Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe
Analysis ID:1645704
MD5:fa21bcb264226c07d923d31a1642af8d
SHA1:4bda85546017addd5943f924e1ab34b3729408a1
SHA256:b662b694630f0b54c92dc2567e00390492d90d6cea5a50efc231e8b4b227ec69
Tags:exeuser-SecuriteInfoCom
Infos:

Detection

Score:64
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Joe Sandbox ML detected suspicious sample
Sigma detected: Potentially Suspicious Malware Callback Communication
Detected TCP or UDP traffic on non-standard ports
Internet Provider seen in connection with other malware
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 176.65.138.157, DestinationIsIpv6: false, DestinationPort: 1443, EventID: 3, Image: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe, Initiated: true, ProcessId: 7692, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49720
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeAvira: detected
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeVirustotal: Detection: 30%Perma Link
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeReversingLabs: Detection: 38%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.2% probability
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE
Source: global trafficTCP traffic: 192.168.2.4:49720 -> 176.65.138.157:1443
Source: Joe Sandbox ViewASN Name: PALTEL-ASPALTELAutonomousSystemPS PALTEL-ASPALTELAutonomousSystemPS
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.138.157
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.138.157
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.138.157
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.138.157
Source: unknownTCP traffic detected without corresponding DNS query: 176.65.138.157
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: Number of sections : 15 > 10
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@2/1@0/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7700:120:WilError_03
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeVirustotal: Detection: 30%
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeReversingLabs: Detection: 38%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeSection loaded: mswsock.dllJump to behavior
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: section name: /4
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: section name: /19
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: section name: /31
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: section name: /45
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: section name: /57
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: section name: /70
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: section name: /81
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeStatic PE information: section name: /92
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeCode function: 0_2_004100CB push ds; retf 0_2_004100CC
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeCode function: 0_2_00401564 GetSystemInfo,GetSystemInfo,0_2_00401564
Source: SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe, 00000000.00000002.1221678852.000000000081E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeCode function: 0_2_0040116C Sleep,Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm,GetStartupInfoA,_cexit,_initterm,exit,0_2_0040116C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeCode function: 0_2_00401160 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,0_2_00401160
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeCode function: 0_2_004013C1 SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,_amsg_exit,_initterm,0_2_004013C1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeCode function: 0_2_0040199C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_0040199C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeCode function: 0_2_004019A0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_004019A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeCode function: 0_2_004011A3 Sleep,SetUnhandledExceptionFilter,__p__acmdln,malloc,strlen,malloc,memcpy,__initenv,0_2_004011A3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exeCode function: 0_2_004018E0 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004018E0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1645704 Sample: SecuriteInfo.com.Win32.Troj... Startdate: 22/03/2025 Architecture: WINDOWS Score: 64 13 Antivirus / Scanner detection for submitted sample 2->13 15 Multi AV Scanner detection for submitted file 2->15 17 Sigma detected: Potentially Suspicious Malware Callback Communication 2->17 19 Joe Sandbox ML detected suspicious sample 2->19 6 SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe 1 2->6         started        process3 dnsIp4 11 176.65.138.157, 1443, 49720 PALTEL-ASPALTELAutonomousSystemPS Germany 6->11 9 conhost.exe 6->9         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe30%VirustotalBrowse
SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe39%ReversingLabs
SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe100%AviraHEUR/AGEN.1319913
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
176.65.138.157
unknownGermany
12975PALTEL-ASPALTELAutonomousSystemPStrue
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1645704
Start date and time:2025-03-22 08:23:14 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 4s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe
Detection:MAL
Classification:mal64.winEXE@2/1@0/1
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 10
  • Number of non-executed functions: 6
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 23.204.23.20, 204.79.197.222, 4.175.87.197
  • Excluded domains from analysis (whitelisted): fp.msedge.net, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
PALTEL-ASPALTELAutonomousSystemPSxenn.ps1Get hashmaliciousRedLineBrowse
  • 176.65.144.135
Confirmaci#U00f3n de Pago.jsGet hashmaliciousRemcosBrowse
  • 176.65.144.3
STEPH.jsGet hashmaliciousFormBookBrowse
  • 176.65.144.3
nabppc.elfGet hashmaliciousUnknownBrowse
  • 82.213.50.193
Rendel#U00e9si k#U00e9relem.exeGet hashmaliciousDarkCloudBrowse
  • 176.65.144.3
MUKK.ps1Get hashmaliciousAgentTeslaBrowse
  • 176.65.144.3
obfuscated (1).jsGet hashmaliciousXWormBrowse
  • 176.65.144.3
KIM.ps1Get hashmaliciousStealeriumBrowse
  • 176.65.144.3
KENT.ps1Get hashmaliciousRemcosBrowse
  • 176.65.144.3
xenbuild.exeGet hashmaliciousRedLineBrowse
  • 176.65.144.135
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):19
Entropy (8bit):3.6818808028034042
Encrypted:false
SSDEEP:3:ljR/a2n:ljBn
MD5:62A7BE59CA4EC4DC0E7EF3474A410A68
SHA1:45C87A259B3F7D75206B4868E9DC0E8B8B7FC9DD
SHA-256:D62C958EF5607905CFB4B9B785F526544F78A1BC36EFADBB9931FAE34CF2036C
SHA-512:3D01752A9C1B3ADD0A4628F6507180F7D7130D1003182DA93EC2B1195833B703BDF6A30362AAC4385D8D95658AE36AB7F1A502025F490D9591020C04B8795BF8
Malicious:false
Reputation:low
Preview:Connection failed..
File type:PE32 executable (console) Intel 80386, for MS Windows
Entropy (8bit):5.9108799652157735
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • VXD Driver (31/22) 0.00%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe
File size:293'842 bytes
MD5:fa21bcb264226c07d923d31a1642af8d
SHA1:4bda85546017addd5943f924e1ab34b3729408a1
SHA256:b662b694630f0b54c92dc2567e00390492d90d6cea5a50efc231e8b4b227ec69
SHA512:4f041dbb346d69e4f79fc450a192e67833dbb4d035ac48b3eed614bfce8d19bd9fa020a9331cf38eca4f6ad0c40623daf38427584cc5d791e697d1953f5ea90a
SSDEEP:6144:x2xqq80/1MW1WqElmz3dWG63acJf2ypi1WqPCTVtq3:A1qHHILgxq+OBQHTvQ
TLSH:2E542AA0F696FDBAE9558FBD14F11309429EE2C0E71DEB333860FD380159A5C46B364A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g....j..........".....0...............0....@........................................... ............................
Icon Hash:90cececece8e8eb0
Entrypoint:0x4014c0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x67DE0784 [Sat Mar 22 00:42:44 2025 UTC]
TLS Callbacks:0x401a80, 0x401a30
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:b8150e1626853a10621ac84308be19b5
Instruction
sub esp, 0Ch
mov dword ptr [00405494h], 00000000h
call 00007F6ACD0DBC03h
add esp, 0Ch
jmp 00007F6ACD0DB47Bh
lea esi, dword ptr [esi+00000000h]
sub esp, 1Ch
mov eax, dword ptr [esp+20h]
mov dword ptr [esp], eax
call 00007F6ACD0DCBC6h
test eax, eax
sete al
add esp, 1Ch
movzx eax, al
neg eax
ret
nop
nop
nop
push ebp
mov ebp, esp
sub esp, 18h
mov dword ptr [esp], 00401520h
call 00007F6ACD0DB7C3h
leave
ret
lea esi, dword ptr [esi+00000000h]
lea esi, dword ptr [esi+00h]
nop
ret
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
push ebp
mov ebp, esp
sub esp, 28h
lea eax, dword ptr [ebp+14h]
mov dword ptr [ebp-10h], eax
mov eax, dword ptr [ebp-10h]
mov dword ptr [esp+0Ch], eax
mov eax, dword ptr [ebp+10h]
mov dword ptr [esp+08h], eax
mov eax, dword ptr [ebp+0Ch]
mov dword ptr [esp+04h], eax
mov eax, dword ptr [ebp+08h]
mov dword ptr [esp], eax
call 00007F6ACD0DCAD9h
mov dword ptr [ebp-0Ch], eax
mov eax, dword ptr [ebp-0Ch]
leave
ret
push ebp
mov ebp, esp
sub esp, 48h
lea eax, dword ptr [ebp-2Ch]
mov dword ptr [esp], eax
mov eax, dword ptr [00406154h]
call eax
sub esp, 04h
movzx eax, word ptr [ebp-2Ch]
cmp ax, 0009h
jne 00007F6ACD0DB7F9h
mov eax, 00404000h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x60000x664.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x40b00x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x61380xe8.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x19640x1a006040c077c01269cd24c30d33a0757a41False0.5593449519230769data5.870853919191518IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x30000x300x200d57819111cd7c312e4b58d71f1ef1650False0.08984375data0.5781491419435547IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x40000x6940x800b1c92641f76728a04adeff41dc55e7a0False0.26513671875data4.711862879033733IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
.bss0x50000x4e80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x60000x6640x800f320d04965b1f446c16c295481f4d31eFalse0.35888671875data3.9846482031717056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT0x70000x340x2008260687f18135aef8fc3d7ab41206c16False0.072265625Matlab v4 mat-file (little endian) \300\030@, numeric, rows 4198688, columns 00.2748254782599745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x80000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
/40x90000x2d80x400c1f06c32bb4ff70774a0fc4ffba7f689False0.2412109375Matlab v4 mat-file (little endian) \375\004, rows 2, columns 2621441.747536435918311IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/190xa0000x357320x358006fbdf31957df435a69ab0c0ef4863958False0.2899888653621495data6.013009488695018IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/310x400000x229e0x24007494e2dd1ed7f7b3b372245d126dd653False0.1806640625data4.587488917350296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/450x430000x2c770x2e002d561cf00ccda35526126a03f45aa6c4False0.33755095108695654data5.346475771934375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/570x460000x7480x8007e1dc8bec09e8a0a96fc1d1ab4ea6b8eFalse0.40380859375data4.424167454921425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/700x470000x4ee0x600b8e844e565f9c1616a0d5869b094ecd3False0.3678385416666667data4.366683744454898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/810x480000x11e20x1200c2ca0570b995d66695092059bc4994f2False0.3276909722222222data3.027796683635334IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
/920x4a0000x2500x4007fb4be62f4f9a0a0930b93c770d68c97False0.2509765625Matlab v4 mat-file (little endian) \340, rows 16, columns 19, imaginary1.6779866419342222IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetLastError, GetStartupInfoA, GetSystemInfo, GetSystemTimeAsFileTime, GetTickCount, GlobalMemoryStatusEx, InitializeCriticalSection, LeaveCriticalSection, QueryPerformanceCounter, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualProtect, VirtualQuery
msvcrt.dll__getmainargs, __initenv, __lconv_init, __p__acmdln, __p__fmode, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _initterm, _iob, _onexit, _vsnprintf, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, puts, signal, strlen, strncmp, vfprintf
WS2_32.dllWSACleanup, WSAStartup, closesocket, connect, htons, inet_addr, send, socket

Download Network PCAP: filteredfull

TimestampSource PortDest PortSource IPDest IP
Mar 22, 2025 08:24:14.308125973 CET497201443192.168.2.4176.65.138.157
Mar 22, 2025 08:24:14.479149103 CET144349720176.65.138.157192.168.2.4
Mar 22, 2025 08:24:14.994534969 CET497201443192.168.2.4176.65.138.157
Mar 22, 2025 08:24:15.161294937 CET144349720176.65.138.157192.168.2.4
Mar 22, 2025 08:24:15.680692911 CET497201443192.168.2.4176.65.138.157
Mar 22, 2025 08:24:15.847839117 CET144349720176.65.138.157192.168.2.4
Mar 22, 2025 08:24:16.353871107 CET497201443192.168.2.4176.65.138.157
Mar 22, 2025 08:24:16.522495031 CET144349720176.65.138.157192.168.2.4
Mar 22, 2025 08:24:17.025846958 CET497201443192.168.2.4176.65.138.157
Mar 22, 2025 08:24:17.191742897 CET144349720176.65.138.157192.168.2.4

Click to jump to process

Click to jump to process

  • File
  • Network

Click to dive into process behavior distribution

Target ID:0
Start time:03:24:12
Start date:22/03/2025
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Trojan.Agent.QWCKHW.31433.26307.exe"
Imagebase:0x400000
File size:293'842 bytes
MD5 hash:FA21BCB264226C07D923D31A1642AF8D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:03:24:12
Start date:22/03/2025
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff62fc20000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:8.8%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:33.1%
Total number of Nodes:357
Total number of Limit Nodes:1
Show Legend
Hide Nodes/Edges
execution_graph 1167 4014c0 1168 4018e0 5 API calls 1167->1168 1169 4014d2 1168->1169 1298 401500 1301 4014e0 _onexit 1298->1301 1300 401512 1301->1300 1043 4013c1 1054 4011da 1043->1054 1044 4013db _amsg_exit 1046 4013f5 _initterm 1044->1046 1044->1054 1045 401460 _initterm 1047 401483 1045->1047 1046->1054 1049 40148b exit 1047->1049 1098 4018e0 1049->1098 1050 401231 SetUnhandledExceptionFilter 1050->1054 1052 4014b2 1053 401257 __p__acmdln 1053->1054 1054->1044 1054->1045 1054->1046 1054->1053 1055 4012db malloc 1054->1055 1056 4012d6 1054->1056 1067 401d60 1054->1067 1055->1047 1057 401301 1055->1057 1056->1055 1058 401310 strlen malloc memcpy 1057->1058 1058->1058 1059 401346 1058->1059 1082 4018a0 1059->1082 1061 40135f 1087 40174e 1061->1087 1064 401399 1065 4013a7 1064->1065 1066 401448 _cexit 1064->1066 1069 401d80 1067->1069 1073 401d75 1067->1073 1068 401f70 1068->1073 1075 401f81 1068->1075 1069->1068 1070 401fc2 1069->1070 1069->1073 1077 401e10 1069->1077 1081 401ee0 1069->1081 1071 401bc0 11 API calls 1070->1071 1074 401fd2 1071->1074 1073->1050 1074->1050 1076 401edd 1075->1076 1128 401c20 1075->1128 1076->1081 1077->1069 1077->1076 1078 401c20 11 API calls 1077->1078 1102 401bc0 1077->1102 1078->1077 1080 401f12 VirtualProtect 1080->1081 1081->1073 1081->1080 1083 4018a9 1082->1083 1084 401840 1082->1084 1083->1061 1152 4014e0 _onexit 1084->1152 1086 401870 1086->1061 1088 4018a0 _onexit 1087->1088 1089 40175f 1088->1089 1153 401564 GetSystemInfo 1089->1153 1093 401770 1157 4015e2 GlobalMemoryStatusEx 1093->1157 1095 40177c 1158 401607 WSAStartup 1095->1158 1099 401903 1098->1099 1100 401918 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 1098->1100 1099->1052 1101 40196f 1100->1101 1101->1052 1150 402910 1102->1150 1104 401bd4 fwrite 1151 402910 1104->1151 1106 401c00 vfprintf abort 1111 401c20 1106->1111 1107 401cc8 1107->1069 1108 401d47 1109 401bc0 4 API calls 1108->1109 1123 401d57 1109->1123 1110 401c87 VirtualQuery 1110->1111 1112 401d27 1110->1112 1111->1107 1111->1108 1111->1110 1114 401cd6 VirtualProtect 1111->1114 1113 401bc0 4 API calls 1112->1113 1113->1108 1114->1107 1115 401d0a GetLastError 1114->1115 1116 401bc0 4 API calls 1115->1116 1116->1111 1117 401f70 1120 401c20 4 API calls 1117->1120 1125 401edd 1117->1125 1127 401d75 1117->1127 1118 401fc2 1119 401bc0 4 API calls 1118->1119 1121 401fd2 1119->1121 1120->1117 1121->1069 1122 401c20 VirtualQuery VirtualProtect GetLastError VirtualProtect 1122->1123 1123->1117 1123->1118 1123->1122 1124 401bc0 4 API calls 1123->1124 1123->1125 1123->1127 1124->1123 1126 401f12 VirtualProtect 1125->1126 1125->1127 1126->1125 1127->1069 1133 401c36 1128->1133 1129 401cc8 1129->1075 1130 401d47 1131 401bc0 7 API calls 1130->1131 1137 401d57 1131->1137 1132 401c87 VirtualQuery 1132->1133 1134 401d27 1132->1134 1133->1129 1133->1130 1133->1132 1136 401cd6 VirtualProtect 1133->1136 1135 401bc0 7 API calls 1134->1135 1135->1130 1136->1129 1138 401d0a GetLastError 1136->1138 1140 401f70 1137->1140 1141 401d75 1137->1141 1142 401fc2 1137->1142 1146 401c20 7 API calls 1137->1146 1147 401bc0 7 API calls 1137->1147 1148 401edd 1137->1148 1139 401bc0 7 API calls 1138->1139 1139->1133 1140->1141 1144 401c20 7 API calls 1140->1144 1140->1148 1141->1075 1143 401bc0 7 API calls 1142->1143 1145 401fd2 1143->1145 1144->1140 1145->1075 1146->1137 1147->1137 1148->1141 1149 401f12 VirtualProtect 1148->1149 1149->1148 1150->1104 1151->1106 1152->1086 1154 401584 1153->1154 1155 4015a2 GetSystemInfo 1154->1155 1156 4015db 1155->1156 1156->1093 1157->1095 1159 401640 socket 1158->1159 1160 40162f puts 1158->1160 1162 401682 connect 1159->1162 1163 40166a puts 1159->1163 1161 401386 1160->1161 1161->1049 1161->1064 1165 4016e2 puts closesocket 1162->1165 1166 401707 strlen 1162->1166 1163->1161 1165->1161 1166->1161 1170 401441 1171 401448 _cexit 1170->1171 1302 401001 1303 401048 1302->1303 1304 4010a0 __set_app_type 1303->1304 1305 40106e __set_app_type 1303->1305 1306 40107a __p__fmode 1304->1306 1305->1306 1307 40108c 1306->1307 1308 401095 1307->1308 1311 402040 1307->1311 1312 4028e0 __setusermatherr 1311->1312 1313 402308 1314 402310 EnterCriticalSection 1313->1314 1315 402350 LeaveCriticalSection 1314->1315 1316 402329 1314->1316 1316->1315 1317 402348 free 1316->1317 1317->1315 1318 402189 1319 402190 signal 1318->1319 1320 402182 1319->1320 1172 401a4b 1173 401a50 1172->1173 1176 402380 1173->1176 1175 401a68 1177 402391 1176->1177 1179 402450 1176->1179 1178 402393 1177->1178 1183 4023b8 1177->1183 1180 402397 1178->1180 1181 4023e8 1178->1181 1179->1175 1182 4023a0 1180->1182 1185 4023d0 InitializeCriticalSection 1180->1185 1184 4023f6 1181->1184 1187 402200 4 API calls 1181->1187 1182->1175 1183->1182 1190 402200 EnterCriticalSection 1183->1190 1184->1182 1188 402421 DeleteCriticalSection 1184->1188 1189 402410 free 1184->1189 1185->1182 1187->1184 1188->1182 1189->1188 1189->1189 1191 402255 LeaveCriticalSection 1190->1191 1193 402221 1190->1193 1191->1182 1192 402230 TlsGetValue GetLastError 1192->1193 1193->1191 1193->1192 1194 402050 1195 402080 signal 1194->1195 1196 402063 1194->1196 1197 402190 signal 1195->1197 1204 40209d 1195->1204 1199 40214b signal 1196->1199 1201 402100 1196->1201 1202 402076 1196->1202 1196->1204 1206 40212c 1197->1206 1198 4020c7 signal 1200 4020e0 signal 1198->1200 1198->1204 1203 4021d9 signal 1199->1203 1199->1204 1200->1206 1201->1204 1205 402107 signal 1201->1205 1202->1195 1202->1204 1203->1206 1204->1198 1204->1199 1204->1206 1205->1204 1207 4021c0 signal 1205->1207 1207->1206 1321 401114 __getmainargs 1322 401296 1328 4011da 1322->1328 1323 4012db malloc 1325 401301 1323->1325 1326 401483 1323->1326 1324 4012d6 1324->1323 1327 401310 strlen malloc memcpy 1325->1327 1330 40148b exit 1326->1330 1327->1327 1331 401346 1327->1331 1328->1323 1328->1324 1329 4013db _amsg_exit 1328->1329 1332 401460 _initterm 1328->1332 1333 4013f5 _initterm 1328->1333 1339 401d60 12 API calls 1328->1339 1345 401257 __p__acmdln 1328->1345 1329->1328 1329->1333 1334 4018e0 5 API calls 1330->1334 1335 4018a0 _onexit 1331->1335 1332->1326 1333->1328 1336 4014b2 1334->1336 1337 40135f 1335->1337 1338 40174e 12 API calls 1337->1338 1340 401386 1338->1340 1341 401231 SetUnhandledExceptionFilter 1339->1341 1340->1330 1342 401399 1340->1342 1341->1328 1343 4013a7 1342->1343 1344 401448 _cexit 1342->1344 1345->1328 1346 40109b 1347 4010a0 __set_app_type 1346->1347 1348 40107a __p__fmode 1347->1348 1349 40108c 1348->1349 1350 401095 1349->1350 1351 402040 __setusermatherr 1349->1351 1352 4010ec 1351->1352 1353 401e9b 1356 401ddf 1353->1356 1354 401c20 11 API calls 1354->1356 1355 401edd 1357 401f12 VirtualProtect 1355->1357 1360 401d75 1355->1360 1356->1354 1356->1355 1358 401bc0 11 API calls 1356->1358 1359 401f70 1356->1359 1356->1360 1362 401fc2 1356->1362 1357->1355 1358->1356 1359->1355 1359->1360 1361 401c20 11 API calls 1359->1361 1361->1359 1363 401bc0 11 API calls 1362->1363 1364 401fd2 1363->1364 1365 40199c 1366 4019a0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 1365->1366 1367 401a3c 1366->1367 1368 401a40 1367->1368 1369 402380 7 API calls 1367->1369 1370 401a68 1369->1370 1208 401160 1209 40116c 1208->1209 1210 401430 GetStartupInfoA 1209->1210 1211 401190 1209->1211 1212 401448 _cexit 1210->1212 1214 4011b0 Sleep 1211->1214 1217 4011ca 1211->1217 1213 4013db _amsg_exit 1216 4013f5 _initterm 1213->1216 1213->1217 1214->1211 1215 401460 _initterm 1218 401483 1215->1218 1216->1217 1217->1213 1217->1215 1217->1216 1219 401d60 12 API calls 1217->1219 1224 401257 __p__acmdln 1217->1224 1225 4012db malloc 1217->1225 1226 4012d6 1217->1226 1220 40148b exit 1218->1220 1221 401231 SetUnhandledExceptionFilter 1219->1221 1222 4018e0 5 API calls 1220->1222 1221->1217 1223 4014b2 1222->1223 1224->1217 1225->1218 1227 401301 1225->1227 1226->1225 1228 401310 strlen malloc memcpy 1227->1228 1228->1228 1229 401346 1228->1229 1230 4018a0 _onexit 1229->1230 1231 40135f 1230->1231 1232 40174e 12 API calls 1231->1232 1233 401386 1232->1233 1233->1220 1234 401399 1233->1234 1234->1212 1235 4013a7 1234->1235 1371 4019a0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 1372 401a3c 1371->1372 1373 401a40 1372->1373 1374 402380 7 API calls 1372->1374 1375 401a68 1374->1375 1376 4011a3 1377 4011a8 1376->1377 1378 4011b0 Sleep 1377->1378 1392 4011ca 1377->1392 1378->1377 1379 4013db _amsg_exit 1381 4013f5 _initterm 1379->1381 1379->1392 1380 401460 _initterm 1382 401483 1380->1382 1381->1392 1384 40148b exit 1382->1384 1383 401d60 12 API calls 1385 401231 SetUnhandledExceptionFilter 1383->1385 1386 4018e0 5 API calls 1384->1386 1385->1392 1387 4014b2 1386->1387 1388 401257 __p__acmdln 1388->1392 1389 4012db malloc 1389->1382 1391 401301 1389->1391 1390 4012d6 1390->1389 1393 401310 strlen malloc memcpy 1391->1393 1392->1379 1392->1380 1392->1381 1392->1383 1392->1388 1392->1389 1392->1390 1393->1393 1394 401346 1393->1394 1395 4018a0 _onexit 1394->1395 1396 40135f 1395->1396 1397 40174e 12 API calls 1396->1397 1398 401386 1397->1398 1398->1384 1399 401399 1398->1399 1400 4013a7 1399->1400 1401 401448 _cexit 1399->1401 1236 4022e5 1237 402310 EnterCriticalSection 1236->1237 1238 402301 1236->1238 1239 402350 LeaveCriticalSection 1237->1239 1240 402329 1237->1240 1240->1239 1241 402348 free 1240->1241 1241->1239 1242 401f66 1244 401f70 1242->1244 1243 401d75 1244->1243 1245 401c20 11 API calls 1244->1245 1246 401ee0 1244->1246 1245->1244 1246->1243 1247 401f12 VirtualProtect 1246->1247 1248 401f37 1246->1248 1247->1246 1402 401426 1403 401430 GetStartupInfoA 1402->1403 1404 401448 _cexit 1403->1404 1249 402367 1250 402348 free 1249->1250 1252 402350 LeaveCriticalSection 1250->1252 1253 40116c 1254 401430 GetStartupInfoA 1253->1254 1255 401190 1253->1255 1256 401448 _cexit 1254->1256 1258 4011b0 Sleep 1255->1258 1271 4011ca 1255->1271 1257 4013db _amsg_exit 1260 4013f5 _initterm 1257->1260 1257->1271 1258->1255 1259 401460 _initterm 1261 401483 1259->1261 1260->1271 1263 40148b exit 1261->1263 1262 401d60 12 API calls 1264 401231 SetUnhandledExceptionFilter 1262->1264 1265 4018e0 5 API calls 1263->1265 1264->1271 1266 4014b2 1265->1266 1267 401257 __p__acmdln 1267->1271 1268 4012db malloc 1268->1261 1270 401301 1268->1270 1269 4012d6 1269->1268 1272 401310 strlen malloc memcpy 1270->1272 1271->1257 1271->1259 1271->1260 1271->1262 1271->1267 1271->1268 1271->1269 1272->1272 1273 401346 1272->1273 1274 4018a0 _onexit 1273->1274 1275 40135f 1274->1275 1276 40174e 12 API calls 1275->1276 1277 401386 1276->1277 1277->1263 1278 401399 1277->1278 1278->1256 1279 4013a7 1278->1279 1280 401aec 1281 401af0 1280->1281 1282 402380 7 API calls 1281->1282 1283 401b0c 1282->1283 1284 402270 1285 402280 calloc 1284->1285 1286 402279 1284->1286 1287 4022db 1285->1287 1288 40229e EnterCriticalSection LeaveCriticalSection 1285->1288 1288->1287 1289 4024f0 strlen 1290 40250a 1289->1290 1291 40256a 1289->1291 1290->1291 1292 402552 strncmp 1290->1292 1292->1290 1292->1291 1405 401b30 1406 401b48 1405->1406 1407 401b73 fprintf 1406->1407 1408 401831 1409 401840 1408->1409 1412 4014e0 _onexit 1409->1412 1411 401870 1412->1411 1293 401a73 1295 401a92 1293->1295 1294 401aa6 1295->1294 1296 402380 7 API calls 1295->1296 1297 401b0c 1296->1297 1442 4023b4 1443 4023b8 1442->1443 1444 402200 4 API calls 1443->1444 1445 4023aa 1443->1445 1444->1445 1453 4020bc 1457 40209d 1453->1457 1454 4020c7 signal 1455 4020e0 signal 1454->1455 1454->1457 1459 40216c 1455->1459 1456 40214b signal 1456->1457 1458 4021d9 signal 1456->1458 1457->1454 1457->1456 1457->1459 1458->1459

Callgraph

Hide Legend
  • Executed
  • Not Executed
  • Opacity -> Relevance
  • Disassembly available
callgraph 0 Function_00402040 1 Function_00401BC0 1->1 48 Function_00402610 1->48 49 Function_00402810 1->49 50 Function_00402910 1->50 51 Function_00402590 1->51 60 Function_00401C20 1->60 63 Function_004026A0 1->63 2 Function_004014C0 18 Function_004018E0 2->18 3 Function_00402741 4 Function_00401441 5 Function_004013C1 9 Function_0040174E 5->9 14 Function_00401D60 5->14 5->18 64 Function_004018A0 5->64 72 Function_00402930 5->72 75 Function_00401BB0 5->75 6 Function_004026C4 15 Function_00402460 6->15 7 Function_004100CB 8 Function_00401A4B 38 Function_00402380 8->38 19 Function_004015E2 9->19 20 Function_00401564 9->20 45 Function_00401607 9->45 9->64 66 Function_004015A2 9->66 73 Function_00401530 9->73 10 Function_00402050 10->75 11 Function_004018D0 12 Function_00402753 12->15 13 Function_004027D7 14->1 14->48 14->49 14->60 16 Function_00401160 16->9 16->14 16->18 16->64 16->72 16->75 17 Function_004014E0 21 Function_004022E5 22 Function_00401F66 22->60 23 Function_00402367 24 Function_004105E9 25 Function_0040116C 25->9 25->14 25->18 25->64 25->72 25->75 26 Function_00401AEC 26->38 27 Function_00402270 28 Function_004024F0 28->15 29 Function_00401A73 29->38 30 Function_00402574 31 Function_00402478 32 Function_00402378 33 Function_0040217C 34 Function_0040D3FF 35 Function_00402200 36 Function_00401500 36->17 37 Function_00401800 38->35 38->75 39 Function_0040C980 40 Function_00401001 40->0 40->11 41 Function_00402603 42 Function_00402483 43 Function_00402584 44 Function_00401986 46 Function_00402308 47 Function_00402189 47->75 48->15 51->15 52 Function_00401892 53 Function_00401114 54 Function_00401514 55 Function_00401296 55->9 55->14 55->18 55->64 55->72 55->75 56 Function_00401B19 57 Function_0040109B 57->0 57->11 58 Function_00401E9B 58->1 58->60 59 Function_0040199C 59->38 60->1 60->48 60->49 60->51 60->60 60->63 61 Function_004019A0 61->38 62 Function_00402920 63->15 64->17 65 Function_00402021 66->73 67 Function_004011A3 67->9 67->14 67->18 67->64 67->72 67->75 68 Function_004024A3 69 Function_00401426 70 Function_00402926 71 Function_0040182B 74 Function_00401B30 74->50 76 Function_00401831 76->17 77 Function_00402032 78 Function_004013B3 78->9 78->14 78->18 78->64 78->72 78->75 79 Function_00401AB3 79->38 80 Function_00401FB4 81 Function_004023B4 81->35 82 Function_00402638 82->15 83 Function_0040CBB8 84 Function_0040213C 85 Function_004020BC

Executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 0 40116c-40118a 1 401430-40143c GetStartupInfoA 0->1 2 401190-4011a1 0->2 3 401448-40145d _cexit 1->3 4 4011bc-4011c8 2->4 5 4011a8-4011aa 4->5 6 4011ca-4011d4 4->6 9 4011b0-4011b9 Sleep 5->9 10 4013c8-4013d5 5->10 7 4011da-4011e1 6->7 8 4013db-4013ef _amsg_exit 6->8 11 401460-401479 _initterm 7->11 12 4011e7-4011f9 7->12 13 4013f5-401415 _initterm 8->13 14 4011ff-401201 8->14 9->4 10->7 10->8 17 401483 11->17 12->13 12->14 15 401207-40120e 13->15 16 40141b-401421 13->16 14->15 14->16 18 401210-401229 15->18 19 40122c-40126c call 401d60 SetUnhandledExceptionFilter call 402930 call 401bb0 __p__acmdln 15->19 16->15 21 40148b-4014b2 exit call 4018e0 17->21 18->19 30 401281-401287 19->30 31 40126e 19->31 32 401270-401272 30->32 33 401289-401294 30->33 34 4012bd-4012c5 31->34 38 401274-401277 32->38 39 4012b8 32->39 35 40127e 33->35 36 4012c7-4012d0 34->36 37 4012db-4012fb malloc 34->37 35->30 40 4012d6 36->40 41 4013b8-4013bc 36->41 37->17 42 401301-40130d 37->42 43 4012a0-4012a2 38->43 44 401279 38->44 39->34 40->37 41->10 41->40 46 401310-401344 strlen malloc memcpy 42->46 43->39 45 4012a4 43->45 44->35 47 4012a8-4012b1 45->47 46->46 48 401346-401393 call 4018a0 call 40174e 46->48 47->39 49 4012b3-4012b6 47->49 48->21 54 401399-4013a1 48->54 49->39 49->47 54->3 55 4013a7-4013b2 54->55
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdlnmemcpystrlen
  • String ID:
  • API String ID: 1672962128-0
  • Opcode ID: b1ee7d8352319cae9150eead45ad2cecbce749cd6f6f65bd659f45cbfef0020e
  • Instruction ID: 31d339f947e01fb693a9f7cc325f1ddaf09a3bd9e78bb49fcc57b70c4a085736
  • Opcode Fuzzy Hash: b1ee7d8352319cae9150eead45ad2cecbce749cd6f6f65bd659f45cbfef0020e
  • Instruction Fuzzy Hash: 6D819C719046008FDB10EF69DA857AE77E1FB44304F10853EE944BB3A1D779A845CF9A

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 56 4013c1 57 4013c8-4013d5 56->57 58 4011da-4011e1 57->58 59 4013db-4013ef _amsg_exit 57->59 60 401460-401479 _initterm 58->60 61 4011e7-4011f9 58->61 62 4013f5-401415 _initterm 59->62 63 4011ff-401201 59->63 66 401483 60->66 61->62 61->63 64 401207-40120e 62->64 65 40141b-401421 62->65 63->64 63->65 67 401210-401229 64->67 68 40122c-40126c call 401d60 SetUnhandledExceptionFilter call 402930 call 401bb0 __p__acmdln 64->68 65->64 70 40148b-4014ad exit call 4018e0 66->70 67->68 79 401281-401287 68->79 80 40126e 68->80 76 4014b2 70->76 81 401270-401272 79->81 82 401289-401294 79->82 83 4012bd-4012c5 80->83 87 401274-401277 81->87 88 4012b8 81->88 84 40127e 82->84 85 4012c7-4012d0 83->85 86 4012db-4012fb malloc 83->86 84->79 89 4012d6 85->89 90 4013b8-4013bc 85->90 86->66 91 401301-40130d 86->91 92 4012a0-4012a2 87->92 93 401279 87->93 88->83 89->86 90->57 90->89 95 401310-401344 strlen malloc memcpy 91->95 92->88 94 4012a4 92->94 93->84 96 4012a8-4012b1 94->96 95->95 97 401346-401381 call 4018a0 call 40174e 95->97 96->88 98 4012b3-4012b6 96->98 102 401386-401393 97->102 98->88 98->96 102->70 103 401399-4013a1 102->103 104 4013a7-4013b2 103->104 105 401448-40145d _cexit 103->105
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: malloc$ExceptionFilterUnhandled__p__acmdln_amsg_exit_inittermmemcpystrlen
  • String ID:
  • API String ID: 2053141405-0
  • Opcode ID: 00df0f6b45fa9b03f4d19803fb0ca039e6bd42b5f224ebcffffd213f371fa5bd
  • Instruction ID: 67fee7102c81470e6c36d64dad3523a64b230410408b2e3bfdc9e5343fe76f77
  • Opcode Fuzzy Hash: 00df0f6b45fa9b03f4d19803fb0ca039e6bd42b5f224ebcffffd213f371fa5bd
  • Instruction Fuzzy Hash: 804106B5A046018FDB10EF65DA8475EBBE0FB44304F10853EE984BB3A1D7789945CF9A

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 120 4011a3-4011a7 121 4011a8-4011aa 120->121 122 4011b0-4011c8 Sleep 121->122 123 4013c8-4013d5 121->123 122->121 131 4011ca-4011d4 122->131 125 4011da-4011e1 123->125 126 4013db-4013ef _amsg_exit 123->126 127 401460-401479 _initterm 125->127 128 4011e7-4011f9 125->128 129 4013f5-401415 _initterm 126->129 130 4011ff-401201 126->130 134 401483 127->134 128->129 128->130 132 401207-40120e 129->132 133 40141b-401421 129->133 130->132 130->133 131->125 131->126 135 401210-401229 132->135 136 40122c-40126c call 401d60 SetUnhandledExceptionFilter call 402930 call 401bb0 __p__acmdln 132->136 133->132 138 40148b-4014b2 exit call 4018e0 134->138 135->136 147 401281-401287 136->147 148 40126e 136->148 149 401270-401272 147->149 150 401289-401294 147->150 151 4012bd-4012c5 148->151 155 401274-401277 149->155 156 4012b8 149->156 152 40127e 150->152 153 4012c7-4012d0 151->153 154 4012db-4012fb malloc 151->154 152->147 157 4012d6 153->157 158 4013b8-4013bc 153->158 154->134 159 401301-40130d 154->159 160 4012a0-4012a2 155->160 161 401279 155->161 156->151 157->154 158->123 158->157 163 401310-401344 strlen malloc memcpy 159->163 160->156 162 4012a4 160->162 161->152 164 4012a8-4012b1 162->164 163->163 165 401346-401393 call 4018a0 call 40174e 163->165 164->156 166 4012b3-4012b6 164->166 165->138 171 401399-4013a1 165->171 166->156 166->164 172 4013a7-4013b2 171->172 173 401448-40145d _cexit 171->173
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: malloc$ExceptionFilterSleepUnhandled__p__acmdln_amsg_exit_inittermmemcpystrlen
  • String ID:
  • API String ID: 2230096795-0
  • Opcode ID: 48f9bb498974ba7f6b2b11b41656a3c6cf18e1478a1957e9b97a47c5ef3458f4
  • Instruction ID: ef795e9572295aa069d4f734ff055e90b9c036a7c352001c97976244d843facb
  • Opcode Fuzzy Hash: 48f9bb498974ba7f6b2b11b41656a3c6cf18e1478a1957e9b97a47c5ef3458f4
  • Instruction Fuzzy Hash: 324118B1A046018FEB10EF69DA8475EBBF0FB44304F10853EE944AB3A1D7789945CF9A

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 174 401160-40118a 176 401430-40143c GetStartupInfoA 174->176 177 401190-4011a1 174->177 178 401448-40145d _cexit 176->178 179 4011bc-4011c8 177->179 180 4011a8-4011aa 179->180 181 4011ca-4011d4 179->181 184 4011b0-4011b9 Sleep 180->184 185 4013c8-4013d5 180->185 182 4011da-4011e1 181->182 183 4013db-4013ef _amsg_exit 181->183 186 401460-401479 _initterm 182->186 187 4011e7-4011f9 182->187 188 4013f5-401415 _initterm 183->188 189 4011ff-401201 183->189 184->179 185->182 185->183 192 401483 186->192 187->188 187->189 190 401207-40120e 188->190 191 40141b-401421 188->191 189->190 189->191 193 401210-401229 190->193 194 40122c-40126c call 401d60 SetUnhandledExceptionFilter call 402930 call 401bb0 __p__acmdln 190->194 191->190 196 40148b-4014b2 exit call 4018e0 192->196 193->194 205 401281-401287 194->205 206 40126e 194->206 207 401270-401272 205->207 208 401289-401294 205->208 209 4012bd-4012c5 206->209 213 401274-401277 207->213 214 4012b8 207->214 210 40127e 208->210 211 4012c7-4012d0 209->211 212 4012db-4012fb malloc 209->212 210->205 215 4012d6 211->215 216 4013b8-4013bc 211->216 212->192 217 401301-40130d 212->217 218 4012a0-4012a2 213->218 219 401279 213->219 214->209 215->212 216->185 216->215 221 401310-401344 strlen malloc memcpy 217->221 218->214 220 4012a4 218->220 219->210 222 4012a8-4012b1 220->222 221->221 223 401346-401393 call 4018a0 call 40174e 221->223 222->214 224 4012b3-4012b6 222->224 223->196 229 401399-4013a1 223->229 224->214 224->222 229->178 230 4013a7-4013b2 229->230
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandled__p__acmdlnmemcpystrlen
  • String ID:
  • API String ID: 1672962128-0
  • Opcode ID: acd13347ab27ab248bced7b31e04489e1b2e15703b88c806e97055b87229361b
  • Instruction ID: e9e8a89b1c8dfa4840c54fae9af8206b258e069e7731568e9d07c10cfcf77caa
  • Opcode Fuzzy Hash: acd13347ab27ab248bced7b31e04489e1b2e15703b88c806e97055b87229361b
  • Instruction Fuzzy Hash: 225148B1A046018FDB10EFA9DA8475EBBF4FB44304F10853EE944AB3A1D7789945CF9A

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 231 401564-401582 GetSystemInfo 232 401584-401589 231->232 233 40158b-401592 231->233 236 4015a0-4015a1 232->236 234 401594-401599 233->234 235 40159b 233->235 234->236 235->236
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: InfoSystem
  • String ID: 32-bit$64-bit$Unknown
  • API String ID: 31276548-642458120
  • Opcode ID: d220fe4a6df499f89076f25f428d08403f573503201339276a5e8fef182f7ace
  • Instruction ID: 62ce7129832ecbb45d7e2a12266202d296a782548419a5a72cfcf08c8fb9f74f
  • Opcode Fuzzy Hash: d220fe4a6df499f89076f25f428d08403f573503201339276a5e8fef182f7ace
  • Instruction Fuzzy Hash: 23E0B6A49141149ACB00AB7D99455B9B2B4A684748F808433FA92FA3D0E73CD88696AA

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 106 401607-40162d WSAStartup 107 401640-401668 socket 106->107 108 40162f-40163b puts 106->108 110 401682-4016e0 connect 107->110 111 40166a-40167d puts 107->111 109 40174c-40174d 108->109 115 4016e2-4016fe puts closesocket 110->115 116 401707-401745 strlen 110->116 111->109 117 401705 115->117 116->109 117->109
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: puts$Startupsocket
  • String ID:
  • API String ID: 395126789-0
  • Opcode ID: 8fde3de2ecfb12ee71b38ca7383442b94bd7b78b0536bb60b03550daf7a61553
  • Instruction ID: 2f7336bebe8b5cee35e1adf164307ae04fbe61e37d2cdbb50ae41637a735a456
  • Opcode Fuzzy Hash: 8fde3de2ecfb12ee71b38ca7383442b94bd7b78b0536bb60b03550daf7a61553
  • Instruction Fuzzy Hash: DC31C7B4904204DFDB00FF78DA8565EBBF0AF44304F01897EE8A5E72A1D77899549F4A

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 237 401296-40129d 238 4012a0-4012a2 237->238 239 4012a4 238->239 240 4012b8 238->240 241 4012a8-4012b1 239->241 242 4012bd-4012c5 240->242 241->240 243 4012b3-4012b6 241->243 244 4012c7-4012d0 242->244 245 4012db-4012fb malloc 242->245 243->240 243->241 246 4012d6 244->246 247 4013b8-4013bc 244->247 248 401301-40130d 245->248 249 401483 245->249 246->245 247->246 251 4013c8-4013d5 247->251 250 401310-401344 strlen malloc memcpy 248->250 254 40148b-4014b2 exit call 4018e0 249->254 250->250 255 401346-401393 call 4018a0 call 40174e 250->255 252 4011da-4011e1 251->252 253 4013db-4013ef _amsg_exit 251->253 256 401460-401479 _initterm 252->256 257 4011e7-4011f9 252->257 258 4013f5-401415 _initterm 253->258 259 4011ff-401201 253->259 255->254 273 401399-4013a1 255->273 256->249 257->258 257->259 262 401207-40120e 258->262 263 40141b-401421 258->263 259->262 259->263 266 401210-401229 262->266 267 40122c-40126c call 401d60 SetUnhandledExceptionFilter call 402930 call 401bb0 __p__acmdln 262->267 263->262 266->267 280 401281-401287 267->280 281 40126e 267->281 274 4013a7-4013b2 273->274 275 401448-40145d _cexit 273->275 282 401270-401272 280->282 283 401289-401294 280->283 281->242 282->240 285 401274-401277 282->285 284 40127e 283->284 284->280 285->238 286 401279 285->286 286->284
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: malloc$memcpystrlen
  • String ID:
  • API String ID: 3553820921-0
  • Opcode ID: e3461f500282cd11525847983a2662328add1416995e3fdd5088ef0bf176da1d
  • Instruction ID: 5cb5bc42b62de7076cded7308b6661e4eaaff1c0b1d4db119d01c7bb8cfece06
  • Opcode Fuzzy Hash: e3461f500282cd11525847983a2662328add1416995e3fdd5088ef0bf176da1d
  • Instruction Fuzzy Hash: 043135B5A007018FDB20EF65DA8465EBBF1FB84304F14853ED948A7361E738A945CF89

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 287 4013b3-4013b7 288 4013b8-4013bc 287->288 289 4012d6 288->289 290 4013c8-4013d5 288->290 293 4012db-4012fb malloc 289->293 291 4011da-4011e1 290->291 292 4013db-4013ef _amsg_exit 290->292 294 401460-401479 _initterm 291->294 295 4011e7-4011f9 291->295 296 4013f5-401415 _initterm 292->296 297 4011ff-401201 292->297 298 401301-40130d 293->298 299 401483 293->299 294->299 295->296 295->297 300 401207-40120e 296->300 301 40141b-401421 296->301 297->300 297->301 302 401310-401344 strlen malloc memcpy 298->302 303 40148b-4014b2 exit call 4018e0 299->303 304 401210-401229 300->304 305 40122c-40126c call 401d60 SetUnhandledExceptionFilter call 402930 call 401bb0 __p__acmdln 300->305 301->300 302->302 306 401346-401393 call 4018a0 call 40174e 302->306 304->305 323 401281-401287 305->323 324 40126e 305->324 306->303 319 401399-4013a1 306->319 320 4013a7-4013b2 319->320 321 401448-40145d _cexit 319->321 325 401270-401272 323->325 326 401289-401294 323->326 327 4012bd-4012c5 324->327 330 401274-401277 325->330 331 4012b8 325->331 328 40127e 326->328 327->293 329 4012c7-4012d0 327->329 328->323 329->288 329->289 332 4012a0-4012a2 330->332 333 401279 330->333 331->327 332->331 334 4012a4 332->334 333->328 335 4012a8-4012b1 334->335 335->331 336 4012b3-4012b6 335->336 336->331 336->335
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: malloc$memcpystrlen
  • String ID:
  • API String ID: 3553820921-0
  • Opcode ID: 76b2ce9682316c75f2820bbc22d2d016bf35376532b5ba21952d83d7d0b6c2f4
  • Instruction ID: b91585b2c04cc7397c547903c23b4239cdfb62678f0a710de18b37565bea0cf4
  • Opcode Fuzzy Hash: 76b2ce9682316c75f2820bbc22d2d016bf35376532b5ba21952d83d7d0b6c2f4
  • Instruction Fuzzy Hash: 8721E6B5904601CFDB10EF69DA8465EB7F0FB88304B14853ED948A7361E738A945CF99

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 337 4015a2-4015e1 GetSystemInfo call 401530
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: InfoSystem
  • String ID: P@
  • API String ID: 31276548-191595318
  • Opcode ID: 5bd4bc48da887309ae7c6fbdfebc28c00f1cb0719bc3fa656270968fd98a2424
  • Instruction ID: 9e4787628a0dd11eab54821a0926a2223023c376523dede5a2f9caf6befc5a07
  • Opcode Fuzzy Hash: 5bd4bc48da887309ae7c6fbdfebc28c00f1cb0719bc3fa656270968fd98a2424
  • Instruction Fuzzy Hash: 7EE0B6B09043049FC700EF68D94A54EBBF4AB84348F40C83AE585A7390E378D4488F96

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 340 4015e2-401606 GlobalMemoryStatusEx
APIs
  • GlobalMemoryStatusEx.KERNELBASE ref: 004015FA
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: GlobalMemoryStatus
  • String ID: @
  • API String ID: 1890195054-2766056989
  • Opcode ID: 01fac1430c1cacc2cebe984f3e2806f8a970f9a57fe9608ca1b01272e7789876
  • Instruction ID: 1ae3d0658aa4b8584122034f7cb288f6f80b367b9b8ec70c680e7f07caf30c62
  • Opcode Fuzzy Hash: 01fac1430c1cacc2cebe984f3e2806f8a970f9a57fe9608ca1b01272e7789876
  • Instruction Fuzzy Hash: 77D0C9B491024C8BCB00EFB8E98598DBBF8BF44208F400124E955B7354E770E85A8B86

Non-executed Functions

Control-flow Graph

APIs
  • GetSystemTimeAsFileTime.KERNEL32 ref: 0040191F
  • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004014D2), ref: 00401930
  • GetCurrentThreadId.KERNEL32 ref: 00401938
  • GetTickCount.KERNEL32 ref: 00401940
  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004014D2), ref: 0040194F
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
  • String ID:
  • API String ID: 1445889803-0
  • Opcode ID: fc8c2d76732fc83df1ce6a6e9f6d837a77a948d5041beb6b55617d944e2dd6df
  • Instruction ID: a7979860823111bd7cca56da38f816591c8e564a5f8883184c1fa6aefdea0bea
  • Opcode Fuzzy Hash: fc8c2d76732fc83df1ce6a6e9f6d837a77a948d5041beb6b55617d944e2dd6df
  • Instruction Fuzzy Hash: 631170B59053008FC300EF79E98854BBBE5FB88365F054C3AE445D7320EA35D959CB96

Control-flow Graph

APIs
  • SetUnhandledExceptionFilter.KERNEL32 ref: 004019EF
  • UnhandledExceptionFilter.KERNEL32 ref: 004019FF
  • GetCurrentProcess.KERNEL32 ref: 00401A08
  • TerminateProcess.KERNEL32 ref: 00401A19
  • abort.MSVCRT ref: 00401A22
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
  • String ID:
  • API String ID: 520269711-0
  • Opcode ID: 913968f87ed5b583e91c67d2cfcffecc74f52b9bd08fd81f0818ed3542fcb971
  • Instruction ID: 073cd2012325d89299ac364f295ddd6bb47226e633fa073d98b0c12ecca74ebf
  • Opcode Fuzzy Hash: 913968f87ed5b583e91c67d2cfcffecc74f52b9bd08fd81f0818ed3542fcb971
  • Instruction Fuzzy Hash: C31123B49052008FC700EF69EA4860EBBF0FB48305F41853DE989AB361E37899548F8A
APIs
  • SetUnhandledExceptionFilter.KERNEL32 ref: 004019EF
  • UnhandledExceptionFilter.KERNEL32 ref: 004019FF
  • GetCurrentProcess.KERNEL32 ref: 00401A08
  • TerminateProcess.KERNEL32 ref: 00401A19
  • abort.MSVCRT ref: 00401A22
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
  • String ID:
  • API String ID: 520269711-0
  • Opcode ID: 9d5ab7050385d662649b0e4274c3265333d9074af5dcbd66b068a8a0b653aab2
  • Instruction ID: a5edbd6665176a393142217ce9ec35b91009a5cd70f4b96e1ae43536530bb9c7
  • Opcode Fuzzy Hash: 9d5ab7050385d662649b0e4274c3265333d9074af5dcbd66b068a8a0b653aab2
  • Instruction Fuzzy Hash: 771153B5801200DFD700EF79EA4864E7BF0FB08306F41843DE94AAB361E77899548F8A

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 354 401bc0-401c30 call 402910 fwrite call 402910 vfprintf abort 360 401d20-401d22 354->360 361 401c36-401c3d 354->361 363 401c5a-401c66 call 402590 360->363 362 401c40-401c44 361->362 364 401c50-401c58 362->364 365 401c46-401c4e 362->365 369 401d47-401d73 call 401bc0 363->369 370 401c6c-401cb2 call 4026a0 VirtualQuery 363->370 364->362 364->363 365->364 367 401ccf-401cd5 365->367 381 401d80-401dc9 call 402610 call 402810 369->381 382 401d75-401d7c 369->382 375 401cb4-401cbe 370->375 376 401d27-401d42 call 401bc0 370->376 378 401cc0-401cc6 375->378 379 401cc8 375->379 376->369 378->379 383 401cd6-401d08 VirtualProtect 378->383 379->367 381->382 390 401dcb-401dd4 381->390 383->379 386 401d0a-401d1b GetLastError call 401bc0 383->386 386->360 391 401e70-401e72 390->391 392 401dda 390->392 393 401f70 391->393 394 401e78-401e85 391->394 395 401ddf-401de1 392->395 396 401f75-401f7b 393->396 397 401fb8-401fbd 394->397 398 401e8b-401e96 394->398 395->396 399 401de7-401dec 395->399 396->382 400 401f81 396->400 398->395 399->396 401 401df2-401df8 399->401 402 401f88-401fad call 401c20 400->402 403 401fc2-401ff6 call 401bc0 401->403 404 401dfe-401e07 401->404 418 401faf 402->418 413 402028-40202c 403->413 414 401ff8-40201f 403->414 407 401e09 404->407 408 401e2f-401e50 404->408 407->382 410 401ea0-401ed7 call 401c20 408->410 411 401e52-401e55 408->411 410->408 430 401edd 410->430 415 401e10-401e1e call 401c20 411->415 416 401e57-401e5a 411->416 422 40202e-402031 413->422 414->422 432 401e20-401e29 415->432 420 401f40-401f61 call 401c20 416->420 421 401e60-401e6b call 401bc0 416->421 424 401ee0-401ee7 418->424 420->432 421->391 424->382 425 401eed-401ef9 424->425 431 401f00-401f10 425->431 430->424 434 401f12-401f29 VirtualProtect 431->434 435 401f2c-401f35 431->435 432->408 432->424 434->435 435->431 436 401f37-401f3e 435->436
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: Virtual$ErrorLastProtectQueryabortfwritevfprintf
  • String ID: @
  • API String ID: 1616349570-2766056989
  • Opcode ID: ecca34f98cdc65aeeca1a735f0b146d20763e9faef7609abf5221a31533d04b6
  • Instruction ID: 236e55e103048ce71270f33d734916b2187191ef9b8f6d8041716fff023a61a7
  • Opcode Fuzzy Hash: ecca34f98cdc65aeeca1a735f0b146d20763e9faef7609abf5221a31533d04b6
  • Instruction Fuzzy Hash: B8415EB15047019FD700EF69D98565BBBE0FF84354F45893EE888A73A1E738E844CB9A

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 437 402050-402061 438 402080-402097 signal 437->438 439 402063 437->439 442 402190-4021ae signal call 401bb0 438->442 443 40209d-40209f 438->443 440 4020c0-4020c5 439->440 441 402065-40206a 439->441 444 402140-402145 440->444 445 4020c7-4020de signal 440->445 447 402070 441->447 448 40214b-402162 signal 441->448 459 402182-402186 442->459 449 4021b0-4021be 443->449 450 4020a5-4020ac 443->450 444->448 444->450 445->443 451 4020e0-4020f9 signal 445->451 453 402100-402105 447->453 454 402076-40207e 447->454 455 402164-402166 448->455 456 4021d9-4021f0 signal 448->456 449->459 457 402180 450->457 458 4020b2-4020b9 450->458 451->459 453->450 460 402107-40211e signal 453->460 454->438 454->450 455->450 462 40216c-40217a 455->462 456->459 457->459 458->440 463 4021c0-4021d7 signal 460->463 464 402124-402126 460->464 462->459 463->459 464->450 465 40212c-40213a 464->465 465->459
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: signal
  • String ID:
  • API String ID: 1946981877-0
  • Opcode ID: cb8ccc5166911e1f8d0c4b5830e9c0a4dd2fbfc72a791690fbc43fca53de752e
  • Instruction ID: c4006f23d49f6398cdef7e4489ced8a44a13a1b8f75b12636761a7417a4f511c
  • Opcode Fuzzy Hash: cb8ccc5166911e1f8d0c4b5830e9c0a4dd2fbfc72a791690fbc43fca53de752e
  • Instruction Fuzzy Hash: BF31EFB05043019AE7106F758A4C32B76D0BB45328F554B2FEAE8AA3D1CBFD8984975B
APIs
  • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,004023CB,?,?,?,?,?,00401A68), ref: 0040220E
  • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,004023CB,?,?,?,?,?,00401A68), ref: 00402235
  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,004023CB,?,?,?,?,?,00401A68), ref: 0040223C
  • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,004023CB,?,?,?,?,?,00401A68), ref: 0040225C
Memory Dump Source
  • Source File: 00000000.00000002.1221552620.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
  • Associated: 00000000.00000002.1221538281.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221573936.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221589712.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1221602304.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
Similarity
  • API ID: CriticalSection$EnterErrorLastLeaveValue
  • String ID:
  • API String ID: 682475483-0
  • Opcode ID: e1e3b316b4aa3560c6e44db3fbfadc5d62f60003180bfd34d7f43d5b58e88eba
  • Instruction ID: ccc19a43c5a5876d2525a8681ce01f410aff69457d79c607b1565b06db7da662
  • Opcode Fuzzy Hash: e1e3b316b4aa3560c6e44db3fbfadc5d62f60003180bfd34d7f43d5b58e88eba
  • Instruction Fuzzy Hash: F9F0F4715006108BD7107FB8EE8861B7BB8FA44300B06407DDD857B355D738A855CBAA