Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1501455
MD5:8ef3231a2184f8e55fe3656d01f21075
SHA1:0dba37c84d8a65d3cce20548ef68663c3a498008
SHA256:0cd7337379f60570ecc65298ffddb43bb5a0eb93300b83906c38b741725c974d
Infos:

Detection

BlackSuit
Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected BlackSuit Ransomware
Deletes shadow drive data (may be related to ransomware)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Program does not show much activity (idle)
Uses 32bit PE files

Classification

  • System is w10x64
  • file.exe (PID: 6592 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 8EF3231A2184F8E55FE3656D01F21075)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 6592JoeSecurity_BlackSuitYara detected BlackSuit RansomwareJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeAvira: detected
    Source: C:\Users\user\Desktop\file.exeCode function: -----BEGIN RSA PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA42b6yev524etcti9MBEdY1cgr2ybNMRDHyZZHpV0nTpWeVFCtgSMoUDKuaY5DJzru65IkZyoQWqP6n78pbLnCFxB7+JJ3jeb1aZDfDpnPnY81u+h+1jVbcL0qo8PMPIDbkRcOsu7hCi76++HvACKxHeThbue6rHprDZ5HcOZnNpEb8Mihl3q2/sidy0_2_0100AB60
    Source: C:\Users\user\Desktop\file.exeCode function: -----BEGIN RSA PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA42b6yev524etcti9MBEdY1cgr2ybNMRDHyZZHpV0nTpWeVFCtgSMoUDKuaY5DJzru65IkZyoQWqP6n78pbLnCFxB7+JJ3jeb1aZDfDpnPnY81u+h+1jVbcL0qo8PMPIDbkRcOsu7hCi76++HvACKxHeThbue6rHprDZ5HcOZnNpEb8Mihl3q2/sidy0_2_0100AB60
    Source: file.exeBinary or memory string: -----BEGIN RSA PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA42b6yev524etcti9MBEdY1cgr2ybNMRDHyZZHpV0nTpWeVFCtgSMoUDKuaY5DJzru65IkZyoQWqP6n78pbLnCFxB7+JJ3jeb1aZDfDpnPnY81u+h+1jVbcL0qo8PMPIDbkRcOsu7hCi76++HvACKxHeThbue6rHprDZ5HcOZnNpEb8Mihl3q2/sidy
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

    Spam, unwanted Advertisements and Ransom Demands

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6592, type: MEMORYSTR
    Source: file.exe, 00000000.00000002.1661517890.0000000002D4D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: cmd.exe /c vssadmin delete shadows /all /quietD
    Source: file.exe, 00000000.00000002.1661517890.0000000002D4D000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: cmd.exe /c vssadmin delete shadows /all /quietX
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010070300_2_01007030
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01007FC00_2_01007FC0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_010018C00_2_010018C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_01008BD00_2_01008BD0
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal60.rans.winEXE@1/0@0/0
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
    Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0100B110 GetProcessHeap,HeapFree,0_2_0100B110
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services11
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    File Deletion
    LSASS Memory1
    System Information Discovery
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    SourceDetectionScannerLabelLink
    file.exe100%AviraTR/Dropper.Gen
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1501455
    Start date and time:2024-08-30 00:06:29 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 1m 30s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:1
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:file.exe
    Detection:MAL
    Classification:mal60.rans.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 5
    • Number of non-executed functions: 11
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    • VT rate limit hit for: file.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.170566055977904
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:file.exe
    File size:68'608 bytes
    MD5:8ef3231a2184f8e55fe3656d01f21075
    SHA1:0dba37c84d8a65d3cce20548ef68663c3a498008
    SHA256:0cd7337379f60570ecc65298ffddb43bb5a0eb93300b83906c38b741725c974d
    SHA512:28f201b85f7f6518f2348ed4b0b7936be03c6f9530320da3af76a8bf39b730a6333a0c4561ce3baed7b5dcba33a689d00fbeddd0d39147ade02f8ee5b3256b7b
    SSDEEP:1536:wZfowJIzIhKOmZ6dpa80BN0WryYpwDZ9kVy+E1kpIE:Z4IzEZmAp0BNjrcZKcu7
    TLSH:03637C01D89ED0F0F29219F4795E862244F66C2553AE1EF363909F139AB3AD0FD3666C
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................;.................................!.............Rich....................PE..L....%.f...............$...........
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x406690
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x668925E4 [Sat Jul 6 11:09:24 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:ecc488e51fbb2e01a7aac2b35d5f10bd
    Instruction
    call 00007F9E00B71600h
    retn 0010h
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    push 00000000h
    push dword ptr [esp+08h]
    call 00007F9E00B763AAh
    add esp, 08h
    ret
    int3
    push esi
    mov esi, dword ptr [esp+08h]
    push dword ptr [esi]
    call 00007F9E00B76399h
    push 00000000h
    push esi
    call 00007F9E00B76391h
    add esp, 0Ch
    pop esi
    ret
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    sub esp, 1Ch
    push ebx
    push ebp
    mov ebp, dword ptr [00455C94h]
    push esi
    push edi
    test ebp, ebp
    jne 00007F9E00B71958h
    mov edx, 004066A0h
    call 00007F9E00B7142Ah
    mov ebp, eax
    mov dword ptr [00455C94h], ebp
    test ebp, ebp
    je 00007F9E00B71961h
    cmp dword ptr [ebp+04h], 00000000h
    je 00007F9E00B7195Bh
    mov ecx, ebp
    call 00007F9E00B714D1h
    mov edx, 004066A0h
    call 00007F9E00B71407h
    mov ebp, eax
    mov dword ptr [00455C94h], ebp
    push 00000118h
    mov dword ptr [esp+20h], 00000118h
    call 00007F9E00B7630Dh
    mov esi, eax
    add esp, 04h
    mov dword ptr [esp+20h], esi
    test esi, esi
    je 00007F9E00B719BFh
    mov edx, 00000013h
    push 0000F050h
    push 49336547h
    lea ecx, dword ptr [edx-0Dh]
    call 00007F9E00B6D9D9h
    add esp, 08h
    lea ecx, dword ptr [esp+1Ch]
    push 00000000h
    push ecx
    push esi
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1169c0x64.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x570000x1e8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000x2c0.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0xea2c0x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0xe0000x70.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000xc4ba0xc600b515775d07b9c4b67bf02d3373400cf9False0.5116003787878788data6.244303927533799IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0xe0000x38fc0x3a00c67e0ca067d5e26e1bd89856bf4f4f91False0.49212015086206895data5.515155570891862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x120000x43ef00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .CRT0x560000x180x200fb17f86eeadcc21b5a95b49cd91cac97False0.060546875MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "@"0.2797047950073886IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x570000x1e80x200ac3199c3f5c2959d8efbd1d6f1cbe96fFalse0.529296875data4.728472067285766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x580000x2c00x400854346813db8fc74ad68ea4f1533d793False0.6240234375data4.770355989687143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x570600x181XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5922077922077922
    DLLImport
    KERNEL32.dllMultiByteToWideChar, EnterCriticalSection, lstrlenW, WaitForMultipleObjects, LeaveCriticalSection, InitializeCriticalSection, FindClose, GetLastError, TerminateThread, WideCharToMultiByte, ExitProcess, lstrcatW, lstrcpyW, LocalFree, HeapFree, SetLastError, HeapAlloc, GetProcessHeap
    USER32.dllCharLowerW
    SHLWAPI.dllStrCmpNIW, StrCpyNW
    WS2_32.dllhtons, WSAGetLastError
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:18:07:18
    Start date:29/08/2024
    Path:C:\Users\user\Desktop\file.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\file.exe"
    Imagebase:0x1000000
    File size:68'608 bytes
    MD5 hash:8EF3231A2184F8E55FE3656D01F21075
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:3.3%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:11.4%
      Total number of Nodes:787
      Total number of Limit Nodes:2
      execution_graph 3019 1001200 3020 100120f 3019->3020 3024 1001224 3019->3024 3021 10023e0 2 API calls 3020->3021 3022 1001214 3021->3022 3023 1002630 7 API calls 3022->3023 3023->3024 3025 1003040 3026 1003ae0 3025->3026 3027 10027e0 7 API calls 3026->3027 3044 1003b18 3027->3044 3028 1004382 3029 1003c71 LeaveCriticalSection 3029->3044 3030 1003c5f LeaveCriticalSection 3030->3044 3032 1003ca1 LeaveCriticalSection 3032->3044 3033 100430e LeaveCriticalSection 3033->3044 3035 1003e95 LeaveCriticalSection 3035->3044 3037 1003eb8 LeaveCriticalSection 3037->3044 3038 1001d30 9 API calls 3039 1003ecf LeaveCriticalSection 3038->3039 3039->3044 3041 10027e0 7 API calls 3041->3044 3042 100b0f0 GetProcessHeap HeapAlloc 3042->3044 3043 1001d30 9 API calls 3043->3044 3044->3028 3044->3029 3044->3030 3044->3032 3044->3033 3044->3038 3044->3041 3044->3042 3044->3043 3045 100b110 GetProcessHeap HeapFree 3044->3045 3046 1001d30 3044->3046 3058 1004ed0 3044->3058 3072 1005050 3044->3072 3094 1001f50 3044->3094 3045->3044 3047 1001d3d 3046->3047 3048 1001d58 3046->3048 3047->3048 3052 10027e0 7 API calls 3047->3052 3049 1001d78 3048->3049 3114 100b110 GetProcessHeap HeapFree 3048->3114 3051 1001d8b 3049->3051 3116 100b110 GetProcessHeap HeapFree 3049->3116 3056 10027e0 7 API calls 3051->3056 3057 1001daf 3051->3057 3052->3048 3053 1001d6d 3115 100b110 GetProcessHeap HeapFree 3053->3115 3056->3057 3057->3032 3059 1004ee7 3058->3059 3062 1005029 3058->3062 3060 1004ffe 3059->3060 3064 1004ef0 3059->3064 3061 10027e0 7 API calls 3060->3061 3061->3062 3062->3035 3063 10027e0 7 API calls 3065 1004fad 3063->3065 3064->3063 3065->3062 3066 1004fc2 GetLastError 3065->3066 3066->3062 3067 1004fcf 3066->3067 3067->3062 3117 1006150 3067->3117 3073 1005068 3072->3073 3090 1005455 3072->3090 3074 1005344 3073->3074 3079 10027e0 7 API calls 3073->3079 3075 1005360 3074->3075 3076 10053ea 3074->3076 3078 10027e0 7 API calls 3075->3078 3077 10027e0 7 API calls 3076->3077 3080 1005410 3077->3080 3081 1005375 3078->3081 3082 10052de 3079->3082 3083 1005431 3080->3083 3125 100b0f0 GetProcessHeap HeapAlloc 3080->3125 3084 10027e0 7 API calls 3081->3084 3085 10027e0 7 API calls 3082->3085 3088 10027e0 7 API calls 3083->3088 3087 100539f 3084->3087 3089 100531d 3085->3089 3091 10053c4 3087->3091 3093 10027e0 7 API calls 3087->3093 3088->3090 3089->3074 3092 10027e0 7 API calls 3089->3092 3090->3037 3091->3037 3092->3074 3093->3091 3095 10027e0 7 API calls 3094->3095 3096 1001f76 3095->3096 3097 1002161 3096->3097 3098 10027e0 7 API calls 3096->3098 3097->3044 3099 1001fa1 3098->3099 3099->3097 3100 10027e0 7 API calls 3099->3100 3101 1001fec 3100->3101 3101->3097 3102 10027e0 7 API calls 3101->3102 3103 1002039 3102->3103 3103->3097 3104 10027e0 7 API calls 3103->3104 3106 100206f 3103->3106 3104->3106 3106->3097 3126 100ab60 3106->3126 3107 10020f3 3110 10027e0 7 API calls 3107->3110 3108 10020b1 3108->3107 3109 1002200 2 API calls 3108->3109 3109->3107 3111 1002131 3110->3111 3151 100b110 GetProcessHeap HeapFree 3111->3151 3113 1002151 3113->3044 3114->3053 3115->3049 3116->3051 3118 1004fef 3117->3118 3119 1006159 3117->3119 3121 1002250 3118->3121 3124 100b0f0 GetProcessHeap HeapAlloc 3119->3124 3122 10027e0 7 API calls 3121->3122 3123 1002274 3122->3123 3123->3035 3124->3118 3125->3083 3127 10027e0 7 API calls 3126->3127 3128 100abe0 3127->3128 3129 100ad99 3128->3129 3152 100b0f0 GetProcessHeap HeapAlloc 3128->3152 3131 100adb0 10 API calls 3129->3131 3133 100ada5 3131->3133 3132 100ac0a 3134 10027e0 7 API calls 3132->3134 3133->3108 3135 100ac2a 3134->3135 3135->3129 3136 10027e0 7 API calls 3135->3136 3137 100ac69 3136->3137 3137->3129 3138 10027e0 7 API calls 3137->3138 3139 100aca7 3138->3139 3139->3129 3140 10027e0 7 API calls 3139->3140 3141 100ace3 3140->3141 3141->3129 3142 10027e0 7 API calls 3141->3142 3143 100ad14 3142->3143 3143->3129 3153 100b0f0 GetProcessHeap HeapAlloc 3143->3153 3145 100ad36 3146 10027e0 7 API calls 3145->3146 3147 100ad6b 3146->3147 3147->3129 3148 100ad82 3147->3148 3154 100adb0 3148->3154 3151->3113 3152->3132 3153->3145 3155 100adc2 3154->3155 3156 100add9 3154->3156 3157 10027e0 7 API calls 3155->3157 3158 10027e0 7 API calls 3156->3158 3162 100adff 3156->3162 3157->3156 3158->3162 3160 100ae22 LocalFree 3161 100ad8f 3160->3161 3161->3108 3163 100ae16 3162->3163 3164 100b110 GetProcessHeap HeapFree 3162->3164 3163->3160 3163->3161 3164->3163 3165 100cb40 3166 100cb80 3165->3166 3167 100cb53 3165->3167 3168 100cbb2 3166->3168 3171 100b110 GetProcessHeap HeapFree 3166->3171 3167->3166 3169 10027e0 7 API calls 3167->3169 3169->3166 3171->3168 3172 100d440 3173 100d461 3172->3173 3174 100d44b 3172->3174 3178 100b110 GetProcessHeap HeapFree 3174->3178 3176 100d456 3179 100b110 GetProcessHeap HeapFree 3176->3179 3178->3176 3179->3173 3180 1003580 3181 1003589 3180->3181 3182 100358f 3180->3182 3183 10060d0 2 API calls 3182->3183 3184 1003594 3183->3184 3189 1004660 3184->3189 3188 10035a2 3217 10043a0 3189->3217 3191 100467c 3236 100b0f0 GetProcessHeap HeapAlloc 3191->3236 3193 1004685 3194 1004692 3193->3194 3237 100b0f0 GetProcessHeap HeapAlloc 3193->3237 3239 100b0f0 GetProcessHeap HeapAlloc 3194->3239 3197 10046a1 3197->3194 3238 100b110 GetProcessHeap HeapFree 3197->3238 3199 100481d 3200 1006290 2 API calls 3199->3200 3201 100359c 3200->3201 3216 100b110 GetProcessHeap HeapFree 3201->3216 3202 10027e0 7 API calls 3203 10046e9 3202->3203 3203->3199 3203->3202 3208 10048e0 3203->3208 3205 10027e0 7 API calls 3205->3208 3207 100b0f0 GetProcessHeap HeapAlloc 3207->3208 3208->3205 3208->3207 3209 1004a1c 3208->3209 3210 10043a0 9 API calls 3208->3210 3240 1007030 3208->3240 3276 1004aa0 3208->3276 3244 100c210 3209->3244 3210->3208 3212 1004a22 3275 100b110 GetProcessHeap HeapFree 3212->3275 3215 1004a2b FindClose 3216->3188 3218 10043bb 3217->3218 3336 100b0f0 GetProcessHeap HeapAlloc 3218->3336 3220 10043f3 3221 10043fe 3220->3221 3222 1004545 3220->3222 3223 100442e 3220->3223 3221->3191 3226 10027e0 7 API calls 3222->3226 3224 1004520 3223->3224 3225 1004439 3223->3225 3227 10027e0 7 API calls 3224->3227 3229 10027e0 7 API calls 3225->3229 3228 10045d3 3226->3228 3234 1004511 3227->3234 3231 10027e0 7 API calls 3228->3231 3230 10044eb 3229->3230 3233 10027e0 7 API calls 3230->3233 3231->3234 3232 100463d 3232->3191 3233->3234 3234->3232 3235 10027e0 7 API calls 3234->3235 3235->3232 3236->3193 3237->3197 3238->3194 3239->3203 3242 10070a8 3240->3242 3241 10027e0 7 API calls 3241->3242 3242->3241 3243 1007f9e 3242->3243 3243->3208 3245 10027e0 7 API calls 3244->3245 3246 100c233 3245->3246 3337 100b0f0 GetProcessHeap HeapAlloc 3246->3337 3248 100c277 3249 10027e0 7 API calls 3248->3249 3274 100c289 3248->3274 3250 100c2bb 3249->3250 3251 10027e0 7 API calls 3250->3251 3252 100c84c 3251->3252 3253 10027e0 7 API calls 3252->3253 3254 100c88b 3253->3254 3255 1002200 2 API calls 3254->3255 3254->3274 3256 100c909 3255->3256 3338 100aae0 3256->3338 3259 1002200 2 API calls 3260 100c939 3259->3260 3261 10027e0 7 API calls 3260->3261 3262 100c967 3261->3262 3263 1002200 2 API calls 3262->3263 3262->3274 3264 100c9a8 3263->3264 3265 1002200 2 API calls 3264->3265 3264->3274 3266 100c9cc 3265->3266 3267 10027e0 7 API calls 3266->3267 3268 100c9f2 3267->3268 3269 1002200 2 API calls 3268->3269 3268->3274 3270 100ca36 3269->3270 3271 10027e0 7 API calls 3270->3271 3272 100ca65 3271->3272 3273 10027e0 7 API calls 3272->3273 3272->3274 3273->3274 3274->3212 3275->3215 3277 1004ab0 3276->3277 3280 1004aba 3276->3280 3343 100b0f0 GetProcessHeap HeapAlloc 3277->3343 3344 1007fc0 3280->3344 3282 1004ebd 3282->3208 3283 10027e0 7 API calls 3284 1004b0f 3283->3284 3285 1004b26 3284->3285 3287 1004b21 3284->3287 3288 1004b32 3284->3288 3285->3282 3286 10027e0 7 API calls 3285->3286 3290 1004b61 3286->3290 3291 1002200 2 API calls 3287->3291 3289 1002200 2 API calls 3288->3289 3292 1004b37 3289->3292 3294 10027e0 7 API calls 3290->3294 3291->3285 3348 1008bd0 3292->3348 3295 1004b88 3294->3295 3354 100b0f0 GetProcessHeap HeapAlloc 3295->3354 3297 1004bad 3297->3282 3298 10027e0 7 API calls 3297->3298 3299 1004bdf 3298->3299 3300 10027e0 7 API calls 3299->3300 3301 1004c1a 3300->3301 3301->3282 3302 10027e0 7 API calls 3301->3302 3303 1004c4a 3302->3303 3304 10027e0 7 API calls 3303->3304 3306 1004c68 3304->3306 3305 1004c94 3307 10027e0 7 API calls 3305->3307 3310 1004e8f 3305->3310 3306->3305 3308 10027e0 7 API calls 3306->3308 3309 1004cda 3307->3309 3308->3305 3309->3310 3317 1004d30 3309->3317 3322 1004d89 3309->3322 3355 100b0f0 GetProcessHeap HeapAlloc 3309->3355 3444 100b110 GetProcessHeap HeapFree 3310->3444 3312 1004d60 3356 100bb20 3312->3356 3313 1004d69 3393 100b740 3313->3393 3316 1004e99 3316->3208 3317->3312 3317->3313 3319 1004d67 3320 10027e0 7 API calls 3319->3320 3320->3322 3321 1004e1e 3324 10027e0 7 API calls 3321->3324 3322->3310 3322->3321 3414 100b0f0 GetProcessHeap HeapAlloc 3322->3414 3325 1004e45 3324->3325 3415 100ae40 3325->3415 3329 1004e84 3330 1004ea6 3329->3330 3331 1004e88 3329->3331 3332 1006150 2 API calls 3330->3332 3333 1001d30 9 API calls 3331->3333 3334 1004eb5 3332->3334 3333->3310 3335 1002250 7 API calls 3334->3335 3335->3282 3336->3220 3337->3248 3339 100aaed 3338->3339 3341 100aaf8 3338->3341 3342 100b0f0 GetProcessHeap HeapAlloc 3339->3342 3341->3259 3341->3274 3342->3341 3343->3280 3346 1008060 3344->3346 3345 10027e0 7 API calls 3345->3346 3346->3345 3347 1004af0 3346->3347 3347->3282 3347->3283 3349 1008c16 3348->3349 3350 10027e0 7 API calls 3349->3350 3351 100aa64 3350->3351 3352 10027e0 7 API calls 3351->3352 3353 100aabe 3351->3353 3352->3351 3353->3285 3354->3297 3355->3317 3357 100bb4a 3356->3357 3358 10027e0 7 API calls 3357->3358 3359 100bb64 3358->3359 3360 100c1c3 3359->3360 3361 10027e0 7 API calls 3359->3361 3360->3319 3362 100bb9d 3361->3362 3362->3360 3363 10027e0 7 API calls 3362->3363 3365 100bbe5 3363->3365 3364 100c1a3 3366 10027e0 7 API calls 3364->3366 3365->3364 3445 100b0f0 GetProcessHeap HeapAlloc 3365->3445 3366->3360 3368 100bc29 3368->3364 3369 10027e0 7 API calls 3368->3369 3372 100bc5b 3369->3372 3370 100c19a 3448 100b110 GetProcessHeap HeapFree 3370->3448 3372->3370 3373 10027e0 7 API calls 3372->3373 3374 100bd72 3373->3374 3375 10027e0 7 API calls 3374->3375 3392 100bd82 3374->3392 3387 100bdab 3375->3387 3376 100c136 3377 10027e0 7 API calls 3376->3377 3378 100c151 3377->3378 3447 100b110 GetProcessHeap HeapFree 3378->3447 3379 100bdc2 3380 10027e0 7 API calls 3379->3380 3380->3392 3382 100c166 3384 10027e0 7 API calls 3382->3384 3386 100c184 3384->3386 3385 100b110 GetProcessHeap HeapFree 3385->3392 3386->3319 3387->3379 3388 100be2f 3387->3388 3390 10027e0 7 API calls 3387->3390 3389 10027e0 7 API calls 3388->3389 3389->3392 3390->3387 3391 10027e0 7 API calls 3391->3392 3392->3370 3392->3376 3392->3385 3392->3391 3446 100b0f0 GetProcessHeap HeapAlloc 3392->3446 3398 100b756 3393->3398 3396 100b8e5 3396->3319 3397 10027e0 7 API calls 3397->3398 3398->3396 3398->3397 3399 100b7c6 3398->3399 3401 100b8d7 3398->3401 3449 100b110 GetProcessHeap HeapFree 3398->3449 3450 100b0f0 GetProcessHeap HeapAlloc 3398->3450 3451 100b0f0 GetProcessHeap HeapAlloc 3399->3451 3401->3396 3471 100b110 GetProcessHeap HeapFree 3401->3471 3402 100b7db 3452 100b0f0 GetProcessHeap HeapAlloc 3402->3452 3405 100b8ce 3463 100d220 3405->3463 3407 100b8c5 3453 100d1a0 3407->3453 3409 100b0f0 GetProcessHeap HeapAlloc 3411 100b7ec 3409->3411 3410 100d1a0 9 API calls 3410->3411 3411->3401 3411->3405 3411->3407 3411->3409 3411->3410 3412 10027e0 7 API calls 3411->3412 3472 100b400 3411->3472 3412->3411 3414->3321 3416 100ae50 3415->3416 3422 1004e58 3415->3422 3417 10027e0 7 API calls 3416->3417 3418 100b07e 3417->3418 3419 10027e0 7 API calls 3418->3419 3420 100b0b1 3419->3420 3421 10027e0 7 API calls 3420->3421 3420->3422 3421->3422 3423 10018c0 3422->3423 3424 10027e0 7 API calls 3423->3424 3426 10018f0 3424->3426 3425 1001d19 3425->3329 3426->3425 3427 10019e4 3426->3427 3428 100192e 3426->3428 3430 1002200 2 API calls 3427->3430 3429 1002200 2 API calls 3428->3429 3431 1001933 3429->3431 3432 10019e9 3430->3432 3434 1002200 2 API calls 3431->3434 3442 1001942 __aulldiv __aullrem 3431->3442 3433 1002200 2 API calls 3432->3433 3432->3442 3433->3442 3434->3442 3436 1001be6 3436->3425 3504 100b0f0 GetProcessHeap HeapAlloc 3436->3504 3438 1001bfa 3439 10027e0 7 API calls 3438->3439 3440 1001cbe 3439->3440 3441 10027e0 7 API calls 3440->3441 3443 1001cef 3441->3443 3503 100b0f0 GetProcessHeap HeapAlloc 3442->3503 3443->3329 3444->3316 3445->3368 3446->3392 3447->3382 3448->3364 3449->3398 3450->3398 3451->3402 3452->3411 3454 100d1ab 3453->3454 3457 100d1b1 3453->3457 3498 100b110 GetProcessHeap HeapFree 3454->3498 3458 100d1cb 3457->3458 3499 100b110 GetProcessHeap HeapFree 3457->3499 3461 100d1e6 3458->3461 3500 100b110 GetProcessHeap HeapFree 3458->3500 3460 100d212 3460->3405 3461->3460 3462 10027e0 7 API calls 3461->3462 3462->3460 3464 100d234 3463->3464 3469 100d23a 3463->3469 3501 100b110 GetProcessHeap HeapFree 3464->3501 3466 100d285 3466->3401 3467 10027e0 7 API calls 3467->3469 3468 100d27b 3502 100b110 GetProcessHeap HeapFree 3468->3502 3469->3466 3469->3467 3469->3468 3471->3396 3473 10027e0 7 API calls 3472->3473 3474 100b42d 3473->3474 3475 100b6d3 3474->3475 3476 10027e0 7 API calls 3474->3476 3477 100b702 3475->3477 3479 10027e0 7 API calls 3475->3479 3481 100b46b 3476->3481 3478 100b728 3477->3478 3480 10027e0 7 API calls 3477->3480 3478->3411 3479->3477 3480->3478 3481->3475 3482 10027e0 7 API calls 3481->3482 3483 100b4cb 3482->3483 3484 100b510 3483->3484 3485 100b4e7 3483->3485 3487 100b541 SetLastError 3484->3487 3488 100b523 SetLastError 3484->3488 3486 10027e0 7 API calls 3485->3486 3489 100b4fe SetLastError 3486->3489 3491 100b54f 3487->3491 3488->3491 3489->3475 3491->3475 3492 10027e0 7 API calls 3491->3492 3494 100b595 3492->3494 3493 10027e0 7 API calls 3493->3494 3494->3475 3494->3493 3495 100b656 StrCmpNIW 3494->3495 3496 100b67d StrCpyNW 3494->3496 3495->3494 3497 10027e0 7 API calls 3496->3497 3497->3494 3498->3457 3499->3458 3500->3461 3501->3469 3502->3466 3503->3436 3504->3438 3542 1003020 3545 10035b0 3542->3545 3544 100302a 3546 100360a 3545->3546 3550 10035d4 3545->3550 3547 10035f4 3546->3547 3548 1006170 4 API calls 3546->3548 3547->3544 3549 100361f 3548->3549 3552 10027e0 7 API calls 3549->3552 3551 1004660 17 API calls 3550->3551 3551->3547 3553 1003636 3552->3553 3553->3547 3564 100b0f0 GetProcessHeap HeapAlloc 3553->3564 3555 100365b 3555->3547 3556 10027e0 7 API calls 3555->3556 3558 100367f 3556->3558 3557 10027e0 7 API calls 3557->3558 3558->3547 3558->3557 3560 1003780 3558->3560 3563 1006170 4 API calls 3558->3563 3565 100b0f0 GetProcessHeap HeapAlloc 3558->3565 3566 100b110 GetProcessHeap HeapFree 3560->3566 3562 1003789 WaitForMultipleObjects 3562->3544 3563->3558 3564->3555 3565->3558 3566->3562 3567 10066a0 3570 100b110 GetProcessHeap HeapFree 3567->3570 3569 10066ab 3570->3569 2666 1006690 2669 1006350 2666->2669 2695 100b140 2669->2695 2671 1006362 2744 10027e0 2671->2744 2673 10064cc CreateMutexW 2674 1006616 2673->2674 2675 10064ed 2673->2675 2677 10027e0 7 API calls 2674->2677 2676 10027e0 7 API calls 2675->2676 2679 100651b 2676->2679 2678 100662d CreateThread 2677->2678 2680 1006646 2678->2680 3003 100cf40 2678->3003 2679->2674 2681 100660c 2679->2681 2687 10027e0 7 API calls 2679->2687 2755 10060d0 2680->2755 2683 100664f 2684 10060d0 2 API calls 2683->2684 2685 1006660 2684->2685 2763 1003060 2685->2763 2687->2679 2688 1006667 2689 1006673 2688->2689 2690 100666b ExitProcess 2688->2690 2691 10060d0 2 API calls 2689->2691 2692 1006678 2691->2692 2824 1005f20 2692->2824 2697 100b161 2695->2697 2696 100b271 2698 100b291 2696->2698 2700 100b29a 2696->2700 2701 100b2f8 2696->2701 2697->2696 2703 10027e0 7 API calls 2697->2703 2699 100b296 2698->2699 2698->2700 2706 100b313 2699->2706 2707 100b2ff 2699->2707 2704 100b2a3 2700->2704 2705 100b2e9 2700->2705 2701->2699 2702 100b330 2701->2702 2709 100b335 2702->2709 2710 100b39c 2702->2710 2708 100b21f 2703->2708 2836 100b0f0 GetProcessHeap HeapAlloc 2704->2836 2705->2671 2713 100b3e2 2706->2713 2721 1002200 2 API calls 2706->2721 2837 1002200 2707->2837 2736 10027e0 7 API calls 2708->2736 2737 100b245 2708->2737 2714 100b351 2709->2714 2715 100b33d 2709->2715 2716 100b3db 2710->2716 2723 100b3a9 2710->2723 2713->2671 2718 100b356 2714->2718 2719 100b36a 2714->2719 2722 1002200 2 API calls 2715->2722 2716->2713 2730 1002200 2 API calls 2716->2730 2717 100b2ad 2717->2671 2717->2705 2727 1002200 2 API calls 2718->2727 2728 100b383 2719->2728 2729 100b36f 2719->2729 2731 100b321 2721->2731 2724 100b342 2722->2724 2725 100b3b3 2723->2725 2726 100b3c7 2723->2726 2724->2671 2732 1002200 2 API calls 2725->2732 2733 1002200 2 API calls 2726->2733 2734 100b35b 2727->2734 2728->2713 2742 1002200 2 API calls 2728->2742 2735 1002200 2 API calls 2729->2735 2730->2713 2731->2671 2738 100b3b8 2732->2738 2739 100b3cc 2733->2739 2734->2671 2741 100b374 2735->2741 2736->2737 2740 10027e0 7 API calls 2737->2740 2738->2671 2739->2671 2740->2696 2741->2671 2743 100b38d 2742->2743 2743->2671 2745 1002800 2744->2745 2754 1002dde 2744->2754 2746 1002805 2745->2746 2753 100280f 2745->2753 2842 10023e0 2746->2842 2748 100280a 2846 1002630 2748->2846 2749 10027e0 6 API calls 2751 1002dbb LoadLibraryA 2749->2751 2751->2748 2753->2749 2753->2754 2754->2673 2756 1006145 2755->2756 2757 10060d9 2755->2757 2756->2683 2863 100b0f0 GetProcessHeap HeapAlloc 2757->2863 2759 10060e4 2760 100613a 2759->2760 2864 100b0f0 GetProcessHeap HeapAlloc 2759->2864 2760->2756 2762 1006113 2762->2683 2865 1005600 2763->2865 2766 1003568 2766->2688 2768 1003083 2891 1005470 2768->2891 2770 100308a 2901 1005950 2770->2901 2772 100308f 2773 10027e0 7 API calls 2772->2773 2780 10030bd 2773->2780 2774 100319c 2775 10031f0 InitializeCriticalSection 2774->2775 2775->2775 2776 1003207 2775->2776 2913 1001250 2776->2913 2778 10027e0 7 API calls 2778->2780 2780->2774 2780->2778 2783 100319e 2780->2783 2781 10027e0 7 API calls 2782 100322a 2781->2782 2782->2766 2786 100325a 2782->2786 2787 100324b 2782->2787 2783->2774 2784 10031a7 2783->2784 2912 100b0f0 GetProcessHeap HeapAlloc 2784->2912 2790 10027e0 7 API calls 2786->2790 2919 100b0f0 GetProcessHeap HeapAlloc 2787->2919 2788 10031b1 2788->2774 2802 100328d 2790->2802 2791 1003252 2791->2786 2792 1003319 2792->2766 2794 1003331 2792->2794 2795 1003365 2792->2795 2793 10027e0 7 API calls 2793->2802 2928 100b0f0 GetProcessHeap HeapAlloc 2794->2928 2797 1003382 2795->2797 2800 10027e0 7 API calls 2795->2800 2798 10033a1 2797->2798 2806 10033d5 2797->2806 2929 100b0f0 GetProcessHeap HeapAlloc 2798->2929 2799 100333b 2799->2795 2800->2797 2802->2792 2802->2793 2920 1006170 2802->2920 2804 100352f 2804->2688 2805 10033ab 2805->2806 2806->2804 2807 10027e0 7 API calls 2806->2807 2808 100340d 2807->2808 2810 10027e0 7 API calls 2808->2810 2823 10034d2 2808->2823 2813 1003460 2810->2813 2816 10027e0 7 API calls 2813->2816 2813->2823 2818 1003497 2816->2818 2821 10027e0 7 API calls 2818->2821 2818->2823 2819 10027e0 7 API calls 2820 1003502 2819->2820 2822 10027e0 7 API calls 2820->2822 2821->2823 2822->2804 2930 10066d0 2823->2930 2826 1005f30 2824->2826 2827 10027e0 7 API calls 2826->2827 2828 1005fc3 2826->2828 3002 100b0f0 GetProcessHeap HeapAlloc 2826->3002 2827->2826 2829 10027e0 7 API calls 2828->2829 2835 1005fe4 2828->2835 2829->2828 2830 100602b TerminateThread TerminateThread TerminateThread 2832 10027e0 7 API calls 2830->2832 2831 1006000 TerminateThread 2834 10027e0 7 API calls 2831->2834 2833 100605a ExitProcess 2832->2833 2834->2835 2835->2830 2835->2831 2836->2717 2838 1002209 2837->2838 2840 1002213 2837->2840 2841 100b0f0 GetProcessHeap HeapAlloc 2838->2841 2840->2671 2841->2840 2845 100241d 2842->2845 2843 10024b1 2843->2748 2844 100246d StrCpyNW CharLowerW 2844->2845 2845->2843 2845->2844 2848 1002654 2846->2848 2847 1002662 2847->2673 2848->2847 2849 10026a2 MultiByteToWideChar 2848->2849 2849->2847 2850 10026da 2849->2850 2856 100cf50 2850->2856 2852 10026f6 2853 10027e0 6 API calls 2852->2853 2854 100278f 2853->2854 2854->2847 2855 1002630 6 API calls 2854->2855 2855->2847 2857 10027e0 4 API calls 2856->2857 2858 100cf7e 2857->2858 2859 100d010 CharLowerW 2858->2859 2860 100d03d 2858->2860 2862 100d05d 2858->2862 2859->2859 2859->2860 2861 100d089 lstrlenW StrCmpNIW 2860->2861 2860->2862 2861->2862 2862->2852 2863->2759 2864->2762 2866 10027e0 7 API calls 2865->2866 2868 100563e 2866->2868 2867 1003076 2867->2766 2881 1005c50 2867->2881 2868->2867 2869 10057c0 2868->2869 2870 10027e0 7 API calls 2868->2870 2869->2867 2871 10027e0 7 API calls 2869->2871 2870->2869 2872 1005831 2871->2872 2873 10027e0 7 API calls 2872->2873 2874 1005864 WideCharToMultiByte WideCharToMultiByte 2873->2874 2876 10027e0 7 API calls 2874->2876 2877 10058fb 2876->2877 2877->2867 2878 1002200 2 API calls 2877->2878 2879 1005929 2878->2879 2965 1002ff0 2879->2965 2882 10027e0 7 API calls 2881->2882 2885 1005c85 2882->2885 2883 1005e05 2883->2768 2884 1005e0f 2886 10027e0 7 API calls 2884->2886 2885->2883 2885->2884 2887 10027e0 7 API calls 2885->2887 2888 1005e3c 2886->2888 2887->2885 2888->2888 2890 1005ed2 2888->2890 2968 100b0f0 GetProcessHeap HeapAlloc 2888->2968 2890->2768 2892 10027e0 7 API calls 2891->2892 2895 10054a9 2892->2895 2893 1005585 2893->2770 2894 10027e0 7 API calls 2894->2895 2895->2893 2895->2894 2896 100558f lstrlenW 2895->2896 2969 100b0f0 GetProcessHeap HeapAlloc 2896->2969 2898 10055bb 2898->2893 2899 10027e0 7 API calls 2898->2899 2900 10055eb 2899->2900 2900->2770 2902 10027e0 7 API calls 2901->2902 2905 1005985 2902->2905 2903 1005b78 2903->2772 2904 1005be4 2908 1005bf7 2904->2908 2971 100b0f0 GetProcessHeap HeapAlloc 2904->2971 2905->2903 2905->2904 2907 10027e0 7 API calls 2905->2907 2909 1005b82 2905->2909 2907->2905 2908->2772 2911 1005b95 2909->2911 2970 100b0f0 GetProcessHeap HeapAlloc 2909->2970 2911->2772 2912->2788 2914 1001489 2913->2914 2915 10027e0 7 API calls 2914->2915 2916 10014c7 2915->2916 2917 100187b InitializeCriticalSection 2916->2917 2918 10027e0 7 API calls 2916->2918 2917->2781 2918->2917 2919->2791 2921 100617d 2920->2921 2927 10061c3 2920->2927 2972 100b0f0 GetProcessHeap HeapAlloc 2921->2972 2923 1006196 2973 100b110 GetProcessHeap HeapFree 2923->2973 2925 10061b7 2974 100b110 GetProcessHeap HeapFree 2925->2974 2927->2802 2928->2799 2929->2805 2931 10066e1 2930->2931 2932 10066eb 2930->2932 2975 10061d0 2931->2975 2934 100670e 2932->2934 2983 1006290 2932->2983 2991 100b0f0 GetProcessHeap HeapAlloc 2934->2991 2937 1006728 2940 10027e0 7 API calls 2937->2940 2947 10034dd 2937->2947 2939 10061d0 4 API calls 2939->2934 2942 100674c 2940->2942 2941 100691d 2995 100b110 GetProcessHeap HeapFree 2941->2995 2954 10067bc 2942->2954 2992 100b110 GetProcessHeap HeapFree 2942->2992 2945 1006768 2993 100b0f0 GetProcessHeap HeapAlloc 2945->2993 2947->2804 2955 1006940 2947->2955 2948 1006774 2948->2947 2949 10027e0 7 API calls 2948->2949 2951 1006798 2949->2951 2950 100b0f0 GetProcessHeap HeapAlloc 2950->2954 2952 10067a9 2951->2952 2951->2954 2994 100b110 GetProcessHeap HeapFree 2952->2994 2954->2941 2954->2950 2956 10034e6 2955->2956 2957 1006954 2955->2957 2960 1006ab0 2956->2960 2957->2956 2958 10060d0 GetProcessHeap HeapAlloc 2957->2958 2959 10027e0 7 API calls 2957->2959 2958->2957 2959->2957 2962 10034eb 2960->2962 2963 1006ac9 2960->2963 2961 1006b06 htons 2961->2963 2962->2819 2963->2961 2963->2962 2964 1006b5e WSAGetLastError 2963->2964 2964->2963 2966 10027e0 7 API calls 2965->2966 2967 100300a 2966->2967 2967->2867 2968->2890 2969->2898 2970->2911 2971->2908 2972->2923 2973->2925 2974->2927 2996 100b0f0 GetProcessHeap HeapAlloc 2975->2996 2977 10061db 2982 1006222 2977->2982 2997 100b0f0 GetProcessHeap HeapAlloc 2977->2997 2979 10061eb 2980 10061f2 2979->2980 2998 100b110 GetProcessHeap HeapFree 2979->2998 2980->2932 2982->2932 2987 1006298 2983->2987 2985 100632c 3001 100b110 GetProcessHeap HeapFree 2985->3001 2990 1006321 2987->2990 2999 100b110 GetProcessHeap HeapFree 2987->2999 2988 1006334 2988->2939 3000 100b110 GetProcessHeap HeapFree 2990->3000 2991->2937 2992->2945 2993->2948 2994->2947 2995->2947 2996->2977 2997->2979 2998->2982 2999->2987 3000->2985 3001->2988 3002->2826 3006 100cbc0 3003->3006 3008 100cbe2 3006->3008 3007 10027e0 7 API calls 3009 100ce0b 3007->3009 3008->3007 3008->3008 3010 10027e0 7 API calls 3009->3010 3011 100cea1 CreateProcessW 3010->3011 3012 100ced0 3011->3012 3013 100cf32 3011->3013 3014 10027e0 7 API calls 3012->3014 3015 100ceeb 3014->3015 3016 10027e0 7 API calls 3015->3016 3017 100cf11 3016->3017 3018 10027e0 7 API calls 3017->3018 3018->3013 3505 100d410 3506 100d424 3505->3506 3507 100d419 3505->3507 3509 100b110 GetProcessHeap HeapFree 3507->3509 3509->3506 3510 1003050 3513 10037c0 3510->3513 3515 10037f8 3513->3515 3514 10027e0 7 API calls 3514->3515 3515->3514 3516 100305a 3515->3516 3518 1004660 17 API calls 3515->3518 3519 1006290 2 API calls 3515->3519 3520 100b110 GetProcessHeap HeapFree 3515->3520 3521 1006b90 3515->3521 3518->3515 3519->3515 3520->3515 3522 1006ba4 3521->3522 3525 1006bae 3521->3525 3523 10061d0 4 API calls 3522->3523 3523->3525 3524 10027e0 7 API calls 3524->3525 3525->3524 3526 1006c20 3525->3526 3532 1006c28 3525->3532 3526->3515 3527 1007005 3528 10027e0 7 API calls 3527->3528 3529 1007020 3528->3529 3529->3515 3530 10027e0 7 API calls 3530->3532 3531 100b0f0 GetProcessHeap HeapAlloc 3531->3532 3532->3527 3532->3530 3532->3531 3533 1006e78 lstrcpyW lstrcatW 3532->3533 3534 1006eef lstrcatW lstrcatW 3532->3534 3535 1006f50 lstrcatW 3532->3535 3533->3532 3533->3534 3534->3532 3534->3535 3537 100b0f0 GetProcessHeap HeapAlloc 3535->3537 3537->3532 3538 100d490 3539 100d4b2 3538->3539 3540 100d49b 3538->3540 3541 10027e0 7 API calls 3540->3541 3541->3539 3576 10011b0 3579 100b0f0 GetProcessHeap HeapAlloc 3576->3579 3578 10011b7 3579->3578 3580 10066b0 3585 100b110 GetProcessHeap HeapFree 3580->3585 3582 10066bc 3586 100b110 GetProcessHeap HeapFree 3582->3586 3584 10066c4 3585->3582 3586->3584 3591 1005672 3592 100567b 3591->3592 3593 10057c0 3592->3593 3594 10027e0 7 API calls 3592->3594 3595 10027e0 7 API calls 3593->3595 3601 10057ee 3593->3601 3594->3593 3596 1005831 3595->3596 3597 10027e0 7 API calls 3596->3597 3598 1005864 WideCharToMultiByte WideCharToMultiByte 3597->3598 3600 10027e0 7 API calls 3598->3600 3602 10058fb 3600->3602 3602->3601 3603 1002200 2 API calls 3602->3603 3604 1005929 3603->3604 3605 1002ff0 7 API calls 3604->3605 3605->3601 3606 10026ff 3607 1002765 3606->3607 3608 10027e0 7 API calls 3607->3608 3609 100278f 3608->3609 3610 10027ae 3609->3610 3611 1002630 7 API calls 3609->3611 3611->3610

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_01005600 3 Function_01002200 0->3 57 Function_01006090 0->57 80 Function_0100D2D0 0->80 83 Function_010027E0 0->83 89 Function_01002FF0 0->89 1 Function_01001000 2 Function_01001200 14 Function_0100B130 2->14 15 Function_01002630 2->15 85 Function_010023E0 2->85 91 Function_0100B0F0 3->91 4 Function_0100B400 4->80 4->83 5 Function_0100C210 5->3 17 Function_0100AE30 5->17 42 Function_0100D160 5->42 53 Function_0100D290 5->53 5->83 87 Function_0100AAE0 5->87 5->91 6 Function_0100D410 7 Function_0100B110 6->7 8 Function_0100D320 9 Function_01005F20 9->83 9->91 10 Function_0100D220 10->7 10->83 11 Function_0100BB20 11->7 11->80 11->83 11->91 12 Function_01003020 71 Function_010035B0 12->71 13 Function_01006230 15->15 35 Function_0100CF50 15->35 58 Function_01002290 15->58 59 Function_01002390 15->59 15->80 82 Function_010024D0 15->82 15->83 84 Function_01002FE0 15->84 90 Function_01002EF0 15->90 16 Function_01001D30 16->7 16->83 18 Function_01007030 18->83 19 Function_0100D431 19->7 20 Function_0100AE40 20->83 21 Function_0100B740 21->4 21->7 21->10 61 Function_0100D1A0 21->61 21->83 21->91 22 Function_01003040 22->7 22->16 30 Function_01005050 22->30 38 Function_01001F50 22->38 46 Function_01002170 22->46 77 Function_01004ED0 22->77 22->83 22->91 23 Function_0100CB40 23->7 23->83 24 Function_0100CF40 74 Function_0100CBC0 24->74 25 Function_0100D440 25->7 26 Function_0100B140 26->3 26->80 26->83 26->91 27 Function_01006340 28 Function_01006940 79 Function_010060D0 28->79 28->83 29 Function_01005950 29->83 29->91 30->83 30->91 31 Function_01006250 32 Function_01006350 32->9 32->24 32->26 41 Function_01003060 32->41 32->79 32->83 92 Function_0100D0F0 32->92 33 Function_01006150 33->91 34 Function_01005C50 34->83 34->91 35->83 36 Function_01001250 36->83 37 Function_01002250 37->83 38->3 38->7 43 Function_0100AB60 38->43 38->80 38->83 39 Function_01003050 72 Function_010037C0 39->72 40 Function_01004660 40->5 40->7 40->13 40->18 47 Function_01006270 40->47 52 Function_01006290 40->52 60 Function_010043A0 40->60 62 Function_01004AA0 40->62 40->80 40->83 40->91 41->0 41->28 41->29 41->34 41->36 44 Function_01006170 41->44 48 Function_01005470 41->48 65 Function_01006AB0 41->65 78 Function_010066D0 41->78 41->80 41->83 41->91 69 Function_0100ADB0 43->69 43->83 43->91 44->7 44->91 45 Function_0100D470 45->7 48->83 48->91 49 Function_01005672 49->3 49->57 49->80 49->83 49->89 50 Function_01003580 50->7 50->40 50->79 51 Function_01006690 51->32 52->7 52->47 54 Function_0100D390 55 Function_01006B90 76 Function_010061D0 55->76 55->83 55->91 56 Function_0100D490 56->83 58->80 60->83 60->91 61->7 61->83 62->3 62->7 62->11 62->16 62->20 62->21 62->33 62->37 73 Function_010018C0 62->73 75 Function_01007FC0 62->75 81 Function_01008BD0 62->81 62->83 62->91 63 Function_010066A0 63->7 64 Function_010011A5 64->14 66 Function_0100D2B0 67 Function_010011B0 67->14 67->91 68 Function_010023B0 69->7 69->83 70 Function_010066B0 70->7 71->7 71->40 71->44 71->83 71->91 72->7 72->31 72->40 72->47 72->52 72->55 72->80 72->83 73->3 73->8 73->46 73->54 73->83 86 Function_0100C1E0 73->86 73->91 73->92 94 Function_0100D2F0 73->94 74->80 74->83 75->83 76->7 76->91 77->33 77->37 77->66 77->83 78->7 78->52 78->76 78->83 78->91 79->91 81->83 82->68 82->90 83->15 83->83 83->85 85->80 93 Function_01002DF0 85->93 87->91 88 Function_010011E5 88->14 89->83 95 Function_010011F5 95->14 96 Function_010026FF 96->15 96->83 96->90

      Control-flow Graph

      APIs
      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0100CECA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: CreateProcess
      • String ID: #$*$*$*$1$3$3$3$5$<$@$@$@$@$D$G$G$N$R$R$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$U$]$]$]$]$]$]$d$h$h$h$k$v$v$v$v$|$|$|$|$|$|
      • API String ID: 963392458-1537683230
      • Opcode ID: 994fa99692b8e3a42a6d046e26866904babd5e714022bd3f5eef0992c205b33e
      • Instruction ID: 7e0776037331504bc639d127d3f5fbd0cf587979dd767f433247a75f06c6d57c
      • Opcode Fuzzy Hash: 994fa99692b8e3a42a6d046e26866904babd5e714022bd3f5eef0992c205b33e
      • Instruction Fuzzy Hash: 0FB1C02050CBC1D9E312CA68CC5974BFFD15FA630AF48498DB1D81A2D2DBFA9548CB67

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 21 10027e0-10027fa 22 1002de0-1002de6 21->22 23 1002800-1002803 21->23 24 1002805-100280a call 10023e0 23->24 25 100280f-1002812 23->25 40 1002dc1-1002ddd call 1002630 24->40 26 1002818-1002867 25->26 27 1002899-100289c 25->27 29 1002890-1002894 26->29 30 1002869-100286e 26->30 31 1002919-100291c 27->31 32 100289e-10028e3 27->32 35 1002da4-1002dbf call 10027e0 LoadLibraryA 29->35 34 1002870-100288e 30->34 38 1002999-100299c 31->38 39 100291e-1002963 31->39 36 1002910-1002914 32->36 37 10028e5-10028ea 32->37 34->29 34->34 35->40 36->35 43 10028f0-100290e 37->43 46 1002a20-1002a23 38->46 47 10029a2-10029e2 38->47 44 1002990-1002994 39->44 45 1002965-100296a 39->45 43->36 43->43 44->35 54 1002970-100298e 45->54 51 1002a29-1002a78 46->51 52 1002aad-1002ab0 46->52 48 10029e4-10029e9 47->48 49 1002a17-1002a1b 47->49 55 10029f0-1002a15 48->55 49->35 56 1002aa4-1002aa8 51->56 57 1002a7a-1002a7f 51->57 58 1002ab6-1002b00 52->58 59 1002b39-1002b3c 52->59 54->44 54->54 55->49 55->55 56->35 60 1002a80-1002aa2 57->60 61 1002b30-1002b34 58->61 62 1002b02-1002b07 58->62 63 1002bd0-1002bd3 59->63 64 1002b42-1002b9a 59->64 60->56 60->60 61->35 67 1002b10-1002b2e 62->67 65 1002c59-1002c5c 63->65 66 1002bd9-1002c23 63->66 68 1002bc7-1002bcb 64->68 69 1002b9c-1002b9e 64->69 73 1002ce0-1002ce3 65->73 74 1002c62-1002cac 65->74 71 1002c50-1002c54 66->71 72 1002c25-1002c2a 66->72 67->61 67->67 68->35 70 1002ba1-1002bc5 69->70 70->68 70->70 71->35 75 1002c30-1002c4e 72->75 78 1002ce9-1002d68 73->78 79 1002dde 73->79 76 1002cd7-1002cdb 74->76 77 1002cae-1002cb0 74->77 75->71 75->75 76->35 80 1002cb3-1002cd5 77->80 81 1002d6a-1002d6f 78->81 82 1002d9d 78->82 79->22 80->76 80->80 83 1002d70-1002d9b 81->83 82->35 83->82 83->83
      APIs
      • LoadLibraryA.KERNELBASE(00000020,?,?), ref: 01002DBF
        • Part of subcall function 010023E0: StrCpyNW.SHLWAPI(?,?,0100280A,?,?,?), ref: 0100247F
        • Part of subcall function 010023E0: CharLowerW.USER32(?,?,?,?), ref: 0100248C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: CharLibraryLoadLower
      • String ID: $ $ $!$!$"$$$$$'$'$'$($+$,$,$,$,$,$,$/$/$0$1$2$3$7$9$9$;$>$C$E$E$F$G$H$H$J$L$N$O$Q$Q$S$T$U$W$X$X$X$X$Y$Y$Z$[$[$[$[$[$\$\$^$`$a$b$c$c$k$m$n$o$o$o$o$o$r$x$x$y$|$|$}$}
      • API String ID: 3706104380-3667687842
      • Opcode ID: 98af70fc9ae21d5791a397d43777a8d18ac6e9e95df3f378ad64345332ee53bc
      • Instruction ID: 257d7e9d323376c5e6f31169084f753390907976ba89ef77fb60d2ef296f6a47
      • Opcode Fuzzy Hash: 98af70fc9ae21d5791a397d43777a8d18ac6e9e95df3f378ad64345332ee53bc
      • Instruction Fuzzy Hash: FB02372000C3C088E766C63994487AFBFD15FA6308F5819DEE5D95B293C2AAC64DDB67

      Control-flow Graph

      APIs
      • CreateMutexW.KERNELBASE(00000000,00000000,?), ref: 010064D8
      • CreateThread.KERNELBASE(00000000,00000000,0100CF40,00000000,00000000,00000000), ref: 0100663F
        • Part of subcall function 01003060: InitializeCriticalSection.KERNEL32(01012020), ref: 010031F4
      • ExitProcess.KERNEL32 ref: 0100666D
      • ExitProcess.KERNEL32 ref: 01006681
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: CreateExitProcess$CriticalInitializeMutexSectionThread
      • String ID: #$($+$2$6$:$<$<$=$@$C$W$\$`$a$b$d$d$k$l$l$n$p$p$t$w$z$|$~
      • API String ID: 1276792753-586605904
      • Opcode ID: 06aead34d7083681c0116c98607042d8ab79c139042ed3e05ad65f0e7bcc8bbe
      • Instruction ID: 5fedd2cd4235a8ddeea7398cf957647ff051bdf5c66bd2024cfb6b42dfe620d1
      • Opcode Fuzzy Hash: 06aead34d7083681c0116c98607042d8ab79c139042ed3e05ad65f0e7bcc8bbe
      • Instruction Fuzzy Hash: 77A1143050C3C589F316D668C85879BBFD15BA6708F480D9CF6C85B2C3D7EA968893A7

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 124 1003060-1003071 call 1005600 126 1003076-1003078 124->126 127 1003568-1003570 126->127 128 100307e-10030d5 call 1005c50 call 1005470 call 1005950 call 10027e0 126->128 138 10030db-10030df 128->138 139 10031df-10031ea 128->139 138->139 140 10030e5-10030ed 138->140 141 10031f0-1003205 InitializeCriticalSection 139->141 142 10030f0-100313a 140->142 141->141 143 1003207-100323c call 1001250 InitializeCriticalSection call 10027e0 141->143 144 1003164-100318b call 10027e0 142->144 145 100313c-100313e 142->145 143->127 159 1003242-1003249 143->159 154 100318d-1003196 144->154 155 100319e-10031a5 144->155 147 1003140-1003162 145->147 147->144 147->147 154->142 160 100319c 154->160 157 10031a7-10031b6 call 100b0f0 155->157 158 10031db 155->158 167 10031d4 157->167 168 10031b8-10031d2 157->168 158->139 162 100325a-10032a2 call 10027e0 159->162 163 100324b-1003255 call 100b0f0 159->163 160->139 173 10032a4-10032a8 162->173 174 100331b 162->174 163->162 171 10031d6 167->171 168->171 171->158 176 10032b0-10032ea call 10027e0 173->176 175 1003320-1003322 174->175 175->127 177 1003328-100332f 175->177 196 1003300-1003317 176->196 197 10032ec-10032fa call 1006170 176->197 179 1003331-1003340 call 100b0f0 177->179 180 1003365-1003369 177->180 192 1003342-100335c 179->192 193 100335e 179->193 183 100336b-1003398 call 10027e0 180->183 184 100339d-100339f 180->184 183->184 185 10033a1-10033b0 call 100b0f0 184->185 186 10033d5-10033dc 184->186 208 10033b2-10033cc 185->208 209 10033ce 185->209 194 10033e2-1003423 call 100d2d0 call 10027e0 186->194 195 1003545-1003549 186->195 203 1003360 192->203 193->203 215 10034d8-10034df call 10066d0 194->215 216 1003429-1003476 call 10027e0 194->216 199 100354b-100354f 195->199 200 100355f-1003567 195->200 196->176 201 1003319 196->201 197->196 199->200 207 1003551-100355e 199->207 201->175 203->180 211 10033d0 208->211 209->211 211->186 215->195 221 10034e1-1003542 call 1006940 call 1006ab0 call 10027e0 * 2 215->221 216->215 225 1003478-10034bb call 10027e0 216->225 221->195 225->215 233 10034bd-10034d5 call 10027e0 225->233 233->215
      APIs
      • InitializeCriticalSection.KERNEL32(01012020), ref: 010031F4
      • InitializeCriticalSection.KERNEL32(01012000), ref: 01003211
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: CriticalInitializeSection
      • String ID: :$a$a$o$y${:
      • API String ID: 32694325-2230504418
      • Opcode ID: 984535122b68dd5e199211974d2c701e2bcc1847d6055fbe6742509fd725c3b9
      • Instruction ID: 33b9009358c8a4cd7337fcb68bf52c4cc94d659869420b58bff79d507b627137
      • Opcode Fuzzy Hash: 984535122b68dd5e199211974d2c701e2bcc1847d6055fbe6742509fd725c3b9
      • Instruction Fuzzy Hash: 06D1F7706043019EF726DF28DC46B9ABBD0BF54705F150198E9C4AF2D2EBB5E644CB62

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 240 1005600-1005639 call 10027e0 242 100563e-100565c 240->242 244 1005665-1005681 242->244 245 100565e-1005660 242->245 248 10057e6-10057ec 244->248 249 1005687-10057d9 call 1006090 call 10027e0 244->249 246 100593d-1005940 245->246 250 10057f5-1005918 call 100d2d0 call 10027e0 * 2 WideCharToMultiByte * 2 call 10027e0 248->250 251 10057ee-10057f0 248->251 262 10057e1 249->262 263 10057db-10057df 249->263 270 1005920-1005922 250->270 271 100591a-100591e 250->271 251->246 262->248 263->248 270->246 271->270 272 1005924-100593b call 1002200 call 1002ff0 271->272 272->246
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 539d9f088f080cf4bc3975485b2e0f19f5b2bfd1993e300185426058a8a8b163
      • Instruction ID: 3e03dca870c7d772408212f24277114924c9d387cc61ab99efd2de7385ac31bf
      • Opcode Fuzzy Hash: 539d9f088f080cf4bc3975485b2e0f19f5b2bfd1993e300185426058a8a8b163
      • Instruction Fuzzy Hash: 9B91E875E042499BEB05CFA8DD51BEDBBB6AFA8300F148069E185FB3C1D6749A01CB61
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID:
      • String ID: !$!$!$!$!$!$!$!$!$!$"$"$"$"$"$"$"$"$"$"$#$#$#$#$#$#$#$#$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$%$%$&$'$'$'$($($*$*$*$,$-$.$/$0$1$1$1$1$1$1$1$1$1$2$2$2$2$2$2$2$2$2$2$3$3$3$3$4$4$4$4$4$5$7$7$7$8$8$8$8$8$9$9$;$>$>$>$>$>$?$C$C$C$C$C$D$D$D$D$D$D$D$D$D$D$D$D$E$F$F$F$F$F$F$F$F$F$F$G$G$G$G$G$G$G$G$G$G$G$G$H$I$I$I$I$J$J$J$J$J$J$J$K$K$L$M$M$N$N$N$N$N$N$N$O$O$O$O$O$O$O$O$O$O$O$P$Q$Q$Q$Q$Q$Q$R$R$R$R$R$R$S$S$S$T$TFFFF$U$U$U$V$W$W$W$W$W$WYYDl??$X$X$Y$Y$Y$Y$Y$Y$Y$Y$Y$Z$Z$Z$Z$[$[$[$[$[$[$\$\$]$]$]$]$]$]$]$]$]$]$]$^$^22$_$_$`$`$a$a$a$a$b$b$b[[$d$d$e$e$f$f$f$f$f$f$f$g$h$h$h$h$h$i$j$k$l$l$l$l$l$l$l$l$m$m$m$m$m$m$m$m$n$o$p$p$p$p$q$r$r$r$r$r$r$r$r$s$s$s$s$s$s$s$s$t$v$w$w$wll10ss$x$x$xGGfeDD$y$y$z$z$z$z$z$z$z$z${${$|$}$}$}$}$~$~
      • API String ID: 0-3725935762
      • Opcode ID: 2a33115a5b65e9ba0ed335379edfe63754a4f6cfd88c01791815ecb9874a3a1b
      • Instruction ID: cc0b429b089c804852933ff711e1a8693b927f97d81712e357b22bf83be2c878
      • Opcode Fuzzy Hash: 2a33115a5b65e9ba0ed335379edfe63754a4f6cfd88c01791815ecb9874a3a1b
      • Instruction Fuzzy Hash: 4003037440D3C0C9E332C63990587DBFFD16BA6308F4859AED5DD8A293C2BA8249D727

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 442 1007030-10070a6 443 10070d0-1007125 442->443 444 10070a8-10070aa 442->444 446 1007127-1007129 443->446 447 1007159-100724b 443->447 445 10070b0-10070ce 444->445 445->443 445->445 448 1007130-1007157 446->448 449 1007279-10072db 447->449 450 100724d-100724f 447->450 448->447 448->448 452 1007306-10073a0 449->452 453 10072dd-10072df 449->453 451 1007250-1007277 450->451 451->449 451->451 455 10073a2 452->455 456 10073c4-1007586 452->456 454 10072e0-1007304 453->454 454->452 454->454 457 10073a4-10073c2 455->457 458 1007588-100758a 456->458 459 10075ba-1007626 456->459 457->456 457->457 460 1007590-10075b8 458->460 461 1007658-10076c1 459->461 462 1007628-100762a 459->462 460->459 460->460 464 10076c3-10076c5 461->464 465 10076f7-1007760 461->465 463 1007630-1007656 462->463 463->461 463->463 466 10076d0-10076f5 464->466 467 1007762 465->467 468 1007788-100786a 465->468 466->465 466->466 469 1007764-1007786 467->469 470 1007898-100798d 468->470 471 100786c-100786e 468->471 469->468 469->469 472 10079be-1007af3 470->472 473 100798f 470->473 474 1007870-1007896 471->474 476 1007af5-1007af7 472->476 477 1007b2e-1007c23 472->477 475 1007991-10079bc 473->475 474->470 474->474 475->472 475->475 478 1007b00-1007b2c 476->478 479 1007c60-1007cae 477->479 480 1007c25-1007c27 477->480 478->477 478->478 482 1007cb0 479->482 483 1007cd2-1007db4 479->483 481 1007c30-1007c5e 480->481 481->479 481->481 484 1007cb2-1007cd0 482->484 485 1007de6-1007f0b 483->485 486 1007db6-1007db8 483->486 484->483 484->484 487 1007f3d-1007f67 485->487 488 1007f0d-1007f0f 485->488 489 1007dc0-1007de4 486->489 491 1007f70-1007f90 call 10027e0 487->491 490 1007f10-1007f3b 488->490 489->485 489->489 490->487 490->490 495 1007f92-1007f9c 491->495 496 1007fac-1007fb7 491->496 495->491 497 1007f9e-1007fa9 495->497
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID:
      • String ID: !$!$"$$$$$$$$$$$$$$$$$$$$$$$%$%$&$&$&$&$&$&$&$'$($)$)$)$,$,$-$-$-$/$/$/$/$0$0$0$1$2$3$4$4$4$4$5$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7vvvvvv$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$;$;$<$<$<$=$=$=$=$=$=$=$=$=$=$=$?$?$@$A$B$D$E$G$G$G$G$G$G$I$I$J$J$J$J$J$K$K$L$L$M$M$M$Q$Q$R$R$R$S$U$U$W$W$W$[$]$^$^$^$^$^$^$^$^$^$^$^$`$a$a$c$c$c$c$c$c$c$c$c$c$c$c$c$c$ceeeeee$v0[w^^^^&0S====$d$d$d$d$d$d$d$d$d$e$e$e$e$e$e$e$e$e$e$e$e$e$h$j$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$m$m$n$nddd$o$q$r$s$v$v$v$v$v$v$v$v$v$v$v$v$v$v$v$w$w$x$x$y$y$y$y$y$y$y$y====${${${
      • API String ID: 0-671366649
      • Opcode ID: 7704dd6c9ed8124bb592b2bb7925e20da9965f65f7458f2f9cf62649c6dd3342
      • Instruction ID: 61343346860f743e4565e2cc5fcbeab71981bec749d912297f180fc8d1cc1125
      • Opcode Fuzzy Hash: 7704dd6c9ed8124bb592b2bb7925e20da9965f65f7458f2f9cf62649c6dd3342
      • Instruction Fuzzy Hash: 3E92C96000C7C0CCE332C63994487DBBFD25BA6308F4849AED5D94B293D2FA8699D767

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 498 1007fc0-100805e 499 1008060 498->499 500 1008088-100816a 498->500 501 1008062-1008086 499->501 502 100819a-100828f 500->502 503 100816c-100816e 500->503 501->500 501->501 505 1008291-1008297 502->505 506 10082ca-100834a 502->506 504 1008170-1008198 503->504 504->502 504->504 507 10082a0-10082c8 505->507 508 1008374-10083fb 506->508 509 100834c-100834e 506->509 507->506 507->507 510 1008424-1008497 508->510 511 10083fd-10083ff 508->511 512 1008350-1008372 509->512 514 10084c9-10085bb 510->514 515 1008499-100849b 510->515 513 1008400-1008422 511->513 512->508 512->512 513->510 513->513 517 10085ec-1008697 514->517 518 10085bd-10085bf 514->518 516 10084a0-10084c7 515->516 516->514 516->516 520 10086c0-10087d2 517->520 521 1008699-100869b 517->521 519 10085c0-10085ea 518->519 519->517 519->519 523 10087d4-10087d6 520->523 524 100880a-1008862 520->524 522 10086a0-10086be 521->522 522->520 522->522 525 10087e0-1008808 523->525 526 1008864 524->526 527 100888c-100896e 524->527 525->524 525->525 528 1008866-100888a 526->528 529 1008970-1008976 527->529 530 10089ad-1008b22 527->530 528->527 528->528 531 1008980-10089ab 529->531 532 1008b53-1008b79 530->532 533 1008b24-1008b26 530->533 531->530 531->531 535 1008b80-1008ba0 call 10027e0 532->535 534 1008b30-1008b51 533->534 534->532 534->534 539 1008ba2-1008bac 535->539 540 1008bbc-1008bc7 535->540 539->535 541 1008bae-1008bb9 539->541
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID:
      • String ID: $ $!$!$#$$$$$%$%$%$&$&$&$&$&$&$&$&$&$&$&$($)$)$*$*$*$*$*$*$*$*$*$*$*$*$*$*$+$,$-$-$-$0$1$1$3$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$7$;$>$@$@$@$@$@$@$@$@$A$B$B$B$B$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$D$D$H$H$J$J$J$J$J$J$J$J$J$J$J$J$J$P$P$Puuuuu$Q$R$T$UCCC$V$V$W$W$W$W$W$Z$Z$[$[$[$[$[$[$[$[$[$[$[$_$_$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$`$b$d$d$d$g$i$k$k$k$m$n$o$o$o$q$q$q$q$r$r$r$r$r$r$r$r$r$r$r$r$r$r$s$t$t$u$u$u$u$u$u$u$u$u$u$u$u$u$v$v$v$w$w$w$w$y$z$z$z${${$|$}$~
      • API String ID: 0-697038378
      • Opcode ID: 55a290864d8f61e87842251b7d395c55d774bd4f193dc7a42426be62e165e2d6
      • Instruction ID: 3d93f9f260ba2378e2b30636707ad10305dcc00a842c01daa0bf9472f7ef0b8e
      • Opcode Fuzzy Hash: 55a290864d8f61e87842251b7d395c55d774bd4f193dc7a42426be62e165e2d6
      • Instruction Fuzzy Hash: 5A72CB6050C7C0C9E332C62890587DBFFD16BA7308F48999ED1D85A293C3FA8659DB67
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: __aulldiv$LibraryLoad__aullrem
      • String ID:
      • API String ID: 3418814274-3916222277
      • Opcode ID: 6ea0e3d76126cfe31118055ae846c7f15595f40367b1c0acf53f67eebbc58ee0
      • Instruction ID: b5268c87f58b1a93e55691d3e22f82d84bb0d57437cebb5e0a877c6c416102d1
      • Opcode Fuzzy Hash: 6ea0e3d76126cfe31118055ae846c7f15595f40367b1c0acf53f67eebbc58ee0
      • Instruction Fuzzy Hash: 15C1C3716043019FE719DF68C984BAABBE5EB88304F08857CFD889B396E774D845CB91
      Strings
      • -----BEGIN RSA PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA42b6yev524etcti9MBEdY1cgr2ybNMRDHyZZHpV0nTpWeVFCtgSMoUDKuaY5DJzru65IkZyoQWqP6n78pbLnCFxB7+JJ3jeb1aZDfDpnPnY81u+h+1jVbcL0qo8PMPIDbkRcOsu7hCi76++HvACKxHeThbue6rHprDZ5HcOZnNpEb8Mihl3q2/sidy, xrefs: 0100ABF2, 0100AC3B
      • , xrefs: 0100ABCF
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: Heap$AllocFreeLibraryLoadLocalProcess
      • String ID: $-----BEGIN RSA PUBLIC KEY-----MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA42b6yev524etcti9MBEdY1cgr2ybNMRDHyZZHpV0nTpWeVFCtgSMoUDKuaY5DJzru65IkZyoQWqP6n78pbLnCFxB7+JJ3jeb1aZDfDpnPnY81u+h+1jVbcL0qo8PMPIDbkRcOsu7hCi76++HvACKxHeThbue6rHprDZ5HcOZnNpEb8Mihl3q2/sidy
      • API String ID: 2209227660-1321880044
      • Opcode ID: 2a8bed1cd19852a32c05a9ae13591e6b14223d94525a9592aa9551d597762c47
      • Instruction ID: 421b5cf364584494fb4f921919f41bbfbc492e0f70aadfa792d502690fa78018
      • Opcode Fuzzy Hash: 2a8bed1cd19852a32c05a9ae13591e6b14223d94525a9592aa9551d597762c47
      • Instruction Fuzzy Hash: BB51D471244302ABF711DF51CC55F9BB7D4AB94751F10092DFA88AB2C0EBB1EA09C7A2
      APIs
      • GetProcessHeap.KERNEL32(00000000,01006923,?,01006923,00000000,?,?,00000000,?,?,?,?,?,?,010034DD), ref: 0100B119
      • HeapFree.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,010034DD), ref: 0100B120
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: Heap$FreeProcess
      • String ID:
      • API String ID: 3859560861-0
      • Opcode ID: da887030d4f74b2c9b511809ecc4f5a9dabe7e0032c1f90972012ad5d25a9d8c
      • Instruction ID: 16c3854af377ed0b204961f824dc18cb707ddab81a71835ddffa268bfe5808a9
      • Opcode Fuzzy Hash: da887030d4f74b2c9b511809ecc4f5a9dabe7e0032c1f90972012ad5d25a9d8c
      • Instruction Fuzzy Hash: EAC09BB1144308ABD611ABE4E90DF99376CD708652F004440F74DD6184C679A5804771

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 616 1006b90-1006ba2 617 1006bb0-1006bd6 616->617 618 1006ba4-1006bae call 10061d0 616->618 620 1006be0-1006c17 call 10027e0 617->620 618->617 625 1006c28-1006c3d 620->625 626 1006c19-1006c1e 620->626 628 1006c43-1006c48 625->628 629 1007009-100702d call 10027e0 625->629 626->620 627 1006c20-1006c27 626->627 631 1006c50-1006ca6 628->631 633 1006cd0-1006cf4 call 10027e0 631->633 634 1006ca8-1006caa 631->634 640 1006cfa-1006d50 633->640 641 1006feb-1006fff 633->641 635 1006cb0-1006cce 634->635 635->633 635->635 642 1006d52 640->642 643 1006d7d-1006da1 call 10027e0 640->643 641->631 644 1007005 641->644 645 1006d54-1006d7b 642->645 643->641 649 1006da7 643->649 644->629 645->643 645->645 650 1006da9 call 100b0f0 649->650 651 1006dae-1006e0b call 10027e0 * 2 650->651 658 1006e0c call 100b0f0 651->658 659 1006e11-1006e51 658->659 660 1006e53 659->660 661 1006e78-1006eb7 lstrcpyW lstrcatW 659->661 662 1006e55-1006e76 660->662 663 1006eb9-1006ebe 661->663 664 1006eef-1006f2c lstrcatW * 2 661->664 662->661 662->662 665 1006ec0-1006ee4 663->665 666 1006f50-1006f5a lstrcatW 664->666 667 1006f2e 664->667 665->665 668 1006ee6-1006eea 665->668 670 1006f5c call 100b0f0 666->670 669 1006f30-1006f4e 667->669 668->664 669->666 669->669 671 1006f61-1006f68 670->671 672 1006f6a-1006f7b 671->672 673 1006f7e-1006f84 671->673 672->673 674 1006fe2-1006fe6 673->674 675 1006f86-1006f9d 673->675 674->641 676 1006fbc-1006fbe 675->676 677 1006f9f-1006fa1 675->677 680 1006fc0 676->680 681 1006fca-1006fcc 676->681 678 1006fa3-1006fa7 677->678 679 1006fad 677->679 678->679 682 1006fa9-1006fab 678->682 683 1006faf-1006fb1 679->683 684 1006fc2-1006fc8 680->684 681->674 685 1006fce-1006fd0 681->685 682->683 683->681 686 1006fb3-1006fb8 683->686 684->681 684->684 685->674 687 1006fd2-1006fdf 685->687 686->686 688 1006fba 686->688 687->674 688->681
      APIs
      • lstrcpyW.KERNEL32(00000000,0000006B), ref: 01006E80
      • lstrcatW.KERNEL32(00000000,?), ref: 01006E93
      • lstrcatW.KERNEL32(00000000,0000005F), ref: 01006EF7
      • lstrcatW.KERNEL32(00000000,?), ref: 01006EFE
      • lstrcatW.KERNEL32(00000000,00000012), ref: 01006F58
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: lstrcat$lstrcpy
      • String ID: $$$$$$$$9$9$9$9$D$E$I$S$V$\$_$_$d$d$d$k$k$n$y$y$y$y$y$y$y$y$z
      • API String ID: 2482611188-1225197215
      • Opcode ID: 9450eecb8539e434b6aaa4ae100dd20de0e9dd03fd35c52b4f1fd996c65498c9
      • Instruction ID: ca967127a118c8322d4e9a7487c89f504db022e6f096e82f55f08deca63c20c0
      • Opcode Fuzzy Hash: 9450eecb8539e434b6aaa4ae100dd20de0e9dd03fd35c52b4f1fd996c65498c9
      • Instruction Fuzzy Hash: AEE1B17050C3C19EE712DB68C88476BBFD1AF95308F4808ADE5C54B292D7BAD958C763
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: lstrlen
      • String ID: $$4$O$Z$p
      • API String ID: 1659193697-2970395073
      • Opcode ID: 0d0a0626f8b425b8dc060a5e593501395dad459e842b7b2711ed9bfd4c0cc17e
      • Instruction ID: bcb366e81e6bc41ab8fb43459e56a9818a637868f290dedce19147a6bcfef338
      • Opcode Fuzzy Hash: 0d0a0626f8b425b8dc060a5e593501395dad459e842b7b2711ed9bfd4c0cc17e
      • Instruction Fuzzy Hash: DA412A711083818EE705CB28CC447EBBFD19F99308F0805ACEA88AB282E779D549C777
      APIs
        • Part of subcall function 010027E0: LoadLibraryA.KERNELBASE(00000020,?,?), ref: 01002DBF
      • SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 0100B505
      • SetLastError.KERNEL32 ref: 0100B52D
      • StrCmpNIW.SHLWAPI(?,?,00000000), ref: 0100B667
      • StrCpyNW.SHLWAPI(?,?,00000004), ref: 0100B68E
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: ErrorLast$LibraryLoad
      • String ID:
      • API String ID: 1136134869-0
      • Opcode ID: 7b9a396da702741760a033beaab3032069c8ca4711b1e7cabb40e06ff430f93a
      • Instruction ID: 49c8222b56be6f5d987513b9eabc11e5e3683cd5c333fa293461eb3c3418d946
      • Opcode Fuzzy Hash: 7b9a396da702741760a033beaab3032069c8ca4711b1e7cabb40e06ff430f93a
      • Instruction Fuzzy Hash: 19813775644306ABF721DB54DC45FABB3E4AF68300F040668F695A71C1FBB4E648C7A1
      APIs
      • TerminateThread.KERNEL32(?,00000000), ref: 01006004
      • TerminateThread.KERNEL32(?,00000000), ref: 01006030
      • TerminateThread.KERNEL32(?,00000000), ref: 01006037
      • TerminateThread.KERNEL32(?,00000000), ref: 0100603E
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: TerminateThread
      • String ID:
      • API String ID: 1852365436-0
      • Opcode ID: 5451c4d356752e13aeb892a386f30832e21a298c3e7ea3b555cb2f5f48b32c7b
      • Instruction ID: d05a1ee05bce216e84bc10f0de077ef598120d08a7697fc2ca91f04940ade1c7
      • Opcode Fuzzy Hash: 5451c4d356752e13aeb892a386f30832e21a298c3e7ea3b555cb2f5f48b32c7b
      • Instruction Fuzzy Hash: E5312C316402059BFB32DF18DC45FB977D4AF10354F0541A8FD88AF2D0EBA6A905CB51
      APIs
      • StrCpyNW.SHLWAPI(?,?,0100280A,?,?,?), ref: 0100247F
      • CharLowerW.USER32(?,?,?,?), ref: 0100248C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1661389392.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
      • Associated: 00000000.00000002.1661379020.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661401529.000000000100E000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1661420001.0000000001057000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_1000000_file.jbxd
      Similarity
      • API ID: CharLower
      • String ID: klqq
      • API String ID: 1615517891-2642973767
      • Opcode ID: e8c97e68807a461a7009a75a4310c9f208ae528ee51ee706ccdc06101a93b4e3
      • Instruction ID: dcd2bc009999bc91f05c0a9d14418253663b48c15673d967935c29e12e213709
      • Opcode Fuzzy Hash: e8c97e68807a461a7009a75a4310c9f208ae528ee51ee706ccdc06101a93b4e3
      • Instruction Fuzzy Hash: C5314671E00209EFDB55CF98D5949AEB7F5FB88300F2085AAE555A7381DB34AA81CF90