Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cbot.exe

Overview

General Information

Sample name:cbot.exe
Analysis ID:1587731
MD5:800dcb9f93715f5ed7189be2e35aebd9
SHA1:5d0a60c1e85bed844bb98a864c04d87e1b66c76d
SHA256:cff151ab7a8c0d221278758e76f71fc6c120d22bc39bf98daabfe1f450642a6f
Tags:DDoSexeuser-NDA0E
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
AI detected suspicious sample
Drops PE files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cbot.exe (PID: 1892 cmdline: "C:\Users\user\Desktop\cbot.exe" MD5: 800DCB9F93715F5ED7189BE2E35AEBD9)
  • svchost.exe (PID: 5056 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" MD5: 800DCB9F93715F5ED7189BE2E35AEBD9)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , ProcessId: 5056, ProcessName: svchost.exe
Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\cbot.exe, ProcessId: 1892, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe
Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe" , ProcessId: 5056, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeVirustotal: Detection: 23%Perma Link
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeReversingLabs: Detection: 21%
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)ReversingLabs: Detection: 21%
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)Virustotal: Detection: 23%Perma Link
Source: cbot.exeVirustotal: Detection: 23%Perma Link
Source: cbot.exeReversingLabs: Detection: 21%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJoe Sandbox ML: detected
Source: cbot.exeJoe Sandbox ML: detected
Source: cbot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

Networking

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeNetwork Connect: 154.213.192.42 3778Jump to behavior
Source: global trafficTCP traffic: 192.168.2.8:49707 -> 154.213.192.42:3778
Source: global trafficTCP traffic: 192.168.2.8:49229 -> 162.159.36.2:53
Source: Joe Sandbox ViewASN Name: POWERLINE-AS-APPOWERLINEDATACENTERHK POWERLINE-AS-APPOWERLINEDATACENTERHK
Source: unknownDNS traffic detected: query: 18.31.95.13.in-addr.arpa replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 154.213.192.42
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF630603D58 htons,inet_addr,Sleep,send,send,send,send,send,memset,recv,recv,perror,closesocket,Sleep,0_2_00007FF630603D58
Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF630607DF00_2_00007FF630607DF0
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A07DF02_2_00007FF609A07DF0
Source: classification engineClassification label: mal88.adwa.evad.winEXE@2/3@1/1
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6306033E2 CreateToolhelp32Snapshot,GetLastError,Process32First,strcmp,Process32Next,CloseHandle,CloseHandle,Sleep,SleepEx,0_2_00007FF6306033E2
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to behavior
Source: C:\Users\user\Desktop\cbot.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: cbot.exeVirustotal: Detection: 23%
Source: cbot.exeReversingLabs: Detection: 21%
Source: C:\Users\user\Desktop\cbot.exeFile read: C:\Users\user\Desktop\cbot.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\cbot.exe "C:\Users\user\Desktop\cbot.exe"
Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
Source: C:\Users\user\Desktop\cbot.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\cbot.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\cbot.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\cbot.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\cbot.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: cbot.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: cbot.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: cbot.exeStatic PE information: section name: UPX2
Source: cbot.exe.0.drStatic PE information: section name: UPX2
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF63061139C push rbp; retf 0_2_00007FF630611387
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF63061139C push rbp; retf 0_2_00007FF6306113BF
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6306113A4 push rbp; retf 0_2_00007FF6306113BF
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF630611384 push rbp; retf 0_2_00007FF630611387
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6306113FC push rbp; retf 0_2_00007FF6306113FF
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF630611404 push rsi; retf 0_2_00007FF63061140F
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6306113DC push rbp; retf 0_2_00007FF6306113DF
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF630605040 push rbp; retf 0_2_00007FF6306113BF
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A05040 push rbp; retf 2_2_00007FF609A113BF
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A113DC push rbp; retf 2_2_00007FF609A113DF
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A113FC push rbp; retf 2_2_00007FF609A113FF
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A11404 push rsi; retf 2_2_00007FF609A1140F
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A1139C push rbp; retf 2_2_00007FF609A11387
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A1139C push rbp; retf 2_2_00007FF609A113BF
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A113A4 push rbp; retf 2_2_00007FF609A113BF
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A11384 push rbp; retf 2_2_00007FF609A11387
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to dropped file
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to behavior
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exeJump to behavior
Source: C:\Users\user\Desktop\cbot.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe\:Zone.Identifier:$DATAJump to behavior

Malware Analysis System Evasion

barindex
Source: cbot.exe, cbot.exe, 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: PROCESSHACKER.EXE
Source: cbot.exe, cbot.exe, 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: X64DBG.EXE
Source: svchost.exe, 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: NLCLIENTAPP.EXEWIRESHARK.EXEDUMPCAP.EXEX64DBG.EXEX32DBG.EXEPROCESSHACKER.EXEBOT.EXEBOT.EXECREATETOOLHELP32SNAPSHOT FAILED. ERROR: %LU
Source: cbot.exe, cbot.exe, 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: DUMPCAP.EXE
Source: cbot.exe, cbot.exe, 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: WIRESHARK.EXE
Source: C:\Users\user\Desktop\cbot.exe TID: 5532Thread sleep count: 88 > 30Jump to behavior
Source: C:\Users\user\Desktop\cbot.exe TID: 5532Thread sleep time: -176000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe TID: 5308Thread sleep count: 81 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe TID: 5308Thread sleep time: -162000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\cbot.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\cbot.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeLast function: Thread delayed
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeLast function: Thread delayed
Source: cbot.exe, 00000000.00000002.3473420215.0000017D760F4000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.3473477702.00000279D9A13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\cbot.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF630601190 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,exit,0_2_00007FF630601190
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF6306113DC SetUnhandledExceptionFilter,0_2_00007FF6306113DC
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF63060AA8A SetUnhandledExceptionFilter,0_2_00007FF63060AA8A
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A01190 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,exit,2_2_00007FF609A01190
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A0AA8A SetUnhandledExceptionFilter,2_2_00007FF609A0AA8A
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A113DC SetUnhandledExceptionFilter,2_2_00007FF609A113DC

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeNetwork Connect: 154.213.192.42 3778Jump to behavior
Source: cbot.exe, cbot.exe, 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, svchost.exe, svchost.exe, 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmpBinary or memory string: Wireshark.exe
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF63060241D socket,free,memset,htons,bind,closesocket,free,memset,htons,inet_addr,sendto,closesocket,free,0_2_00007FF63060241D
Source: C:\Users\user\Desktop\cbot.exeCode function: 0_2_00007FF630602666 socket,free,memset,htons,bind,closesocket,free,memset,htons,inet_addr,sendto,closesocket,free,0_2_00007FF630602666
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A02666 socket,free,memset,htons,bind,closesocket,free,memset,htons,inet_addr,sendto,closesocket,free,2_2_00007FF609A02666
Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeCode function: 2_2_00007FF609A0241D socket,free,memset,htons,bind,closesocket,free,memset,htons,inet_addr,sendto,closesocket,free,2_2_00007FF609A0241D
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation12
Registry Run Keys / Startup Folder
11
Process Injection
1
Masquerading
OS Credential Dumping211
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
12
Registry Run Keys / Startup Folder
1
Virtualization/Sandbox Evasion
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
11
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Obfuscated Files or Information
NTDS1
System Information Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Software Packing
LSA SecretsInternet Connection DiscoverySSHKeylogging1
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
cbot.exe24%VirustotalBrowse
cbot.exe21%ReversingLabs
cbot.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe24%VirustotalBrowse
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cbot.exe21%ReversingLabs
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)21%ReversingLabs
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe (copy)24%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
18.31.95.13.in-addr.arpa
unknown
unknownfalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    154.213.192.42
    unknownSeychelles
    132839POWERLINE-AS-APPOWERLINEDATACENTERHKtrue
    Joe Sandbox version:42.0.0 Malachite
    Analysis ID:1587731
    Start date and time:2025-01-10 17:38:34 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 37s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:cbot.exe
    Detection:MAL
    Classification:mal88.adwa.evad.winEXE@2/3@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 97%
    • Number of executed functions: 12
    • Number of non-executed functions: 45
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.95.31.18, 13.107.246.45
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    TimeTypeDescription
    17:40:00AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    POWERLINE-AS-APPOWERLINEDATACENTERHKNWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
    • 154.213.39.66
    armv4l.elfGet hashmaliciousUnknownBrowse
    • 156.253.200.172
    https://199.188.109.181Get hashmaliciousUnknownBrowse
    • 154.203.26.164
    Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
    • 156.243.249.53
    sora.arm7.elfGet hashmaliciousUnknownBrowse
    • 154.216.35.228
    DHL-DOC83972025-1.exeGet hashmaliciousFormBookBrowse
    • 154.215.72.110
    gompsl.elfGet hashmaliciousMiraiBrowse
    • 156.251.7.182
    garm5.elfGet hashmaliciousMiraiBrowse
    • 156.242.206.46
    garm7.elfGet hashmaliciousMiraiBrowse
    • 156.242.206.54
    No context
    No context
    Process:C:\Users\user\Desktop\cbot.exe
    File Type:PE32+ executable (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):154772
    Entropy (8bit):7.054263895609286
    Encrypted:false
    SSDEEP:1536:/LtDu076JchveHZHAsFXGDDkDNsJQ337Tcxg3cXf3NsMpphw6p0HP94Y8udRivy:TtD9+dHNAe2v8Ns67wg3af9skh4eS/i6
    MD5:800DCB9F93715F5ED7189BE2E35AEBD9
    SHA1:5D0A60C1E85BED844BB98A864C04D87E1B66C76D
    SHA-256:CFF151AB7A8C0D221278758E76F71FC6C120D22BC39BF98DAABFE1F450642A6F
    SHA-512:F8BFBB0AF933AD0F4CF96B27811CBA1520AC436D3A511D26D1A005813B0B19FBC4B613BEBECB2F847A072CD59002F489F81AC98EE34DD84125706BBE6AC215F2
    Malicious:true
    Antivirus:
    • Antivirus: Joe Sandbox ML, Detection: 100%
    • Antivirus: Virustotal, Detection: 24%, Browse
    • Antivirus: ReversingLabs, Detection: 21%
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g.B........&....&.........p.............@............................. ............`... .................................................P...............x...........P...................................(...................................................UPX0.....p..............................UPX1................................@...UPX2................................@...3.94.UPX!.$...5........{......I..R...a.z.....f.....kx...KQc...D....>o.\%Qx..?o!.>......A%..#:V.,Wb.;%.U}.....t^.|..:.....r...e_H..g.....F.Ju.X......I.P%........pe..l....M.<.Gskoa.5&)7..A.1.w.'`.J..E.}..T!.RjH-/o...8A.....1...Y.wp%..S.x'...)k.... Kx.......uj.Dg.~...]7..%.)..7@O$...R....7..m..1..Z..G\j.>.;^.<..]t..h.F..=...oMv..u....\k............,..}."....8..F.....6..yRbT)....l?....(..[`.=B...!ADMo..5V.P....}l...%N.H..i.P_.l..'r....H&..kcO..g.4...Lx.o.8zJJ......
    Process:C:\Users\user\Desktop\cbot.exe
    File Type:ASCII text, with CRLF line terminators
    Category:modified
    Size (bytes):26
    Entropy (8bit):3.95006375643621
    Encrypted:false
    SSDEEP:3:ggPYV:rPYV
    MD5:187F488E27DB4AF347237FE461A079AD
    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
    Malicious:true
    Reputation:high, very likely benign file
    Preview:[ZoneTransfer]....ZoneId=0
    Process:C:\Users\user\Desktop\cbot.exe
    File Type:PE32+ executable (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):154772
    Entropy (8bit):7.054263895609286
    Encrypted:false
    SSDEEP:1536:/LtDu076JchveHZHAsFXGDDkDNsJQ337Tcxg3cXf3NsMpphw6p0HP94Y8udRivy:TtD9+dHNAe2v8Ns67wg3af9skh4eS/i6
    MD5:800DCB9F93715F5ED7189BE2E35AEBD9
    SHA1:5D0A60C1E85BED844BB98A864C04D87E1B66C76D
    SHA-256:CFF151AB7A8C0D221278758E76F71FC6C120D22BC39BF98DAABFE1F450642A6F
    SHA-512:F8BFBB0AF933AD0F4CF96B27811CBA1520AC436D3A511D26D1A005813B0B19FBC4B613BEBECB2F847A072CD59002F489F81AC98EE34DD84125706BBE6AC215F2
    Malicious:true
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 21%
    • Antivirus: Virustotal, Detection: 24%, Browse
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g.B........&....&.........p.............@............................. ............`... .................................................P...............x...........P...................................(...................................................UPX0.....p..............................UPX1................................@...UPX2................................@...3.94.UPX!.$...5........{......I..R...a.z.....f.....kx...KQc...D....>o.\%Qx..?o!.>......A%..#:V.,Wb.;%.U}.....t^.|..:.....r...e_H..g.....F.Ju.X......I.P%........pe..l....M.<.Gskoa.5&)7..A.1.w.'`.J..E.}..T!.RjH-/o...8A.....1...Y.wp%..S.x'...)k.... Kx.......uj.Dg.~...]7..%.)..7@O$...R....7..m..1..Z..G\j.>.;^.<..]t..h.F..=...oMv..u....\k............,..}."....8..F.....6..yRbT)....l?....(..[`.=B...!ADMo..5V.P....}l...%N.H..i.P_.l..'r....H&..kcO..g.4...Lx.o.8zJJ......
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):7.054263895609286
    TrID:
    • Win64 Executable GUI (202006/5) 81.26%
    • UPX compressed Win32 Executable (30571/9) 12.30%
    • Win64 Executable (generic) (12005/4) 4.83%
    • Generic Win/DOS Executable (2004/3) 0.81%
    • DOS Executable Generic (2002/1) 0.81%
    File name:cbot.exe
    File size:154'772 bytes
    MD5:800dcb9f93715f5ed7189be2e35aebd9
    SHA1:5d0a60c1e85bed844bb98a864c04d87e1b66c76d
    SHA256:cff151ab7a8c0d221278758e76f71fc6c120d22bc39bf98daabfe1f450642a6f
    SHA512:f8bfbb0af933ad0f4cf96b27811cba1520ac436d3a511d26d1a005813b0b19fbc4b613bebecb2f847a072cd59002f489f81ac98ee34dd84125706bbe6ac215f2
    SSDEEP:1536:/LtDu076JchveHZHAsFXGDDkDNsJQ337Tcxg3cXf3NsMpphw6p0HP94Y8udRivy:TtD9+dHNAe2v8Ns67wg3af9skh4eS/i6
    TLSH:BAE34AE066E85D86FA24527D41C7D222273CFBE1C7434B07493476362E63BD27DC266A
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g.B........&....&.........p.............@............................. ............`... ............................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x14007fbd0
    Entrypoint Section:UPX1
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x677FF49E [Thu Jan 9 16:09:02 2025 UTC]
    TLS Callbacks:0x400807b4, 0x1
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f09dfdec43a86f0214209d98673dd7a5
    Instruction
    push ebx
    push esi
    push edi
    push ebp
    dec eax
    lea esi, dword ptr [FFFE844Ah]
    dec eax
    lea edi, dword ptr [esi-00067025h]
    push edi
    mov eax, 0007D898h
    push eax
    dec eax
    mov ecx, esp
    dec eax
    mov edx, edi
    dec eax
    mov edi, esi
    mov esi, 00017BA9h
    push ebp
    dec eax
    mov ebp, esp
    inc esp
    mov ecx, dword ptr [ecx]
    dec ecx
    mov eax, edx
    dec eax
    mov edx, esi
    dec eax
    lea esi, dword ptr [edi+02h]
    push esi
    mov al, byte ptr [edi]
    dec edx
    mov cl, al
    and al, 07h
    shr cl, 00000003h
    dec eax
    mov ebx, FFFFFD00h
    dec eax
    shl ebx, cl
    mov cl, al
    dec eax
    lea ebx, dword ptr [esp+ebx*2-00000E78h]
    dec eax
    and ebx, FFFFFFC0h
    push 00000000h
    dec eax
    cmp esp, ebx
    jne 00007FE13CDEBEFBh
    push ebx
    dec eax
    lea edi, dword ptr [ebx+08h]
    mov cl, byte ptr [esi-01h]
    dec edx
    mov byte ptr [edi+02h], al
    mov al, cl
    shr cl, 00000004h
    mov byte ptr [edi+01h], cl
    and al, 0Fh
    mov byte ptr [edi], al
    dec eax
    lea ecx, dword ptr [edi-04h]
    push eax
    inc ecx
    push edi
    dec eax
    lea eax, dword ptr [edi+04h]
    inc ebp
    xor edi, edi
    inc ecx
    push esi
    inc ecx
    mov esi, 00000001h
    inc ecx
    push ebp
    inc ebp
    xor ebp, ebp
    inc ecx
    push esp
    push ebp
    push ebx
    dec eax
    mov dword ptr [esp-10h], ecx
    dec eax
    mov dword ptr [esp-28h], eax
    mov eax, 00000001h
    dec eax
    mov dword ptr [esp-08h], esi
    dec esp
    mov dword ptr [esp-18h], eax
    mov ebx, eax
    inc esp
    mov dword ptr [esp-1Ch], ecx
    movzx ecx, byte ptr [edi+02h]
    shl ebx, cl
    mov ecx, ebx
    dec eax
    mov ebx, dword ptr [esp+38h]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x810000x150UPX2
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe0000x678UPX0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x811500x14UPX2
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x807e00x28UPX1
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    UPX00x10000x670000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    UPX10x680000x190000x18a00f41f1ea65f943a5bd10b513b61e18c03False0.9843849143401016data7.988732441146602IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    UPX20x810000x10000x2007d6ce4d078252eaccdfee320f323b357False0.40234375data2.962088078182722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    DLLImport
    KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
    msvcrt.dllatoi
    SHELL32.dllSHGetSpecialFolderPathA
    WS2_32.dllbind
    TimestampSource PortDest PortSource IPDest IP
    Jan 10, 2025 17:39:57.886636972 CET497073778192.168.2.8154.213.192.42
    Jan 10, 2025 17:39:57.891462088 CET377849707154.213.192.42192.168.2.8
    Jan 10, 2025 17:39:57.891544104 CET497073778192.168.2.8154.213.192.42
    Jan 10, 2025 17:39:57.892252922 CET497073778192.168.2.8154.213.192.42
    Jan 10, 2025 17:39:57.897053003 CET377849707154.213.192.42192.168.2.8
    Jan 10, 2025 17:39:57.897123098 CET497073778192.168.2.8154.213.192.42
    Jan 10, 2025 17:39:57.901992083 CET377849707154.213.192.42192.168.2.8
    Jan 10, 2025 17:39:58.520579100 CET377849707154.213.192.42192.168.2.8
    Jan 10, 2025 17:39:58.569575071 CET497073778192.168.2.8154.213.192.42
    Jan 10, 2025 17:39:58.649470091 CET377849707154.213.192.42192.168.2.8
    Jan 10, 2025 17:39:58.694427967 CET497073778192.168.2.8154.213.192.42
    Jan 10, 2025 17:40:09.770706892 CET497083778192.168.2.8154.213.192.42
    Jan 10, 2025 17:40:09.775651932 CET377849708154.213.192.42192.168.2.8
    Jan 10, 2025 17:40:09.775795937 CET497083778192.168.2.8154.213.192.42
    Jan 10, 2025 17:40:09.775795937 CET497083778192.168.2.8154.213.192.42
    Jan 10, 2025 17:40:09.780649900 CET377849708154.213.192.42192.168.2.8
    Jan 10, 2025 17:40:09.780714035 CET497083778192.168.2.8154.213.192.42
    Jan 10, 2025 17:40:09.785561085 CET377849708154.213.192.42192.168.2.8
    Jan 10, 2025 17:40:10.392095089 CET377849708154.213.192.42192.168.2.8
    Jan 10, 2025 17:40:10.444552898 CET497083778192.168.2.8154.213.192.42
    Jan 10, 2025 17:40:10.521326065 CET377849708154.213.192.42192.168.2.8
    Jan 10, 2025 17:40:10.569400072 CET497083778192.168.2.8154.213.192.42
    Jan 10, 2025 17:40:30.078110933 CET4922953192.168.2.8162.159.36.2
    Jan 10, 2025 17:40:30.083769083 CET5349229162.159.36.2192.168.2.8
    Jan 10, 2025 17:40:30.083892107 CET4922953192.168.2.8162.159.36.2
    Jan 10, 2025 17:40:30.089497089 CET5349229162.159.36.2192.168.2.8
    Jan 10, 2025 17:40:30.548048019 CET4922953192.168.2.8162.159.36.2
    Jan 10, 2025 17:40:30.553491116 CET5349229162.159.36.2192.168.2.8
    Jan 10, 2025 17:40:30.553559065 CET4922953192.168.2.8162.159.36.2
    TimestampSource PortDest PortSource IPDest IP
    Jan 10, 2025 17:40:30.077526093 CET5359086162.159.36.2192.168.2.8
    Jan 10, 2025 17:40:30.561811924 CET5350853192.168.2.81.1.1.1
    Jan 10, 2025 17:40:30.570547104 CET53535081.1.1.1192.168.2.8
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 10, 2025 17:40:30.561811924 CET192.168.2.81.1.1.10x8d61Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 10, 2025 17:40:30.570547104 CET1.1.1.1192.168.2.80x8d61Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:11:39:56
    Start date:10/01/2025
    Path:C:\Users\user\Desktop\cbot.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\cbot.exe"
    Imagebase:0x7ff630600000
    File size:154'772 bytes
    MD5 hash:800DCB9F93715F5ED7189BE2E35AEBD9
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:2
    Start time:11:40:08
    Start date:10/01/2025
    Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
    Imagebase:0x7ff609a00000
    File size:154'772 bytes
    MD5 hash:800DCB9F93715F5ED7189BE2E35AEBD9
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:7.3%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:13.4%
      Total number of Nodes:618
      Total number of Limit Nodes:7
      execution_graph 2989 7ff630601ca4 2990 7ff630601cd1 2989->2990 2991 7ff630601cf2 malloc 2990->2991 2992 7ff630601cdc free 2990->2992 2994 7ff630601d34 memset 2991->2994 2995 7ff630601d0e free 2991->2995 2993 7ff630601ef0 2992->2993 3001 7ff630601d66 2994->3001 2995->2993 2997 7ff630601ec0 free 2999 7ff630601edf free 2997->2999 2999->2993 3000 7ff630601dd9 rand 3000->3001 3001->2997 3001->3000 3351 7ff630603a24 3352 7ff630603570 3 API calls 3351->3352 3353 7ff630603a4b 3352->3353 3356 7ff630601ef6 3353->3356 3358 7ff630601fb7 3356->3358 3357 7ff630601f30 malloc 3357->3358 3358->3357 3359 7ff630602023 3358->3359 3362 7ff630601550 3358->3362 3363 7ff630601585 3362->3363 3364 7ff6306056c0 3 API calls 3363->3364 3365 7ff630601594 free 3364->3365 3365->3358 3002 7ff6306074a3 3003 7ff6306074ba 3002->3003 3005 7ff6306074ca 3002->3005 3008 7ff630605b00 3003->3008 3007 7ff6306079ce 3005->3007 3011 7ff6306058e0 3005->3011 3009 7ff630605b40 strlen 3008->3009 3010 7ff630605b26 3008->3010 3009->3010 3010->3009 3016 7ff63060a790 3011->3016 3013 7ff63060a790 2 API calls 3015 7ff63060590d 3013->3015 3014 7ff630605979 3014->3007 3015->3013 3015->3014 3017 7ff63060a7ae 3016->3017 3020 7ff63060a700 3017->3020 3019 7ff63060a7c6 3019->3015 3021 7ff63060a730 WideCharToMultiByte 3020->3021 3022 7ff63060a714 3020->3022 3021->3022 3024 7ff63060a774 _errno 3021->3024 3023 7ff63060a71b 3022->3023 3022->3024 3023->3019 3024->3019 3025 7ff6306047a0 3026 7ff6306047bf 3025->3026 3027 7ff6306047fd fprintf 3026->3027 3366 7ff63060391f 3369 7ff630602ed2 3366->3369 3374 7ff630602f83 3369->3374 3370 7ff630602f0c malloc 3370->3374 3371 7ff6306020bf 3 API calls 3373 7ff630602fb7 free 3371->3373 3372 7ff630602fef 3373->3374 3374->3370 3374->3371 3374->3372 3375 7ff63060241d 3376 7ff63060244d 3375->3376 3377 7ff63060246e 3376->3377 3378 7ff630602458 free 3376->3378 3388 7ff630602110 rand 3377->3388 3379 7ff63060265d 3378->3379 3381 7ff630602473 memset 3382 7ff6306024a4 3381->3382 3383 7ff6306024f4 memset 3382->3383 3384 7ff6306024ce free 3382->3384 3386 7ff630602526 3383->3386 3384->3379 3387 7ff63060264c free 3386->3387 3387->3379 3388->3381 3028 7ff63060aab1 MultiByteToWideChar 3029 7ff630604f99 signal 3030 7ff630605010 signal 3029->3030 3031 7ff630604f0d 3029->3031 3032 7ff6306077b3 3033 7ff6306077c7 3032->3033 3036 7ff63060758b 3032->3036 3035 7ff6306060d0 19 API calls 3033->3035 3037 7ff6306077e6 3035->3037 3036->3032 3038 7ff6306060d0 3036->3038 3037->3037 3039 7ff6306060e5 3038->3039 3045 7ff630605770 3039->3045 3043 7ff630606178 3043->3036 3044 7ff63060613f 3044->3036 3046 7ff630605788 3045->3046 3058 7ff630607df0 3046->3058 3048 7ff6306057ff 3048->3043 3049 7ff630605d10 3048->3049 3052 7ff630605d30 3049->3052 3050 7ff630605ec2 3056 7ff630605ee5 3050->3056 3150 7ff630605c00 3050->3150 3052->3050 3053 7ff630605ddd 3052->3053 3054 7ff630605f98 3052->3054 3053->3050 3057 7ff6306058e0 2 API calls 3053->3057 3055 7ff630605c00 8 API calls 3054->3055 3054->3056 3055->3056 3056->3044 3057->3053 3059 7ff6306080f0 3058->3059 3060 7ff630607e36 3058->3060 3062 7ff630607bd0 6 API calls 3059->3062 3061 7ff630608060 3060->3061 3066 7ff630607e46 3060->3066 3082 7ff63060808d 3061->3082 3105 7ff630607bd0 3061->3105 3062->3082 3063 7ff6306080c0 3065 7ff630607bd0 6 API calls 3063->3065 3065->3082 3066->3063 3066->3066 3074 7ff630607f46 3066->3074 3066->3082 3098 7ff630609750 3066->3098 3068 7ff630607e7f 3069 7ff6306080b8 3068->3069 3068->3074 3109 7ff630609850 3069->3109 3070 7ff630608429 3070->3048 3072 7ff630608440 3073 7ff630607b90 6 API calls 3072->3073 3096 7ff630608230 3072->3096 3073->3096 3074->3070 3074->3072 3075 7ff6306081f3 3074->3075 3074->3096 3115 7ff630607b90 3075->3115 3077 7ff630609970 6 API calls 3077->3096 3078 7ff630609850 5 API calls 3079 7ff630608701 3078->3079 3081 7ff630609850 5 API calls 3079->3081 3089 7ff6306083f1 3079->3089 3080 7ff630609850 5 API calls 3080->3082 3081->3089 3082->3048 3083 7ff630609c80 7 API calls 3083->3096 3084 7ff630609af0 10 API calls 3084->3096 3086 7ff630608948 3086->3048 3087 7ff6306098c0 8 API calls 3087->3096 3088 7ff63060869f 3088->3086 3123 7ff6306098c0 3088->3123 3089->3080 3090 7ff630609750 6 API calls 3092 7ff63060917d memcpy 3090->3092 3137 7ff630609c80 3092->3137 3093 7ff6306086bd 3093->3078 3093->3086 3096->3077 3096->3083 3096->3084 3096->3086 3096->3087 3096->3088 3096->3089 3096->3090 3096->3093 3097 7ff630609850 Sleep RtlInitializeCriticalSection RtlInitializeCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 3096->3097 3119 7ff6306099a0 3096->3119 3130 7ff630609e00 3096->3130 3097->3096 3143 7ff630609620 3098->3143 3101 7ff630609764 malloc 3102 7ff6306097a0 3101->3102 3103 7ff630609791 3101->3103 3102->3068 3103->3102 3104 7ff6306097d3 RtlLeaveCriticalSection 3103->3104 3104->3102 3106 7ff630607be3 3105->3106 3106->3106 3107 7ff630609750 6 API calls 3106->3107 3108 7ff630607c04 3107->3108 3108->3082 3110 7ff630609898 3109->3110 3111 7ff63060985e 3109->3111 3110->3063 3112 7ff630609620 4 API calls 3111->3112 3113 7ff630609877 3112->3113 3113->3110 3114 7ff6306098a0 RtlLeaveCriticalSection 3113->3114 3116 7ff630607b9c 3115->3116 3117 7ff630609750 6 API calls 3116->3117 3118 7ff630607bbb 3117->3118 3118->3096 3120 7ff6306099c2 3119->3120 3121 7ff630609750 6 API calls 3120->3121 3122 7ff6306099e5 3121->3122 3122->3096 3124 7ff6306098e0 3123->3124 3124->3124 3125 7ff63060990f 3124->3125 3126 7ff630609750 6 API calls 3124->3126 3125->3093 3127 7ff63060993d 3126->3127 3127->3125 3128 7ff630609945 memcpy 3127->3128 3129 7ff630609850 5 API calls 3128->3129 3129->3125 3131 7ff630609e59 3130->3131 3132 7ff630609e21 3130->3132 3133 7ff630609750 6 API calls 3131->3133 3132->3131 3134 7ff630609fa0 3132->3134 3136 7ff630609e67 3133->3136 3135 7ff630609750 6 API calls 3134->3135 3135->3136 3136->3096 3138 7ff630609caf 3137->3138 3139 7ff630609750 6 API calls 3138->3139 3141 7ff630609cbe 3139->3141 3140 7ff630609d84 3140->3096 3141->3140 3142 7ff630609850 5 API calls 3141->3142 3142->3140 3144 7ff6306096ae RtlEnterCriticalSection 3143->3144 3145 7ff630609633 3143->3145 3147 7ff630609637 3144->3147 3146 7ff63060967f RtlInitializeCriticalSection RtlInitializeCriticalSection 3145->3146 3145->3147 3146->3147 3147->3144 3148 7ff63060965f 3147->3148 3149 7ff630609648 Sleep 3147->3149 3148->3101 3148->3103 3149->3147 3149->3149 3151 7ff630605cb0 3150->3151 3152 7ff630605c1a 3150->3152 3157 7ff63060a520 ___mb_cur_max_func ___lc_codepage_func 3151->3157 3153 7ff630605c90 3152->3153 3155 7ff63060a790 2 API calls 3152->3155 3153->3056 3156 7ff630605c54 3155->3156 3156->3056 3160 7ff63060a3a0 3157->3160 3159 7ff63060a57a 3159->3152 3161 7ff63060a4e8 3160->3161 3164 7ff63060a3b5 3160->3164 3161->3159 3162 7ff63060a478 3162->3159 3163 7ff63060a458 3166 7ff63060a4b0 MultiByteToWideChar 3163->3166 3167 7ff63060a463 3163->3167 3164->3162 3164->3163 3165 7ff63060a3e9 IsDBCSLeadByteEx 3164->3165 3168 7ff63060a404 3164->3168 3165->3163 3165->3168 3166->3162 3170 7ff63060a4f8 _errno 3166->3170 3167->3159 3168->3162 3169 7ff63060a42e MultiByteToWideChar 3168->3169 3169->3170 3171 7ff63060a448 3169->3171 3170->3162 3171->3159 3172 7ff630603fb0 3173 7ff630603ff0 3172->3173 3174 7ff630603fca rand 3173->3174 3175 7ff630603ffa 3173->3175 3174->3173 3176 7ff6306050b0 3177 7ff6306050d0 3176->3177 3178 7ff6306050c6 3176->3178 3177->3178 3179 7ff6306050e7 RtlEnterCriticalSection RtlLeaveCriticalSection 3177->3179 3389 7ff630605130 3390 7ff630605141 3389->3390 3391 7ff630605150 RtlEnterCriticalSection 3389->3391 3392 7ff630605193 RtlLeaveCriticalSection 3391->3392 3393 7ff630605169 3391->3393 3393->3392 3394 7ff63060518e free 3393->3394 3394->3392 3395 7ff630605330 strlen 3396 7ff6306053c0 3395->3396 3398 7ff630605346 3395->3398 3397 7ff6306053ae 3398->3396 3398->3397 3399 7ff630605399 strncmp 3398->3399 3399->3397 3399->3398 3180 7ff63060a6a0 ___mb_cur_max_func ___lc_codepage_func 3181 7ff63060a3a0 4 API calls 3180->3181 3182 7ff63060a6ee 3181->3182 3183 7ff6306075a8 3184 7ff6306075c3 3183->3184 3185 7ff6306075db 3183->3185 3189 7ff6306066b0 3184->3189 3187 7ff6306066b0 21 API calls 3185->3187 3188 7ff63060781e 3187->3188 3188->3188 3190 7ff6306066ca 3189->3190 3201 7ff630606743 3189->3201 3191 7ff630605770 11 API calls 3190->3191 3192 7ff6306066fd 3191->3192 3193 7ff630606768 3192->3193 3196 7ff630606724 3192->3196 3192->3201 3194 7ff630606777 3193->3194 3195 7ff63060676c strlen 3193->3195 3202 7ff630606510 3194->3202 3195->3194 3197 7ff63060672c 3196->3197 3198 7ff6306067f8 strlen 3196->3198 3200 7ff630605d10 8 API calls 3197->3200 3198->3197 3200->3201 3201->3185 3203 7ff63060653c 3202->3203 3204 7ff630605d10 8 API calls 3203->3204 3205 7ff6306065ac 3204->3205 3206 7ff630603985 3211 7ff630603570 3206->3211 3208 7ff6306039ac 3215 7ff630603067 3208->3215 3212 7ff6306035a5 3211->3212 3213 7ff6306056c0 3 API calls 3212->3213 3214 7ff6306035b4 3213->3214 3214->3208 3217 7ff630603128 3215->3217 3216 7ff6306030a1 malloc 3216->3217 3217->3216 3220 7ff630603194 3217->3220 3221 7ff6306020bf 3217->3221 3222 7ff6306020f4 3221->3222 3223 7ff6306056c0 3 API calls 3222->3223 3224 7ff630602103 free 3223->3224 3224->3217 3400 7ff63060ab09 RtlDeleteCriticalSection 3225 7ff63060aa8a SetUnhandledExceptionFilter 3401 7ff630604700 3403 7ff630604712 3401->3403 3402 7ff630604722 3403->3402 3406 7ff6306051c0 3403->3406 3405 7ff630604775 3407 7ff630605290 3406->3407 3408 7ff6306051ce 3406->3408 3407->3405 3409 7ff6306051d0 3408->3409 3412 7ff6306051f8 3408->3412 3410 7ff6306051d4 3409->3410 3411 7ff630605220 3409->3411 3414 7ff630605210 RtlInitializeCriticalSection 3410->3414 3415 7ff6306051de 3410->3415 3413 7ff63060522f 3411->3413 3417 7ff630605040 4 API calls 3411->3417 3412->3415 3420 7ff630605040 RtlEnterCriticalSection 3412->3420 3413->3415 3418 7ff630605261 RtlDeleteCriticalSection 3413->3418 3419 7ff630605250 free 3413->3419 3414->3415 3415->3405 3417->3413 3418->3415 3419->3418 3419->3419 3421 7ff630605094 RtlLeaveCriticalSection 3420->3421 3423 7ff630605062 3420->3423 3424 7ff63061137b 3421->3424 3422 7ff630605070 TlsGetValue GetLastError 3422->3423 3423->3421 3423->3422 3229 7ff63060177e 3230 7ff6306017ae 3229->3230 3231 7ff6306017cf memset 3230->3231 3232 7ff6306017b9 free 3230->3232 3235 7ff630601801 3231->3235 3233 7ff630601971 3232->3233 3234 7ff630601960 free 3234->3233 3235->3234 3236 7ff63060a590 ___lc_codepage_func ___mb_cur_max_func 3237 7ff63060a5cf 3236->3237 3238 7ff63060a5e8 3236->3238 3237->3238 3239 7ff63060a5e0 3237->3239 3242 7ff63060a650 3237->3242 3239->3238 3240 7ff63060a3a0 4 API calls 3239->3240 3240->3239 3241 7ff63060a3a0 4 API calls 3241->3242 3242->3238 3242->3241 3243 7ff63060777b 3244 7ff63060778f 3243->3244 3245 7ff6306075fb 3243->3245 3247 7ff630606600 19 API calls 3244->3247 3245->3243 3249 7ff630606600 3245->3249 3248 7ff6306077ae 3247->3248 3248->3248 3250 7ff630606615 3249->3250 3251 7ff630605770 11 API calls 3250->3251 3252 7ff630606646 3251->3252 3253 7ff630606510 8 API calls 3252->3253 3255 7ff630606690 3252->3255 3254 7ff630606666 3253->3254 3254->3245 3255->3245 3425 7ff630607915 3426 7ff63060791e localeconv 3425->3426 3427 7ff630607838 3425->3427 3428 7ff63060a520 6 API calls 3426->3428 3429 7ff63060795b 3428->3429 3430 7ff63060aaf9 RtlEnterCriticalSection 3431 7ff630603a11 3432 7ff630603570 3 API calls 3431->3432 3433 7ff630603a1d 3432->3433 3436 7ff630603540 3433->3436 3441 7ff630604268 3436->3441 3442 7ff630604296 3441->3442 3443 7ff6306042c5 3442->3443 3444 7ff6306042ad 3442->3444 3447 7ff630604010 3 API calls 3443->3447 3459 7ff630604010 3444->3459 3446 7ff6306042c3 3448 7ff6306043a3 3446->3448 3450 7ff630604315 3446->3450 3447->3446 3449 7ff630604010 3 API calls 3448->3449 3453 7ff63060354d 3449->3453 3451 7ff630604365 3450->3451 3454 7ff63060437d 3450->3454 3452 7ff630604010 3 API calls 3451->3452 3452->3453 3456 7ff6306033c0 3453->3456 3455 7ff630604010 3 API calls 3454->3455 3455->3453 3457 7ff630603210 3 API calls 3456->3457 3458 7ff6306033db 3457->3458 3460 7ff630604045 3459->3460 3461 7ff6306056c0 3 API calls 3460->3461 3462 7ff630604054 3461->3462 3462->3446 3463 7ff630601010 3464 7ff630601058 3463->3464 3465 7ff63060107a __set_app_type 3464->3465 3466 7ff630601084 3464->3466 3465->3466 3467 7ff630609700 3468 7ff630609720 RtlDeleteCriticalSection 3467->3468 3469 7ff630609715 3467->3469 3256 7ff63060798a 3258 7ff63060798f 3256->3258 3257 7ff6306079ce 3258->3257 3259 7ff6306058e0 2 API calls 3258->3259 3259->3257 2950 7ff6306033e2 2952 7ff6306033fe 2950->2952 2951 7ff630603532 2952->2951 2953 7ff630603414 CreateToolhelp32Snapshot 2952->2953 2954 7ff630603515 SleepEx 2952->2954 2956 7ff6306034e2 CloseHandle 2952->2956 2961 7ff630603210 2952->2961 2965 7ff630603261 2952->2965 2953->2952 2955 7ff630603450 Process32First 2953->2955 2954->2952 2955->2956 2957 7ff63060346f strcmp 2955->2957 2956->2952 2957->2952 2958 7ff6306034ca Process32Next 2957->2958 2958->2956 2958->2957 2962 7ff630603245 2961->2962 2974 7ff6306056c0 2962->2974 2966 7ff630603287 2965->2966 2967 7ff630603298 2966->2967 2972 7ff6306032b4 2966->2972 2968 7ff630603210 3 API calls 2967->2968 2969 7ff6306032af 2968->2969 2969->2952 2970 7ff630603387 Process32Next 2970->2969 2970->2972 2971 7ff630603210 3 API calls 2971->2970 2972->2969 2972->2970 2972->2971 2973 7ff630603210 3 API calls 2972->2973 2973->2972 2979 7ff63060a920 2974->2979 2976 7ff6306056d7 2983 7ff63060a990 2976->2983 2981 7ff63060a92f 2979->2981 2980 7ff63060a943 RtlEnterCriticalSection 2982 7ff63060a958 2980->2982 2981->2980 2981->2982 2982->2976 2985 7ff63060a99f 2983->2985 2984 7ff63060a9b3 RtlLeaveCriticalSection 2986 7ff63060a9c8 2984->2986 2985->2984 2985->2986 2987 7ff63060aa20 _unlock 2986->2987 2988 7ff630603254 2987->2988 2988->2952 3470 7ff63060aae9 GetLastError 3272 7ff630607860 3273 7ff630607874 3272->3273 3277 7ff63060770f 3272->3277 3274 7ff630606cc0 8 API calls 3273->3274 3276 7ff630607893 3274->3276 3276->3276 3277->3272 3278 7ff630606cc0 3277->3278 3279 7ff630606e90 3278->3279 3281 7ff630606d20 3278->3281 3279->3277 3280 7ff6306058e0 2 API calls 3280->3281 3281->3279 3281->3280 3282 7ff630605c00 8 API calls 3281->3282 3282->3281 3477 7ff6306038de 3478 7ff630603570 3 API calls 3477->3478 3479 7ff6306038fd 3478->3479 3482 7ff630602a13 3479->3482 3484 7ff630602ac4 3482->3484 3483 7ff630602a4d malloc 3483->3484 3484->3483 3485 7ff630602b30 3484->3485 3486 7ff6306020bf 3 API calls 3484->3486 3487 7ff630602af8 free 3486->3487 3487->3484 3488 7ff630604ede signal 3489 7ff630604ef4 signal 3488->3489 3490 7ff630604f08 3488->3490 3489->3490 3491 7ff63060a0f0 3492 7ff630609750 6 API calls 3491->3492 3493 7ff63060a10c 3492->3493 3283 7ff630607658 3284 7ff630607664 3283->3284 3285 7ff630605b00 strlen 3284->3285 3286 7ff630607671 3285->3286 3286->3286 3497 7ff6306076f4 3498 7ff630607874 3497->3498 3499 7ff63060770f 3497->3499 3500 7ff630606cc0 8 API calls 3498->3500 3499->3498 3501 7ff630606cc0 8 API calls 3499->3501 3502 7ff630607893 3500->3502 3501->3499 3502->3502 3287 7ff630607570 3288 7ff6306077c7 3287->3288 3291 7ff63060758b 3287->3291 3290 7ff6306060d0 19 API calls 3288->3290 3289 7ff6306060d0 19 API calls 3289->3291 3292 7ff6306077e6 3290->3292 3291->3288 3291->3289 3292->3292 3512 7ff6306014f0 3515 7ff630601190 3512->3515 3514 7ff630601506 3516 7ff6306011c4 3515->3516 3517 7ff630601470 GetStartupInfoA 3515->3517 3519 7ff6306011f1 Sleep 3516->3519 3520 7ff630601206 3516->3520 3518 7ff6306013d8 3517->3518 3518->3514 3519->3516 3521 7ff63060143c _initterm 3520->3521 3522 7ff630601239 3520->3522 3535 7ff6306013c4 3520->3535 3521->3522 3536 7ff630604b40 3522->3536 3524 7ff6306014be exit 3526 7ff630601190 29 API calls 3524->3526 3525 7ff630601261 SetUnhandledExceptionFilter 3531 7ff630601284 3525->3531 3527 7ff6306014e6 3526->3527 3527->3514 3528 7ff63060131e malloc 3529 7ff630601345 3528->3529 3530 7ff63060138b 3528->3530 3532 7ff630601350 strlen malloc memcpy 3529->3532 3556 7ff630603d58 3530->3556 3531->3528 3532->3532 3533 7ff630601386 3532->3533 3533->3530 3535->3518 3535->3524 3540 7ff630604b78 3536->3540 3555 7ff630604b62 3536->3555 3537 7ff630604db0 3539 7ff630604daa 3537->3539 3537->3555 3538 7ff630604d3e 3543 7ff630604dfc 3538->3543 3571 7ff630604920 3538->3571 3539->3537 3542 7ff630604920 8 API calls 3539->3542 3539->3543 3540->3537 3540->3538 3541 7ff630604e18 3540->3541 3548 7ff630604c20 3540->3548 3540->3555 3544 7ff6306048b0 8 API calls 3541->3544 3542->3539 3600 7ff6306048b0 3543->3600 3550 7ff630604e24 3544->3550 3545 7ff630604d78 3549 7ff630604920 8 API calls 3545->3549 3548->3538 3548->3543 3548->3545 3551 7ff630604920 8 API calls 3548->3551 3552 7ff630604cc6 3548->3552 3554 7ff630604cd0 3548->3554 3549->3539 3550->3525 3551->3548 3552->3554 3553 7ff630604d02 VirtualProtect 3553->3554 3554->3553 3554->3555 3555->3525 3557 7ff630603d6d 3556->3557 3628 7ff630604146 3557->3628 3562 7ff630603570 3 API calls 3563 7ff630603df7 send 3562->3563 3564 7ff63060a2a0 3563->3564 3565 7ff630603e44 send 3564->3565 3566 7ff630603e9e memset recv 3565->3566 3567 7ff630603ee4 perror 3566->3567 3569 7ff630603d77 3566->3569 3567->3569 3568 7ff630603570 RtlEnterCriticalSection RtlLeaveCriticalSection _unlock 3568->3569 3569->3562 3569->3566 3569->3568 3649 7ff630603ae6 socket 3569->3649 3654 7ff630603660 3569->3654 3572 7ff630604ad0 3571->3572 3573 7ff630604942 3571->3573 3572->3545 3574 7ff630604b2d 3573->3574 3575 7ff6306049f0 3573->3575 3577 7ff6306049ac VirtualQuery 3573->3577 3576 7ff6306048b0 4 API calls 3574->3576 3575->3545 3596 7ff630604b3c 3576->3596 3578 7ff630604b12 3577->3578 3579 7ff6306049d8 3577->3579 3581 7ff6306048b0 4 API calls 3578->3581 3579->3575 3582 7ff630604a80 VirtualProtect 3579->3582 3580 7ff630604b62 3580->3545 3581->3574 3582->3575 3583 7ff630604abc GetLastError 3582->3583 3584 7ff6306048b0 4 API calls 3583->3584 3584->3572 3585 7ff630604d3e 3588 7ff630604dfc 3585->3588 3593 7ff630604920 4 API calls 3585->3593 3586 7ff630604e18 3589 7ff6306048b0 4 API calls 3586->3589 3587 7ff630604920 4 API calls 3590 7ff630604daa 3587->3590 3592 7ff6306048b0 4 API calls 3588->3592 3594 7ff630604e24 3589->3594 3590->3580 3590->3587 3590->3588 3591 7ff630604d78 3595 7ff630604920 4 API calls 3591->3595 3592->3586 3593->3591 3594->3545 3595->3590 3596->3580 3596->3585 3596->3586 3596->3588 3596->3590 3596->3591 3597 7ff630604920 VirtualQuery VirtualProtect GetLastError VirtualProtect 3596->3597 3598 7ff630604cc6 3596->3598 3597->3596 3598->3580 3599 7ff630604d02 VirtualProtect 3598->3599 3599->3598 3601 7ff6306048dd 3600->3601 3602 7ff630604b2d 3601->3602 3603 7ff6306049f0 3601->3603 3605 7ff6306049ac VirtualQuery 3601->3605 3604 7ff6306048b0 4 API calls 3602->3604 3603->3541 3624 7ff630604b3c 3604->3624 3606 7ff630604b12 3605->3606 3607 7ff6306049d8 3605->3607 3609 7ff6306048b0 4 API calls 3606->3609 3607->3603 3610 7ff630604a80 VirtualProtect 3607->3610 3608 7ff630604b62 3608->3541 3609->3602 3610->3603 3611 7ff630604abc GetLastError 3610->3611 3612 7ff6306048b0 4 API calls 3611->3612 3612->3603 3613 7ff630604d3e 3616 7ff630604dfc 3613->3616 3621 7ff630604920 4 API calls 3613->3621 3614 7ff630604e18 3617 7ff6306048b0 4 API calls 3614->3617 3615 7ff630604920 4 API calls 3618 7ff630604daa 3615->3618 3620 7ff6306048b0 4 API calls 3616->3620 3622 7ff630604e24 3617->3622 3618->3608 3618->3615 3618->3616 3619 7ff630604d78 3623 7ff630604920 4 API calls 3619->3623 3620->3614 3621->3619 3622->3541 3623->3618 3624->3608 3624->3613 3624->3614 3624->3616 3624->3618 3624->3619 3625 7ff630604920 VirtualQuery VirtualProtect GetLastError VirtualProtect 3624->3625 3626 7ff630604cc6 3624->3626 3625->3624 3626->3608 3627 7ff630604d02 VirtualProtect 3626->3627 3627->3626 3629 7ff630604174 3628->3629 3630 7ff630604252 3629->3630 3631 7ff6306041a0 3629->3631 3632 7ff630604010 3 API calls 3630->3632 3664 7ff6306040f0 3631->3664 3644 7ff630603d72 3632->3644 3634 7ff6306041b3 3635 7ff630604244 3634->3635 3636 7ff6306041f4 CopyFileA 3634->3636 3638 7ff630604010 3 API calls 3635->3638 3637 7ff630604218 3636->3637 3641 7ff63060422b 3636->3641 3639 7ff630604010 3 API calls 3637->3639 3638->3644 3640 7ff630604224 3639->3640 3668 7ff6306043b9 3640->3668 3643 7ff630604010 3 API calls 3641->3643 3643->3644 3645 7ff630603a84 CreateThread 3644->3645 3646 7ff630603adf 3645->3646 3647 7ff630603ac8 3645->3647 3646->3569 3648 7ff630603570 3 API calls 3647->3648 3648->3646 3650 7ff630603b68 ioctlsocket connect 3649->3650 3652 7ff630603b52 3649->3652 3651 7ff630603d1b ioctlsocket 3650->3651 3653 7ff630603bc3 3650->3653 3651->3652 3652->3569 3653->3651 3653->3652 3655 7ff630603a78 3654->3655 3662 7ff63060367c 3654->3662 3655->3569 3656 7ff6306038af 3659 7ff630603570 3 API calls 3656->3659 3657 7ff630603777 memcpy atoi 3660 7ff630603570 3 API calls 3657->3660 3658 7ff6306037d2 memcpy atoi 3661 7ff630603570 3 API calls 3658->3661 3659->3655 3660->3662 3661->3662 3662->3656 3662->3657 3662->3658 3663 7ff630603570 3 API calls 3662->3663 3663->3662 3665 7ff63060410e 3664->3665 3666 7ff63060412f 3665->3666 3667 7ff630604119 _mbscpy 3665->3667 3666->3634 3667->3666 3669 7ff6306043e7 3668->3669 3670 7ff630604413 3669->3670 3671 7ff630604548 3669->3671 3673 7ff6306040f0 _mbscpy 3670->3673 3672 7ff630604010 3 API calls 3671->3672 3677 7ff63060451f 3672->3677 3674 7ff630604426 3673->3674 3675 7ff63060453a 3674->3675 3682 7ff63060446b 3674->3682 3676 7ff630604010 3 API calls 3675->3676 3676->3677 3677->3644 3678 7ff6306044eb MoveFileA 3679 7ff630604521 3678->3679 3680 7ff630604509 3678->3680 3685 7ff630604010 3 API calls 3679->3685 3681 7ff630604010 3 API calls 3680->3681 3681->3677 3682->3678 3683 7ff6306044d4 3682->3683 3684 7ff6306044c6 3682->3684 3688 7ff630604010 3 API calls 3683->3688 3686 7ff630604010 3 API calls 3684->3686 3685->3677 3687 7ff6306044d2 3686->3687 3687->3678 3688->3678 3689 7ff6306077eb 3690 7ff6306075c3 3689->3690 3693 7ff6306075db 3689->3693 3691 7ff6306066b0 21 API calls 3690->3691 3691->3693 3692 7ff6306066b0 21 API calls 3694 7ff63060781e 3692->3694 3693->3692 3694->3694 3695 7ff63060a7e0 ___lc_codepage_func ___mb_cur_max_func 3696 7ff63060a81c 3695->3696 3697 7ff63060a812 3695->3697 3698 7ff63060a817 3697->3698 3701 7ff63060a878 3697->3701 3698->3696 3699 7ff63060a700 2 API calls 3698->3699 3699->3698 3700 7ff63060a700 2 API calls 3700->3701 3701->3696 3701->3700 3296 7ff63060aa62 VirtualQuery 3702 7ff6306015c0 3703 7ff6306015ed 3702->3703 3704 7ff63060160e memset 3703->3704 3705 7ff6306015f8 free 3703->3705 3707 7ff630601640 memset 3704->3707 3706 7ff630601778 3705->3706 3710 7ff63060169e 3707->3710 3709 7ff630601767 free 3709->3706 3710->3709 3720 7ff6306046d0 3721 7ff6306046d9 3720->3721 3722 7ff6306046dd 3721->3722 3723 7ff6306051c0 7 API calls 3721->3723 3724 7ff6306046f5 3723->3724 3725 7ff6306074cf 3726 7ff6306074f1 3725->3726 3727 7ff6306058e0 2 API calls 3726->3727 3728 7ff630607776 3727->3728 3728->3728 3729 7ff63060aac1 RtlLeaveCriticalSection 3730 7ff6306022c9 3731 7ff6306022f6 3730->3731 3732 7ff630602301 free 3731->3732 3733 7ff630602317 memset 3731->3733 3734 7ff630602417 3732->3734 3735 7ff630602349 rand 3733->3735 3737 7ff63060236f memset 3735->3737 3739 7ff6306023a2 3737->3739 3740 7ff630602406 free 3739->3740 3740->3734

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: send$CopyCreateFileThreadmemsetperrorrecvsocket
      • String ID: %02x $154.213.192.42$Connected to C&C server$Connection failed. Retrying...$Disconnected from server. Retrying in 500ms...$Received %d bytes: $recv failed$win_x86_x64
      • API String ID: 1215720109-3681654477
      • Opcode ID: 52fefeefcdcf2a04f80c01cf7036b6e0bdcb3ce1ba97b7727e3dfdfb8c4737e3
      • Instruction ID: e02de8ab9662e2ce43414ba18a31ab9fb7121826e0ccb6a37146ab89defee320
      • Opcode Fuzzy Hash: 52fefeefcdcf2a04f80c01cf7036b6e0bdcb3ce1ba97b7727e3dfdfb8c4737e3
      • Instruction Fuzzy Hash: 14516021B5C6A2ADE725DB65E8507EC2764BB4678CF00003AD90DDB7ADDE2DD609F300

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 81 7ff630601190-7ff6306011be 82 7ff6306011c4-7ff6306011e1 81->82 83 7ff630601470-7ff630601473 GetStartupInfoA 81->83 84 7ff6306011f9-7ff630601204 82->84 87 7ff630601480-7ff63060149a call 7ff63060a368 83->87 85 7ff6306011e8-7ff6306011eb 84->85 86 7ff630601206-7ff630601214 84->86 88 7ff6306011f1-7ff6306011f6 Sleep 85->88 89 7ff630601410-7ff630601421 85->89 90 7ff63060121a-7ff63060121e 86->90 91 7ff630601427-7ff630601436 call 7ff63060a370 86->91 88->84 89->90 89->91 94 7ff630601224-7ff630601233 90->94 95 7ff6306014a0-7ff6306014b9 call 7ff63060a358 90->95 98 7ff63060143c-7ff630601457 _initterm 91->98 99 7ff630601239-7ff63060123b 91->99 94->98 94->99 107 7ff6306014be-7ff6306014e1 exit call 7ff630601190 95->107 102 7ff630601241-7ff63060124e 98->102 103 7ff63060145d-7ff630601462 98->103 99->102 99->103 104 7ff630601250-7ff630601258 102->104 105 7ff63060125c-7ff6306012a4 call 7ff630604b40 SetUnhandledExceptionFilter call 7ff63060a910 call 7ff6306048a0 call 7ff63060a9f0 102->105 103->102 104->105 117 7ff6306012c2-7ff6306012c8 105->117 118 7ff6306012a6 105->118 111 7ff6306014e6-7ff6306014ec 107->111 120 7ff6306012b0-7ff6306012b2 117->120 121 7ff6306012ca-7ff6306012d8 117->121 119 7ff630601300-7ff630601306 118->119 122 7ff63060131e-7ff630601343 malloc 119->122 123 7ff630601308-7ff630601312 119->123 124 7ff6306012b4-7ff6306012b7 120->124 125 7ff6306012f9 120->125 126 7ff6306012be 121->126 129 7ff630601345-7ff63060134a 122->129 130 7ff63060138b-7ff6306013bf call 7ff630604690 call 7ff630603d58 122->130 127 7ff630601400-7ff630601405 123->127 128 7ff630601318 123->128 131 7ff6306012e0-7ff6306012e2 124->131 132 7ff6306012b9 124->132 125->119 126->117 127->128 128->122 134 7ff630601350-7ff630601384 strlen malloc memcpy 129->134 141 7ff6306013c4-7ff6306013d2 130->141 131->125 133 7ff6306012e4 131->133 132->126 136 7ff6306012e8-7ff6306012f2 133->136 134->134 137 7ff630601386 134->137 136->125 139 7ff6306012f4-7ff6306012f7 136->139 137->130 139->125 139->136 141->107 142 7ff6306013d8-7ff6306013e0 141->142 142->87 143 7ff6306013e6-7ff6306013f5 142->143
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
      • String ID:
      • API String ID: 649803965-0
      • Opcode ID: e225db0f86b9ce421def3ab0fa0d7062bc5e7b1d61233733194764ee289550e2
      • Instruction ID: 5ffba0877f1e700bd8e047189d33f9ea0d3f733f43411ad90724329c6f4e19b1
      • Opcode Fuzzy Hash: e225db0f86b9ce421def3ab0fa0d7062bc5e7b1d61233733194764ee289550e2
      • Instruction Fuzzy Hash: AE816A31E8C666A5FB649F5AE85077923A1AF47788F444035DE0CCB399DE6DE98CB300

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: Sleep
      • String ID: CreateToolhelp32Snapshot failed. Error: %lu
      • API String ID: 3472027048-731459797
      • Opcode ID: ae22be0987ea78f0aaeb91b8f08f01e6461eae328b81d81411c2ff8828f2edc0
      • Instruction ID: 91eb9e48cb46d8cfc1a3f7ea02f0990750e6a5ea0816f92e2309bb2582d0733c
      • Opcode Fuzzy Hash: ae22be0987ea78f0aaeb91b8f08f01e6461eae328b81d81411c2ff8828f2edc0
      • Instruction Fuzzy Hash: 02315031A4C7AAA8EB319B65D8443F823A4FB5635CF504136C51D9B7ADDE2CE54CB310

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: FileMove_mbscpy
      • String ID: %s\%s$Error while deleting old file: %d$Error while renaming file: %d$Error: Could not get Startup folder path.$File does not exist in Startup to rename.$File renamed successfully to: %s$Old file with the same name deleted successfully.$svchost.exe
      • API String ID: 2828783803-2379623443
      • Opcode ID: 283c2b815b14451717e1a4ace5ca775bf56e5c860f8ccf1696d16ad81b1b3476
      • Instruction ID: 63f3ab4ef660468d24a33c3d9b8e4e09e8b69573e1cd6305db8ef89b4df346cb
      • Opcode Fuzzy Hash: 283c2b815b14451717e1a4ace5ca775bf56e5c860f8ccf1696d16ad81b1b3476
      • Instruction Fuzzy Hash: EA41ED65A4CA92A6EB31DB65EC503F92364AF4634CF404036D91D97BA9EE2CE64DF300

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: File$CopyMove_mbscpy
      • String ID: %s\%s$Error while copying file: %d$Error: Could not get Startup folder path.$File already exists in Startup.$File copied to Startup successfully.
      • API String ID: 655623600-1093518506
      • Opcode ID: b3a68b522b0c4e086914e0fe6ab555447e334a681f0e6ef4894ef28e4b9245cf
      • Instruction ID: 176adfca4fd9153a985afb9d49a7b5452177e8bb019dec25ee5928e9dd5204f8
      • Opcode Fuzzy Hash: b3a68b522b0c4e086914e0fe6ab555447e334a681f0e6ef4894ef28e4b9245cf
      • Instruction Fuzzy Hash: F521F0A1B5D662A5EB34DB61E8503F91350AF4674CF804032DA5DCBBADEE2CD649F340

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: connectioctlsocketsocket
      • String ID: Socket creation failed
      • API String ID: 3033478179-2728381879
      • Opcode ID: 3fca099bde09a1a059df5816efd18c7b1ebc4960c7c28b0057210e83bd6d0c1a
      • Instruction ID: ab5a9acaa1dc8ac52196d003cce8e51d745c970809dce9bc5989fbeb638c2f00
      • Opcode Fuzzy Hash: 3fca099bde09a1a059df5816efd18c7b1ebc4960c7c28b0057210e83bd6d0c1a
      • Instruction Fuzzy Hash: 87611D72748A968EE7748F69DC443D83365F78979DF104136CA1D9BBACDF389604A700

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 215 7ff630603a84-7ff630603ac6 CreateThread 216 7ff630603adf-7ff630603ae5 215->216 217 7ff630603ac8-7ff630603ada call 7ff630603570 215->217 217->216
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: CreateThread
      • String ID: Failed to create thread. Error: %lu
      • API String ID: 2422867632-1876256139
      • Opcode ID: cd41cf2e5e1f9492d1ffe20eb3d477d557d5a9303e1400c434a624d3a7105117
      • Instruction ID: 77dc4b4183c3273771c13ff224ed5792ec11354a82e3e5be83eeb431c0e98253
      • Opcode Fuzzy Hash: cd41cf2e5e1f9492d1ffe20eb3d477d557d5a9303e1400c434a624d3a7105117
      • Instruction Fuzzy Hash: 8FF0E521F4C611A9F3009720F8513AA2760FB8174CF144134C90D8BBECCE3CDA4AA740

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: free$memset
      • String ID: SAMPgy_$c
      • API String ID: 2717317152-1181286492
      • Opcode ID: 11a51b238fa7ff4f3de048e7e0399e496a3b39d4eba30ae5ff845e0166315fef
      • Instruction ID: 4b5d4132536ebc8149efa04f62b4d4b32780006b1705cad76dc3511fb7665e7e
      • Opcode Fuzzy Hash: 11a51b238fa7ff4f3de048e7e0399e496a3b39d4eba30ae5ff845e0166315fef
      • Instruction Fuzzy Hash: 96516D26F187259CFB44DBB6E8403AC27B0AB49B98F100539DE5E97BA9DF38C504A710
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID:
      • String ID: $ $Infinity$NaN
      • API String ID: 0-3274152445
      • Opcode ID: fa0095dd0704e67f1fdba37e40ff34f5250a2dc34ff6449e999dcc29cf86c872
      • Instruction ID: fd5281ef38c8f877ebd307d06ffbb2b84537111bf93a4642a4ad0d5f4d7738bf
      • Opcode Fuzzy Hash: fa0095dd0704e67f1fdba37e40ff34f5250a2dc34ff6449e999dcc29cf86c872
      • Instruction Fuzzy Hash: 1AC2D732A5C6529BD761CF25A04072A7791FB86788F105135EA8A97B8DDF3DE848FF00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: free$memset
      • String ID:
      • API String ID: 2717317152-0
      • Opcode ID: 4f8eb30e03a2088e02aa41d26e0366e703c7c16698a6fc90498e6d19936d4cc9
      • Instruction ID: 682d185aa611961aa2c525491bfea2a1e91d5bde733f355627e2afdcfb3336d2
      • Opcode Fuzzy Hash: 4f8eb30e03a2088e02aa41d26e0366e703c7c16698a6fc90498e6d19936d4cc9
      • Instruction Fuzzy Hash: C9514C76B18B259CFB54DBA6E8403AC37B0BB49B98F004135DE5DA7BA8DF38D544A700
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a92a76f01a41839edb0db2aacd7120ad0be31812e7200489862737987be0680a
      • Instruction ID: 7dbdb2f680f2fac5505af72f0510429ebe8b33c6763a50d849f0f512f2101495
      • Opcode Fuzzy Hash: a92a76f01a41839edb0db2aacd7120ad0be31812e7200489862737987be0680a
      • Instruction Fuzzy Hash: B4B01233818D1288D3096F04CC016A063BCE386250F416430C05486796CE7CD112E514
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7c307f67adb8aff98d3f095286b2b700dfcb55a183617c16c72d4ace8312b7d4
      • Instruction ID: 038cc99b61fe1a58f79dc842e8ffe6d2d7c0790616e2838ebdfb41b054369831
      • Opcode Fuzzy Hash: 7c307f67adb8aff98d3f095286b2b700dfcb55a183617c16c72d4ace8312b7d4
      • Instruction Fuzzy Hash:

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: atoimemcpy
      • String ID: %d.%d.%d.%d$Packet size set to: %d bytes$Port set to: %d$Threads set to: %d$Unknown command
      • API String ID: 126230704-3691821516
      • Opcode ID: 761a1ce485632921bbffb7281cf2a6218fe9a642e71f4fdc5b2252f871c063eb
      • Instruction ID: bc889a60a2ac5ac2892809e16978224fea824dfec13819c64c3b3721a9ec7d34
      • Opcode Fuzzy Hash: 761a1ce485632921bbffb7281cf2a6218fe9a642e71f4fdc5b2252f871c063eb
      • Instruction Fuzzy Hash: 0D812F72F0C6609EEB00CBB5C4402AC3BB0AB4534CF408466EA5C97B99DE38D619EB44

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 266 7ff6306048b0-7ff63060493c call 7ff63060a8e0 call 7ff63060a2f8 call 7ff63060a8e0 call 7ff63060a288 call 7ff63060a340 278 7ff630604942-7ff63060494f 266->278 279 7ff630604ad0-7ff630604ad2 266->279 280 7ff630604950-7ff630604956 278->280 281 7ff63060496c-7ff630604975 280->281 282 7ff630604958-7ff630604966 280->282 281->280 284 7ff630604977-7ff630604985 call 7ff6306053d0 281->284 282->281 283 7ff6306049f7-7ff6306049fa 282->283 286 7ff6306049fc-7ff6306049ff 283->286 287 7ff630604a28-7ff630604a53 283->287 293 7ff630604b2d-7ff630604b60 call 7ff6306048b0 284->293 294 7ff63060498b-7ff6306049d2 call 7ff630605500 VirtualQuery 284->294 289 7ff630604a05-7ff630604a07 286->289 290 7ff630604ae0-7ff630604af1 286->290 291 7ff630604a55-7ff630604a58 287->291 292 7ff630604a19-7ff630604a23 287->292 289->292 295 7ff630604a09-7ff630604a13 289->295 290->292 296 7ff630604a5a-7ff630604a69 291->296 306 7ff630604b62-7ff630604b72 293->306 307 7ff630604b78-7ff630604bcf call 7ff630605460 call 7ff630605680 293->307 303 7ff630604b12-7ff630604b28 call 7ff6306048b0 294->303 304 7ff6306049d8-7ff6306049e2 294->304 295->292 300 7ff630604b00-7ff630604b0d 295->300 296->296 297 7ff630604a6b-7ff630604a75 296->297 300->292 303->293 308 7ff6306049e4-7ff6306049ea 304->308 309 7ff6306049f0 304->309 307->306 318 7ff630604bd1-7ff630604bd7 307->318 308->309 312 7ff630604a80-7ff630604ab6 VirtualProtect 308->312 309->283 312->309 313 7ff630604abc-7ff630604acb GetLastError call 7ff6306048b0 312->313 313->279 319 7ff630604bdd-7ff630604bdf 318->319 320 7ff630604d28-7ff630604d2a 318->320 321 7ff630604be5 319->321 322 7ff630604db0-7ff630604db3 319->322 320->322 323 7ff630604d30-7ff630604d38 320->323 325 7ff630604be8-7ff630604bea 321->325 322->306 326 7ff630604db9-7ff630604dd4 322->326 324 7ff630604d3e-7ff630604d41 323->324 323->325 329 7ff630604d50-7ff630604d54 324->329 325->322 327 7ff630604bf0-7ff630604bf6 325->327 328 7ff630604dd8-7ff630604dfa call 7ff630604920 326->328 330 7ff630604bfc-7ff630604c18 327->330 331 7ff630604e18-7ff630604e3e call 7ff6306048b0 327->331 339 7ff630604dfc 328->339 333 7ff630604e01-7ff630604e13 call 7ff6306048b0 329->333 334 7ff630604d5a-7ff630604d78 call 7ff630604920 329->334 336 7ff630604c1a 330->336 337 7ff630604c59-7ff630604c70 330->337 347 7ff630604e40-7ff630604e6b 331->347 348 7ff630604e6c-7ff630604e70 331->348 333->331 340 7ff630604d80-7ff630604daa call 7ff630604920 334->340 336->306 337->340 341 7ff630604c76 337->341 339->333 340->322 341->329 345 7ff630604c7c-7ff630604c80 341->345 350 7ff630604c82-7ff630604c86 345->350 351 7ff630604c20-7ff630604c57 call 7ff630604920 345->351 347->348 350->333 353 7ff630604c8c-7ff630604cc4 call 7ff630604920 350->353 351->337 358 7ff630604cd0-7ff630604cd8 351->358 353->337 360 7ff630604cc6 353->360 358->306 361 7ff630604cde-7ff630604ce7 358->361 360->358 362 7ff630604cf0-7ff630604d00 361->362 363 7ff630604d02-7ff630604d0d VirtualProtect 362->363 364 7ff630604d10-7ff630604d1d 362->364 363->364 364->362 365 7ff630604d1f 364->365 365->306
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: QueryVirtual
      • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
      • API String ID: 1804819252-1534286854
      • Opcode ID: d803b5b9f4712c63a583bc66fc2a8294c2c3be480b6b5a6bb31d90d251e6b5c6
      • Instruction ID: 0206fc944fbef590e3b863997cf47964bd66b39d43cca6921637a2e74fd78f33
      • Opcode Fuzzy Hash: d803b5b9f4712c63a583bc66fc2a8294c2c3be480b6b5a6bb31d90d251e6b5c6
      • Instruction Fuzzy Hash: 0B71EA72B8DA62A6EB208B55F84526973A0FB467A8F444135EF5C83798DE3CE449F300

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: free$malloc
      • String ID:
      • API String ID: 2190258309-0
      • Opcode ID: 3fdcc2ec0350fbc7881cfd62aa9810f02018ec7521ec9bc9f349b6b3c1acdd06
      • Instruction ID: 5d8d0663fe6d5c4a79dae75df45c4456d13039f09ac1c20b238a40562cc32561
      • Opcode Fuzzy Hash: 3fdcc2ec0350fbc7881cfd62aa9810f02018ec7521ec9bc9f349b6b3c1acdd06
      • Instruction Fuzzy Hash: 2C615171F08B1599EB04CBAAD8413AC27B1AB89B9CF104139CE1D9BBADDE3CD544A710

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: free$malloc
      • String ID:
      • API String ID: 2190258309-0
      • Opcode ID: 9323b672db99f97c56645a26587eadc63964ebb5107a1af4015708c92901af04
      • Instruction ID: a5d4b696bfca62d703f5267a50faab4578a1003b0e0e28d2b3f2a3b470fef191
      • Opcode Fuzzy Hash: 9323b672db99f97c56645a26587eadc63964ebb5107a1af4015708c92901af04
      • Instruction Fuzzy Hash: E9517176F08B2599EB04DBA6D8403AC23B1BB89B8CF004535DE1ED7BADDE38D504A310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: NextProcess32
      • String ID: CreateToolhelp32Snapshot failed. Error: %lu$Failed to open process: %s (PID: %u)$Terminated process: %s (PID: %u)
      • API String ID: 1850201408-153003829
      • Opcode ID: e181661efe4dd773058fb5c019e7242ec3b384c34b7989fb4873058b68cdb20b
      • Instruction ID: f7be78ab5fd4ddf29c34359f0d7ed67bcd36011f539e4a1b71b88d3b592ba41d
      • Opcode Fuzzy Hash: e181661efe4dd773058fb5c019e7242ec3b384c34b7989fb4873058b68cdb20b
      • Instruction Fuzzy Hash: B7316331B4C7A699EB24DBA5D8843ED2365BB8679CF004136C91C8BBADDE28D548E340
      APIs
      • Sleep.KERNEL32(?,?,00000000,Infinity,00007FF63060975F,?,?,?,?,00000000,Infinity,00007FF630607C04,?,00000000,00000003,00007FF630608118), ref: 00007FF63060964D
      • RtlInitializeCriticalSection.NTDLL ref: 00007FF63060968D
      • RtlInitializeCriticalSection.NTDLL ref: 00007FF630609696
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: CriticalInitializeSection$Sleep
      • String ID: Infinity
      • API String ID: 1960909292-1015270809
      • Opcode ID: 2b3a132f51e9cd6b10359d2b6f53ec181f5f3bad216d3bdb832c5de5ecd3c170
      • Instruction ID: 91f085f47cf30659d5805003952519b9496466186c8b099a039de1a0794dfac2
      • Opcode Fuzzy Hash: 2b3a132f51e9cd6b10359d2b6f53ec181f5f3bad216d3bdb832c5de5ecd3c170
      • Instruction Fuzzy Hash: C9113D3196C836A5FA198B19E8A01B42252FF4730CF540631D80DCA3A8DE7EE84DFB50
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: freememset$rand
      • String ID:
      • API String ID: 2025389305-0
      • Opcode ID: 4480c9dfa61de757a7f1f0e5d6dc5bea86d1d3a71a6a449468cd70b262eee5fd
      • Instruction ID: 67b012e06858b02ab050ada71b66dee65c2dba9deac654dd38ac4cf46fe40097
      • Opcode Fuzzy Hash: 4480c9dfa61de757a7f1f0e5d6dc5bea86d1d3a71a6a449468cd70b262eee5fd
      • Instruction Fuzzy Hash: 48315271B1872599EB04DBA5D8503AC23B0AB497ACF004635DD6ED7BE9DF3CD504A300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: Byte$CharLeadMultiWide
      • String ID:
      • API String ID: 2561704868-0
      • Opcode ID: 98b7f6bf3ad1004ecf0cff6562c8d77fed0c02d9e6fb996009e33322c1bcc7a6
      • Instruction ID: fe9defc33a04a32a7ef886ba19083c37b853dc537ef4b9de96bc3f516ac6e791
      • Opcode Fuzzy Hash: 98b7f6bf3ad1004ecf0cff6562c8d77fed0c02d9e6fb996009e33322c1bcc7a6
      • Instruction Fuzzy Hash: 4531B376A4C29186E3608B28B80436D66D0BB927D8F548235DA98C7BDCDE7DD48CAB00
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID:
      • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
      • API String ID: 0-395989641
      • Opcode ID: 76e62dfac5ded097740ec0d1c05d2b01f578fe877c8bdf0b2acdc5b6a318c470
      • Instruction ID: 777d8c119ae41d6c67e6e60be417e5f84006822d9c6dce640e935909e5191d26
      • Opcode Fuzzy Hash: 76e62dfac5ded097740ec0d1c05d2b01f578fe877c8bdf0b2acdc5b6a318c470
      • Instruction Fuzzy Hash: 0B71D6A2F4C665A7FB209B61E4047A96791BF46BACF544130DE1C97B9CDE3CE448F600
      APIs
        • Part of subcall function 00007FF630609620: Sleep.KERNEL32(?,?,00000000,Infinity,00007FF63060975F,?,?,?,?,00000000,Infinity,00007FF630607C04,?,00000000,00000003,00007FF630608118), ref: 00007FF63060964D
      • malloc.MSVCRT ref: 00007FF630609787
      • RtlLeaveCriticalSection.NTDLL ref: 00007FF6306097DF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: CriticalLeaveSectionSleepmalloc
      • String ID: Infinity
      • API String ID: 1993596536-1015270809
      • Opcode ID: 583c81eff2bc653449be8c5b22903ef88f54eda45f881fdddad083b71c83a9c0
      • Instruction ID: 302687b500b34af1b4136fd84be96027bbdc235ca9e9cf2604f0776ca42c6b5a
      • Opcode Fuzzy Hash: 583c81eff2bc653449be8c5b22903ef88f54eda45f881fdddad083b71c83a9c0
      • Instruction Fuzzy Hash: C1219272F6CA26A2EE18CF05E4503B96392BB46788F458235C91D873A8DF7CA54CF740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-3474627141
      • Opcode ID: f7e8b77a0b0dff4a7c8fd560446d4c8046c86c2a5a0ae3229943de372c0eb2c5
      • Instruction ID: 8ba0b6fbc4c585e157bf0a4094bc377ddee5284eebb5f833f4896b5b2f38a565
      • Opcode Fuzzy Hash: f7e8b77a0b0dff4a7c8fd560446d4c8046c86c2a5a0ae3229943de372c0eb2c5
      • Instruction Fuzzy Hash: 6001CE62C4CF9483D2018F18D8001BA7330FB5F79CF25A325EA8C66719DF28E59AE700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-4273532761
      • Opcode ID: 2555366b7f243d5c5750147fe3f99058101b7cdae7e235ce5a55a443d9b88822
      • Instruction ID: 23133f633c2e78d3cca7ee133ede5a93d3f2dacf3487be897d4e827e8e57fd95
      • Opcode Fuzzy Hash: 2555366b7f243d5c5750147fe3f99058101b7cdae7e235ce5a55a443d9b88822
      • Instruction Fuzzy Hash: A6F06262C9CE9482D2129F1CA8000BB7330FF4F79CF245325EE8D66759DF28E58AA700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-4064033741
      • Opcode ID: 30eeda8bdb12080cde567a8558e119721110e6916e5ac3dcb8fdf4791492d7ce
      • Instruction ID: b0fd790d1af1c391b2bbb5ba7642811a5c8048e9e3acad8031c29ff7fa8c10b0
      • Opcode Fuzzy Hash: 30eeda8bdb12080cde567a8558e119721110e6916e5ac3dcb8fdf4791492d7ce
      • Instruction Fuzzy Hash: D7F06262C5CE9482D2129F1CA8000BB7330FF4F79CF145325EE8D66759DF28E58AA700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: fprintf
      • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-2187435201
      • Opcode ID: f4b68061637c4e869876cc2b07be9ae89b12cec57d0ec52bd52edc14d149258f
      • Instruction ID: 1fc7d949402cf0a51626e81a3f482056adb91f20b1d34266e24c2c71f1ae328e
      • Opcode Fuzzy Hash: f4b68061637c4e869876cc2b07be9ae89b12cec57d0ec52bd52edc14d149258f
      • Instruction Fuzzy Hash: C1F04F62C4CE9482D2029F18A8001AA7330FB4E79CF245325EA8D66759DF28E58AA700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-2713391170
      • Opcode ID: 709d1337b431af56bb765744f32365ef71057d2f3adb48a5db82197e702a3b57
      • Instruction ID: d851adaaa479b6d8f18790887f236f7945b6c1ef83abcc578626e001ee7686fd
      • Opcode Fuzzy Hash: 709d1337b431af56bb765744f32365ef71057d2f3adb48a5db82197e702a3b57
      • Instruction Fuzzy Hash: 97F06262C5CE9482D2129F1CA8000BB7330FF4F79CF245725EE8D66759DF28E58AA700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-4283191376
      • Opcode ID: ef8ff845aa821fedd75d124928bf110435547eefecd6d81b6760bdc6d9931a3a
      • Instruction ID: 584d809866da5058794199c7b614e84e3d6158fe8a7744de71942e5959a00226
      • Opcode Fuzzy Hash: ef8ff845aa821fedd75d124928bf110435547eefecd6d81b6760bdc6d9931a3a
      • Instruction Fuzzy Hash: 5BF06262C5CE9482D2129F1CA8000BB7330FF4F79CF145326EE8D66759DF28E58AA700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-2468659920
      • Opcode ID: bffe1eaf3389dee2b12e3729f9d500de9cab9793a4ff0cf748dbcce5efa7edf7
      • Instruction ID: d8d6449dc7e5ef258a72786635cdc47b4189fef42d124f78b038987bf4313830
      • Opcode Fuzzy Hash: bffe1eaf3389dee2b12e3729f9d500de9cab9793a4ff0cf748dbcce5efa7edf7
      • Instruction Fuzzy Hash: 09F01D22D4CE9492D202DF18A8001AB7370FB5E79DF149726EE8D6A659DF28E586A700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: freememset
      • String ID:
      • API String ID: 2499939622-0
      • Opcode ID: 8337257afa241cc28aafe8cf9f7202994b655755b37db60b13fdb6ff63783a31
      • Instruction ID: 365b8d64cfe69da2b1a4c8f40c92443e17a058676f2ba38ffc82b4499e3ca9ee
      • Opcode Fuzzy Hash: 8337257afa241cc28aafe8cf9f7202994b655755b37db60b13fdb6ff63783a31
      • Instruction Fuzzy Hash: 72415561B18B159CEB04DBAADC503AC2771AB89BA8F004635CD2D9B7E9DE3DD604A300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3473626775.00007FF630601000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF630600000, based on PE: true
      • Associated: 00000000.00000002.3473602807.00007FF630600000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630611000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473626775.00007FF630615000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473740086.00007FF63067F000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473770046.00007FF630680000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3473799589.00007FF630681000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff630600000_cbot.jbxd
      Similarity
      • API ID: freememset
      • String ID:
      • API String ID: 2499939622-0
      • Opcode ID: 9f44535f6fd749539bcc271d37f089827b23007be47d33ba420ed4f177ea1149
      • Instruction ID: 85f9c9b57e1ad83c7f0bd75a53dcbf8204bfc7476294c2bb5bdc86f468360251
      • Opcode Fuzzy Hash: 9f44535f6fd749539bcc271d37f089827b23007be47d33ba420ed4f177ea1149
      • Instruction Fuzzy Hash: 74315025708B959AEB759F65E8403E92364EB49B9CF000136DA1D8BBA9DF7DD304A300

      Execution Graph

      Execution Coverage:7%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:0%
      Total number of Nodes:613
      Total number of Limit Nodes:5
      execution_graph 2964 7ff609a033e2 2971 7ff609a033fe 2964->2971 2965 7ff609a03532 2966 7ff609a03414 CreateToolhelp32Snapshot 2968 7ff609a03450 Process32First 2966->2968 2966->2971 2967 7ff609a03515 SleepEx 2967->2971 2969 7ff609a034e2 CloseHandle 2968->2969 2970 7ff609a0346f strcmp 2968->2970 2969->2971 2970->2971 2972 7ff609a034ca Process32Next 2970->2972 2971->2965 2971->2966 2971->2967 2971->2969 2975 7ff609a03210 2971->2975 2979 7ff609a03261 2971->2979 2972->2969 2972->2970 2976 7ff609a03245 2975->2976 2988 7ff609a056c0 2976->2988 2980 7ff609a03287 2979->2980 2981 7ff609a03298 2980->2981 2984 7ff609a032b4 2980->2984 2982 7ff609a03210 3 API calls 2981->2982 2983 7ff609a032af 2982->2983 2983->2971 2984->2983 2985 7ff609a03387 Process32Next 2984->2985 2986 7ff609a03210 3 API calls 2984->2986 2987 7ff609a03210 3 API calls 2984->2987 2985->2983 2985->2984 2986->2985 2987->2984 2993 7ff609a0a920 2988->2993 2990 7ff609a056d7 2997 7ff609a0a990 2990->2997 2995 7ff609a0a92f 2993->2995 2994 7ff609a0a943 RtlEnterCriticalSection 2996 7ff609a0a958 2994->2996 2995->2994 2995->2996 2996->2990 2999 7ff609a0a99f 2997->2999 2998 7ff609a0a9b3 RtlLeaveCriticalSection 3000 7ff609a0a9c8 2998->3000 2999->2998 2999->3000 3001 7ff609a0aa20 _unlock 3000->3001 3002 7ff609a03254 3001->3002 3002->2971 3003 7ff609a0aae9 GetLastError 3004 7ff609a075e0 3005 7ff609a07613 3004->3005 3006 7ff609a075fb 3004->3006 3008 7ff609a06600 19 API calls 3005->3008 3010 7ff609a06600 3006->3010 3009 7ff609a077ae 3008->3009 3009->3009 3011 7ff609a06615 3010->3011 3017 7ff609a05770 3011->3017 3016 7ff609a06690 3016->3005 3018 7ff609a05788 3017->3018 3025 7ff609a07df0 3018->3025 3020 7ff609a057ff 3020->3016 3021 7ff609a06510 3020->3021 3022 7ff609a0653c 3021->3022 3117 7ff609a05d10 3022->3117 3024 7ff609a065ac 3026 7ff609a080f0 3025->3026 3027 7ff609a07e36 3025->3027 3029 7ff609a07bd0 6 API calls 3026->3029 3028 7ff609a08060 3027->3028 3034 7ff609a07e46 3027->3034 3030 7ff609a0808d 3028->3030 3072 7ff609a07bd0 3028->3072 3029->3030 3030->3020 3031 7ff609a080c0 3033 7ff609a07bd0 6 API calls 3031->3033 3033->3030 3034->3030 3034->3031 3034->3034 3042 7ff609a07f46 3034->3042 3065 7ff609a09750 3034->3065 3036 7ff609a07e7f 3037 7ff609a080b8 3036->3037 3036->3042 3076 7ff609a09850 3037->3076 3038 7ff609a08429 3038->3020 3040 7ff609a08440 3041 7ff609a07b90 6 API calls 3040->3041 3063 7ff609a08230 3040->3063 3041->3063 3042->3038 3042->3040 3043 7ff609a081f3 3042->3043 3042->3063 3082 7ff609a07b90 3043->3082 3045 7ff609a09970 6 API calls 3045->3063 3046 7ff609a09850 5 API calls 3048 7ff609a08701 3046->3048 3047 7ff609a08948 3047->3020 3050 7ff609a09850 5 API calls 3048->3050 3054 7ff609a083f1 3048->3054 3049 7ff609a09850 5 API calls 3049->3030 3050->3054 3051 7ff609a09af0 10 API calls 3051->3063 3053 7ff609a09c80 7 API calls 3053->3063 3054->3049 3055 7ff609a0869f 3055->3047 3090 7ff609a098c0 3055->3090 3057 7ff609a09750 6 API calls 3058 7ff609a0917d memcpy 3057->3058 3104 7ff609a09c80 3058->3104 3060 7ff609a098c0 8 API calls 3060->3063 3061 7ff609a086bd 3061->3046 3061->3047 3063->3045 3063->3047 3063->3051 3063->3053 3063->3054 3063->3055 3063->3057 3063->3060 3063->3061 3064 7ff609a09850 Sleep RtlInitializeCriticalSection RtlInitializeCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 3063->3064 3086 7ff609a099a0 3063->3086 3097 7ff609a09e00 3063->3097 3064->3063 3110 7ff609a09620 3065->3110 3067 7ff609a09764 malloc 3069 7ff609a09791 3067->3069 3070 7ff609a097a0 3067->3070 3069->3070 3071 7ff609a097d3 RtlLeaveCriticalSection 3069->3071 3070->3036 3071->3070 3073 7ff609a07be3 3072->3073 3074 7ff609a09750 6 API calls 3073->3074 3075 7ff609a07c04 3074->3075 3075->3030 3075->3075 3077 7ff609a09898 3076->3077 3078 7ff609a0985e 3076->3078 3077->3031 3079 7ff609a09620 4 API calls 3078->3079 3080 7ff609a09877 3079->3080 3080->3077 3081 7ff609a098a0 RtlLeaveCriticalSection 3080->3081 3083 7ff609a07b9c 3082->3083 3084 7ff609a09750 6 API calls 3083->3084 3085 7ff609a07bbb 3084->3085 3085->3063 3087 7ff609a099c2 3086->3087 3088 7ff609a09750 6 API calls 3087->3088 3089 7ff609a099e5 3088->3089 3089->3063 3091 7ff609a098e0 3090->3091 3092 7ff609a0990f 3091->3092 3093 7ff609a09750 6 API calls 3091->3093 3092->3061 3094 7ff609a0993d 3093->3094 3094->3092 3095 7ff609a09945 memcpy 3094->3095 3096 7ff609a09850 5 API calls 3095->3096 3096->3092 3098 7ff609a09e59 3097->3098 3099 7ff609a09e21 3097->3099 3100 7ff609a09750 6 API calls 3098->3100 3099->3098 3101 7ff609a09fa0 3099->3101 3103 7ff609a09e67 3100->3103 3102 7ff609a09750 6 API calls 3101->3102 3102->3103 3103->3063 3103->3103 3105 7ff609a09caf 3104->3105 3106 7ff609a09750 6 API calls 3105->3106 3109 7ff609a09cbe 3106->3109 3107 7ff609a09d84 3107->3063 3108 7ff609a09850 5 API calls 3108->3107 3109->3107 3109->3108 3111 7ff609a096ae RtlEnterCriticalSection 3110->3111 3112 7ff609a09633 3110->3112 3113 7ff609a09637 3111->3113 3112->3113 3115 7ff609a0967f RtlInitializeCriticalSection RtlInitializeCriticalSection 3112->3115 3113->3111 3114 7ff609a0965f 3113->3114 3116 7ff609a09648 Sleep 3113->3116 3114->3067 3114->3069 3115->3113 3116->3113 3116->3116 3119 7ff609a05d30 3117->3119 3118 7ff609a05ec2 3124 7ff609a05ee5 3118->3124 3131 7ff609a05c00 3118->3131 3119->3118 3121 7ff609a05ddd 3119->3121 3122 7ff609a05f98 3119->3122 3121->3118 3126 7ff609a058e0 3121->3126 3123 7ff609a05c00 8 API calls 3122->3123 3122->3124 3123->3124 3124->3024 3138 7ff609a0a790 3126->3138 3128 7ff609a0a790 2 API calls 3130 7ff609a0590d 3128->3130 3129 7ff609a05979 3129->3121 3130->3128 3130->3129 3132 7ff609a05cb0 3131->3132 3135 7ff609a05c1a 3131->3135 3147 7ff609a0a520 ___mb_cur_max_func ___lc_codepage_func 3132->3147 3133 7ff609a05c90 3133->3124 3135->3133 3136 7ff609a0a790 2 API calls 3135->3136 3137 7ff609a05c54 3136->3137 3137->3124 3139 7ff609a0a7ae 3138->3139 3142 7ff609a0a700 3139->3142 3141 7ff609a0a7c6 3141->3130 3143 7ff609a0a730 WideCharToMultiByte 3142->3143 3144 7ff609a0a714 3142->3144 3143->3144 3146 7ff609a0a774 _errno 3143->3146 3145 7ff609a0a71b 3144->3145 3144->3146 3145->3141 3146->3141 3150 7ff609a0a3a0 3147->3150 3149 7ff609a0a57a 3149->3135 3151 7ff609a0a4e8 3150->3151 3153 7ff609a0a3b5 3150->3153 3151->3149 3152 7ff609a0a458 3155 7ff609a0a4b0 MultiByteToWideChar 3152->3155 3156 7ff609a0a463 3152->3156 3153->3152 3154 7ff609a0a3e9 IsDBCSLeadByteEx 3153->3154 3159 7ff609a0a404 3153->3159 3160 7ff609a0a478 3153->3160 3154->3152 3154->3159 3158 7ff609a0a4f8 _errno 3155->3158 3155->3160 3156->3149 3157 7ff609a0a42e MultiByteToWideChar 3157->3158 3161 7ff609a0a448 3157->3161 3158->3160 3159->3157 3159->3160 3160->3149 3161->3149 3582 7ff609a07860 3583 7ff609a07727 3582->3583 3584 7ff609a0770f 3582->3584 3586 7ff609a06cc0 8 API calls 3583->3586 3585 7ff609a06cc0 8 API calls 3584->3585 3585->3583 3587 7ff609a07893 3586->3587 3587->3587 3162 7ff609a038de 3167 7ff609a03570 3162->3167 3164 7ff609a038fd 3171 7ff609a02a13 3164->3171 3168 7ff609a035a5 3167->3168 3169 7ff609a056c0 3 API calls 3168->3169 3170 7ff609a035b4 3169->3170 3170->3164 3173 7ff609a02ac4 3171->3173 3172 7ff609a02a4d malloc 3172->3173 3173->3172 3175 7ff609a02b30 3173->3175 3177 7ff609a020bf 3173->3177 3178 7ff609a020f4 3177->3178 3179 7ff609a056c0 3 API calls 3178->3179 3180 7ff609a02103 free 3179->3180 3180->3173 3181 7ff609a04ede signal 3182 7ff609a04ef4 signal 3181->3182 3183 7ff609a04f08 3181->3183 3182->3183 3184 7ff609a0a0f0 3185 7ff609a09750 6 API calls 3184->3185 3186 7ff609a0a10c 3185->3186 3588 7ff609a07658 3589 7ff609a07664 3588->3589 3592 7ff609a05b00 3589->3592 3593 7ff609a05b40 strlen 3592->3593 3594 7ff609a05b26 3592->3594 3593->3594 3594->3593 3190 7ff609a076f4 3191 7ff609a07727 3190->3191 3192 7ff609a0770f 3190->3192 3194 7ff609a06cc0 8 API calls 3191->3194 3196 7ff609a06cc0 3192->3196 3195 7ff609a07893 3194->3195 3195->3195 3197 7ff609a06e90 3196->3197 3198 7ff609a06d20 3196->3198 3197->3191 3198->3197 3199 7ff609a058e0 2 API calls 3198->3199 3200 7ff609a05c00 8 API calls 3198->3200 3199->3198 3200->3198 3201 7ff609a039f2 3204 7ff609a01b0f 3201->3204 3206 7ff609a01bc0 3204->3206 3205 7ff609a01b49 malloc 3205->3206 3206->3205 3207 7ff609a01c2c 3206->3207 3210 7ff609a01550 3206->3210 3211 7ff609a01585 3210->3211 3212 7ff609a056c0 3 API calls 3211->3212 3213 7ff609a01594 free 3212->3213 3213->3206 3214 7ff609a014f0 3217 7ff609a01190 3214->3217 3216 7ff609a01506 3218 7ff609a011c4 3217->3218 3219 7ff609a01470 GetStartupInfoA 3217->3219 3220 7ff609a011f1 Sleep 3218->3220 3222 7ff609a01206 3218->3222 3221 7ff609a013d8 3219->3221 3220->3218 3221->3216 3223 7ff609a0143c _initterm 3222->3223 3224 7ff609a01239 3222->3224 3237 7ff609a013c4 3222->3237 3223->3224 3238 7ff609a04b40 3224->3238 3226 7ff609a014be exit 3228 7ff609a01190 27 API calls 3226->3228 3227 7ff609a01261 SetUnhandledExceptionFilter 3234 7ff609a01284 3227->3234 3229 7ff609a014e6 3228->3229 3229->3216 3230 7ff609a0131e malloc 3231 7ff609a01345 3230->3231 3232 7ff609a0138b 3230->3232 3233 7ff609a01350 strlen malloc memcpy 3231->3233 3258 7ff609a03d58 3232->3258 3233->3233 3235 7ff609a01386 3233->3235 3234->3230 3235->3232 3237->3221 3237->3226 3242 7ff609a04b78 3238->3242 3257 7ff609a04b62 3238->3257 3239 7ff609a04db0 3240 7ff609a04daa 3239->3240 3239->3257 3240->3239 3244 7ff609a04920 8 API calls 3240->3244 3245 7ff609a04dfc 3240->3245 3241 7ff609a04d3e 3241->3245 3273 7ff609a04920 3241->3273 3242->3239 3242->3241 3243 7ff609a04e18 3242->3243 3252 7ff609a04c20 3242->3252 3242->3257 3246 7ff609a048b0 8 API calls 3243->3246 3244->3240 3302 7ff609a048b0 3245->3302 3250 7ff609a04e24 3246->3250 3247 7ff609a04d78 3251 7ff609a04920 8 API calls 3247->3251 3250->3227 3251->3240 3252->3241 3252->3245 3252->3247 3253 7ff609a04920 8 API calls 3252->3253 3254 7ff609a04cd0 3252->3254 3255 7ff609a04cc6 3252->3255 3253->3252 3256 7ff609a04d02 VirtualProtect 3254->3256 3254->3257 3255->3254 3256->3254 3257->3227 3259 7ff609a03d6d 3258->3259 3330 7ff609a04146 3259->3330 3264 7ff609a03570 3 API calls 3265 7ff609a03df7 send 3264->3265 3266 7ff609a0a2a0 3265->3266 3267 7ff609a03e44 send 3266->3267 3268 7ff609a03e9e memset recv 3267->3268 3269 7ff609a03ee4 perror 3268->3269 3271 7ff609a03d77 3268->3271 3269->3271 3270 7ff609a03570 RtlEnterCriticalSection RtlLeaveCriticalSection _unlock 3270->3271 3271->3264 3271->3268 3271->3270 3351 7ff609a03ae6 socket 3271->3351 3356 7ff609a03660 3271->3356 3274 7ff609a04ad0 3273->3274 3277 7ff609a04942 3273->3277 3274->3247 3275 7ff609a049f0 3275->3247 3275->3275 3276 7ff609a04b2d 3278 7ff609a048b0 4 API calls 3276->3278 3277->3275 3277->3276 3279 7ff609a049ac VirtualQuery 3277->3279 3299 7ff609a04b3c 3278->3299 3280 7ff609a04b12 3279->3280 3281 7ff609a049d8 3279->3281 3280->3276 3283 7ff609a048b0 4 API calls 3280->3283 3281->3275 3284 7ff609a04a80 VirtualProtect 3281->3284 3282 7ff609a04b62 3282->3247 3283->3276 3284->3275 3285 7ff609a04abc GetLastError 3284->3285 3285->3274 3286 7ff609a048b0 4 API calls 3285->3286 3286->3274 3287 7ff609a04d3e 3291 7ff609a04dfc 3287->3291 3295 7ff609a04920 4 API calls 3287->3295 3288 7ff609a04e18 3292 7ff609a048b0 4 API calls 3288->3292 3289 7ff609a04920 4 API calls 3290 7ff609a04daa 3289->3290 3290->3282 3290->3289 3290->3291 3294 7ff609a048b0 4 API calls 3291->3294 3296 7ff609a04e24 3292->3296 3293 7ff609a04d78 3297 7ff609a04920 4 API calls 3293->3297 3294->3288 3295->3293 3296->3247 3297->3290 3298 7ff609a04920 VirtualQuery VirtualProtect GetLastError VirtualProtect 3298->3299 3299->3282 3299->3287 3299->3288 3299->3290 3299->3291 3299->3293 3299->3298 3300 7ff609a04cc6 3299->3300 3300->3282 3301 7ff609a04d02 VirtualProtect 3300->3301 3301->3300 3306 7ff609a048dd 3302->3306 3303 7ff609a04b2d 3305 7ff609a048b0 4 API calls 3303->3305 3304 7ff609a049f0 3304->3243 3326 7ff609a04b3c 3305->3326 3306->3303 3306->3304 3307 7ff609a049ac VirtualQuery 3306->3307 3308 7ff609a04b12 3307->3308 3309 7ff609a049d8 3307->3309 3308->3303 3310 7ff609a048b0 4 API calls 3308->3310 3309->3304 3311 7ff609a04a80 VirtualProtect 3309->3311 3310->3303 3311->3304 3312 7ff609a04abc GetLastError 3311->3312 3312->3304 3313 7ff609a048b0 4 API calls 3312->3313 3313->3304 3314 7ff609a04d3e 3319 7ff609a04dfc 3314->3319 3323 7ff609a04920 4 API calls 3314->3323 3315 7ff609a04e18 3320 7ff609a048b0 4 API calls 3315->3320 3316 7ff609a04920 4 API calls 3318 7ff609a04daa 3316->3318 3317 7ff609a04b62 3317->3243 3318->3316 3318->3317 3318->3319 3322 7ff609a048b0 4 API calls 3319->3322 3324 7ff609a04e24 3320->3324 3321 7ff609a04d78 3325 7ff609a04920 4 API calls 3321->3325 3322->3315 3323->3321 3324->3243 3325->3318 3326->3314 3326->3315 3326->3317 3326->3318 3326->3319 3326->3321 3327 7ff609a04920 VirtualQuery VirtualProtect GetLastError VirtualProtect 3326->3327 3328 7ff609a04cc6 3326->3328 3327->3326 3328->3317 3329 7ff609a04d02 VirtualProtect 3328->3329 3329->3328 3331 7ff609a04174 3330->3331 3332 7ff609a04252 3331->3332 3333 7ff609a041a0 3331->3333 3335 7ff609a04010 3 API calls 3332->3335 3366 7ff609a040f0 3333->3366 3346 7ff609a03d72 3335->3346 3336 7ff609a041b3 3337 7ff609a04244 3336->3337 3338 7ff609a041f4 3336->3338 3370 7ff609a04010 3337->3370 3340 7ff609a0422b 3338->3340 3341 7ff609a04218 3338->3341 3345 7ff609a04010 3 API calls 3340->3345 3342 7ff609a04010 3 API calls 3341->3342 3343 7ff609a04224 3342->3343 3374 7ff609a043b9 3343->3374 3345->3346 3347 7ff609a03a84 CreateThread 3346->3347 3348 7ff609a03adf 3347->3348 3349 7ff609a03ac8 3347->3349 3348->3271 3350 7ff609a03570 3 API calls 3349->3350 3350->3348 3352 7ff609a03b68 ioctlsocket connect 3351->3352 3354 7ff609a03b52 3351->3354 3353 7ff609a03d1b ioctlsocket 3352->3353 3355 7ff609a03bc3 3352->3355 3353->3354 3354->3271 3355->3353 3355->3354 3362 7ff609a03a78 3356->3362 3364 7ff609a0367c 3356->3364 3357 7ff609a038af 3359 7ff609a03570 3 API calls 3357->3359 3358 7ff609a03777 memcpy atoi 3360 7ff609a03570 3 API calls 3358->3360 3359->3362 3360->3364 3361 7ff609a037d2 memcpy atoi 3363 7ff609a03570 3 API calls 3361->3363 3362->3271 3363->3364 3364->3357 3364->3358 3364->3361 3365 7ff609a03570 3 API calls 3364->3365 3365->3364 3367 7ff609a0410e 3366->3367 3368 7ff609a0412f 3367->3368 3369 7ff609a04119 _mbscpy 3367->3369 3368->3336 3369->3368 3371 7ff609a04045 3370->3371 3372 7ff609a056c0 3 API calls 3371->3372 3373 7ff609a04054 3372->3373 3373->3346 3375 7ff609a043e7 3374->3375 3376 7ff609a04413 3375->3376 3377 7ff609a04548 3375->3377 3378 7ff609a040f0 _mbscpy 3376->3378 3379 7ff609a04010 3 API calls 3377->3379 3381 7ff609a04426 3378->3381 3380 7ff609a0451f 3379->3380 3380->3346 3382 7ff609a0453a 3381->3382 3385 7ff609a0446b 3381->3385 3383 7ff609a04010 3 API calls 3382->3383 3383->3380 3384 7ff609a044d2 3388 7ff609a04521 3384->3388 3389 7ff609a04509 3384->3389 3385->3384 3386 7ff609a044d4 3385->3386 3387 7ff609a044c6 3385->3387 3393 7ff609a04010 3 API calls 3386->3393 3390 7ff609a04010 3 API calls 3387->3390 3392 7ff609a04010 3 API calls 3388->3392 3391 7ff609a04010 3 API calls 3389->3391 3390->3384 3391->3380 3392->3380 3393->3384 3598 7ff609a07570 3599 7ff609a0758b 3598->3599 3602 7ff609a075a3 3598->3602 3604 7ff609a060d0 3599->3604 3601 7ff609a060d0 19 API calls 3603 7ff609a077e6 3601->3603 3602->3601 3603->3603 3605 7ff609a060e5 3604->3605 3606 7ff609a05770 11 API calls 3605->3606 3607 7ff609a0611f 3606->3607 3608 7ff609a05d10 8 API calls 3607->3608 3609 7ff609a06178 3607->3609 3610 7ff609a0613f 3608->3610 3609->3602 3610->3602 3394 7ff609a077eb 3395 7ff609a075c3 3394->3395 3396 7ff609a077ff 3394->3396 3395->3394 3400 7ff609a066b0 3395->3400 3398 7ff609a066b0 21 API calls 3396->3398 3399 7ff609a0781e 3398->3399 3399->3399 3401 7ff609a066ca 3400->3401 3412 7ff609a06743 3400->3412 3402 7ff609a05770 11 API calls 3401->3402 3403 7ff609a066fd 3402->3403 3404 7ff609a06768 3403->3404 3405 7ff609a06724 3403->3405 3403->3412 3406 7ff609a06777 3404->3406 3407 7ff609a0676c strlen 3404->3407 3408 7ff609a0672c 3405->3408 3409 7ff609a067f8 strlen 3405->3409 3410 7ff609a06510 8 API calls 3406->3410 3407->3406 3411 7ff609a05d10 8 API calls 3408->3411 3409->3408 3410->3412 3411->3412 3412->3395 3413 7ff609a0a7e0 ___lc_codepage_func ___mb_cur_max_func 3414 7ff609a0a812 3413->3414 3415 7ff609a0a81c 3413->3415 3418 7ff609a0a817 3414->3418 3419 7ff609a0a878 3414->3419 3416 7ff609a0a700 2 API calls 3416->3419 3417 7ff609a0a700 2 API calls 3417->3418 3418->3415 3418->3417 3419->3415 3419->3416 3611 7ff609a0aa62 VirtualQuery 3420 7ff609a015c0 3421 7ff609a015ed 3420->3421 3422 7ff609a0160e memset 3421->3422 3423 7ff609a015f8 free 3421->3423 3425 7ff609a01640 memset 3422->3425 3424 7ff609a01778 3423->3424 3428 7ff609a0169e 3425->3428 3427 7ff609a01767 free 3427->3424 3428->3427 3429 7ff609a046d0 3430 7ff609a046d9 3429->3430 3431 7ff609a046dd 3430->3431 3434 7ff609a051c0 3430->3434 3433 7ff609a046f5 3435 7ff609a05290 3434->3435 3436 7ff609a051ce 3434->3436 3435->3433 3437 7ff609a051d0 3436->3437 3438 7ff609a051f8 3436->3438 3439 7ff609a051d4 3437->3439 3440 7ff609a05220 3437->3440 3441 7ff609a051de 3438->3441 3448 7ff609a05040 RtlEnterCriticalSection 3438->3448 3439->3441 3442 7ff609a05210 RtlInitializeCriticalSection 3439->3442 3443 7ff609a0522f 3440->3443 3445 7ff609a05040 4 API calls 3440->3445 3441->3433 3442->3441 3443->3441 3446 7ff609a05261 RtlDeleteCriticalSection 3443->3446 3447 7ff609a05250 free 3443->3447 3445->3443 3446->3441 3447->3446 3447->3447 3449 7ff609a05094 RtlLeaveCriticalSection 3448->3449 3450 7ff609a05062 3448->3450 3452 7ff609a1137b 3449->3452 3450->3449 3451 7ff609a05070 TlsGetValue GetLastError 3450->3451 3451->3450 3452->3441 3462 7ff609a074cf 3463 7ff609a074f1 3462->3463 3464 7ff609a058e0 2 API calls 3463->3464 3465 7ff609a07776 3464->3465 3465->3465 3466 7ff609a0aac1 RtlLeaveCriticalSection 3467 7ff609a022c9 3468 7ff609a022f6 3467->3468 3469 7ff609a02301 free 3468->3469 3470 7ff609a02317 memset 3468->3470 3471 7ff609a02417 3469->3471 3472 7ff609a02349 rand 3470->3472 3474 7ff609a0236f memset 3472->3474 3476 7ff609a023a2 3474->3476 3477 7ff609a02406 free 3476->3477 3477->3471 3666 7ff609a01ca4 3667 7ff609a01cd1 3666->3667 3668 7ff609a01cf2 malloc 3667->3668 3669 7ff609a01cdc free 3667->3669 3671 7ff609a01d34 memset 3668->3671 3672 7ff609a01d0e free 3668->3672 3670 7ff609a01ef0 3669->3670 3678 7ff609a01d66 3671->3678 3672->3670 3674 7ff609a01ec0 free 3676 7ff609a01edf free 3674->3676 3676->3670 3677 7ff609a01dd9 rand 3677->3678 3678->3674 3678->3677 3679 7ff609a074a3 3680 7ff609a074ca 3679->3680 3681 7ff609a074ba 3679->3681 3683 7ff609a058e0 2 API calls 3680->3683 3684 7ff609a079ce 3680->3684 3682 7ff609a05b00 strlen 3681->3682 3682->3680 3683->3684 3685 7ff609a047a0 3686 7ff609a047bf 3685->3686 3687 7ff609a047fd fprintf 3686->3687 3489 7ff609a0391f 3492 7ff609a02ed2 3489->3492 3494 7ff609a02f83 3492->3494 3493 7ff609a02f0c malloc 3493->3494 3494->3493 3495 7ff609a020bf 3 API calls 3494->3495 3496 7ff609a02fef 3494->3496 3497 7ff609a02fb7 free 3495->3497 3497->3494 3498 7ff609a0241d 3499 7ff609a0244d 3498->3499 3500 7ff609a0246e 3499->3500 3501 7ff609a02458 free 3499->3501 3511 7ff609a02110 rand 3500->3511 3502 7ff609a0265d 3501->3502 3504 7ff609a02473 memset 3505 7ff609a024a4 3504->3505 3506 7ff609a024f4 memset 3505->3506 3507 7ff609a024ce free 3505->3507 3509 7ff609a02526 3506->3509 3507->3502 3510 7ff609a0264c free 3509->3510 3510->3502 3511->3504 3688 7ff609a0aab1 MultiByteToWideChar 3689 7ff609a04f99 signal 3690 7ff609a05010 signal 3689->3690 3691 7ff609a04f0d 3689->3691 3512 7ff609a05330 strlen 3513 7ff609a053c0 3512->3513 3515 7ff609a05346 3512->3515 3514 7ff609a053ae 3515->3513 3515->3514 3516 7ff609a05399 strncmp 3515->3516 3516->3514 3516->3515 3517 7ff609a05130 3518 7ff609a05141 3517->3518 3519 7ff609a05150 RtlEnterCriticalSection 3517->3519 3520 7ff609a05193 RtlLeaveCriticalSection 3519->3520 3521 7ff609a05169 3519->3521 3521->3520 3522 7ff609a0518e free 3521->3522 3522->3520 3698 7ff609a050b0 3699 7ff609a050d0 3698->3699 3700 7ff609a050c6 3698->3700 3699->3700 3701 7ff609a050e7 RtlEnterCriticalSection RtlLeaveCriticalSection 3699->3701 3702 7ff609a03fb0 3703 7ff609a03ff0 3702->3703 3704 7ff609a03fca rand 3703->3704 3705 7ff609a03ffa 3703->3705 3704->3703 3706 7ff609a0a6a0 ___mb_cur_max_func ___lc_codepage_func 3707 7ff609a0a3a0 4 API calls 3706->3707 3708 7ff609a0a6ee 3707->3708 3709 7ff609a075a8 3710 7ff609a075c3 3709->3710 3711 7ff609a077ff 3709->3711 3710->3711 3712 7ff609a066b0 21 API calls 3710->3712 3713 7ff609a066b0 21 API calls 3711->3713 3712->3710 3714 7ff609a0781e 3713->3714 3714->3714 3715 7ff609a03985 3716 7ff609a03570 3 API calls 3715->3716 3717 7ff609a039ac 3716->3717 3720 7ff609a03067 3717->3720 3722 7ff609a03128 3720->3722 3721 7ff609a030a1 malloc 3721->3722 3722->3721 3723 7ff609a03194 3722->3723 3724 7ff609a020bf 3 API calls 3722->3724 3725 7ff609a0315c free 3724->3725 3725->3722 3523 7ff609a0ab09 RtlDeleteCriticalSection 3726 7ff609a0aa8a SetUnhandledExceptionFilter 3524 7ff609a04700 3525 7ff609a04712 3524->3525 3526 7ff609a051c0 7 API calls 3525->3526 3527 7ff609a04722 3525->3527 3528 7ff609a04775 3526->3528 3730 7ff609a0177e 3731 7ff609a017ae 3730->3731 3732 7ff609a017cf memset 3731->3732 3733 7ff609a017b9 free 3731->3733 3736 7ff609a01801 3732->3736 3734 7ff609a01971 3733->3734 3735 7ff609a01960 free 3735->3734 3736->3735 3737 7ff609a0777b 3738 7ff609a07613 3737->3738 3739 7ff609a075fb 3737->3739 3741 7ff609a06600 19 API calls 3738->3741 3740 7ff609a06600 19 API calls 3739->3740 3740->3738 3742 7ff609a077ae 3741->3742 3742->3742 3743 7ff609a0a590 ___lc_codepage_func ___mb_cur_max_func 3744 7ff609a0a5cf 3743->3744 3745 7ff609a0a5e8 3743->3745 3744->3745 3746 7ff609a0a5e0 3744->3746 3749 7ff609a0a650 3744->3749 3746->3745 3748 7ff609a0a3a0 4 API calls 3746->3748 3747 7ff609a0a3a0 4 API calls 3747->3749 3748->3746 3749->3745 3749->3747 3529 7ff609a07915 3530 7ff609a0791e localeconv 3529->3530 3531 7ff609a07838 3529->3531 3532 7ff609a0a520 6 API calls 3530->3532 3533 7ff609a0795b 3532->3533 3534 7ff609a0aaf9 RtlEnterCriticalSection 3535 7ff609a03a11 3536 7ff609a03570 3 API calls 3535->3536 3537 7ff609a03a1d 3536->3537 3540 7ff609a03540 3537->3540 3545 7ff609a04268 3540->3545 3546 7ff609a04296 3545->3546 3547 7ff609a042c5 3546->3547 3548 7ff609a042ad 3546->3548 3551 7ff609a04010 3 API calls 3547->3551 3549 7ff609a04010 3 API calls 3548->3549 3550 7ff609a042c3 3549->3550 3552 7ff609a043a3 3550->3552 3555 7ff609a04315 3550->3555 3551->3550 3553 7ff609a04010 3 API calls 3552->3553 3554 7ff609a0354d 3553->3554 3560 7ff609a033c0 3554->3560 3556 7ff609a04365 3555->3556 3557 7ff609a0437d 3555->3557 3558 7ff609a04010 3 API calls 3556->3558 3559 7ff609a04010 3 API calls 3557->3559 3558->3554 3559->3554 3561 7ff609a03210 3 API calls 3560->3561 3562 7ff609a033db 3561->3562 3563 7ff609a01010 3565 7ff609a01058 3563->3565 3564 7ff609a0107a __set_app_type 3566 7ff609a01084 3564->3566 3565->3564 3565->3566 3567 7ff609a09700 3568 7ff609a09720 RtlDeleteCriticalSection 3567->3568 3569 7ff609a09715 3567->3569 3750 7ff609a0798a 3751 7ff609a0798f 3750->3751 3752 7ff609a079ce 3751->3752 3753 7ff609a058e0 2 API calls 3751->3753 3752->3752 3753->3752

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 44 7ff609a01190-7ff609a011be 45 7ff609a011c4-7ff609a011e1 44->45 46 7ff609a01470-7ff609a01473 GetStartupInfoA 44->46 47 7ff609a011f9-7ff609a01204 45->47 50 7ff609a01480-7ff609a0149a call 7ff609a0a368 46->50 48 7ff609a011e8-7ff609a011eb 47->48 49 7ff609a01206-7ff609a01214 47->49 51 7ff609a011f1-7ff609a011f6 Sleep 48->51 52 7ff609a01410-7ff609a01421 48->52 53 7ff609a0121a-7ff609a0121e 49->53 54 7ff609a01427-7ff609a01436 call 7ff609a0a370 49->54 51->47 52->53 52->54 56 7ff609a01224-7ff609a01233 53->56 57 7ff609a014a0-7ff609a014b9 call 7ff609a0a358 53->57 61 7ff609a0143c-7ff609a01457 _initterm 54->61 62 7ff609a01239-7ff609a0123b 54->62 56->61 56->62 70 7ff609a014be-7ff609a014e1 exit call 7ff609a01190 57->70 64 7ff609a01241-7ff609a0124e 61->64 65 7ff609a0145d-7ff609a01462 61->65 62->64 62->65 67 7ff609a01250-7ff609a01258 64->67 68 7ff609a0125c-7ff609a012a4 call 7ff609a04b40 SetUnhandledExceptionFilter call 7ff609a0a910 call 7ff609a048a0 call 7ff609a0a9f0 64->68 65->64 67->68 80 7ff609a012c2-7ff609a012c8 68->80 81 7ff609a012a6 68->81 74 7ff609a014e6-7ff609a014ec 70->74 83 7ff609a012b0-7ff609a012b2 80->83 84 7ff609a012ca-7ff609a012d8 80->84 82 7ff609a01300-7ff609a01306 81->82 88 7ff609a0131e-7ff609a01343 malloc 82->88 89 7ff609a01308-7ff609a01312 82->89 85 7ff609a012b4-7ff609a012b7 83->85 86 7ff609a012f9 83->86 87 7ff609a012be 84->87 94 7ff609a012e0-7ff609a012e2 85->94 95 7ff609a012b9 85->95 86->82 87->80 92 7ff609a01345-7ff609a0134a 88->92 93 7ff609a0138b-7ff609a013bf call 7ff609a04690 call 7ff609a03d58 88->93 90 7ff609a01400-7ff609a01405 89->90 91 7ff609a01318 89->91 90->91 91->88 96 7ff609a01350-7ff609a01384 strlen malloc memcpy 92->96 104 7ff609a013c4-7ff609a013d2 93->104 94->86 98 7ff609a012e4 94->98 95->87 96->96 99 7ff609a01386 96->99 101 7ff609a012e8-7ff609a012f2 98->101 99->93 101->86 103 7ff609a012f4-7ff609a012f7 101->103 103->86 103->101 104->70 105 7ff609a013d8-7ff609a013e0 104->105 105->50 106 7ff609a013e6-7ff609a013f5 105->106
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
      • String ID:
      • API String ID: 649803965-0
      • Opcode ID: e225db0f86b9ce421def3ab0fa0d7062bc5e7b1d61233733194764ee289550e2
      • Instruction ID: cfbb1b05f79a7edd766c8a721f9dd3a509af4e24e9db0fe47a073b67b084d343
      • Opcode Fuzzy Hash: e225db0f86b9ce421def3ab0fa0d7062bc5e7b1d61233733194764ee289550e2
      • Instruction Fuzzy Hash: A9815935E0D74685FBA09F55E8947B933A7AF8AB84F644135DE4DC33A1DE2DE8848700

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: send$CreateThreadmemsetperrorrecvsocket
      • String ID: %02x $154.213.192.42$Connected to C&C server$Connection failed. Retrying...$Disconnected from server. Retrying in 500ms...$Received %d bytes: $recv failed$win_x86_x64
      • API String ID: 1679048947-3681654477
      • Opcode ID: 52fefeefcdcf2a04f80c01cf7036b6e0bdcb3ce1ba97b7727e3dfdfb8c4737e3
      • Instruction ID: 93a51665f3cf9d394b418c2283b495ea3e877f70c37bdb599cb41364144e993f
      • Opcode Fuzzy Hash: 52fefeefcdcf2a04f80c01cf7036b6e0bdcb3ce1ba97b7727e3dfdfb8c4737e3
      • Instruction Fuzzy Hash: A6512021B186828DFB21DF65E8917ED3772AB85788F20003ADA0D9B7A5DE3DE605C340

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: Sleep
      • String ID: CreateToolhelp32Snapshot failed. Error: %lu
      • API String ID: 3472027048-731459797
      • Opcode ID: ae22be0987ea78f0aaeb91b8f08f01e6461eae328b81d81411c2ff8828f2edc0
      • Instruction ID: 53debfed7cbe686823190c8b7cb821351584c6271653e1d9c8b4b1b8f9da247e
      • Opcode Fuzzy Hash: ae22be0987ea78f0aaeb91b8f08f01e6461eae328b81d81411c2ff8828f2edc0
      • Instruction Fuzzy Hash: 71314121E0878A89EF709F65E8443FC33A2FB95758F604136CA1D9B7E9DE2DE5548310

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: connectioctlsocketsocket
      • String ID: Socket creation failed
      • API String ID: 3033478179-2728381879
      • Opcode ID: 3fca099bde09a1a059df5816efd18c7b1ebc4960c7c28b0057210e83bd6d0c1a
      • Instruction ID: 62b9140e86fbbfeef1a15d0787c9fa9e721936e09654fa285a413ecc27f9ca7b
      • Opcode Fuzzy Hash: 3fca099bde09a1a059df5816efd18c7b1ebc4960c7c28b0057210e83bd6d0c1a
      • Instruction Fuzzy Hash: 3A61DF72704A868EDB748F69DC843EC37A2F789798F644136DA1D9BBA8DF38D5408700

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 179 7ff609a03a84-7ff609a03ac6 CreateThread 180 7ff609a03adf-7ff609a03ae5 179->180 181 7ff609a03ac8-7ff609a03ada call 7ff609a03570 179->181 181->180
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: CreateThread
      • String ID: Failed to create thread. Error: %lu
      • API String ID: 2422867632-1876256139
      • Opcode ID: cd41cf2e5e1f9492d1ffe20eb3d477d557d5a9303e1400c434a624d3a7105117
      • Instruction ID: 78d13614197957c42713189168fedd61d71d4e610b4cd0aef0bec3e43e20f68d
      • Opcode Fuzzy Hash: cd41cf2e5e1f9492d1ffe20eb3d477d557d5a9303e1400c434a624d3a7105117
      • Instruction Fuzzy Hash: 07F06521F0860589F7509F61F8553BA3762E784748F244135C54D9BBA4DE3DE9428740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: free$memset
      • String ID: SAMPgy_$c
      • API String ID: 2717317152-1181286492
      • Opcode ID: 11a51b238fa7ff4f3de048e7e0399e496a3b39d4eba30ae5ff845e0166315fef
      • Instruction ID: 1fca54fd38e06a5134283d0230c7b6a57d57773b9e9d3c35c149daa62f7a8c3d
      • Opcode Fuzzy Hash: 11a51b238fa7ff4f3de048e7e0399e496a3b39d4eba30ae5ff845e0166315fef
      • Instruction Fuzzy Hash: 92514C26F147148CFB50DFA6E8543AC37B1AB89B98F200539DE6D97BA9DF38C5008710
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: free$memset
      • String ID:
      • API String ID: 2717317152-0
      • Opcode ID: 4f8eb30e03a2088e02aa41d26e0366e703c7c16698a6fc90498e6d19936d4cc9
      • Instruction ID: 028c54ee633531521b620cf821e772ad3b848cff9df57e0c5ef0007e4fec23e8
      • Opcode Fuzzy Hash: 4f8eb30e03a2088e02aa41d26e0366e703c7c16698a6fc90498e6d19936d4cc9
      • Instruction Fuzzy Hash: 42514A66B14B148CFB50DFA6E8443AC37B5BB88B98F204539DE5DA7BA8DF38D5408700

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: atoimemcpy
      • String ID: %d.%d.%d.%d$Packet size set to: %d bytes$Port set to: %d$Threads set to: %d$Unknown command
      • API String ID: 126230704-3691821516
      • Opcode ID: 761a1ce485632921bbffb7281cf2a6218fe9a642e71f4fdc5b2252f871c063eb
      • Instruction ID: e30820a0ffb31f66713911bdad6c60595065f0c1ade2f19e6f70e667eedc27a4
      • Opcode Fuzzy Hash: 761a1ce485632921bbffb7281cf2a6218fe9a642e71f4fdc5b2252f871c063eb
      • Instruction Fuzzy Hash: C8812AB2F086509EEB00CFA9C4852EC3BB1AB85348F504476EA5D97B9ADE3CD615CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: QueryVirtual
      • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
      • API String ID: 1804819252-1534286854
      • Opcode ID: d803b5b9f4712c63a583bc66fc2a8294c2c3be480b6b5a6bb31d90d251e6b5c6
      • Instruction ID: f354b5e79bf946f175276716233b43dd36a1006398bfd5fc4db96963540ff70d
      • Opcode Fuzzy Hash: d803b5b9f4712c63a583bc66fc2a8294c2c3be480b6b5a6bb31d90d251e6b5c6
      • Instruction Fuzzy Hash: 6071C472B09B4286EB109F55F84566977A2FB8A7E4F644235EF5C833A0EE3CE485C700
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: free$malloc
      • String ID:
      • API String ID: 2190258309-0
      • Opcode ID: 3fdcc2ec0350fbc7881cfd62aa9810f02018ec7521ec9bc9f349b6b3c1acdd06
      • Instruction ID: 803952ff5a06cd5e24035f05581953b4b391032b3332b6127369a487f2017a41
      • Opcode Fuzzy Hash: 3fdcc2ec0350fbc7881cfd62aa9810f02018ec7521ec9bc9f349b6b3c1acdd06
      • Instruction Fuzzy Hash: E3615075F08B058DEB44DFAAD8553AC37B2AB89B98F204139CE1D97BA9DE3CD5408710
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: free$malloc
      • String ID:
      • API String ID: 2190258309-0
      • Opcode ID: 9323b672db99f97c56645a26587eadc63964ebb5107a1af4015708c92901af04
      • Instruction ID: 4737d029605fa57535f522d000b786d51afb38194dbe2a98544a664d80349a31
      • Opcode Fuzzy Hash: 9323b672db99f97c56645a26587eadc63964ebb5107a1af4015708c92901af04
      • Instruction Fuzzy Hash: 54517C66F04B1589EB04DFA6D8443AC33B2BB88B98F204539DE2D97BA9DF38D5008310
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: NextProcess32
      • String ID: CreateToolhelp32Snapshot failed. Error: %lu$Failed to open process: %s (PID: %u)$Terminated process: %s (PID: %u)
      • API String ID: 1850201408-153003829
      • Opcode ID: e181661efe4dd773058fb5c019e7242ec3b384c34b7989fb4873058b68cdb20b
      • Instruction ID: 0ddb50a38dec3cf4e1f083a6ca5f92e62c746c01dd78e4dc69f36e00e6e6a9e8
      • Opcode Fuzzy Hash: e181661efe4dd773058fb5c019e7242ec3b384c34b7989fb4873058b68cdb20b
      • Instruction Fuzzy Hash: 20314521B0474649EF60DFA5D8843ED3362FB99798F204136CA1C9BBA9DE2CD545C340
      APIs
      • Sleep.KERNEL32(?,?,00000000,Infinity,00007FF609A0975F,?,?,?,?,00000000,Infinity,00007FF609A07C04,?,00000000,00000003,00007FF609A08118), ref: 00007FF609A0964D
      • RtlInitializeCriticalSection.NTDLL ref: 00007FF609A0968D
      • RtlInitializeCriticalSection.NTDLL ref: 00007FF609A09696
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: CriticalInitializeSection$Sleep
      • String ID: Infinity
      • API String ID: 1960909292-1015270809
      • Opcode ID: 2b3a132f51e9cd6b10359d2b6f53ec181f5f3bad216d3bdb832c5de5ecd3c170
      • Instruction ID: 71339d40d0485eed905afccb6f8918fe9dfa3e2271309c7311fd1c930eebbf47
      • Opcode Fuzzy Hash: 2b3a132f51e9cd6b10359d2b6f53ec181f5f3bad216d3bdb832c5de5ecd3c170
      • Instruction Fuzzy Hash: 6311D732D2D51686FB569F18E8A51B63293FFC6750F780531D94EC63A2DE2DE885CB00
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: freememset$rand
      • String ID:
      • API String ID: 2025389305-0
      • Opcode ID: 4480c9dfa61de757a7f1f0e5d6dc5bea86d1d3a71a6a449468cd70b262eee5fd
      • Instruction ID: 827cc2f2d3c92db98ccfc0bf02a8d54dfaf9b8a2d2327b3aa670f23b9ea41ba2
      • Opcode Fuzzy Hash: 4480c9dfa61de757a7f1f0e5d6dc5bea86d1d3a71a6a449468cd70b262eee5fd
      • Instruction Fuzzy Hash: 5C313C25B18B0589EB40DFA5E8543AC33B2AB897A8F204635DE6DD7BE9DF3DD5008710
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: Byte$CharLeadMultiWide
      • String ID:
      • API String ID: 2561704868-0
      • Opcode ID: 98b7f6bf3ad1004ecf0cff6562c8d77fed0c02d9e6fb996009e33322c1bcc7a6
      • Instruction ID: 1229c91a2e1db160d37c8e4d4d0dfd04b6002ee1c31d1c95283b4ada4f40d2f4
      • Opcode Fuzzy Hash: 98b7f6bf3ad1004ecf0cff6562c8d77fed0c02d9e6fb996009e33322c1bcc7a6
      • Instruction Fuzzy Hash: 8E31B676A0C78186E3608F24B44836D7692BBD1794F648235DA98C7BD9DF3ED484CB00
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID:
      • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
      • API String ID: 0-395989641
      • Opcode ID: 76e62dfac5ded097740ec0d1c05d2b01f578fe877c8bdf0b2acdc5b6a318c470
      • Instruction ID: 5e2aaac3bf9b5fee26a1d3a77cc176551a6015ec272095b22ab1a0648b0e1d25
      • Opcode Fuzzy Hash: 76e62dfac5ded097740ec0d1c05d2b01f578fe877c8bdf0b2acdc5b6a318c470
      • Instruction Fuzzy Hash: 1971D362F1865686EB109F21E4447A977E2FF99BA8F648231DF1C977A4EE3CE440C700
      APIs
        • Part of subcall function 00007FF609A09620: Sleep.KERNEL32(?,?,00000000,Infinity,00007FF609A0975F,?,?,?,?,00000000,Infinity,00007FF609A07C04,?,00000000,00000003,00007FF609A08118), ref: 00007FF609A0964D
      • malloc.MSVCRT ref: 00007FF609A09787
      • RtlLeaveCriticalSection.NTDLL ref: 00007FF609A097DF
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: CriticalLeaveSectionSleepmalloc
      • String ID: Infinity
      • API String ID: 1993596536-1015270809
      • Opcode ID: 583c81eff2bc653449be8c5b22903ef88f54eda45f881fdddad083b71c83a9c0
      • Instruction ID: eeab870e5db9ba7cd43702ec285cb4291d954fb9cfb5f91e8928122f4e11e97e
      • Opcode Fuzzy Hash: 583c81eff2bc653449be8c5b22903ef88f54eda45f881fdddad083b71c83a9c0
      • Instruction Fuzzy Hash: 9E216A72F1861A82EF24CF05E4903BA73A2BBD5784F658239CA1D873A1DF3CA594C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-3474627141
      • Opcode ID: f7e8b77a0b0dff4a7c8fd560446d4c8046c86c2a5a0ae3229943de372c0eb2c5
      • Instruction ID: 07c3335e32148e8fae350210df796025decec6ebd0af7ac5a91608f5e346be5c
      • Opcode Fuzzy Hash: f7e8b77a0b0dff4a7c8fd560446d4c8046c86c2a5a0ae3229943de372c0eb2c5
      • Instruction Fuzzy Hash: 43015E62D1CF8482D7018F18D8001BA7372FBAE799F25A335EB8D66665DF28E596C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-4064033741
      • Opcode ID: 30eeda8bdb12080cde567a8558e119721110e6916e5ac3dcb8fdf4791492d7ce
      • Instruction ID: 01e70587219d84101c76f62bd86c5b4e2734a267c980ccf8b72bc9548b44570a
      • Opcode Fuzzy Hash: 30eeda8bdb12080cde567a8558e119721110e6916e5ac3dcb8fdf4791492d7ce
      • Instruction Fuzzy Hash: B5F06D12C08F8482D3029F1CA4000AB7332FF9E798F286336EF8D6A655DF28E5828700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: fprintf
      • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-2187435201
      • Opcode ID: f4b68061637c4e869876cc2b07be9ae89b12cec57d0ec52bd52edc14d149258f
      • Instruction ID: 5ca20f33202464d7cf307d6508fe5fea32cb4726bf15a30844296be552dd6690
      • Opcode Fuzzy Hash: f4b68061637c4e869876cc2b07be9ae89b12cec57d0ec52bd52edc14d149258f
      • Instruction Fuzzy Hash: 6AF06D12C08F8482D3029F1CA4001AB7332FF8E798F285336EF8D6A655DF28E5828700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-2713391170
      • Opcode ID: 709d1337b431af56bb765744f32365ef71057d2f3adb48a5db82197e702a3b57
      • Instruction ID: 897eebabbecd9253b5c979dd741d0acb2fd7f7d1e21cb1a924ca20b6fc96a3a8
      • Opcode Fuzzy Hash: 709d1337b431af56bb765744f32365ef71057d2f3adb48a5db82197e702a3b57
      • Instruction Fuzzy Hash: 0AF06212C08F8482D3029F1CA4000BB7332FF9E798F245735EF8D66655DF28E5828700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-4283191376
      • Opcode ID: ef8ff845aa821fedd75d124928bf110435547eefecd6d81b6760bdc6d9931a3a
      • Instruction ID: 2efaa0c4706ae10d2a57cbb43f396d89bc5baf29967fc236b3a80b94dbbb5eaf
      • Opcode Fuzzy Hash: ef8ff845aa821fedd75d124928bf110435547eefecd6d81b6760bdc6d9931a3a
      • Instruction Fuzzy Hash: 50F06252C08F8482D3029F1CA4000AB7331FF9E798F245336EF8D66655DF28E5828700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-4273532761
      • Opcode ID: 2555366b7f243d5c5750147fe3f99058101b7cdae7e235ce5a55a443d9b88822
      • Instruction ID: 55c62191cd3e17f9ce5ee36f53f4d2f74cd6c2a0485033995be3df437d708bd3
      • Opcode Fuzzy Hash: 2555366b7f243d5c5750147fe3f99058101b7cdae7e235ce5a55a443d9b88822
      • Instruction Fuzzy Hash: 6DF06D16C48F8482D3029F1CA4001AB7332FF9E798F286336EF8D6A655DF28E5828700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: fprintf
      • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
      • API String ID: 383729395-2468659920
      • Opcode ID: bffe1eaf3389dee2b12e3729f9d500de9cab9793a4ff0cf748dbcce5efa7edf7
      • Instruction ID: 5918f26418e8385ae690f02a32db4872906debae026ed4342721df5b0ea249fc
      • Opcode Fuzzy Hash: bffe1eaf3389dee2b12e3729f9d500de9cab9793a4ff0cf748dbcce5efa7edf7
      • Instruction Fuzzy Hash: 10F01D16D48F8482D302DF18A4001AB7371FB9E799F255736EE8D6A655DF28E5828700
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: freememset
      • String ID:
      • API String ID: 2499939622-0
      • Opcode ID: 8337257afa241cc28aafe8cf9f7202994b655755b37db60b13fdb6ff63783a31
      • Instruction ID: 74dca95a4f8696ce482e9eebcdcd8c985218ae70a5dc4460bfd222daf2f0e46c
      • Opcode Fuzzy Hash: 8337257afa241cc28aafe8cf9f7202994b655755b37db60b13fdb6ff63783a31
      • Instruction Fuzzy Hash: 6F412E25F19B0588EB40DFA6D8543EC3772AB89BA8F204635CE2D977E9DE39D6408300
      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.3473614797.00007FF609A01000.00000040.00000001.01000000.00000005.sdmp, Offset: 00007FF609A00000, based on PE: true
      • Associated: 00000002.00000002.3473589222.00007FF609A00000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A11000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473614797.00007FF609A15000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473726277.00007FF609A7F000.00000080.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473754724.00007FF609A80000.00000040.00000001.01000000.00000005.sdmpDownload File
      • Associated: 00000002.00000002.3473782365.00007FF609A81000.00000004.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff609a00000_svchost.jbxd
      Similarity
      • API ID: freememset
      • String ID:
      • API String ID: 2499939622-0
      • Opcode ID: 9f44535f6fd749539bcc271d37f089827b23007be47d33ba420ed4f177ea1149
      • Instruction ID: f900994c84f1c5f3245f9d916f08417458cbf37c5b214664a433e39e84686b73
      • Opcode Fuzzy Hash: 9f44535f6fd749539bcc271d37f089827b23007be47d33ba420ed4f177ea1149
      • Instruction Fuzzy Hash: 6B316B25708BC58AEB759F65E8443E93369E788B98F100136DA1D8BBA9DF7DD3008300