2908 2907->2908 2908->2907 2914 7ff6df56a790 2909->2914 2911 7ff6df56590d 2912 7ff6df565979 2911->2912 2913 7ff6df56a790 2 API calls 2911->2913 2912->2903 2913->2911 2915 7ff6df56a7ae 2914->2915 2918 7ff6df56a700 2915->2918 2917 7ff6df56a7c6 2917->2911 2919 7ff6df56a714 2918->2919 2920 7ff6df56a730 WideCharToMultiByte 2918->2920 2921 7ff6df56a71b 2919->2921 2922 7ff6df56a774 _errno 2919->2922 2920->2919 2920->2922 2921->2917 2922->2917 2923 7ff6df561ca4 2924 7ff6df561cd1 2923->2924 2925 7ff6df561cdc free 2924->2925 2926 7ff6df561cf2 malloc 2924->2926 2927 7ff6df561ef0 2925->2927 2928 7ff6df561d34 memset 2926->2928 2929 7ff6df561d0e free 2926->2929 2931 7ff6df561d66 2928->2931 2929->2927 2932 7ff6df561ec0 free 2931->2932 2935 7ff6df561dd9 rand 2931->2935 2934 7ff6df561edf free 2932->2934 2934->2927 2935->2931 2936 7ff6df56a6a0 ___mb_cur_max_func ___lc_codepage_func 2939 7ff6df56a3a0 2936->2939 2938 7ff6df56a6ee 2940 7ff6df56a4e8 2939->2940 2943 7ff6df56a3b5 2939->2943 2940->2938 2941 7ff6df56a478 2941->2938 2942 7ff6df56a458 2944 7ff6df56a463 2942->2944 2945 7ff6df56a4b0 MultiByteToWideChar 2942->2945 2943->2941 2943->2942 2946 7ff6df56a3e9 IsDBCSLeadByteEx 2943->2946 2949 7ff6df56a404 2943->2949 2944->2938 2945->2941 2948 7ff6df56a4f8 _errno 2945->2948 2946->2942 2946->2949 2947 7ff6df56a42e MultiByteToWideChar 2947->2948 2950 7ff6df56a448 2947->2950 2948->2941 2949->2941 2949->2947 2950->2938 3268 7ff6df56391f 3271 7ff6df562ed2 3268->3271 3273 7ff6df562f83 3271->3273 3272 7ff6df562f0c malloc 3272->3273 3273->3272 3274 7ff6df562fef 3273->3274 3275 7ff6df562fb7 free 3273->3275 3275->3273 2951 7ff6df5647a0 2952 7ff6df5647bf 2951->2952 2953 7ff6df5647fd fprintf 2952->2953 2954 7ff6df5650a6 2955 7ff6df5650d0 2954->2955 2957 7ff6df5650c6 2954->2957 2956 7ff6df5650e7 RtlEnterCriticalSection RtlLeaveCriticalSection 2955->2956 2955->2957 2958 7ff6df5675a8 2959 7ff6df5675c3 2958->2959 2962 7ff6df5675db 2958->2962 2964 7ff6df5666b0 2959->2964 2960 7ff6df5666b0 21 API calls 2963 7ff6df56781e 2960->2963 2962->2960 2963->2963 2965 7ff6df5666ca 2964->2965 2976 7ff6df566743 2964->2976 2977 7ff6df565770 2965->2977 2968 7ff6df566768 2969 7ff6df56676c strlen 2968->2969 2970 7ff6df566777 2968->2970 2969->2970 2990 7ff6df566510 2970->2990 2971 7ff6df566724 2972 7ff6df56672c 2971->2972 2973 7ff6df5667f8 strlen 2971->2973 2981 7ff6df565d10 2972->2981 2973->2972 2976->2962 2978 7ff6df565788 2977->2978 2994 7ff6df567df0 2978->2994 2980 7ff6df5657ff 2980->2968 2980->2971 2980->2976 2984 7ff6df565d30 2981->2984 2982 7ff6df565ec2 2988 7ff6df565ee5 2982->2988 3086 7ff6df565c00 2982->3086 2984->2982 2985 7ff6df565ddd 2984->2985 2986 7ff6df565f98 2984->2986 2985->2982 2989 7ff6df5658e0 2 API calls 2985->2989 2987 7ff6df565c00 8 API calls 2986->2987 2986->2988 2987->2988 2988->2976 2989->2985 2991 7ff6df56653c 2990->2991 2992 7ff6df565d10 8 API calls 2991->2992 2993 7ff6df5665ac 2992->2993 2995 7ff6df567e36 2994->2995 2996 7ff6df5680f0 2994->2996 2997 7ff6df568060 2995->2997 3002 7ff6df567e46 2995->3002 2998 7ff6df567bd0 6 API calls 2996->2998 3022 7ff6df56808d 2997->3022 3041 7ff6df567bd0 2997->3041 2998->3022 2999 7ff6df5680c0 3000 7ff6df567bd0 6 API calls 2999->3000 3000->3022 3002->2999 3002->3002 3011 7ff6df567f46 3002->3011 3002->3022 3034 7ff6df569750 3002->3034 3004 7ff6df567e7f 3005 7ff6df5680b8 3004->3005 3004->3011 3045 7ff6df569850 3005->3045 3006 7ff6df568429 3006->2980 3008 7ff6df568440 3009 7ff6df568230 3008->3009 3010 7ff6df567b90 6 API calls 3008->3010 3014 7ff6df568948 3009->3014 3015 7ff6df569970 6 API calls 3009->3015 3019 7ff6df5683f1 3009->3019 3020 7ff6df5686bd 3009->3020 3023 7ff6df569af0 10 API calls 3009->3023 3025 7ff6df56869f 3009->3025 3026 7ff6df569c80 7 API calls 3009->3026 3028 7ff6df569750 6 API calls 3009->3028 3032 7ff6df5698c0 8 API calls 3009->3032 3033 7ff6df569850 Sleep RtlInitializeCriticalSection RtlInitializeCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 3009->3033 3055 7ff6df5699a0 3009->3055 3066 7ff6df569e00 3009->3066 3010->3009 3011->3006 3011->3008 3011->3009 3012 7ff6df5681f3 3011->3012 3051 7ff6df567b90 3012->3051 3014->2980 3015->3009 3016 7ff6df569850 5 API calls 3017 7ff6df568701 3016->3017 3017->3019 3021 7ff6df569850 5 API calls 3017->3021 3018 7ff6df569850 5 API calls 3018->3022 3019->3018 3020->3014 3020->3016 3021->3019 3022->2980 3023->3009 3025->3014 3059 7ff6df5698c0 3025->3059 3026->3009 3029 7ff6df56917d memcpy 3028->3029 3073 7ff6df569c80 3029->3073 3032->3009 3033->3009 3079 7ff6df569620 3034->3079 3037 7ff6df569764 malloc 3038 7ff6df569791 3037->3038 3039 7ff6df5697a0 3037->3039 3038->3039 3040 7ff6df5697d3 RtlLeaveCriticalSection 3038->3040 3039->3004 3040->3039 3042 7ff6df567be3 3041->3042 3043 7ff6df569750 6 API calls 3042->3043 3044 7ff6df567c04 3043->3044 3044->3022 3044->3044 3046 7ff6df569898 3045->3046 3047 7ff6df56985e 3045->3047 3046->2999 3048 7ff6df569620 4 API calls 3047->3048 3049 7ff6df569877 3048->3049 3049->3046 3050 7ff6df5698a0 RtlLeaveCriticalSection 3049->3050 3052 7ff6df567b9c 3051->3052 3053 7ff6df569750 6 API calls 3052->3053 3054 7ff6df567bbb 3053->3054 3054->3009 3056 7ff6df5699c2 3055->3056 3057 7ff6df569750 6 API calls 3056->3057 3058 7ff6df5699e5 3057->3058 3058->3009 3060 7ff6df5698e0 3059->3060 3061 7ff6df569750 6 API calls 3060->3061 3065 7ff6df56990f 3060->3065 3062 7ff6df56993d 3061->3062 3063 7ff6df569945 memcpy 3062->3063 3062->3065 3064 7ff6df569850 5 API calls 3063->3064 3064->3065 3065->3020 3067 7ff6df569e59 3066->3067 3068 7ff6df569e21 3066->3068 3069 7ff6df569750 6 API calls 3067->3069 3068->3067 3070 7ff6df569fa0 3068->3070 3072 7ff6df569e67 3069->3072 3071 7ff6df569750 6 API calls 3070->3071 3071->3072 3072->3009 3072->3072 3074 7ff6df569caf 3073->3074 3075 7ff6df569750 6 API calls 3074->3075 3077 7ff6df569cbe 3075->3077 3076 7ff6df569d84 3076->3009 3077->3076 3078 7ff6df569850 5 API calls 3077->3078 3078->3076 3080 7ff6df5696ae RtlEnterCriticalSection 3079->3080 3081 7ff6df569633 3079->3081 3084 7ff6df569637 3080->3084 3082 7ff6df56967f RtlInitializeCriticalSection RtlInitializeCriticalSection 3081->3082 3081->3084 3082->3084 3083 7ff6df56965f 3083->3037 3083->3038 3084->3080 3084->3083 3085 7ff6df569648 Sleep 3084->3085 3085->3084 3085->3085 3087 7ff6df565cb0 3086->3087 3090 7ff6df565c1a 3086->3090 3093 7ff6df56a520 ___mb_cur_max_func ___lc_codepage_func 3087->3093 3088 7ff6df565c90 3088->2988 3090->3088 3091 7ff6df56a790 2 API calls 3090->3091 3092 7ff6df565c54 3091->3092 3092->2988 3094 7ff6df56a3a0 4 API calls 3093->3094 3095 7ff6df56a57a 3094->3095 3095->3090 3109 7ff6df563fb0 3110 7ff6df563ff0 3109->3110 3111 7ff6df563fca rand 3110->3111 3112 7ff6df563ffa 3110->3112 3111->3110 3276 7ff6df565330 strlen 3277 7ff6df5653c0 3276->3277 3280 7ff6df565346 3276->3280 3278 7ff6df5653ae 3279 7ff6df565399 strncmp 3279->3278 3279->3280 3280->3277 3280->3278 3280->3279 3281 7ff6df565130 3282 7ff6df565141 3281->3282 3283 7ff6df565150 RtlEnterCriticalSection 3281->3283 3284 7ff6df565193 RtlLeaveCriticalSection 3283->3284 3285 7ff6df565169 3283->3285 3285->3284 3286 7ff6df56518e free 3285->3286 3286->3284 3113 7ff6df56777b 3114 7ff6df5675fb 3113->3114 3115 7ff6df56778f 3113->3115 3114->3113 3119 7ff6df566600 3114->3119 3117 7ff6df566600 19 API calls 3115->3117 3118 7ff6df5677ae 3117->3118 3118->3118 3120 7ff6df566615 3119->3120 3121 7ff6df565770 11 API calls 3120->3121 3122 7ff6df566646 3121->3122 3123 7ff6df566510 8 API calls 3122->3123 3125 7ff6df566690 3122->3125 3124 7ff6df566666 3123->3124 3124->3114 3125->3114 3287 7ff6df569700 3288 7ff6df569715 3287->3288 3289 7ff6df569720 RtlDeleteCriticalSection 3287->3289 3135 7ff6df56177e 3136 7ff6df5617ae 3135->3136 3137 7ff6df5617b9 free 3136->3137 3138 7ff6df5617cf memset 3136->3138 3139 7ff6df561971 3137->3139 3141 7ff6df561801 3138->3141 3140 7ff6df561960 free 3140->3139 3141->3140 3290 7ff6df564700 3291 7ff6df564712 3290->3291 3294 7ff6df564722 3291->3294 3295 7ff6df5651c0 3291->3295 3293 7ff6df564775 3296 7ff6df5651ce 3295->3296 3297 7ff6df565290 3295->3297 3298 7ff6df5651d4 3296->3298 3300 7ff6df5651de 3296->3300 3301 7ff6df565220 3296->3301 3297->3293 3299 7ff6df565210 RtlInitializeCriticalSection 3298->3299 3298->3300 3299->3300 3300->3293 3301->3300 3302 7ff6df565261 RtlDeleteCriticalSection 3301->3302 3303 7ff6df565250 free 3301->3303 3302->3300 3303->3302 3303->3303 3145 7ff6df56798a 3146 7ff6df56798f 3145->3146 3147 7ff6df5679ce 3146->3147 3148 7ff6df5658e0 2 API calls 3146->3148 3148->3147 3149 7ff6df56aa8a SetUnhandledExceptionFilter 3304 7ff6df567915 3305 7ff6df567838 3304->3305 3306 7ff6df56791e localeconv 3304->3306 3307 7ff6df56a520 6 API calls 3306->3307 3308 7ff6df56795b 3307->3308 3150 7ff6df56a590 ___lc_codepage_func ___mb_cur_max_func 3151 7ff6df56a5e8 3150->3151 3152 7ff6df56a5cf 3150->3152 3152->3151 3153 7ff6df56a5e0 3152->3153 3156 7ff6df56a650 3152->3156 3153->3151 3155 7ff6df56a3a0 4 API calls 3153->3155 3154 7ff6df56a3a0 4 API calls 3154->3156 3155->3153 3156->3151 3156->3154 3309 7ff6df561010 3310 7ff6df561058 3309->3310 3311 7ff6df56107a __set_app_type 3310->3311 3312 7ff6df561084 3310->3312 3311->3312 3157 7ff6df567658 3158 7ff6df567664 3157->3158 3159 7ff6df565b00 strlen 3158->3159 3160 7ff6df567671 3159->3160 3160->3160 2883 7ff6df5633e2 2891 7ff6df5633fe 2883->2891 2884 7ff6df563532 2885 7ff6df563414 CreateToolhelp32Snapshot 2887 7ff6df563450 Process32First 2885->2887 2885->2891 2886 7ff6df563515 SleepEx 2886->2891 2888 7ff6df5634e2 CloseHandle 2887->2888 2889 7ff6df56346f strcmp 2887->2889 2888->2891 2890 7ff6df5634ca Process32Next 2889->2890 2889->2891 2890->2888 2890->2889 2891->2884 2891->2885 2891->2886 2891->2888 2893 7ff6df563261 2891->2893 2896 7ff6df563287 2893->2896 2894 7ff6df563298 2894->2891 2895 7ff6df563387 Process32Next 2895->2894 2895->2896 2896->2894 2896->2895 3316 7ff6df56a7e0 ___lc_codepage_func ___mb_cur_max_func 3317 7ff6df56a812 3316->3317 3322 7ff6df56a81c 3316->3322 3318 7ff6df56a878 3317->3318 3319 7ff6df56a817 3317->3319 3321 7ff6df56a700 2 API calls 3318->3321 3318->3322 3320 7ff6df56a700 2 API calls 3319->3320 3319->3322 3320->3319 3321->3318 3323 7ff6df5638de 3324 7ff6df5638fd 3323->3324 3327 7ff6df562a13 3324->3327 3330 7ff6df562ac4 3327->3330 3328 7ff6df562a4d malloc 3328->3330 3329 7ff6df562b30 3330->3328 3330->3329 3331 7ff6df562af8 free 3330->3331 3331->3330 3332 7ff6df564ede signal 3333 7ff6df564f08 3332->3333 3334 7ff6df564ef4 signal 3332->3334 3334->3333 3169 7ff6df567860 3170 7ff6df567874 3169->3170 3171 7ff6df56770f 3169->3171 3173 7ff6df566cc0 8 API calls 3170->3173 3171->3169 3175 7ff6df566cc0 3171->3175 3174 7ff6df567893 3173->3174 3174->3174 3177 7ff6df566d20 3175->3177 3179 7ff6df566e90 3175->3179 3176 7ff6df5658e0 2 API calls 3176->3177 3177->3176 3178 7ff6df565c00 8 API calls 3177->3178 3177->3179 3178->3177 3179->3171 3341 7ff6df5677eb 3342 7ff6df5675c3 3341->3342 3343 7ff6df5675db 3341->3343 3345 7ff6df5666b0 21 API calls 3342->3345 3344 7ff6df5666b0 21 API calls 3343->3344 3346 7ff6df56781e 3344->3346 3345->3343 3346->3346 3355 7ff6df56aaf2 RtlEnterCriticalSection 3356 7ff6df5676f4 3357 7ff6df567874 3356->3357 3360 7ff6df56770f 3356->3360 3359 7ff6df566cc0 8 API calls 3357->3359 3358 7ff6df566cc0 8 API calls 3358->3360 3361 7ff6df567893 3359->3361 3360->3357 3360->3358 3361->3361 3362 7ff6df56a0f0 3363 7ff6df569750 6 API calls 3362->3363 3364 7ff6df56a10c 3363->3364 3200 7ff6df567570 3201 7ff6df5677c7 3200->3201 3205 7ff6df56758b 3200->3205 3203 7ff6df5660d0 19 API calls 3201->3203 3202 7ff6df5660d0 19 API calls 3202->3205 3204 7ff6df5677e6 3203->3204 3204->3204 3205->3201 3205->3202 3365 7ff6df5614f0 3368 7ff6df561190 3365->3368 3367 7ff6df561506 3369 7ff6df5611c4 3368->3369 3370 7ff6df561470 GetStartupInfoA 3368->3370 3372 7ff6df5611f1 Sleep 3369->3372 3373 7ff6df561206 3369->3373 3371 7ff6df5613d8 3370->3371 3371->3367 3372->3369 3374 7ff6df56143c _initterm 3373->3374 3375 7ff6df561239 3373->3375 3388 7ff6df5613c4 3373->3388 3374->3375 3389 7ff6df564b40 3375->3389 3377 7ff6df5614be exit 3379 7ff6df561190 26 API calls 3377->3379 3378 7ff6df561261 SetUnhandledExceptionFilter 3382 7ff6df561284 3378->3382 3380 7ff6df5614e6 3379->3380 3380->3367 3381 7ff6df56131e malloc 3383 7ff6df56138b 3381->3383 3384 7ff6df561345 3381->3384 3382->3381 3409 7ff6df563d58 3383->3409 3385 7ff6df561350 strlen malloc memcpy 3384->3385 3385->3385 3386 7ff6df561386 3385->3386 3386->3383 3388->3371 3388->3377 3391 7ff6df564b78 3389->3391 3395 7ff6df564b62 3389->3395 3390 7ff6df564db0 3390->3395 3403 7ff6df564daa 3390->3403 3391->3390 3392 7ff6df564e18 3391->3392 3391->3395 3396 7ff6df564d3e 3391->3396 3404 7ff6df564c20 3391->3404 3394 7ff6df5648b0 8 API calls 3392->3394 3393 7ff6df564920 8 API calls 3393->3403 3398 7ff6df564e24 3394->3398 3395->3378 3397 7ff6df564dfc 3396->3397 3421 7ff6df564920 3396->3421 3450 7ff6df5648b0 3397->3450 3398->3378 3399 7ff6df564d78 3402 7ff6df564920 8 API calls 3399->3402 3402->3403 3403->3390 3403->3393 3403->3397 3404->3396 3404->3397 3404->3399 3405 7ff6df564920 8 API calls 3404->3405 3406 7ff6df564cd0 3404->3406 3407 7ff6df564cc6 3404->3407 3405->3404 3406->3395 3408 7ff6df564d02 VirtualProtect 3406->3408 3407->3406 3408->3406 3410 7ff6df563d6d 3409->3410 3478 7ff6df564146 3410->3478 3412 7ff6df563d72 3486 7ff6df563a84 CreateThread 3412->3486 3415 7ff6df563df7 send 3419 7ff6df563d77 3415->3419 3416 7ff6df563e44 send 3417 7ff6df563e9e memset recv 3416->3417 3418 7ff6df563ee4 perror 3417->3418 3417->3419 3418->3419 3419->3415 3419->3416 3419->3417 3488 7ff6df563ae6 socket 3419->3488 3493 7ff6df563660 3419->3493 3422 7ff6df564ad0 3421->3422 3424 7ff6df564942 3421->3424 3422->3399 3423 7ff6df5649f0 3423->3399 3423->3423 3424->3423 3425 7ff6df564b2d 3424->3425 3427 7ff6df5649ac VirtualQuery 3424->3427 3426 7ff6df5648b0 4 API calls 3425->3426 3446 7ff6df564b3c 3426->3446 3428 7ff6df5649d8 3427->3428 3429 7ff6df564b12 3427->3429 3428->3423 3431 7ff6df564a80 VirtualProtect 3428->3431 3430 7ff6df5648b0 4 API calls 3429->3430 3430->3425 3431->3423 3432 7ff6df564abc GetLastError 3431->3432 3433 7ff6df5648b0 4 API calls 3432->3433 3433->3422 3434 7ff6df564d3e 3439 7ff6df564dfc 3434->3439 3443 7ff6df564920 4 API calls 3434->3443 3435 7ff6df564e18 3437 7ff6df5648b0 4 API calls 3435->3437 3436 7ff6df564920 4 API calls 3438 7ff6df564daa 3436->3438 3440 7ff6df564e24 3437->3440 3438->3436 3438->3439 3449 7ff6df564b62 3438->3449 3442 7ff6df5648b0 4 API calls 3439->3442 3440->3399 3441 7ff6df564d78 3444 7ff6df564920 4 API calls 3441->3444 3442->3435 3443->3441 3444->3438 3445 7ff6df564920 VirtualQuery VirtualProtect GetLastError VirtualProtect 3445->3446 3446->3434 3446->3435 3446->3438 3446->3439 3446->3441 3446->3445 3448 7ff6df564cc6 3446->3448 3446->3449 3447 7ff6df564d02 VirtualProtect 3447->3448 3448->3447 3448->3449 3449->3399 3451 7ff6df5648dd 3450->3451 3452 7ff6df5649f0 3451->3452 3453 7ff6df564b2d 3451->3453 3455 7ff6df5649ac VirtualQuery 3451->3455 3452->3392 3454 7ff6df5648b0 4 API calls 3453->3454 3475 7ff6df564b3c 3454->3475 3456 7ff6df5649d8 3455->3456 3457 7ff6df564b12 3455->3457 3456->3452 3460 7ff6df564a80 VirtualProtect 3456->3460 3458 7ff6df5648b0 4 API calls 3457->3458 3458->3453 3459 7ff6df564b62 3459->3392 3460->3452 3461 7ff6df564abc GetLastError 3460->3461 3462 7ff6df5648b0 4 API calls 3461->3462 3462->3452 3463 7ff6df564d3e 3468 7ff6df564dfc 3463->3468 3472 7ff6df564920 4 API calls 3463->3472 3464 7ff6df564e18 3466 7ff6df5648b0 4 API calls 3464->3466 3465 7ff6df564920 4 API calls 3467 7ff6df564daa 3465->3467 3469 7ff6df564e24 3466->3469 3467->3459 3467->3465 3467->3468 3471 7ff6df5648b0 4 API calls 3468->3471 3469->3392 3470 7ff6df564d78 3473 7ff6df564920 4 API calls 3470->3473 3471->3464 3472->3470 3473->3467 3474 7ff6df564920 VirtualQuery VirtualProtect GetLastError VirtualProtect 3474->3475 3475->3459 3475->3463 3475->3464 3475->3467 3475->3468 3475->3470 3475->3474 3476 7ff6df564cc6 3475->3476 3476->3459 3477 7ff6df564d02 VirtualProtect 3476->3477 3477->3476 3479 7ff6df564174 3478->3479 3483 7ff6df564229 3479->3483 3498 7ff6df5640f0 3479->3498 3481 7ff6df5641b3 3482 7ff6df5641f4 CopyFileA 3481->3482 3481->3483 3482->3483 3484 7ff6df564218 3482->3484 3483->3412 3502 7ff6df5643b9 3484->3502 3487 7ff6df563ac8 3486->3487 3487->3419 3489 7ff6df563b68 ioctlsocket connect 3488->3489 3490 7ff6df563b52 3488->3490 3491 7ff6df563d1b ioctlsocket 3489->3491 3492 7ff6df563bc3 3489->3492 3490->3419 3491->3490 3492->3490 3492->3491 3494 7ff6df5638af 3493->3494 3495 7ff6df56367c 3493->3495 3494->3419 3495->3494 3496 7ff6df563777 memcpy atoi 3495->3496 3497 7ff6df5637d2 memcpy atoi 3495->3497 3496->3495 3497->3495 3499 7ff6df56410e 3498->3499 3500 7ff6df564119 _mbscpy 3499->3500 3501 7ff6df56412f 3499->3501 3500->3501 3501->3481 3503 7ff6df5643e7 3502->3503 3504 7ff6df5640f0 _mbscpy 3503->3504 3505 7ff6df564509 3503->3505 3507 7ff6df564426 3504->3507 3505->3483 3506 7ff6df5644eb MoveFileA 3506->3505 3507->3505 3507->3506 3508 7ff6df56aac1 RtlLeaveCriticalSection 3509 7ff6df5615c0 3510 7ff6df5615ed 3509->3510 3511 7ff6df5615f8 free 3510->3511 3512 7ff6df56160e memset 3510->3512 3513 7ff6df561778 3511->3513 3514 7ff6df561640 memset 3512->3514 3516 7ff6df56169e 3514->3516 3517 7ff6df561767 free 3516->3517 3517->3513 3518 7ff6df5622c9 3519 7ff6df5622f6 3518->3519 3520 7ff6df562317 memset 3519->3520 3521 7ff6df562301 free 3519->3521 3523 7ff6df562349 rand 3520->3523 3522 7ff6df562417 3521->3522 3525 7ff6df56236f memset 3523->3525 3527 7ff6df5623a2 3525->3527 3528 7ff6df562406 free 3527->3528 3528->3522 3529 7ff6df5674cf 3530 7ff6df5674f1 3529->3530 3531 7ff6df5658e0 2 API calls 3530->3531 3532 7ff6df567776 3531->3532 3532->3532 3533 7ff6df56aad1 RtlInitializeCriticalSection 3534 7ff6df5646d0 3535 7ff6df5646d9 3534->3535 3536 7ff6df5646dd 3535->3536 3537 7ff6df5651c0 3 API calls 3535->3537 3538 7ff6df5646f5 3537->3538

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: send$CopyCreateFileThreadmemsetperrorrecvsocket
    • String ID: %02x $154.213.192.42$Connected to C&C server$Connection failed. Retrying...$Disconnected from server. Retrying in 500ms...$Received %d bytes: $recv failed$win_x86_x64
    • API String ID: 1215720109-3681654477
    • Opcode ID: 52fefeefcdcf2a04f80c01cf7036b6e0bdcb3ce1ba97b7727e3dfdfb8c4737e3
    • Instruction ID: d8831f1cfeeb84a86939d99c7f5c667e1461eeca52a0151f3b82b63102b29342
    • Opcode Fuzzy Hash: 52fefeefcdcf2a04f80c01cf7036b6e0bdcb3ce1ba97b7727e3dfdfb8c4737e3
    • Instruction Fuzzy Hash: E5514F21B0868A8DFB21DB65E8947ED2770AB64788F00003BE91DDBBA5DE3DD655C780

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 81 7ff6df561190-7ff6df5611be 82 7ff6df5611c4-7ff6df5611e1 81->82 83 7ff6df561470-7ff6df561473 GetStartupInfoA 81->83 84 7ff6df5611f9-7ff6df561204 82->84 87 7ff6df561480-7ff6df56149a call 7ff6df56a368 83->87 85 7ff6df561206-7ff6df561214 84->85 86 7ff6df5611e8-7ff6df5611eb 84->86 90 7ff6df56121a-7ff6df56121e 85->90 91 7ff6df561427-7ff6df561436 call 7ff6df56a370 85->91 88 7ff6df5611f1-7ff6df5611f6 Sleep 86->88 89 7ff6df561410-7ff6df561421 86->89 88->84 89->90 89->91 94 7ff6df561224-7ff6df561233 90->94 95 7ff6df5614a0-7ff6df5614b9 call 7ff6df56a358 90->95 99 7ff6df56143c-7ff6df561457 _initterm 91->99 100 7ff6df561239-7ff6df56123b 91->100 94->99 94->100 107 7ff6df5614be-7ff6df5614e1 exit call 7ff6df561190 95->107 102 7ff6df56145d-7ff6df561462 99->102 103 7ff6df561241-7ff6df56124e 99->103 100->102 100->103 102->103 104 7ff6df56125c-7ff6df5612a4 call 7ff6df564b40 SetUnhandledExceptionFilter call 7ff6df56a910 call 7ff6df5648a0 call 7ff6df56a9f0 103->104 105 7ff6df561250-7ff6df561258 103->105 117 7ff6df5612a6 104->117 118 7ff6df5612c2-7ff6df5612c8 104->118 105->104 111 7ff6df5614e6-7ff6df5614ec 107->111 121 7ff6df561300-7ff6df561306 117->121 119 7ff6df5612ca-7ff6df5612d8 118->119 120 7ff6df5612b0-7ff6df5612b2 118->120 122 7ff6df5612be 119->122 125 7ff6df5612f9 120->125 126 7ff6df5612b4-7ff6df5612b7 120->126 123 7ff6df561308-7ff6df561312 121->123 124 7ff6df56131e-7ff6df561343 malloc 121->124 122->118 127 7ff6df561318 123->127 128 7ff6df561400-7ff6df561405 123->128 129 7ff6df56138b-7ff6df5613bf call 7ff6df564690 call 7ff6df563d58 124->129 130 7ff6df561345-7ff6df56134a 124->130 125->121 131 7ff6df5612b9 126->131 132 7ff6df5612e0-7ff6df5612e2 126->132 127->124 128->127 141 7ff6df5613c4-7ff6df5613d2 129->141 134 7ff6df561350-7ff6df561384 strlen malloc memcpy 130->134 131->122 132->125 133 7ff6df5612e4 132->133 136 7ff6df5612e8-7ff6df5612f2 133->136 134->134 137 7ff6df561386 134->137 136->125 140 7ff6df5612f4-7ff6df5612f7 136->140 137->129 140->125 140->136 141->107 142 7ff6df5613d8-7ff6df5613e0 141->142 142->87 143 7ff6df5613e6-7ff6df5613f5 142->143
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
    • String ID:
    • API String ID: 649803965-0
    • Opcode ID: e225db0f86b9ce421def3ab0fa0d7062bc5e7b1d61233733194764ee289550e2
    • Instruction ID: 936d0e8d7fcd056dab540c568c80831a2a7d6068e58dc4fd1ea298a003fe8b67
    • Opcode Fuzzy Hash: e225db0f86b9ce421def3ab0fa0d7062bc5e7b1d61233733194764ee289550e2
    • Instruction Fuzzy Hash: 84816731E0864E95FB60AF16E45077D37A0AF65B85F888137EA2CC7391DE2DF8608380

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: Sleep
    • String ID: CreateToolhelp32Snapshot failed. Error: %lu
    • API String ID: 3472027048-731459797
    • Opcode ID: ae22be0987ea78f0aaeb91b8f08f01e6461eae328b81d81411c2ff8828f2edc0
    • Instruction ID: 9b95cffed98ab56eb37d126a6c55b04a2cfe98b05b19bf860e0ac12ea2f8620a
    • Opcode Fuzzy Hash: ae22be0987ea78f0aaeb91b8f08f01e6461eae328b81d81411c2ff8828f2edc0
    • Instruction Fuzzy Hash: 25315231A08B8E99EB309B64D8443FC2360FB24358F504137E92DDB7A5DE2DE5A48390

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: FileMove_mbscpy
    • String ID: %s\%s$Error while deleting old file: %d$Error while renaming file: %d$Error: Could not get Startup folder path.$File does not exist in Startup to rename.$File renamed successfully to: %s$Old file with the same name deleted successfully.$svchost.exe
    • API String ID: 2828783803-2379623443
    • Opcode ID: f5b3094a7a351dbbf5c37f2e529bab28ea883e64a2467667b18b94c603bc05a4
    • Instruction ID: 8e618d38a98fd1a14cde85e0d40ba0345be7d55e6576ce1ec10b4e8e562687e8
    • Opcode Fuzzy Hash: f5b3094a7a351dbbf5c37f2e529bab28ea883e64a2467667b18b94c603bc05a4
    • Instruction Fuzzy Hash: 5141E021B09A8B98EB20DB61EC553FD2364AF65744F404037E92DCBBA5EE2CD725C390

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: File$CopyMove_mbscpy
    • String ID: %s\%s$Error while copying file: %d$Error: Could not get Startup folder path.$File already exists in Startup.$File copied to Startup successfully.
    • API String ID: 655623600-1093518506
    • Opcode ID: 5afcab7db7bad85c666d1735b30a3c9bad96832981f7368ccec23b859591415e
    • Instruction ID: e793af1ccbfd9f9addd36923aa020e04d42a725ff794d39f3cc2c3f608e7b6d5
    • Opcode Fuzzy Hash: 5afcab7db7bad85c666d1735b30a3c9bad96832981f7368ccec23b859591415e
    • Instruction Fuzzy Hash: F0214421B08A8A94FB20EB61EC543FD1351AF64748F904033E92DCBBA5EE2DD725C380

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: connectioctlsocketsocket
    • String ID: Socket creation failed
    • API String ID: 3033478179-2728381879
    • Opcode ID: 3fca099bde09a1a059df5816efd18c7b1ebc4960c7c28b0057210e83bd6d0c1a
    • Instruction ID: 78ea8a17a885de31f057767fed3c8b3831e9cab803e373f97ffa7891df7246e8
    • Opcode Fuzzy Hash: 3fca099bde09a1a059df5816efd18c7b1ebc4960c7c28b0057210e83bd6d0c1a
    • Instruction Fuzzy Hash: 7361EF72B04A8A8EE7748F69DC443DC33A1E758798F108137DA2D9BBA9DF38D5508740

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 215 7ff6df563a84-7ff6df563ac6 CreateThread 216 7ff6df563ac8-7ff6df563ada call 7ff6df563570 215->216 217 7ff6df563adf-7ff6df563ae5 215->217 216->217
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: CreateThread
    • String ID: Failed to create thread. Error: %lu
    • API String ID: 2422867632-1876256139
    • Opcode ID: cd41cf2e5e1f9492d1ffe20eb3d477d557d5a9303e1400c434a624d3a7105117
    • Instruction ID: b41b220e17f1bfaa9de2d8c00f48333b1cb812191b068a520116a03877656557
    • Opcode Fuzzy Hash: cd41cf2e5e1f9492d1ffe20eb3d477d557d5a9303e1400c434a624d3a7105117
    • Instruction Fuzzy Hash: 78F06531F0460999F310A761E8553AE27A0E760788F148137D95D9B7A4DE3DD9A18780

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: free$memset
    • String ID: SAMPgy_$c
    • API String ID: 2717317152-1181286492
    • Opcode ID: 11a51b238fa7ff4f3de048e7e0399e496a3b39d4eba30ae5ff845e0166315fef
    • Instruction ID: 7113aa0ecfda3cf3f7a0efd648c379f0a44bc9b7bde7235a9477043e4dc01534
    • Opcode Fuzzy Hash: 11a51b238fa7ff4f3de048e7e0399e496a3b39d4eba30ae5ff845e0166315fef
    • Instruction Fuzzy Hash: 72515E26F147198CFB40DBB6E8403AC37B0AB58B98F10453AEE6D97BA9DF39C5108750
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID:
    • String ID: $ $Infinity$NaN
    • API String ID: 0-3274152445
    • Opcode ID: fa0095dd0704e67f1fdba37e40ff34f5250a2dc34ff6449e999dcc29cf86c872
    • Instruction ID: d65561383a84511fb7ab3a0c092537ca9399efda6bb7bfd7034dbb90bcd068ea
    • Opcode Fuzzy Hash: fa0095dd0704e67f1fdba37e40ff34f5250a2dc34ff6449e999dcc29cf86c872
    • Instruction Fuzzy Hash: 5DC2E972A1C6468AE7618F25E04076E77A0FFA5785F008136FA6A97B85DF3DE450CF80
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: free$memset
    • String ID:
    • API String ID: 2717317152-0
    • Opcode ID: 4f8eb30e03a2088e02aa41d26e0366e703c7c16698a6fc90498e6d19936d4cc9
    • Instruction ID: 3a53f3b8ca40a543a51fde041611233da3a33d29a895ebf8f12f05840001bb1c
    • Opcode Fuzzy Hash: 4f8eb30e03a2088e02aa41d26e0366e703c7c16698a6fc90498e6d19936d4cc9
    • Instruction Fuzzy Hash: 3B513A76F15B188CEB50DBA6E8403AC33B0BB58B98F00413ADE5DA7BA8DF38D5508740
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a92a76f01a41839edb0db2aacd7120ad0be31812e7200489862737987be0680a
    • Instruction ID: 642c589a1c98018b1f4a57fe4287a9c1be7793384c00ae86aa01daa3788729e2
    • Opcode Fuzzy Hash: a92a76f01a41839edb0db2aacd7120ad0be31812e7200489862737987be0680a
    • Instruction Fuzzy Hash: 78B01233C28D1288D3056F00CC017A463BCE395290F01A431C08882592CE7CD122C514

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: atoimemcpy
    • String ID: %d.%d.%d.%d$Packet size set to: %d bytes$Port set to: %d$Threads set to: %d$Unknown command
    • API String ID: 126230704-3691821516
    • Opcode ID: 761a1ce485632921bbffb7281cf2a6218fe9a642e71f4fdc5b2252f871c063eb
    • Instruction ID: 4634c72a4c4a74db1daa9f4c60b738c0ae6c0f182509e4333a83978bf41c93c5
    • Opcode Fuzzy Hash: 761a1ce485632921bbffb7281cf2a6218fe9a642e71f4fdc5b2252f871c063eb
    • Instruction Fuzzy Hash: 1F814FB2F052449EEB00CBB9C4442EC3BB0AB5534CF404436EA6C97B9ADE3DD655CB90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 266 7ff6df5648b0-7ff6df56493c call 7ff6df56a8e0 call 7ff6df56a2f8 call 7ff6df56a8e0 call 7ff6df56a288 call 7ff6df56a340 278 7ff6df564942-7ff6df56494f 266->278 279 7ff6df564ad0-7ff6df564ad2 266->279 280 7ff6df564950-7ff6df564956 278->280 281 7ff6df56496c-7ff6df564975 280->281 282 7ff6df564958-7ff6df564966 280->282 281->280 284 7ff6df564977-7ff6df564985 call 7ff6df5653d0 281->284 282->281 283 7ff6df5649f7-7ff6df5649fa 282->283 286 7ff6df5649fc-7ff6df5649ff 283->286 287 7ff6df564a28-7ff6df564a53 283->287 294 7ff6df56498b-7ff6df5649d2 call 7ff6df565500 VirtualQuery 284->294 295 7ff6df564b2d-7ff6df564b60 call 7ff6df5648b0 284->295 291 7ff6df564a05-7ff6df564a07 286->291 292 7ff6df564ae0-7ff6df564af1 286->292 288 7ff6df564a19-7ff6df564a23 287->288 289 7ff6df564a55-7ff6df564a58 287->289 293 7ff6df564a5a-7ff6df564a69 289->293 291->288 296 7ff6df564a09-7ff6df564a13 291->296 292->288 293->293 297 7ff6df564a6b-7ff6df564a75 293->297 303 7ff6df5649d8-7ff6df5649e2 294->303 304 7ff6df564b12-7ff6df564b28 call 7ff6df5648b0 294->304 309 7ff6df564b78-7ff6df564bcf call 7ff6df565460 call 7ff6df565680 295->309 310 7ff6df564b62-7ff6df564b72 295->310 296->288 300 7ff6df564b00-7ff6df564b0d 296->300 300->288 306 7ff6df5649e4-7ff6df5649ea 303->306 307 7ff6df5649f0 303->307 304->295 306->307 311 7ff6df564a80-7ff6df564ab6 VirtualProtect 306->311 307->283 309->310 318 7ff6df564bd1-7ff6df564bd7 309->318 311->307 313 7ff6df564abc-7ff6df564acb GetLastError call 7ff6df5648b0 311->313 313->279 319 7ff6df564bdd-7ff6df564bdf 318->319 320 7ff6df564d28-7ff6df564d2a 318->320 321 7ff6df564be5 319->321 322 7ff6df564db0-7ff6df564db3 319->322 320->322 323 7ff6df564d30-7ff6df564d38 320->323 324 7ff6df564be8-7ff6df564bea 321->324 322->310 325 7ff6df564db9-7ff6df564dd4 322->325 323->324 326 7ff6df564d3e-7ff6df564d41 323->326 324->322 327 7ff6df564bf0-7ff6df564bf6 324->327 328 7ff6df564dd8-7ff6df564dfa call 7ff6df564920 325->328 332 7ff6df564d50-7ff6df564d54 326->332 329 7ff6df564bfc-7ff6df564c18 327->329 330 7ff6df564e18-7ff6df564e3e call 7ff6df5648b0 327->330 340 7ff6df564dfc 328->340 334 7ff6df564c1a 329->334 335 7ff6df564c59-7ff6df564c70 329->335 346 7ff6df564e6c-7ff6df564e70 330->346 347 7ff6df564e40-7ff6df564e6b 330->347 337 7ff6df564d5a-7ff6df564d78 call 7ff6df564920 332->337 338 7ff6df564e01-7ff6df564e13 call 7ff6df5648b0 332->338 334->310 341 7ff6df564c76 335->341 342 7ff6df564d80-7ff6df564daa call 7ff6df564920 335->342 337->342 338->330 340->338 341->332 349 7ff6df564c7c-7ff6df564c80 341->349 342->322 347->346 351 7ff6df564c82-7ff6df564c86 349->351 352 7ff6df564c20-7ff6df564c57 call 7ff6df564920 349->352 351->338 355 7ff6df564c8c-7ff6df564cc4 call 7ff6df564920 351->355 352->335 359 7ff6df564cd0-7ff6df564cd8 352->359 355->335 360 7ff6df564cc6 355->360 359->310 361 7ff6df564cde-7ff6df564ce7 359->361 360->359 362 7ff6df564cf0-7ff6df564d00 361->362 363 7ff6df564d02-7ff6df564d0d VirtualProtect 362->363 364 7ff6df564d10-7ff6df564d1d 362->364 363->364 364->362 365 7ff6df564d1f 364->365 365->310
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: QueryVirtual
    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
    • API String ID: 1804819252-1534286854
    • Opcode ID: d803b5b9f4712c63a583bc66fc2a8294c2c3be480b6b5a6bb31d90d251e6b5c6
    • Instruction ID: a963f800e2b0002c258d33163a63fc861a00b36000535fcd8d16069d911b4257
    • Opcode Fuzzy Hash: d803b5b9f4712c63a583bc66fc2a8294c2c3be480b6b5a6bb31d90d251e6b5c6
    • Instruction Fuzzy Hash: 6971D172B04A4A96EB109B11E84426D73A1FB697A4F548236FE6C87790DF3CE562C340

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: free$malloc
    • String ID:
    • API String ID: 2190258309-0
    • Opcode ID: 3fdcc2ec0350fbc7881cfd62aa9810f02018ec7521ec9bc9f349b6b3c1acdd06
    • Instruction ID: bb5ae51cb82f7e386377cc16dbaa8f5719885a71e3014a7402e63bd57712f1b1
    • Opcode Fuzzy Hash: 3fdcc2ec0350fbc7881cfd62aa9810f02018ec7521ec9bc9f349b6b3c1acdd06
    • Instruction Fuzzy Hash: 66618071F14B099DFB04CBAAD8413AC27B1AB58B98F10813ADE2D97BA8DE3DD5508750

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: free$malloc
    • String ID:
    • API String ID: 2190258309-0
    • Opcode ID: 9323b672db99f97c56645a26587eadc63964ebb5107a1af4015708c92901af04
    • Instruction ID: 496aa2544a72eaf68055a7aa56fcb84b3e19e426137e3f5bb9bc5e0dad960ae6
    • Opcode Fuzzy Hash: 9323b672db99f97c56645a26587eadc63964ebb5107a1af4015708c92901af04
    • Instruction Fuzzy Hash: 67518072F15B1989EF04DBA5D8403AC33B1BB98B88F00453AEE6D97BA9DE3CD5508750
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: NextProcess32
    • String ID: CreateToolhelp32Snapshot failed. Error: %lu$Failed to open process: %s (PID: %u)$Terminated process: %s (PID: %u)
    • API String ID: 1850201408-153003829
    • Opcode ID: e181661efe4dd773058fb5c019e7242ec3b384c34b7989fb4873058b68cdb20b
    • Instruction ID: 51126930f69c869aa597f769208d60775072fd5b6e059807ed3d48d8d21e5755
    • Opcode Fuzzy Hash: e181661efe4dd773058fb5c019e7242ec3b384c34b7989fb4873058b68cdb20b
    • Instruction Fuzzy Hash: 63314331F0478A89EB60DBA5E8443ED33A1FB64758F004137D92D9BBA9DE38E565C380
    APIs
    • Sleep.KERNEL32(?,?,00000000,Infinity,00007FF6DF56975F,?,?,?,?,00000000,Infinity,00007FF6DF567C04,?,00000000,00000003,00007FF6DF568118), ref: 00007FF6DF56964D
    • RtlInitializeCriticalSection.NTDLL ref: 00007FF6DF56968D
    • RtlInitializeCriticalSection.NTDLL ref: 00007FF6DF569696
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: CriticalInitializeSection$Sleep
    • String ID: Infinity
    • API String ID: 1960909292-1015270809
    • Opcode ID: 2b3a132f51e9cd6b10359d2b6f53ec181f5f3bad216d3bdb832c5de5ecd3c170
    • Instruction ID: 02cd2b3f148d0d2a0879fa82887c7f60d0fa18385f7811eedaaffa19b6f792a4
    • Opcode Fuzzy Hash: 2b3a132f51e9cd6b10359d2b6f53ec181f5f3bad216d3bdb832c5de5ecd3c170
    • Instruction Fuzzy Hash: 31115E31D2C60F86FA158B14E8911BC6395FF76708F688633E81EC62A0DF2CE865C781
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: freememset$rand
    • String ID:
    • API String ID: 2025389305-0
    • Opcode ID: 4480c9dfa61de757a7f1f0e5d6dc5bea86d1d3a71a6a449468cd70b262eee5fd
    • Instruction ID: 9e367045ae70dec45dded838ebe7bfa208b6fd9b2dc728bea16fbb37a01ba907
    • Opcode Fuzzy Hash: 4480c9dfa61de757a7f1f0e5d6dc5bea86d1d3a71a6a449468cd70b262eee5fd
    • Instruction Fuzzy Hash: 94314D21F15B1989EB00DBA6D8403AC33B0AB587A8F004636EE7D9BBE5DF3DD5108740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: Byte$CharLeadMultiWide
    • String ID:
    • API String ID: 2561704868-0
    • Opcode ID: 98b7f6bf3ad1004ecf0cff6562c8d77fed0c02d9e6fb996009e33322c1bcc7a6
    • Instruction ID: 0a4d6ad39485022412ef0ceae19a02224bd5df3a7df3c69078607f76caf1474b
    • Opcode Fuzzy Hash: 98b7f6bf3ad1004ecf0cff6562c8d77fed0c02d9e6fb996009e33322c1bcc7a6
    • Instruction Fuzzy Hash: 7531B672A0C68586E3718B25F80436D7790BBA1795F548236FAA8CBBD4DF3ED494CB40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID:
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
    • API String ID: 0-395989641
    • Opcode ID: 76e62dfac5ded097740ec0d1c05d2b01f578fe877c8bdf0b2acdc5b6a318c470
    • Instruction ID: 48151fbaea281e6f93d4bb951c6e4c7fff49a0aad073bff4bd350374778beff2
    • Opcode Fuzzy Hash: 76e62dfac5ded097740ec0d1c05d2b01f578fe877c8bdf0b2acdc5b6a318c470
    • Instruction Fuzzy Hash: 1C711762F1468986FB109B21E8007BD63A1BF25B94F548233EE2C97794DF3CE661C780
    APIs
      • Part of subcall function 00007FF6DF569620: Sleep.KERNEL32(?,?,00000000,Infinity,00007FF6DF56975F,?,?,?,?,00000000,Infinity,00007FF6DF567C04,?,00000000,00000003,00007FF6DF568118), ref: 00007FF6DF56964D
    • malloc.MSVCRT ref: 00007FF6DF569787
    • RtlLeaveCriticalSection.NTDLL ref: 00007FF6DF5697DF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: CriticalLeaveSectionSleepmalloc
    • String ID: Infinity
    • API String ID: 1993596536-1015270809
    • Opcode ID: 583c81eff2bc653449be8c5b22903ef88f54eda45f881fdddad083b71c83a9c0
    • Instruction ID: 2f5f538498118c542413945d798c2e90f67728f886411805b5a84357cac97174
    • Opcode Fuzzy Hash: 583c81eff2bc653449be8c5b22903ef88f54eda45f881fdddad083b71c83a9c0
    • Instruction Fuzzy Hash: CE217172F1860E82EE148F04E4503BD6795BF66798F498237D92D877A0DF3CA564C780
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-3474627141
    • Opcode ID: f7e8b77a0b0dff4a7c8fd560446d4c8046c86c2a5a0ae3229943de372c0eb2c5
    • Instruction ID: 8c84b6fb05e5ff9a296bf1887c5b2c7ce6bc99d1a9327389863cdbcd4d6e9367
    • Opcode Fuzzy Hash: f7e8b77a0b0dff4a7c8fd560446d4c8046c86c2a5a0ae3229943de372c0eb2c5
    • Instruction Fuzzy Hash: 35015E62D1CF88C2D6419F18D8001BE7331FB6E789F25A326FA8C66555DF29E6A2C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4273532761
    • Opcode ID: 2555366b7f243d5c5750147fe3f99058101b7cdae7e235ce5a55a443d9b88822
    • Instruction ID: 51b97b02214d3a5377f449b439b3d3bd98f0c135862b179eb7dcef11e4b49e51
    • Opcode Fuzzy Hash: 2555366b7f243d5c5750147fe3f99058101b7cdae7e235ce5a55a443d9b88822
    • Instruction Fuzzy Hash: 59F06212D58E8882D2029F1CA4001AF7330FF5E799F145327EE8D6A515DF29E592C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4064033741
    • Opcode ID: 30eeda8bdb12080cde567a8558e119721110e6916e5ac3dcb8fdf4791492d7ce
    • Instruction ID: 8de21002ad12dc4c4959c66f0dd90364df6c2d9f023f2854bd3d682721c6b52e
    • Opcode Fuzzy Hash: 30eeda8bdb12080cde567a8558e119721110e6916e5ac3dcb8fdf4791492d7ce
    • Instruction Fuzzy Hash: 51F06212D18E8882D2029F1CA4001AF7330FF5E799F145326FE8D6A555DF29E592C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: fprintf
    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2187435201
    • Opcode ID: f4b68061637c4e869876cc2b07be9ae89b12cec57d0ec52bd52edc14d149258f
    • Instruction ID: d3d4e36aa703056ee28b0b640c3d009d41bd4aa4888adc7198f79beda205bfea
    • Opcode Fuzzy Hash: f4b68061637c4e869876cc2b07be9ae89b12cec57d0ec52bd52edc14d149258f
    • Instruction Fuzzy Hash: DEF06252D18E8882D2029F1CA4001AF7330FF5E799F145326FF8D6A555DF29E592C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2713391170
    • Opcode ID: 709d1337b431af56bb765744f32365ef71057d2f3adb48a5db82197e702a3b57
    • Instruction ID: 1f8edeaa2ee8123e774c0baa5710862c40025091d093194ef918554ab09511ab
    • Opcode Fuzzy Hash: 709d1337b431af56bb765744f32365ef71057d2f3adb48a5db82197e702a3b57
    • Instruction Fuzzy Hash: 83F06212D18E8882D2029F1CA4001BF7330FF5E799F245726FE8D6A555DF29E592C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4283191376
    • Opcode ID: ef8ff845aa821fedd75d124928bf110435547eefecd6d81b6760bdc6d9931a3a
    • Instruction ID: b0dd125879b89d6bcadb13c826c92c9c305eaa47473b51503fcfdeb6234b440a
    • Opcode Fuzzy Hash: ef8ff845aa821fedd75d124928bf110435547eefecd6d81b6760bdc6d9931a3a
    • Instruction Fuzzy Hash: 91F06252D18E8882D2029F1CA4001AF7330FF5E799F145327FE8D6A555DF29E592C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2468659920
    • Opcode ID: bffe1eaf3389dee2b12e3729f9d500de9cab9793a4ff0cf748dbcce5efa7edf7
    • Instruction ID: 384477eb99f9ed0f1a583b146a0bd08b9e78e2b11a15b09c10450709e6104ced
    • Opcode Fuzzy Hash: bffe1eaf3389dee2b12e3729f9d500de9cab9793a4ff0cf748dbcce5efa7edf7
    • Instruction Fuzzy Hash: 85F03012D58E8882D202DF1CE4001AB7370FF5E799F155726EF8D6A516DF29E592C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: freememset
    • String ID:
    • API String ID: 2499939622-0
    • Opcode ID: 8337257afa241cc28aafe8cf9f7202994b655755b37db60b13fdb6ff63783a31
    • Instruction ID: c3ff24330ddef084e65ae1ceb8029c6cefc7c227231f0979ba856cb5c648c6a9
    • Opcode Fuzzy Hash: 8337257afa241cc28aafe8cf9f7202994b655755b37db60b13fdb6ff63783a31
    • Instruction Fuzzy Hash: 36415F25F15B199CEB00DBA6D8503AD23B1AB58BA8F004636DD3D97BF9DE3DD6108740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4535174048.00007FF6DF561000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6DF560000, based on PE: true
    • Associated: 00000000.00000002.4535142128.00007FF6DF560000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF571000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535174048.00007FF6DF575000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535398610.00007FF6DF5DF000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535438936.00007FF6DF5E0000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.4535475088.00007FF6DF5E1000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6df560000_cbot.jbxd
    Similarity
    • API ID: freememset
    • String ID:
    • API String ID: 2499939622-0
    • Opcode ID: 9f44535f6fd749539bcc271d37f089827b23007be47d33ba420ed4f177ea1149
    • Instruction ID: 568ed0e18c850455a0a8863c9e6e760dfd28b9e9f754dffbb98b2f75671d6deb
    • Opcode Fuzzy Hash: 9f44535f6fd749539bcc271d37f089827b23007be47d33ba420ed4f177ea1149
    • Instruction Fuzzy Hash: 59316F25B14BC98AEB759F65E8403ED3364E758B98F004136EA5D8BBA9DF7DD3108340

    Execution Graph

    Execution Coverage:6.6%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:505
    Total number of Limit Nodes:3
    execution_graph 3239 7ff77cfc47a0 3240 7ff77cfc47bf 3239->3240 3241 7ff77cfc47fd fprintf 3240->3241 2910 7ff77cfc391f 2913 7ff77cfc2ed2 2910->2913 2915 7ff77cfc2f83 2913->2915 2914 7ff77cfc2f0c malloc 2914->2915 2915->2914 2916 7ff77cfc2fef 2915->2916 2917 7ff77cfc2fb7 free 2915->2917 2917->2915 3242 7ff77cfc50a6 3243 7ff77cfc50d0 3242->3243 3244 7ff77cfc50c6 3242->3244 3243->3244 3245 7ff77cfc50e7 RtlEnterCriticalSection RtlLeaveCriticalSection 3243->3245 3246 7ff77cfca6a0 ___mb_cur_max_func ___lc_codepage_func 3247 7ff77cfca3a0 4 API calls 3246->3247 3248 7ff77cfca6ee 3247->3248 3249 7ff77cfc1ca4 3250 7ff77cfc1cd1 3249->3250 3251 7ff77cfc1cf2 malloc 3250->3251 3252 7ff77cfc1cdc free 3250->3252 3254 7ff77cfc1d34 memset 3251->3254 3255 7ff77cfc1d0e free 3251->3255 3253 7ff77cfc1ef0 3252->3253 3257 7ff77cfc1d66 3254->3257 3255->3253 3260 7ff77cfc1dd9 rand 3257->3260 3261 7ff77cfc1ec0 free 3257->3261 3259 7ff77cfc1edf free 3259->3253 3260->3257 3261->3259 3262 7ff77cfc74a3 3263 7ff77cfc74ba 3262->3263 3265 7ff77cfc74ca 3262->3265 3264 7ff77cfc5b00 strlen 3263->3264 3264->3265 3266 7ff77cfc58e0 2 API calls 3265->3266 3267 7ff77cfc79ce 3265->3267 3266->3267 3268 7ff77cfc4f99 signal 3269 7ff77cfc5010 signal 3268->3269 3270 7ff77cfc4f0d 3268->3270 2927 7ff77cfc241d 2928 7ff77cfc244d 2927->2928 2929 7ff77cfc2458 free 2928->2929 2930 7ff77cfc246e 2928->2930 2931 7ff77cfc265d 2929->2931 2940 7ff77cfc2110 rand 2930->2940 2933 7ff77cfc2473 memset 2934 7ff77cfc24a4 2933->2934 2935 7ff77cfc24f4 memset 2934->2935 2936 7ff77cfc24ce free 2934->2936 2938 7ff77cfc2526 2935->2938 2936->2931 2939 7ff77cfc264c free 2938->2939 2939->2931 2940->2933 2941 7ff77cfc5130 2942 7ff77cfc5141 2941->2942 2943 7ff77cfc5150 RtlEnterCriticalSection 2941->2943 2944 7ff77cfc5193 RtlLeaveCriticalSection 2943->2944 2945 7ff77cfc5169 2943->2945 2945->2944 2946 7ff77cfc518e free 2945->2946 2946->2944 2947 7ff77cfc5330 strlen 2948 7ff77cfc53c0 2947->2948 2950 7ff77cfc5346 2947->2950 2949 7ff77cfc53ae 2950->2948 2950->2949 2951 7ff77cfc5399 strncmp 2950->2951 2951->2949 2951->2950 3271 7ff77cfc3fb0 3272 7ff77cfc3ff0 3271->3272 3273 7ff77cfc3fca rand 3272->3273 3274 7ff77cfc3ffa 3272->3274 3273->3272 3275 7ff77cfc77b3 3276 7ff77cfc758b 3275->3276 3279 7ff77cfc75a3 3275->3279 3277 7ff77cfc60d0 19 API calls 3276->3277 3277->3279 3278 7ff77cfc60d0 19 API calls 3280 7ff77cfc77e6 3278->3280 3279->3278 3280->3280 3281 7ff77cfc75a8 3282 7ff77cfc75db 3281->3282 3283 7ff77cfc75c3 3281->3283 3285 7ff77cfc66b0 21 API calls 3282->3285 3287 7ff77cfc66b0 3283->3287 3286 7ff77cfc781e 3285->3286 3286->3286 3288 7ff77cfc66ca 3287->3288 3299 7ff77cfc6743 3287->3299 3289 7ff77cfc5770 11 API calls 3288->3289 3290 7ff77cfc66fd 3289->3290 3291 7ff77cfc6768 3290->3291 3294 7ff77cfc6724 3290->3294 3290->3299 3292 7ff77cfc6777 3291->3292 3293 7ff77cfc676c strlen 3291->3293 3297 7ff77cfc6510 8 API calls 3292->3297 3293->3292 3295 7ff77cfc67f8 strlen 3294->3295 3296 7ff77cfc672c 3294->3296 3295->3296 3298 7ff77cfc5d10 8 API calls 3296->3298 3297->3299 3298->3299 3299->3282 3300 7ff77cfc15c0 3301 7ff77cfc15ed 3300->3301 3302 7ff77cfc15f8 free 3301->3302 3303 7ff77cfc160e memset 3301->3303 3304 7ff77cfc1778 3302->3304 3305 7ff77cfc1640 memset 3303->3305 3308 7ff77cfc169e 3305->3308 3307 7ff77cfc1767 free 3307->3304 3308->3307 3309 7ff77cfcaac1 RtlLeaveCriticalSection 2975 7ff77cfc7743 2976 7ff77cfc7753 2975->2976 2979 7ff77cfc58e0 2976->2979 2978 7ff77cfc7776 2978->2978 2984 7ff77cfca790 2979->2984 2981 7ff77cfca790 2 API calls 2983 7ff77cfc590d 2981->2983 2982 7ff77cfc5979 2982->2978 2983->2981 2983->2982 2985 7ff77cfca7ae 2984->2985 2988 7ff77cfca700 2985->2988 2987 7ff77cfca7c6 2987->2983 2989 7ff77cfca714 2988->2989 2990 7ff77cfca730 WideCharToMultiByte 2988->2990 2991 7ff77cfca774 _errno 2989->2991 2992 7ff77cfca71b 2989->2992 2990->2989 2990->2991 2991->2987 2992->2987 3310 7ff77cfc46d0 3311 7ff77cfc46d9 3310->3311 3312 7ff77cfc46dd 3311->3312 3315 7ff77cfc51c0 3311->3315 3314 7ff77cfc46f5 3316 7ff77cfc51ce 3315->3316 3318 7ff77cfc5290 3315->3318 3317 7ff77cfc51d4 3316->3317 3319 7ff77cfc51de 3316->3319 3320 7ff77cfc5220 3316->3320 3317->3319 3321 7ff77cfc5210 RtlInitializeCriticalSection 3317->3321 3318->3314 3319->3314 3320->3319 3322 7ff77cfc5261 RtlDeleteCriticalSection 3320->3322 3323 7ff77cfc5250 free 3320->3323 3321->3319 3322->3319 3323->3322 3323->3323 3332 7ff77cfc74cf 3334 7ff77cfc74f1 3332->3334 3333 7ff77cfc58e0 2 API calls 3335 7ff77cfc7776 3333->3335 3334->3333 3335->3335 3336 7ff77cfcaad1 RtlInitializeCriticalSection 3337 7ff77cfc22c9 3338 7ff77cfc22f6 3337->3338 3339 7ff77cfc2301 free 3338->3339 3340 7ff77cfc2317 memset 3338->3340 3341 7ff77cfc2417 3339->3341 3342 7ff77cfc2349 rand 3340->3342 3344 7ff77cfc236f memset 3342->3344 3346 7ff77cfc23a2 3344->3346 3347 7ff77cfc2406 free 3346->3347 3347->3341 2896 7ff77cfc33e2 2904 7ff77cfc33fe 2896->2904 2897 7ff77cfc3532 2898 7ff77cfc3414 CreateToolhelp32Snapshot 2900 7ff77cfc3450 Process32First 2898->2900 2898->2904 2899 7ff77cfc3515 SleepEx 2899->2904 2901 7ff77cfc34e2 CloseHandle 2900->2901 2902 7ff77cfc346f strcmp 2900->2902 2901->2904 2903 7ff77cfc34ca Process32Next 2902->2903 2902->2904 2903->2901 2903->2902 2904->2897 2904->2898 2904->2899 2904->2901 2906 7ff77cfc3261 2904->2906 2909 7ff77cfc3287 2906->2909 2907 7ff77cfc3298 2907->2904 2908 7ff77cfc3387 Process32Next 2908->2907 2908->2909 2909->2907 2909->2908 3005 7ff77cfc7860 3006 7ff77cfc7874 3005->3006 3009 7ff77cfc770f 3005->3009 3008 7ff77cfc6cc0 8 API calls 3006->3008 3010 7ff77cfc7893 3008->3010 3009->3005 3011 7ff77cfc6cc0 3009->3011 3010->3010 3012 7ff77cfc6e90 3011->3012 3015 7ff77cfc6d20 3011->3015 3012->3009 3013 7ff77cfc58e0 2 API calls 3013->3015 3015->3012 3015->3013 3016 7ff77cfc5c00 3015->3016 3017 7ff77cfc5cb0 3016->3017 3018 7ff77cfc5c1a 3016->3018 3023 7ff77cfca520 ___mb_cur_max_func ___lc_codepage_func 3017->3023 3020 7ff77cfc5c90 3018->3020 3021 7ff77cfca790 2 API calls 3018->3021 3020->3015 3022 7ff77cfc5c54 3021->3022 3022->3015 3026 7ff77cfca3a0 3023->3026 3025 7ff77cfca57a 3025->3018 3027 7ff77cfca4e8 3026->3027 3029 7ff77cfca3b5 3026->3029 3027->3025 3028 7ff77cfca478 3028->3025 3029->3028 3030 7ff77cfca458 3029->3030 3033 7ff77cfca3e9 IsDBCSLeadByteEx 3029->3033 3036 7ff77cfca404 3029->3036 3031 7ff77cfca463 3030->3031 3032 7ff77cfca4b0 MultiByteToWideChar 3030->3032 3031->3025 3032->3028 3035 7ff77cfca4f8 _errno 3032->3035 3033->3030 3033->3036 3034 7ff77cfca42e MultiByteToWideChar 3034->3035 3037 7ff77cfca448 3034->3037 3035->3028 3036->3028 3036->3034 3037->3025 3348 7ff77cfc75e0 3349 7ff77cfc778f 3348->3349 3350 7ff77cfc75fb 3348->3350 3352 7ff77cfc6600 19 API calls 3349->3352 3350->3349 3351 7ff77cfc6600 19 API calls 3350->3351 3351->3350 3353 7ff77cfc77ae 3352->3353 3353->3353 3354 7ff77cfca7e0 ___lc_codepage_func ___mb_cur_max_func 3355 7ff77cfca812 3354->3355 3360 7ff77cfca81c 3354->3360 3356 7ff77cfca817 3355->3356 3357 7ff77cfca878 3355->3357 3358 7ff77cfca700 2 API calls 3356->3358 3356->3360 3359 7ff77cfca700 2 API calls 3357->3359 3357->3360 3358->3356 3359->3357 3063 7ff77cfc7658 3064 7ff77cfc7664 3063->3064 3067 7ff77cfc5b00 3064->3067 3068 7ff77cfc5b40 strlen 3067->3068 3069 7ff77cfc5b26 3067->3069 3068->3069 3069->3068 3364 7ff77cfc38de 3365 7ff77cfc38fd 3364->3365 3368 7ff77cfc2a13 3365->3368 3370 7ff77cfc2ac4 3368->3370 3369 7ff77cfc2a4d malloc 3369->3370 3370->3369 3371 7ff77cfc2b30 3370->3371 3372 7ff77cfc2af8 free 3370->3372 3372->3370 3373 7ff77cfc4ede signal 3374 7ff77cfc4ef4 signal 3373->3374 3375 7ff77cfc4f08 3373->3375 3374->3375 3073 7ff77cfc7570 3074 7ff77cfc758b 3073->3074 3077 7ff77cfc75a3 3073->3077 3079 7ff77cfc60d0 3074->3079 3076 7ff77cfc60d0 19 API calls 3078 7ff77cfc77e6 3076->3078 3077->3076 3078->3078 3080 7ff77cfc60e5 3079->3080 3086 7ff77cfc5770 3080->3086 3083 7ff77cfc6178 3083->3077 3085 7ff77cfc613f 3085->3077 3087 7ff77cfc5788 3086->3087 3099 7ff77cfc7df0 3087->3099 3089 7ff77cfc57ff 3089->3083 3090 7ff77cfc5d10 3089->3090 3092 7ff77cfc5d30 3090->3092 3091 7ff77cfc5ec2 3093 7ff77cfc5c00 8 API calls 3091->3093 3096 7ff77cfc5ee5 3091->3096 3092->3091 3094 7ff77cfc5f98 3092->3094 3097 7ff77cfc5ddd 3092->3097 3093->3096 3095 7ff77cfc5c00 8 API calls 3094->3095 3094->3096 3095->3096 3096->3085 3097->3091 3098 7ff77cfc58e0 2 API calls 3097->3098 3098->3097 3100 7ff77cfc80f0 3099->3100 3101 7ff77cfc7e36 3099->3101 3102 7ff77cfc7bd0 6 API calls 3100->3102 3103 7ff77cfc8060 3101->3103 3107 7ff77cfc7e46 3101->3107 3123 7ff77cfc808d 3102->3123 3103->3123 3146 7ff77cfc7bd0 3103->3146 3104 7ff77cfc80c0 3106 7ff77cfc7bd0 6 API calls 3104->3106 3106->3123 3107->3104 3107->3107 3115 7ff77cfc7f46 3107->3115 3107->3123 3139 7ff77cfc9750 3107->3139 3109 7ff77cfc7e7f 3110 7ff77cfc80b8 3109->3110 3109->3115 3150 7ff77cfc9850 3110->3150 3111 7ff77cfc8429 3111->3089 3112 7ff77cfc8440 3114 7ff77cfc7b90 6 API calls 3112->3114 3138 7ff77cfc8230 3112->3138 3114->3138 3115->3111 3115->3112 3116 7ff77cfc81f3 3115->3116 3115->3138 3156 7ff77cfc7b90 3116->3156 3118 7ff77cfc8948 3118->3089 3119 7ff77cfc9850 5 API calls 3120 7ff77cfc8701 3119->3120 3122 7ff77cfc9850 5 API calls 3120->3122 3124 7ff77cfc83f1 3120->3124 3121 7ff77cfc9850 5 API calls 3121->3123 3122->3124 3123->3089 3124->3121 3125 7ff77cfc86bd 3125->3118 3125->3119 3126 7ff77cfc9970 6 API calls 3126->3138 3127 7ff77cfc9af0 10 API calls 3127->3138 3129 7ff77cfc9c80 7 API calls 3129->3138 3130 7ff77cfc869f 3130->3118 3164 7ff77cfc98c0 3130->3164 3131 7ff77cfc9750 6 API calls 3133 7ff77cfc917d memcpy 3131->3133 3178 7ff77cfc9c80 3133->3178 3136 7ff77cfc9850 Sleep RtlInitializeCriticalSection RtlInitializeCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 3136->3138 3137 7ff77cfc98c0 8 API calls 3137->3138 3138->3118 3138->3124 3138->3125 3138->3126 3138->3127 3138->3129 3138->3130 3138->3131 3138->3136 3138->3137 3160 7ff77cfc99a0 3138->3160 3171 7ff77cfc9e00 3138->3171 3184 7ff77cfc9620 3139->3184 3142 7ff77cfc9764 malloc 3143 7ff77cfc9791 3142->3143 3144 7ff77cfc97a0 3142->3144 3143->3144 3145 7ff77cfc97d3 RtlLeaveCriticalSection 3143->3145 3144->3109 3145->3144 3147 7ff77cfc7be3 3146->3147 3147->3147 3148 7ff77cfc9750 6 API calls 3147->3148 3149 7ff77cfc7c04 3148->3149 3149->3123 3151 7ff77cfc985e 3150->3151 3152 7ff77cfc9898 3150->3152 3153 7ff77cfc9620 4 API calls 3151->3153 3152->3104 3154 7ff77cfc9877 3153->3154 3154->3152 3155 7ff77cfc98a0 RtlLeaveCriticalSection 3154->3155 3157 7ff77cfc7b9c 3156->3157 3158 7ff77cfc9750 6 API calls 3157->3158 3159 7ff77cfc7bbb 3158->3159 3159->3138 3161 7ff77cfc99c2 3160->3161 3162 7ff77cfc9750 6 API calls 3161->3162 3163 7ff77cfc99e5 3162->3163 3163->3138 3166 7ff77cfc98e0 3164->3166 3165 7ff77cfc990f 3165->3125 3166->3165 3167 7ff77cfc9750 6 API calls 3166->3167 3168 7ff77cfc993d 3167->3168 3168->3165 3169 7ff77cfc9945 memcpy 3168->3169 3170 7ff77cfc9850 5 API calls 3169->3170 3170->3165 3172 7ff77cfc9e59 3171->3172 3173 7ff77cfc9e21 3171->3173 3174 7ff77cfc9750 6 API calls 3172->3174 3173->3172 3175 7ff77cfc9fa0 3173->3175 3177 7ff77cfc9e67 3174->3177 3176 7ff77cfc9750 6 API calls 3175->3176 3176->3177 3177->3138 3179 7ff77cfc9caf 3178->3179 3180 7ff77cfc9750 6 API calls 3179->3180 3183 7ff77cfc9cbe 3180->3183 3181 7ff77cfc9d84 3181->3138 3182 7ff77cfc9850 5 API calls 3182->3181 3183->3181 3183->3182 3185 7ff77cfc9633 3184->3185 3186 7ff77cfc96ae RtlEnterCriticalSection 3184->3186 3188 7ff77cfc967f RtlInitializeCriticalSection RtlInitializeCriticalSection 3185->3188 3189 7ff77cfc9637 3185->3189 3186->3189 3187 7ff77cfc965f 3187->3142 3187->3143 3188->3189 3189->3186 3189->3187 3190 7ff77cfc9648 Sleep 3189->3190 3190->3189 3190->3190 3384 7ff77cfc14f0 3387 7ff77cfc1190 3384->3387 3386 7ff77cfc1506 3388 7ff77cfc1470 GetStartupInfoA 3387->3388 3389 7ff77cfc11c4 3387->3389 3390 7ff77cfc13d8 3388->3390 3391 7ff77cfc11f1 Sleep 3389->3391 3394 7ff77cfc1206 3389->3394 3390->3386 3391->3389 3392 7ff77cfc1239 3408 7ff77cfc4b40 3392->3408 3393 7ff77cfc143c _initterm 3393->3392 3394->3392 3394->3393 3407 7ff77cfc13c4 3394->3407 3396 7ff77cfc14be exit 3398 7ff77cfc1190 24 API calls 3396->3398 3397 7ff77cfc1261 SetUnhandledExceptionFilter 3404 7ff77cfc1284 3397->3404 3399 7ff77cfc14e6 3398->3399 3399->3386 3400 7ff77cfc131e malloc 3401 7ff77cfc1345 3400->3401 3402 7ff77cfc138b 3400->3402 3403 7ff77cfc1350 strlen malloc memcpy 3401->3403 3428 7ff77cfc3d58 3402->3428 3403->3403 3405 7ff77cfc1386 3403->3405 3404->3400 3405->3402 3407->3390 3407->3396 3410 7ff77cfc4b78 3408->3410 3416 7ff77cfc4b62 3408->3416 3409 7ff77cfc4db0 3411 7ff77cfc4daa 3409->3411 3409->3416 3410->3409 3412 7ff77cfc4d3e 3410->3412 3413 7ff77cfc4e18 3410->3413 3410->3416 3423 7ff77cfc4c20 3410->3423 3411->3409 3414 7ff77cfc4920 8 API calls 3411->3414 3417 7ff77cfc4dfc 3411->3417 3412->3417 3440 7ff77cfc4920 3412->3440 3415 7ff77cfc48b0 8 API calls 3413->3415 3414->3411 3419 7ff77cfc4e24 3415->3419 3416->3397 3469 7ff77cfc48b0 3417->3469 3419->3397 3420 7ff77cfc4d78 3422 7ff77cfc4920 8 API calls 3420->3422 3422->3411 3423->3412 3423->3417 3423->3420 3424 7ff77cfc4920 8 API calls 3423->3424 3425 7ff77cfc4cd0 3423->3425 3426 7ff77cfc4cc6 3423->3426 3424->3423 3425->3416 3427 7ff77cfc4d02 VirtualProtect 3425->3427 3426->3425 3427->3425 3429 7ff77cfc3d6d 3428->3429 3497 7ff77cfc4146 3429->3497 3431 7ff77cfc3d72 3503 7ff77cfc3a84 CreateThread 3431->3503 3434 7ff77cfc3df7 send 3438 7ff77cfc3d77 3434->3438 3435 7ff77cfc3e44 send 3436 7ff77cfc3e9e memset recv 3435->3436 3437 7ff77cfc3ee4 perror 3436->3437 3436->3438 3437->3438 3438->3434 3438->3435 3438->3436 3505 7ff77cfc3ae6 socket 3438->3505 3510 7ff77cfc3660 3438->3510 3441 7ff77cfc4ad0 3440->3441 3443 7ff77cfc4942 3440->3443 3441->3420 3442 7ff77cfc4b2d 3445 7ff77cfc48b0 4 API calls 3442->3445 3443->3442 3444 7ff77cfc49f0 3443->3444 3446 7ff77cfc49ac VirtualQuery 3443->3446 3444->3420 3453 7ff77cfc4b3c 3445->3453 3447 7ff77cfc4b12 3446->3447 3448 7ff77cfc49d8 3446->3448 3449 7ff77cfc48b0 4 API calls 3447->3449 3448->3444 3450 7ff77cfc4a80 VirtualProtect 3448->3450 3449->3442 3450->3444 3451 7ff77cfc4abc GetLastError 3450->3451 3452 7ff77cfc48b0 4 API calls 3451->3452 3452->3441 3454 7ff77cfc4daa 3453->3454 3455 7ff77cfc4e18 3453->3455 3458 7ff77cfc4d3e 3453->3458 3461 7ff77cfc4dfc 3453->3461 3462 7ff77cfc4d78 3453->3462 3465 7ff77cfc4920 VirtualQuery VirtualProtect GetLastError VirtualProtect 3453->3465 3467 7ff77cfc4cc6 3453->3467 3468 7ff77cfc4b62 3453->3468 3456 7ff77cfc4920 4 API calls 3454->3456 3454->3461 3454->3468 3457 7ff77cfc48b0 4 API calls 3455->3457 3456->3454 3460 7ff77cfc4e24 3457->3460 3459 7ff77cfc4920 4 API calls 3458->3459 3458->3461 3459->3462 3460->3420 3463 7ff77cfc48b0 4 API calls 3461->3463 3464 7ff77cfc4920 4 API calls 3462->3464 3463->3455 3464->3454 3465->3453 3466 7ff77cfc4d02 VirtualProtect 3466->3467 3467->3466 3467->3468 3468->3420 3471 7ff77cfc48dd 3469->3471 3470 7ff77cfc4b2d 3473 7ff77cfc48b0 4 API calls 3470->3473 3471->3470 3472 7ff77cfc49f0 3471->3472 3474 7ff77cfc49ac VirtualQuery 3471->3474 3472->3413 3493 7ff77cfc4b3c 3473->3493 3475 7ff77cfc4b12 3474->3475 3476 7ff77cfc49d8 3474->3476 3478 7ff77cfc48b0 4 API calls 3475->3478 3476->3472 3479 7ff77cfc4a80 VirtualProtect 3476->3479 3477 7ff77cfc4b62 3477->3413 3478->3470 3479->3472 3480 7ff77cfc4abc GetLastError 3479->3480 3481 7ff77cfc48b0 4 API calls 3480->3481 3481->3472 3482 7ff77cfc4d3e 3487 7ff77cfc4dfc 3482->3487 3488 7ff77cfc4920 4 API calls 3482->3488 3483 7ff77cfc4e18 3485 7ff77cfc48b0 4 API calls 3483->3485 3484 7ff77cfc4920 4 API calls 3486 7ff77cfc4daa 3484->3486 3489 7ff77cfc4e24 3485->3489 3486->3477 3486->3484 3486->3487 3491 7ff77cfc48b0 4 API calls 3487->3491 3490 7ff77cfc4d78 3488->3490 3489->3413 3492 7ff77cfc4920 4 API calls 3490->3492 3491->3483 3492->3486 3493->3477 3493->3482 3493->3483 3493->3486 3493->3487 3493->3490 3494 7ff77cfc4920 VirtualQuery VirtualProtect GetLastError VirtualProtect 3493->3494 3495 7ff77cfc4cc6 3493->3495 3494->3493 3495->3477 3496 7ff77cfc4d02 VirtualProtect 3495->3496 3496->3495 3498 7ff77cfc4174 3497->3498 3499 7ff77cfc4229 3498->3499 3515 7ff77cfc40f0 3498->3515 3499->3431 3501 7ff77cfc41b3 3501->3499 3519 7ff77cfc43b9 3501->3519 3504 7ff77cfc3ac8 3503->3504 3504->3438 3506 7ff77cfc3b68 ioctlsocket connect 3505->3506 3508 7ff77cfc3b52 3505->3508 3507 7ff77cfc3d1b ioctlsocket 3506->3507 3509 7ff77cfc3bc3 3506->3509 3507->3508 3508->3438 3509->3507 3509->3508 3511 7ff77cfc38af 3510->3511 3514 7ff77cfc367c 3510->3514 3511->3438 3512 7ff77cfc3777 memcpy atoi 3512->3514 3513 7ff77cfc37d2 memcpy atoi 3513->3514 3514->3511 3514->3512 3514->3513 3516 7ff77cfc410e 3515->3516 3517 7ff77cfc412f 3516->3517 3518 7ff77cfc4119 _mbscpy 3516->3518 3517->3501 3518->3517 3520 7ff77cfc43e7 3519->3520 3521 7ff77cfc40f0 _mbscpy 3520->3521 3522 7ff77cfc4426 3520->3522 3521->3522 3522->3499 3523 7ff77cfca0f0 3524 7ff77cfc9750 6 API calls 3523->3524 3525 7ff77cfca10c 3524->3525 3526 7ff77cfc76f4 3527 7ff77cfc7874 3526->3527 3530 7ff77cfc770f 3526->3530 3529 7ff77cfc6cc0 8 API calls 3527->3529 3528 7ff77cfc6cc0 8 API calls 3528->3530 3531 7ff77cfc7893 3529->3531 3530->3527 3530->3528 3531->3531 3532 7ff77cfcaaf2 RtlEnterCriticalSection 3533 7ff77cfc77eb 3534 7ff77cfc75db 3533->3534 3535 7ff77cfc75c3 3533->3535 3537 7ff77cfc66b0 21 API calls 3534->3537 3536 7ff77cfc66b0 21 API calls 3535->3536 3536->3534 3538 7ff77cfc781e 3537->3538 3538->3538 3539 7ff77cfc4700 3540 7ff77cfc4712 3539->3540 3541 7ff77cfc4722 3540->3541 3542 7ff77cfc51c0 3 API calls 3540->3542 3543 7ff77cfc4775 3542->3543 3544 7ff77cfc9700 3545 7ff77cfc9715 3544->3545 3546 7ff77cfc9720 RtlDeleteCriticalSection 3544->3546 3203 7ff77cfc177e 3204 7ff77cfc17ae 3203->3204 3205 7ff77cfc17cf memset 3204->3205 3206 7ff77cfc17b9 free 3204->3206 3209 7ff77cfc1801 3205->3209 3207 7ff77cfc1971 3206->3207 3208 7ff77cfc1960 free 3208->3207 3209->3208 3210 7ff77cfc777b 3211 7ff77cfc778f 3210->3211 3212 7ff77cfc75fb 3210->3212 3214 7ff77cfc6600 19 API calls 3211->3214 3212->3210 3216 7ff77cfc6600 3212->3216 3215 7ff77cfc77ae 3214->3215 3215->3215 3217 7ff77cfc6615 3216->3217 3218 7ff77cfc5770 11 API calls 3217->3218 3219 7ff77cfc6646 3218->3219 3220 7ff77cfc6690 3219->3220 3223 7ff77cfc6510 3219->3223 3220->3212 3224 7ff77cfc653c 3223->3224 3225 7ff77cfc5d10 8 API calls 3224->3225 3226 7ff77cfc65ac 3225->3226 3547 7ff77cfc1010 3548 7ff77cfc1058 3547->3548 3549 7ff77cfc107a __set_app_type 3548->3549 3550 7ff77cfc1084 3548->3550 3549->3550 3227 7ff77cfca590 ___lc_codepage_func ___mb_cur_max_func 3228 7ff77cfca5cf 3227->3228 3233 7ff77cfca5e8 3227->3233 3229 7ff77cfca5e0 3228->3229 3232 7ff77cfca650 3228->3232 3228->3233 3230 7ff77cfca3a0 4 API calls 3229->3230 3229->3233 3230->3229 3231 7ff77cfca3a0 4 API calls 3231->3232 3232->3231 3232->3233 3551 7ff77cfc7915 3552 7ff77cfc7838 3551->3552 3553 7ff77cfc791e localeconv 3551->3553 3554 7ff77cfca520 6 API calls 3553->3554 3555 7ff77cfc795b 3554->3555 3234 7ff77cfc798a 3236 7ff77cfc798f 3234->3236 3235 7ff77cfc79ce 3236->3235 3237 7ff77cfc58e0 2 API calls 3236->3237 3237->3235 3238 7ff77cfcaa8a SetUnhandledExceptionFilter

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 44 7ff77cfc1190-7ff77cfc11be 45 7ff77cfc1470-7ff77cfc1473 GetStartupInfoA 44->45 46 7ff77cfc11c4-7ff77cfc11e1 44->46 50 7ff77cfc1480-7ff77cfc149a call 7ff77cfca368 45->50 47 7ff77cfc11f9-7ff77cfc1204 46->47 48 7ff77cfc1206-7ff77cfc1214 47->48 49 7ff77cfc11e8-7ff77cfc11eb 47->49 51 7ff77cfc121a-7ff77cfc121e 48->51 52 7ff77cfc1427-7ff77cfc1436 call 7ff77cfca370 48->52 54 7ff77cfc11f1-7ff77cfc11f6 Sleep 49->54 55 7ff77cfc1410-7ff77cfc1421 49->55 56 7ff77cfc14a0-7ff77cfc14b9 call 7ff77cfca358 51->56 57 7ff77cfc1224-7ff77cfc1233 51->57 60 7ff77cfc1239-7ff77cfc123b 52->60 61 7ff77cfc143c-7ff77cfc1457 _initterm 52->61 54->47 55->51 55->52 70 7ff77cfc14be-7ff77cfc14e1 exit call 7ff77cfc1190 56->70 57->60 57->61 64 7ff77cfc1241-7ff77cfc124e 60->64 65 7ff77cfc145d-7ff77cfc1462 60->65 61->64 61->65 67 7ff77cfc1250-7ff77cfc1258 64->67 68 7ff77cfc125c-7ff77cfc12a4 call 7ff77cfc4b40 SetUnhandledExceptionFilter call 7ff77cfca910 call 7ff77cfc48a0 call 7ff77cfca9f0 64->68 65->64 67->68 80 7ff77cfc12c2-7ff77cfc12c8 68->80 81 7ff77cfc12a6 68->81 74 7ff77cfc14e6-7ff77cfc14ec 70->74 83 7ff77cfc12b0-7ff77cfc12b2 80->83 84 7ff77cfc12ca-7ff77cfc12d8 80->84 82 7ff77cfc1300-7ff77cfc1306 81->82 88 7ff77cfc1308-7ff77cfc1312 82->88 89 7ff77cfc131e-7ff77cfc1343 malloc 82->89 85 7ff77cfc12b4-7ff77cfc12b7 83->85 86 7ff77cfc12f9 83->86 87 7ff77cfc12be 84->87 92 7ff77cfc12e0-7ff77cfc12e2 85->92 93 7ff77cfc12b9 85->93 86->82 87->80 94 7ff77cfc1400-7ff77cfc1405 88->94 95 7ff77cfc1318 88->95 90 7ff77cfc1345-7ff77cfc134a 89->90 91 7ff77cfc138b-7ff77cfc13bf call 7ff77cfc4690 call 7ff77cfc3d58 89->91 96 7ff77cfc1350-7ff77cfc1384 strlen malloc memcpy 90->96 104 7ff77cfc13c4-7ff77cfc13d2 91->104 92->86 98 7ff77cfc12e4 92->98 93->87 94->95 95->89 96->96 99 7ff77cfc1386 96->99 101 7ff77cfc12e8-7ff77cfc12f2 98->101 99->91 101->86 103 7ff77cfc12f4-7ff77cfc12f7 101->103 103->86 103->101 104->70 105 7ff77cfc13d8-7ff77cfc13e0 104->105 105->50 106 7ff77cfc13e6-7ff77cfc13f5 105->106
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
    • String ID:
    • API String ID: 649803965-0
    • Opcode ID: e225db0f86b9ce421def3ab0fa0d7062bc5e7b1d61233733194764ee289550e2
    • Instruction ID: 1d7e6af899d683559220ddbe948a2995e16becc90be0745aac27dfd2b93b30ba
    • Opcode Fuzzy Hash: e225db0f86b9ce421def3ab0fa0d7062bc5e7b1d61233733194764ee289550e2
    • Instruction Fuzzy Hash: 53815737B39B8682EB70BF15A4503B9A7A0AF4D780FC48835CE1D43395DE2DE8618320

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: send$CreateThreadmemsetperrorrecvsocket
    • String ID: %02x $154.213.192.42$Connected to C&C server$Connection failed. Retrying...$Disconnected from server. Retrying in 500ms...$Received %d bytes: $recv failed$win_x86_x64
    • API String ID: 1679048947-3681654477
    • Opcode ID: 52fefeefcdcf2a04f80c01cf7036b6e0bdcb3ce1ba97b7727e3dfdfb8c4737e3
    • Instruction ID: 768e1dd34ef6baf51f32195bafa16e621ee8a8488d6f42e708e0c8a6a2f4ab9e
    • Opcode Fuzzy Hash: 52fefeefcdcf2a04f80c01cf7036b6e0bdcb3ce1ba97b7727e3dfdfb8c4737e3
    • Instruction Fuzzy Hash: 2A513E23B387C68DF731EB65E8507ED6760AB48788F90143AD90D5B7A9DE2DE609C310

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: Sleep
    • String ID: CreateToolhelp32Snapshot failed. Error: %lu
    • API String ID: 3472027048-731459797
    • Opcode ID: ae22be0987ea78f0aaeb91b8f08f01e6461eae328b81d81411c2ff8828f2edc0
    • Instruction ID: 6a9cdce7a8762dd9edcdca3ab7008a18d558758ac4f33168322a7064e3b25aed
    • Opcode Fuzzy Hash: ae22be0987ea78f0aaeb91b8f08f01e6461eae328b81d81411c2ff8828f2edc0
    • Instruction Fuzzy Hash: CF315623B387CA89EB30AB64D8443F86360FB1C398F904936C91D5B799DE2DE5498330

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: connectioctlsocketsocket
    • String ID: Socket creation failed
    • API String ID: 3033478179-2728381879
    • Opcode ID: 3fca099bde09a1a059df5816efd18c7b1ebc4960c7c28b0057210e83bd6d0c1a
    • Instruction ID: 639e32eff000a8e64587e43fc5ab83f31e1a537a63ebe65de0d4d0fc1f7f1cff
    • Opcode Fuzzy Hash: 3fca099bde09a1a059df5816efd18c7b1ebc4960c7c28b0057210e83bd6d0c1a
    • Instruction Fuzzy Hash: 58611B73724BC68EDB749F69D8843EC73A1E748798F508536DA1D9BBA8DF3896008700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 179 7ff77cfc3a84-7ff77cfc3ac6 CreateThread 180 7ff77cfc3adf-7ff77cfc3ae5 179->180 181 7ff77cfc3ac8-7ff77cfc3ada call 7ff77cfc3570 179->181 181->180
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: CreateThread
    • String ID: Failed to create thread. Error: %lu
    • API String ID: 2422867632-1876256139
    • Opcode ID: cd41cf2e5e1f9492d1ffe20eb3d477d557d5a9303e1400c434a624d3a7105117
    • Instruction ID: 9c5d5f05f75b8982d970a7265ab5f49a3d0dab6551f20edbaf2cc469fcd475a8
    • Opcode Fuzzy Hash: cd41cf2e5e1f9492d1ffe20eb3d477d557d5a9303e1400c434a624d3a7105117
    • Instruction Fuzzy Hash: 45F0E533F34B4185F320BB20E8113FA6760E748788F548434C50D0B7A4CE3CE9568750
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: free$memset
    • String ID: SAMPgy_$c
    • API String ID: 2717317152-1181286492
    • Opcode ID: 11a51b238fa7ff4f3de048e7e0399e496a3b39d4eba30ae5ff845e0166315fef
    • Instruction ID: d41ed46d99e5e3f28ce838118251c1d6cd10b1221bc31f42e47a5487f8fa987a
    • Opcode Fuzzy Hash: 11a51b238fa7ff4f3de048e7e0399e496a3b39d4eba30ae5ff845e0166315fef
    • Instruction Fuzzy Hash: 1D513A27B24B548DFB50EBB6E8503AC23B0AB48798F504939DE5D97BA9DF3CD5018720
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: free$memset
    • String ID:
    • API String ID: 2717317152-0
    • Opcode ID: 4f8eb30e03a2088e02aa41d26e0366e703c7c16698a6fc90498e6d19936d4cc9
    • Instruction ID: fd989e2e0a26fa05b074c344be945488d2620542ca62da45f29c0ed166a74c3d
    • Opcode Fuzzy Hash: 4f8eb30e03a2088e02aa41d26e0366e703c7c16698a6fc90498e6d19936d4cc9
    • Instruction Fuzzy Hash: 0D515A67B20B548CEB50EBB6E8503AC23B0FB48B98F504535DE5DA7BA9DF38D5508720

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: atoimemcpy
    • String ID: %d.%d.%d.%d$Packet size set to: %d bytes$Port set to: %d$Threads set to: %d$Unknown command
    • API String ID: 126230704-3691821516
    • Opcode ID: 761a1ce485632921bbffb7281cf2a6218fe9a642e71f4fdc5b2252f871c063eb
    • Instruction ID: 387aa30fb28e3e51bdb0f59caa373c6a3a4735f9694838cd1ae87cf8144ac46d
    • Opcode Fuzzy Hash: 761a1ce485632921bbffb7281cf2a6218fe9a642e71f4fdc5b2252f871c063eb
    • Instruction Fuzzy Hash: 26814073F247918EEB10DFB5C4402EC7BB0AB49388F904826DA5C57B99DA3CD615CB50
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: QueryVirtual
    • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
    • API String ID: 1804819252-1534286854
    • Opcode ID: d803b5b9f4712c63a583bc66fc2a8294c2c3be480b6b5a6bb31d90d251e6b5c6
    • Instruction ID: dae6060f8e301852c1c05bc0038825ddcc7bd555302b7842fbda7062e7f41db2
    • Opcode Fuzzy Hash: d803b5b9f4712c63a583bc66fc2a8294c2c3be480b6b5a6bb31d90d251e6b5c6
    • Instruction Fuzzy Hash: 2671BF33B35B8286EB20AF51E844279B7A1EB497A4F944635EE5D13394DE3CE452C324
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: free$malloc
    • String ID:
    • API String ID: 2190258309-0
    • Opcode ID: 3fdcc2ec0350fbc7881cfd62aa9810f02018ec7521ec9bc9f349b6b3c1acdd06
    • Instruction ID: 8edb3190aadc6b33a61fb503cd4e85abb755e8f77ace74923a42cc2195095a36
    • Opcode Fuzzy Hash: 3fdcc2ec0350fbc7881cfd62aa9810f02018ec7521ec9bc9f349b6b3c1acdd06
    • Instruction Fuzzy Hash: 32618123F34B4589EB14EBA6D8503AC67B1AB4CB98F508539CE1D97BA9DE3CD5508320
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: free$malloc
    • String ID:
    • API String ID: 2190258309-0
    • Opcode ID: 9323b672db99f97c56645a26587eadc63964ebb5107a1af4015708c92901af04
    • Instruction ID: 0a87c7d1d530fecb0606b957874a23dfa061c728ec6c013993c8b6140a6dea4e
    • Opcode Fuzzy Hash: 9323b672db99f97c56645a26587eadc63964ebb5107a1af4015708c92901af04
    • Instruction Fuzzy Hash: 6C519D63F25B5589EB14EBA5D8503AC63B1FB4CB98F504939DE1D97BA9DE3CD4008320
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: NextProcess32
    • String ID: CreateToolhelp32Snapshot failed. Error: %lu$Failed to open process: %s (PID: %u)$Terminated process: %s (PID: %u)
    • API String ID: 1850201408-153003829
    • Opcode ID: e181661efe4dd773058fb5c019e7242ec3b384c34b7989fb4873058b68cdb20b
    • Instruction ID: 5b03e42526fa1e084296836516a6f301fb531afc763ef4e89b1df8b5c16ad7cd
    • Opcode Fuzzy Hash: e181661efe4dd773058fb5c019e7242ec3b384c34b7989fb4873058b68cdb20b
    • Instruction Fuzzy Hash: B1318823B34BC549EB30EBA5D8543ED6361FB4C798F904536C91C4BB99DE28E549C360
    APIs
    • Sleep.KERNEL32(?,?,00000000,Infinity,00007FF77CFC975F,?,?,?,?,00000000,Infinity,00007FF77CFC7C04,?,00000000,00000003,00007FF77CFC8118), ref: 00007FF77CFC964D
    • RtlInitializeCriticalSection.NTDLL ref: 00007FF77CFC968D
    • RtlInitializeCriticalSection.NTDLL ref: 00007FF77CFC9696
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: CriticalInitializeSection$Sleep
    • String ID: Infinity
    • API String ID: 1960909292-1015270809
    • Opcode ID: 2b3a132f51e9cd6b10359d2b6f53ec181f5f3bad216d3bdb832c5de5ecd3c170
    • Instruction ID: 3994d5d30b1060dc81b174f24f2860b7c587463a5a4690d675662ea43e9c7c8e
    • Opcode Fuzzy Hash: 2b3a132f51e9cd6b10359d2b6f53ec181f5f3bad216d3bdb832c5de5ecd3c170
    • Instruction Fuzzy Hash: 7F110D33E3868685EB25BB14F8A55B8A261FF4C714FE44931C80D862A4EF2DE956D720
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: freememset$rand
    • String ID:
    • API String ID: 2025389305-0
    • Opcode ID: 4480c9dfa61de757a7f1f0e5d6dc5bea86d1d3a71a6a449468cd70b262eee5fd
    • Instruction ID: fe6ad44f5c221d09e5704d64f509a668a2b73294c3a74c51f4020f677df445ac
    • Opcode Fuzzy Hash: 4480c9dfa61de757a7f1f0e5d6dc5bea86d1d3a71a6a449468cd70b262eee5fd
    • Instruction Fuzzy Hash: 5E313D23B35B5589EB10EBA5D8543AC63A0EB487A8F504A35DD6D97BE9DF3CD5008320
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: Byte$CharLeadMultiWide
    • String ID:
    • API String ID: 2561704868-0
    • Opcode ID: 98b7f6bf3ad1004ecf0cff6562c8d77fed0c02d9e6fb996009e33322c1bcc7a6
    • Instruction ID: 538f477bd8547dde9e8802f9770b12e362db92c6c95e2386de092cda6fd279c3
    • Opcode Fuzzy Hash: 98b7f6bf3ad1004ecf0cff6562c8d77fed0c02d9e6fb996009e33322c1bcc7a6
    • Instruction Fuzzy Hash: FE31B773B2D7C186E3705B24F404369A690BB98794F948A35DA98877E8DE3DE485CB10
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID:
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
    • API String ID: 0-395989641
    • Opcode ID: 76e62dfac5ded097740ec0d1c05d2b01f578fe877c8bdf0b2acdc5b6a318c470
    • Instruction ID: 1de371a5270a568706f85c5644c24f38d9ed153e536305abb2e8761d51d98cf4
    • Opcode Fuzzy Hash: 76e62dfac5ded097740ec0d1c05d2b01f578fe877c8bdf0b2acdc5b6a318c470
    • Instruction Fuzzy Hash: 0671B423F347D586EB30BB21E4007B9ABA2BB58B94F958930DE1C17794DE3DE441C620
    APIs
      • Part of subcall function 00007FF77CFC9620: Sleep.KERNEL32(?,?,00000000,Infinity,00007FF77CFC975F,?,?,?,?,00000000,Infinity,00007FF77CFC7C04,?,00000000,00000003,00007FF77CFC8118), ref: 00007FF77CFC964D
    • malloc.MSVCRT ref: 00007FF77CFC9787
    • RtlLeaveCriticalSection.NTDLL ref: 00007FF77CFC97DF
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: CriticalLeaveSectionSleepmalloc
    • String ID: Infinity
    • API String ID: 1993596536-1015270809
    • Opcode ID: 583c81eff2bc653449be8c5b22903ef88f54eda45f881fdddad083b71c83a9c0
    • Instruction ID: 8114b26f264c7838b8f6737b3a8d2a935ea4006c4d1b0433d3ee793c23e00f44
    • Opcode Fuzzy Hash: 583c81eff2bc653449be8c5b22903ef88f54eda45f881fdddad083b71c83a9c0
    • Instruction Fuzzy Hash: 7C216B73F3978682EF24AB04E4503B9A391AF48784F858639C91D073A4EF3DA665C350
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-3474627141
    • Opcode ID: f7e8b77a0b0dff4a7c8fd560446d4c8046c86c2a5a0ae3229943de372c0eb2c5
    • Instruction ID: af98c07a5e445049c6748e19561df53899aa1472d29591555a3fe983a7751f7a
    • Opcode Fuzzy Hash: f7e8b77a0b0dff4a7c8fd560446d4c8046c86c2a5a0ae3229943de372c0eb2c5
    • Instruction Fuzzy Hash: 94017C63E28FC482D711AF1898001BAB331FF5E789F65AB25EA8C26555DF29E592C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2713391170
    • Opcode ID: 709d1337b431af56bb765744f32365ef71057d2f3adb48a5db82197e702a3b57
    • Instruction ID: cb58b47371eceac29d2dc67c87c4ad2bde34164ea37ee2a0f709a06da0786628
    • Opcode Fuzzy Hash: 709d1337b431af56bb765744f32365ef71057d2f3adb48a5db82197e702a3b57
    • Instruction Fuzzy Hash: 6EF04F13D28F8482D312AF18A4001BAB330FF4E798F646B25EA8D26555DF28E5829710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4283191376
    • Opcode ID: ef8ff845aa821fedd75d124928bf110435547eefecd6d81b6760bdc6d9931a3a
    • Instruction ID: 05f7827c934e987bb9d7e3a7a2ca68897a17a35c3ba36640e3965ee61ba545ad
    • Opcode Fuzzy Hash: ef8ff845aa821fedd75d124928bf110435547eefecd6d81b6760bdc6d9931a3a
    • Instruction Fuzzy Hash: 88F04F53D28FC482D312AF18A4001AAB330FF4E798F646B26EA8D26555DF28E5829710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4064033741
    • Opcode ID: 30eeda8bdb12080cde567a8558e119721110e6916e5ac3dcb8fdf4791492d7ce
    • Instruction ID: a9973f5484547c71d937e05970337b29304e00b3e7846614a95bdf573d3cf0bb
    • Opcode Fuzzy Hash: 30eeda8bdb12080cde567a8558e119721110e6916e5ac3dcb8fdf4791492d7ce
    • Instruction Fuzzy Hash: 5BF04F13D28F8482D312AF18A4001AAB330FF4E798F646B25EA8D26555DF29E5829710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: fprintf
    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2187435201
    • Opcode ID: f4b68061637c4e869876cc2b07be9ae89b12cec57d0ec52bd52edc14d149258f
    • Instruction ID: e6b6bf74340c0dd950f40723646ff31da8ec36bcc0fea3842508f58867b6ea64
    • Opcode Fuzzy Hash: f4b68061637c4e869876cc2b07be9ae89b12cec57d0ec52bd52edc14d149258f
    • Instruction Fuzzy Hash: 07F04F13D28F8482D312AF18A4001AAB330FF4E798F645B25EB8D26555DF28E5929710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4273532761
    • Opcode ID: 2555366b7f243d5c5750147fe3f99058101b7cdae7e235ce5a55a443d9b88822
    • Instruction ID: b62011c949c4255cf50ee968f47cf7fe703b33f40f4eeb90de48ef283b70e12b
    • Opcode Fuzzy Hash: 2555366b7f243d5c5750147fe3f99058101b7cdae7e235ce5a55a443d9b88822
    • Instruction Fuzzy Hash: 70F04F17D68F8482D312AF18A4001AAB330FF4E798F646B25EA8D26555DF28E5829710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2468659920
    • Opcode ID: bffe1eaf3389dee2b12e3729f9d500de9cab9793a4ff0cf748dbcce5efa7edf7
    • Instruction ID: 68b84f13ec67206118c8bbcea8b335b66ef6ace9a70951308fc14b7607700bd8
    • Opcode Fuzzy Hash: bffe1eaf3389dee2b12e3729f9d500de9cab9793a4ff0cf748dbcce5efa7edf7
    • Instruction Fuzzy Hash: EBF06213D28F8482D3129F18A4000ABB330FF4E798F545B25EF8C26115DF28E5828710
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: freememset
    • String ID:
    • API String ID: 2499939622-0
    • Opcode ID: 8337257afa241cc28aafe8cf9f7202994b655755b37db60b13fdb6ff63783a31
    • Instruction ID: 7eee289acaad0ba2ef9469492f9b78fe8d4769efda038bca21ed91addf053428
    • Opcode Fuzzy Hash: 8337257afa241cc28aafe8cf9f7202994b655755b37db60b13fdb6ff63783a31
    • Instruction Fuzzy Hash: A3413D23B35B5588EB10EBA6E8503AC6371AB48BA4F508A35CD2D577E9DF3DD6508320
    APIs
    Memory Dump Source
    • Source File: 00000002.00000002.4535028097.00007FF77CFC1000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF77CFC0000, based on PE: true
    • Associated: 00000002.00000002.4534999603.00007FF77CFC0000.00000002.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD1000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535028097.00007FF77CFD5000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535153913.00007FF77D03F000.00000080.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535175151.00007FF77D040000.00000040.00000001.01000000.00000005.sdmpDownload File
    • Associated: 00000002.00000002.4535199466.00007FF77D041000.00000004.00000001.01000000.00000005.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_7ff77cfc0000_svchost.jbxd
    Similarity
    • API ID: freememset
    • String ID:
    • API String ID: 2499939622-0
    • Opcode ID: 9f44535f6fd749539bcc271d37f089827b23007be47d33ba420ed4f177ea1149
    • Instruction ID: 17bfc46f87919d282204068d4946002d1b66bb56398d74d5013844812f172b83
    • Opcode Fuzzy Hash: 9f44535f6fd749539bcc271d37f089827b23007be47d33ba420ed4f177ea1149
    • Instruction Fuzzy Hash: 3F318D27724BC58AEB75AF65E8503E96368E748B98F804536DA1D4BBA9DF7CD3008310