Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
e90zPYFENm.exe

Overview

General Information

Sample name:e90zPYFENm.exe
renamed because original name is a hash value
Original sample name:4ef776934710c9c4f067287fe73f1c94902d9290f0e40e7da83629589c4510aa.exe
Analysis ID:1502168
MD5:94807b134058d14399767d8f5d84a5d5
SHA1:b01a404085091bd567e9c129baecf8230ccbfc46
SHA256:4ef776934710c9c4f067287fe73f1c94902d9290f0e40e7da83629589c4510aa
Tags:119-45-147-28exe
Infos:

Detection

Metasploit
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Yara signature match

Classification

  • System is w10x64
  • e90zPYFENm.exe (PID: 6628 cmdline: "C:\Users\user\Desktop\e90zPYFENm.exe" MD5: 94807B134058D14399767D8F5D84A5D5)
  • cleanup
{"Type": "Metasploit Download", "URL": "http://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Metasploit_0f5a852dIdentifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families.unknown
    • 0x14cb:$a: 49 BE 77 69 6E 69 6E 65 74 00 41 56 48 89 E1 49 C7 C2 4C 77 26 07 FF D5
    00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
    • 0x1471:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
      00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_Metasploit_0f5a852dIdentifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families.unknown
      • 0x93b:$a: 49 BE 77 69 6E 69 6E 65 74 00 41 56 48 89 E1 49 C7 C2 4C 77 26 07 FF D5
      Click to see the 1 entries
      No Sigma rule has matched
      Timestamp:2024-08-31T11:47:46.313345+0200
      SID:2028765
      Severity:3
      Source Port:49715
      Destination Port:443
      Protocol:TCP
      Classtype:Unknown Traffic
      Timestamp:2024-08-31T11:45:56.078747+0200
      SID:2028765
      Severity:3
      Source Port:49717
      Destination Port:443
      Protocol:TCP
      Classtype:Unknown Traffic
      Timestamp:2024-08-31T11:47:09.235138+0200
      SID:2028765
      Severity:3
      Source Port:49713
      Destination Port:443
      Protocol:TCP
      Classtype:Unknown Traffic
      Timestamp:2024-08-31T11:46:32.079108+0200
      SID:2028765
      Severity:3
      Source Port:49704
      Destination Port:443
      Protocol:TCP
      Classtype:Unknown Traffic

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Type": "Metasploit Download", "URL": "http://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i"}
      Source: e90zPYFENm.exeReversingLabs: Detection: 60%
      Source: e90zPYFENm.exeVirustotal: Detection: 53%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: e90zPYFENm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 4x nop then push rbx0_2_00007FF71F481C94

      Networking

      barindex
      Source: Malware configuration extractorURLs: http://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i
      Source: Joe Sandbox ViewASN Name: CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompa CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompa
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49715 -> 119.45.147.28:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49713 -> 119.45.147.28:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49704 -> 119.45.147.28:443
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49717 -> 119.45.147.28:443
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: unknownTCP traffic detected without corresponding DNS query: 119.45.147.28
      Source: e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/
      Source: e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/LzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i
      Source: e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/a81-46d0-b6b6-535557bcc5fa
      Source: e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i
      Source: e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i)
      Source: e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365517788.0000022BBCC24000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_iuq
      Source: e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/mP%
      Source: e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://119.45.147.28/u
      Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
      Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
      Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713

      System Summary

      barindex
      Source: 00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families. Author: unknown
      Source: 00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families. Author: unknown
      Source: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_00007FF71F48D8600_2_00007FF71F48D860
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_00007FF71F48BA500_2_00007FF71F48BA50
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_00007FF71F488F000_2_00007FF71F488F00
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_00007FF71F483D580_2_00007FF71F483D58
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_00007FF71F487D200_2_00007FF71F487D20
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_00007FF71F48B5500_2_00007FF71F48B550
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_00007FF71F48E1F00_2_00007FF71F48E1F0
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_00007FF71F4827F00_2_00007FF71F4827F0
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_0000022BBCDE09360_2_0000022BBCDE0936
      Source: 00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_0f5a852d os = windows, severity = x86, description = Identifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families., creation_date = 2021-04-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 97daac4249e85a73d4e6a4450248e59e0d286d5e7c230cf32a38608f8333f00d, id = 0f5a852d-cacd-43d7-8754-204b09afba2f, last_modified = 2021-08-23
      Source: 00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_0f5a852d os = windows, severity = x86, description = Identifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families., creation_date = 2021-04-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 97daac4249e85a73d4e6a4450248e59e0d286d5e7c230cf32a38608f8333f00d, id = 0f5a852d-cacd-43d7-8754-204b09afba2f, last_modified = 2021-08-23
      Source: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: classification engineClassification label: mal80.troj.winEXE@1/0@0/1
      Source: e90zPYFENm.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\e90zPYFENm.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: e90zPYFENm.exeReversingLabs: Detection: 60%
      Source: e90zPYFENm.exeVirustotal: Detection: 53%
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\e90zPYFENm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
      Source: e90zPYFENm.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: e90zPYFENm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH
      Source: e90zPYFENm.exeStatic PE information: section name: .xdata
      Source: C:\Users\user\Desktop\e90zPYFENm.exeAPI coverage: 5.6 %
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\e90zPYFENm.exeLast function: Thread delayed
      Source: e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
      Source: e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365517788.0000022BBCC24000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365517788.0000022BBCC24000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWQC
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\e90zPYFENm.exeCode function: 0_2_00007FF71F481180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,0_2_00007FF71F481180

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      OS Credential Dumping1
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      12
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Obfuscated Files or Information
      LSASS Memory1
      System Information Discovery
      Remote Desktop ProtocolData from Removable Media11
      Application Layer Protocol
      Exfiltration Over BluetoothNetwork Denial of Service
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      e90zPYFENm.exe61%ReversingLabsWin64.Backdoor.Swrort
      e90zPYFENm.exe53%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i0%Avira URL Cloudsafe
      https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i)0%Avira URL Cloudsafe
      https://119.45.147.28/LzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i0%Avira URL Cloudsafe
      http://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i0%Avira URL Cloudsafe
      https://119.45.147.28/a81-46d0-b6b6-535557bcc5fa0%Avira URL Cloudsafe
      https://119.45.147.28/0%Avira URL Cloudsafe
      https://119.45.147.28/u0%Avira URL Cloudsafe
      https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_iuq0%Avira URL Cloudsafe
      https://119.45.147.28/mP%0%Avira URL Cloudsafe
      https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i0%VirustotalBrowse
      https://119.45.147.28/2%VirustotalBrowse
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_itrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_i)e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_ie90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://119.45.147.28/a81-46d0-b6b6-535557bcc5fae90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://119.45.147.28/LzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_ie90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://119.45.147.28/e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC0A000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmpfalse
      • 2%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://119.45.147.28/ue90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCBEE000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://119.45.147.28/cLzHwODM/SM8omDxZewgwWjFYVimA4g64y1JdIzY4ApXywlnL9_kGiyhwOZf2xLuhPjwY_iuqe90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365517788.0000022BBCC24000.00000004.00000020.00020000.00000000.sdmp, e90zPYFENm.exe, 00000000.00000003.2365454475.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://119.45.147.28/mP%e90zPYFENm.exe, 00000000.00000002.3304460732.0000022BBCC14000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      119.45.147.28
      unknownChina
      45090CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompatrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1502168
      Start date and time:2024-08-31 11:45:07 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 45s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:e90zPYFENm.exe
      renamed because original name is a hash value
      Original Sample Name:4ef776934710c9c4f067287fe73f1c94902d9290f0e40e7da83629589c4510aa.exe
      Detection:MAL
      Classification:mal80.troj.winEXE@1/0@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 4
      • Number of non-executed functions: 23
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      No simulations
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      CNNIC-TENCENT-NET-APShenzhenTencentComputerSystemsCompalinux_amd64.elfGet hashmaliciousUnknownBrowse
      • 119.29.233.208
      SecuriteInfo.com.Linux.Siggen.9999.28377.24731.elfGet hashmaliciousMiraiBrowse
      • 152.136.47.156
      BjdhvHE9Lu.exeGet hashmaliciousUnknownBrowse
      • 122.51.240.117
      SecuriteInfo.com.Trojan.DownLoader46.48074.21382.27832.exeGet hashmaliciousUnknownBrowse
      • 106.53.77.23
      firmware.m68k.elfGet hashmaliciousUnknownBrowse
      • 140.143.139.193
      KKveTTgaAAsecNNaaaa.sh4.elfGet hashmaliciousUnknownBrowse
      • 146.56.230.81
      KKveTTgaAAsecNNaaaa.spc.elfGet hashmaliciousUnknownBrowse
      • 120.53.107.161
      KKveTTgaAAsecNNaaaa.mpsl.elfGet hashmaliciousUnknownBrowse
      • 118.28.5.155
      kovENvYM9C.elfGet hashmaliciousUnknownBrowse
      • 134.175.132.160
      pzGt29I16y.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
      • 111.229.0.18
      No context
      No context
      No created / dropped files found
      File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
      Entropy (8bit):6.042459121075471
      TrID:
      • Win64 Executable (generic) (12005/4) 74.95%
      • Generic Win/DOS Executable (2004/3) 12.51%
      • DOS Executable Generic (2002/1) 12.50%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
      File name:e90zPYFENm.exe
      File size:73'728 bytes
      MD5:94807b134058d14399767d8f5d84a5d5
      SHA1:b01a404085091bd567e9c129baecf8230ccbfc46
      SHA256:4ef776934710c9c4f067287fe73f1c94902d9290f0e40e7da83629589c4510aa
      SHA512:e5a07dbf6bfd47283bca22b12c9f2aa080427c9c7650f92d19b194ca7ed156bd10307b027206f6b24296931ee26d514fb777145515e2208c8959a03b38c24d58
      SSDEEP:1536:8F++kp8oc6BQwZjKuJHo9WOqvKGoRGL8qVUdzrsgcFJhnItmT53m:lvzc6BQwZjKuJI9WrsRGL3OcFJhItmhm
      TLSH:D6732A67F3A350F8C113C574459B67B2EA31BC214874BB6D87E0EA722E22E51FE69311
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....sf...............).......................@...................................../....`... ............................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x1400013d0
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x140000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH
      Time Stamp:0x6673B0BA [Thu Jun 20 04:31:54 2024 UTC]
      TLS Callbacks:0x40001560, 0x1, 0x40001530, 0x1
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:c723e9af32e40ee9cd97441df2c4ea30
      Instruction
      dec eax
      sub esp, 28h
      dec eax
      mov eax, dword ptr [00010D25h]
      mov dword ptr [eax], 00000001h
      call 00007F2E0CE79AAFh
      nop
      nop
      dec eax
      add esp, 28h
      ret
      nop dword ptr [eax]
      dec eax
      sub esp, 28h
      dec eax
      mov eax, dword ptr [00010D05h]
      mov dword ptr [eax], 00000000h
      call 00007F2E0CE79A8Fh
      nop
      nop
      dec eax
      add esp, 28h
      ret
      nop dword ptr [eax]
      dec eax
      sub esp, 28h
      call 00007F2E0CE8783Ch
      dec eax
      cmp eax, 01h
      sbb eax, eax
      dec eax
      add esp, 28h
      ret
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      dec eax
      lea ecx, dword ptr [00000009h]
      jmp 00007F2E0CE79CE9h
      nop dword ptr [eax+00h]
      ret
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      nop
      dec eax
      sub esp, 28h
      dec eax
      mov eax, dword ptr [0000EBA5h]
      dec eax
      mov eax, dword ptr [eax]
      dec eax
      test eax, eax
      je 00007F2E0CE79D34h
      nop dword ptr [eax+eax+00h]
      call eax
      dec eax
      mov eax, dword ptr [0000EB8Fh]
      dec eax
      lea edx, dword ptr [eax+08h]
      dec eax
      mov eax, dword ptr [eax+08h]
      dec eax
      mov dword ptr [0000EB80h], edx
      dec eax
      test eax, eax
      jne 00007F2E0CE79CF5h
      dec eax
      add esp, 28h
      ret
      nop word ptr [eax+eax+00h]
      push esi
      push ebx
      dec eax
      sub esp, 28h
      dec eax
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x160000x8d0.idata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x130000x57c.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x190000x94.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x115400x28.rdata
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x162580x208.idata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000xe3280xe40043a91766180d67c8ce111e9bd941a8d7False0.5532997532894737data6.187637412043698IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .data0x100000x1000x200395a4e9f11c8b3f97e55c1b5c78206d1False0.1640625data1.1390273388522143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rdata0x110000x18300x1a00f17419416e8e79e96db0d0ad7233fdb1False0.3117487980769231data4.893737932260672IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .pdata0x130000x57c0x600d2e16b3786312bc2fc3648be71769094False0.4934895833333333data4.309111008094311IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .xdata0x140000x56c0x600c8cc16dc306ff100e0c055a12467a5cbFalse0.3053385416666667data4.1806771646521055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .bss0x150000xc800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .idata0x160000x8d00xa0045a3787a44cc66bf355793a2da7abe04False0.319921875data3.819323089090164IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .CRT0x170000x600x200eb9c3cc3a0b4c9366754ba7755a2651dFalse0.068359375data0.28265357431271465IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .tls0x180000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .reloc0x190000x940x2009d7a9b2d83b3d1cf4c2b0abc53f9f8d0False0.267578125data1.6272808376258594IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      DLLImport
      KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetLastError, HeapAlloc, HeapCreate, InitializeCriticalSection, IsDBCSLeadByteEx, LeaveCriticalSection, MultiByteToWideChar, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WideCharToMultiByte
      msvcrt.dll__C_specific_handler, ___lc_codepage_func, ___mb_cur_max_func, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _errno, _fmode, _initterm, _lock, _onexit, _strrev, _unlock, abort, calloc, exit, fprintf, fputc, free, fwrite, getc, isspace, isxdigit, localeconv, malloc, memcpy, memmove, memset, realloc, signal, strerror, strlen, strncmp, strtol, strtoul, tolower, ungetc, vfprintf, wcslen, _strtoui64, _strtoi64
      USER32.dllEnumWindows
      TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
      2024-08-31T11:47:46.313345+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex349715443192.168.2.5119.45.147.28
      2024-08-31T11:45:56.078747+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex349717443192.168.2.5119.45.147.28
      2024-08-31T11:47:09.235138+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex349713443192.168.2.5119.45.147.28
      2024-08-31T11:46:32.079108+0200TCP2028765ET JA3 Hash - [Abuse.ch] Possible Dridex349704443192.168.2.5119.45.147.28
      TimestampSource PortDest PortSource IPDest IP
      Aug 31, 2024 11:46:00.002305984 CEST49704443192.168.2.5119.45.147.28
      Aug 31, 2024 11:46:00.002336025 CEST44349704119.45.147.28192.168.2.5
      Aug 31, 2024 11:46:00.002466917 CEST49704443192.168.2.5119.45.147.28
      Aug 31, 2024 11:46:00.010966063 CEST49704443192.168.2.5119.45.147.28
      Aug 31, 2024 11:46:00.010977983 CEST44349704119.45.147.28192.168.2.5
      Aug 31, 2024 11:46:32.079108000 CEST49704443192.168.2.5119.45.147.28
      Aug 31, 2024 11:46:37.096266985 CEST49713443192.168.2.5119.45.147.28
      Aug 31, 2024 11:46:37.096312046 CEST44349713119.45.147.28192.168.2.5
      Aug 31, 2024 11:46:37.096410036 CEST49713443192.168.2.5119.45.147.28
      Aug 31, 2024 11:46:37.097058058 CEST49713443192.168.2.5119.45.147.28
      Aug 31, 2024 11:46:37.097073078 CEST44349713119.45.147.28192.168.2.5
      Aug 31, 2024 11:47:09.235137939 CEST49713443192.168.2.5119.45.147.28
      Aug 31, 2024 11:47:14.253420115 CEST49715443192.168.2.5119.45.147.28
      Aug 31, 2024 11:47:14.253467083 CEST44349715119.45.147.28192.168.2.5
      Aug 31, 2024 11:47:14.253551960 CEST49715443192.168.2.5119.45.147.28
      Aug 31, 2024 11:47:14.253942013 CEST49715443192.168.2.5119.45.147.28
      Aug 31, 2024 11:47:14.253957987 CEST44349715119.45.147.28192.168.2.5
      Aug 31, 2024 11:47:46.313344955 CEST49715443192.168.2.5119.45.147.28
      Aug 31, 2024 11:47:51.332501888 CEST49717443192.168.2.5119.45.147.28
      Aug 31, 2024 11:47:51.332542896 CEST44349717119.45.147.28192.168.2.5
      Aug 31, 2024 11:47:51.332633972 CEST49717443192.168.2.5119.45.147.28
      Aug 31, 2024 11:47:51.332951069 CEST49717443192.168.2.5119.45.147.28
      Aug 31, 2024 11:47:51.332964897 CEST44349717119.45.147.28192.168.2.5

      Click to jump to process

      Click to jump to process

      Target ID:0
      Start time:05:45:58
      Start date:31/08/2024
      Path:C:\Users\user\Desktop\e90zPYFENm.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\e90zPYFENm.exe"
      Imagebase:0x7ff71f480000
      File size:73'728 bytes
      MD5 hash:94807B134058D14399767D8F5D84A5D5
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Yara matches:
      • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Metasploit_0f5a852d, Description: Identifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families., Source: 00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3304629088.0000022BBCE50000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, Author: Joe Security
      • Rule: Windows_Trojan_Metasploit_0f5a852d, Description: Identifies 64 bit metasploit wininet reverse shellcode. May also be used by other malware families., Source: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
      • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
      Reputation:low
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:2.3%
        Dynamic/Decrypted Code Coverage:1.7%
        Signature Coverage:35.4%
        Total number of Nodes:1332
        Total number of Limit Nodes:8
        execution_graph 6845 7ff71f48ed70 ___lc_codepage_func ___mb_cur_max_func 6846 7ff71f48edc9 6845->6846 6847 7ff71f48edb0 6845->6847 6847->6846 6848 7ff71f48edc1 6847->6848 6851 7ff71f48ee30 6847->6851 6848->6846 6850 7ff71f48eba0 4 API calls 6848->6850 6849 7ff71f48eba0 4 API calls 6849->6851 6850->6848 6851->6846 6851->6849 7640 7ff71f4883f0 7643 7ff71f488278 7640->7643 7641 7ff71f48836f 7642 7ff71f4867b0 fputc 7642->7643 7643->7641 7643->7642 7644 7ff71f483aec 7645 7ff71f483afa 7644->7645 7646 7ff71f483b29 7645->7646 7647 7ff71f485c58 7645->7647 7649 7ff71f484efc 7646->7649 7652 7ff71f483b3e 7646->7652 7648 7ff71f482660 6 API calls 7647->7648 7682 7ff71f4829f6 7648->7682 7650 7ff71f4825f0 3 API calls 7649->7650 7651 7ff71f484f1e 7650->7651 7658 7ff71f484f70 ungetc 7651->7658 7653 7ff71f4825f0 3 API calls 7652->7653 7668 7ff71f4831a1 7652->7668 7653->7668 7654 7ff71f483774 7663 7ff71f482660 6 API calls 7654->7663 7655 7ff71f484ad1 tolower 7655->7654 7655->7668 7656 7ff71f4825f0 realloc malloc free 7656->7668 7657 7ff71f484a91 isxdigit 7657->7668 7658->7668 7659 7ff71f485ccf realloc 7659->7668 7660 7ff71f4860cf 7662 7ff71f482660 6 API calls 7660->7662 7661 7ff71f485255 tolower 7661->7668 7662->7682 7663->7682 7664 7ff71f484fcb tolower 7664->7654 7664->7668 7665 7ff71f485b2e ungetc 7665->7668 7666 7ff71f483cdc 7667 7ff71f48361e isspace 7667->7668 7668->7654 7668->7655 7668->7656 7668->7657 7668->7659 7668->7660 7668->7661 7668->7664 7668->7665 7668->7666 7668->7667 7669 7ff71f483c96 _strtoi64 7668->7669 7670 7ff71f48605b ungetc 7668->7670 7671 7ff71f484c3e ungetc 7668->7671 7672 7ff71f48ed00 6 API calls 7668->7672 7673 7ff71f485cb1 _errno 7668->7673 7674 7ff71f483674 _errno 7668->7674 7675 7ff71f48573e 7668->7675 7676 7ff71f4860c7 7668->7676 7683 7ff71f4843a3 _errno 7668->7683 7684 7ff71f483201 realloc 7668->7684 7685 7ff71f483720 7668->7685 7687 7ff71f483284 _errno 7668->7687 7688 7ff71f4844ff realloc 7668->7688 7669->7654 7669->7668 7670->7668 7671->7668 7672->7668 7677 7ff71f483690 free 7674->7677 7678 7ff71f4829c1 7674->7678 7681 7ff71f482660 6 API calls 7675->7681 7676->7660 7676->7675 7677->7677 7677->7678 7679 7ff71f4829e9 free 7678->7679 7680 7ff71f4829d5 free 7678->7680 7679->7682 7680->7679 7681->7682 7683->7668 7684->7668 7686 7ff71f482570 3 API calls 7685->7686 7686->7682 7687->7678 7689 7ff71f4832a0 free 7687->7689 7688->7668 7689->7678 7689->7689 7690 7ff71f4888f1 7691 7ff71f4888fa localeconv 7690->7691 7695 7ff71f488278 7690->7695 7692 7ff71f48ed00 6 API calls 7691->7692 7692->7695 7693 7ff71f4867b0 fputc 7693->7695 7694 7ff71f48836f 7695->7693 7695->7694 7696 7ff71f4885f5 7697 7ff71f488634 7696->7697 7698 7ff71f488616 7696->7698 7699 7ff71f486810 6 API calls 7697->7699 7700 7ff71f4869a0 3 API calls 7698->7700 7701 7ff71f488842 7699->7701 7700->7697 7701->7701 6852 7ff71f488567 6854 7ff71f48857e 6852->6854 6855 7ff71f488778 6852->6855 6853 7ff71f486b40 3 API calls 6856 7ff71f4885eb 6853->6856 6854->6856 6857 7ff71f488b09 6854->6857 6855->6854 6855->6856 6862 7ff71f486b40 6855->6862 6856->6853 6866 7ff71f487d20 6856->6866 6860 7ff71f486b40 3 API calls 6857->6860 6861 7ff71f488c82 6860->6861 6861->6861 6863 7ff71f486b54 6862->6863 6871 7ff71f4869a0 6863->6871 6867 7ff71f487d3b 6866->6867 6868 7ff71f4867b0 fputc 6867->6868 6879 7ff71f487420 6867->6879 6894 7ff71f486810 6867->6894 6868->6867 6872 7ff71f486a88 6871->6872 6873 7ff71f4869cb 6871->6873 6872->6873 6875 7ff71f4867b0 fputc 6872->6875 6874 7ff71f486a75 6873->6874 6876 7ff71f486a25 fputc 6873->6876 6878 7ff71f486a30 6873->6878 6874->6854 6875->6872 6876->6873 6877 7ff71f486a66 fputc 6877->6878 6878->6874 6878->6877 6880 7ff71f48743c 6879->6880 6881 7ff71f487510 localeconv 6879->6881 6882 7ff71f4874f0 6880->6882 6885 7ff71f487449 6880->6885 6907 7ff71f48ed00 ___mb_cur_max_func ___lc_codepage_func 6881->6907 6884 7ff71f4867b0 fputc 6882->6884 6886 7ff71f4874fd 6884->6886 6904 7ff71f48ea60 ___mb_cur_max_func ___lc_codepage_func 6885->6904 6886->6867 6889 7ff71f487536 6890 7ff71f4867b0 fputc 6889->6890 6891 7ff71f4874db 6890->6891 6891->6867 6892 7ff71f4874c5 fputc 6892->6891 6893 7ff71f487481 6892->6893 6893->6891 6893->6892 6895 7ff71f48ea60 4 API calls 6894->6895 6896 7ff71f48683f 6895->6896 6897 7ff71f486859 6896->6897 6900 7ff71f4867b0 fputc 6896->6900 6898 7ff71f48692a 6897->6898 6899 7ff71f48ea60 4 API calls 6897->6899 6901 7ff71f4868fd 6897->6901 6903 7ff71f4868d6 fputc 6897->6903 6898->6867 6899->6897 6900->6896 6901->6898 6902 7ff71f4867b0 fputc 6901->6902 6902->6901 6903->6897 6910 7ff71f48e9d0 6904->6910 6906 7ff71f487479 6906->6889 6906->6893 6908 7ff71f48eba0 4 API calls 6907->6908 6909 7ff71f48ed5b 6908->6909 6909->6889 6911 7ff71f48ea00 WideCharToMultiByte 6910->6911 6912 7ff71f48e9e4 6910->6912 6911->6912 6913 7ff71f48ea44 _errno 6911->6913 6912->6913 6914 7ff71f48e9eb 6912->6914 6913->6906 6914->6906 6915 7ff71f488768 6917 7ff71f48857e 6915->6917 6918 7ff71f488778 6915->6918 6916 7ff71f486b40 3 API calls 6919 7ff71f4885eb 6916->6919 6917->6919 6920 7ff71f488b09 6917->6920 6918->6917 6918->6919 6922 7ff71f486b40 3 API calls 6918->6922 6919->6916 6921 7ff71f487d20 14 API calls 6919->6921 6923 7ff71f486b40 3 API calls 6920->6923 6921->6919 6922->6917 6924 7ff71f488c82 6923->6924 6924->6924 6925 7ff71f483770 6926 7ff71f483774 6925->6926 6927 7ff71f482660 6 API calls 6926->6927 6928 7ff71f4829f6 6927->6928 7702 7ff71f4813f0 7705 7ff71f481180 7702->7705 7704 7ff71f481406 7706 7ff71f4811b0 7705->7706 7707 7ff71f4811b9 Sleep 7706->7707 7708 7ff71f4811cd 7706->7708 7707->7706 7709 7ff71f48134c _initterm 7708->7709 7710 7ff71f481200 7708->7710 7714 7ff71f4813a0 7708->7714 7709->7710 7711 7ff71f4818f0 9 API calls 7710->7711 7712 7ff71f481228 SetUnhandledExceptionFilter 7711->7712 7713 7ff71f48124b 7712->7713 7715 7ff71f481250 malloc 7713->7715 7715->7714 7716 7ff71f48127a 7715->7716 7717 7ff71f481280 strlen malloc memcpy 7716->7717 7717->7717 7718 7ff71f4812b2 7717->7718 7719 7ff71f481500 _onexit 7718->7719 7720 7ff71f4812c8 7719->7720 7721 7ff71f48f2d0 84 API calls 7720->7721 7722 7ff71f4812ee 7721->7722 7722->7704 7722->7714 6929 7ff71f488664 6930 7ff71f48867b 6929->6930 6933 7ff71f488690 6929->6933 6935 7ff71f487ba0 6930->6935 6932 7ff71f487ba0 34 API calls 6934 7ff71f4888d5 6932->6934 6933->6932 6936 7ff71f487bb9 6935->6936 6937 7ff71f487cb8 6935->6937 6955 7ff71f4866c0 6936->6955 6939 7ff71f486b40 3 API calls 6937->6939 6941 7ff71f487cdf 6939->6941 6941->6933 6942 7ff71f487bf4 6943 7ff71f487c60 6942->6943 6946 7ff71f487c08 6942->6946 6944 7ff71f487c6f 6943->6944 6945 7ff71f487c64 strlen 6943->6945 6991 7ff71f487950 6944->6991 6945->6944 6947 7ff71f487cf0 strlen 6946->6947 6948 7ff71f487c10 6946->6948 6947->6948 6959 7ff71f487570 6948->6959 6952 7ff71f487c27 6953 7ff71f487c4a 6952->6953 6954 7ff71f4867b0 fputc 6952->6954 6953->6933 6954->6952 6956 7ff71f4866e4 6955->6956 6997 7ff71f488f00 6956->6997 6958 7ff71f48674d 6958->6937 6958->6942 6974 7ff71f487590 6959->6974 6960 7ff71f48760b 6961 7ff71f4876e6 6960->6961 6969 7ff71f487613 6960->6969 6962 7ff71f4867b0 fputc 6961->6962 6975 7ff71f487627 6962->6975 6963 7ff71f487828 6965 7ff71f4867b0 fputc 6963->6965 6964 7ff71f48761f 6966 7ff71f487920 6964->6966 6964->6975 6965->6975 6968 7ff71f4867b0 fputc 6966->6968 6967 7ff71f487643 6970 7ff71f487750 6967->6970 6978 7ff71f48764b 6967->6978 6984 7ff71f4876a7 6968->6984 6969->6963 6969->6964 6971 7ff71f4867b0 fputc 6970->6971 6971->6984 6972 7ff71f4867b0 fputc 6972->6974 6973 7ff71f4867b0 fputc 6973->6975 6974->6960 6974->6961 6974->6969 6974->6972 6975->6967 6975->6973 6976 7ff71f4867b0 fputc 6976->6978 6977 7ff71f487420 13 API calls 6980 7ff71f487770 6977->6980 6978->6976 6981 7ff71f4876a0 6978->6981 6989 7ff71f486810 6 API calls 6978->6989 6979 7ff71f487944 6979->6979 6980->6979 6982 7ff71f4867b0 fputc 6980->6982 6985 7ff71f487710 6980->6985 6983 7ff71f487708 6981->6983 6981->6984 6982->6980 6988 7ff71f487420 13 API calls 6983->6988 6984->6977 6984->6980 6986 7ff71f4876b1 6984->6986 6987 7ff71f487740 6985->6987 6990 7ff71f4867b0 fputc 6985->6990 6986->6952 6987->6952 6988->6985 6989->6978 6990->6985 6992 7ff71f48797e 6991->6992 6993 7ff71f487570 14 API calls 6992->6993 6994 7ff71f4879e3 6993->6994 6995 7ff71f4867b0 fputc 6994->6995 6996 7ff71f487a04 6995->6996 6998 7ff71f4891c0 6997->6998 7001 7ff71f488f67 6997->7001 7004 7ff71f48922a 6998->7004 7033 7ff71f48aa40 6998->7033 6999 7ff71f489208 7039 7ff71f488cd0 6999->7039 7001->6998 7001->6999 7026 7ff71f48a950 7001->7026 7004->6958 7005 7ff71f489060 7007 7ff71f489615 7005->7007 7008 7ff71f488c90 7 API calls 7005->7008 7010 7ff71f48ab70 7 API calls 7005->7010 7011 7ff71f48af10 9 API calls 7005->7011 7012 7ff71f48a348 7005->7012 7014 7ff71f48aa40 6 API calls 7005->7014 7016 7ff71f48aab0 9 API calls 7005->7016 7019 7ff71f48954b 7005->7019 7021 7ff71f48971f 7005->7021 7024 7ff71f48ad90 12 API calls 7005->7024 7043 7ff71f48b070 7005->7043 7050 7ff71f48ac30 7005->7050 7006 7ff71f488f9d 7006->6998 7006->7005 7007->6958 7008->7005 7010->7005 7011->7005 7015 7ff71f48a950 7 API calls 7012->7015 7013 7ff71f48aa40 6 API calls 7017 7ff71f489748 7013->7017 7014->7005 7018 7ff71f48a355 memcpy 7015->7018 7016->7005 7017->7019 7022 7ff71f48aa40 6 API calls 7017->7022 7056 7ff71f48af10 7018->7056 7023 7ff71f48aa40 6 API calls 7019->7023 7021->7013 7022->7019 7023->7004 7024->7005 7064 7ff71f48a820 7026->7064 7029 7ff71f48a977 7031 7ff71f48a9d7 7029->7031 7032 7ff71f48a987 LeaveCriticalSection 7029->7032 7030 7ff71f48a9ba malloc 7030->7029 7030->7031 7031->7006 7032->7031 7034 7ff71f48aa86 7033->7034 7035 7ff71f48aa4d 7033->7035 7034->6999 7036 7ff71f48a820 5 API calls 7035->7036 7037 7ff71f48aa67 7036->7037 7037->7034 7038 7ff71f48aa90 LeaveCriticalSection 7037->7038 7040 7ff71f488ce3 7039->7040 7041 7ff71f48a950 7 API calls 7040->7041 7042 7ff71f488d04 7041->7042 7042->7004 7044 7ff71f48b093 7043->7044 7045 7ff71f48b0c9 7043->7045 7044->7045 7047 7ff71f48b210 7044->7047 7046 7ff71f48a950 7 API calls 7045->7046 7049 7ff71f48b0d8 7046->7049 7048 7ff71f48a950 7 API calls 7047->7048 7048->7049 7049->7005 7051 7ff71f48ac53 7050->7051 7052 7ff71f48a950 7 API calls 7051->7052 7053 7ff71f48ac78 7052->7053 7054 7ff71f48ac94 memset 7053->7054 7055 7ff71f48acb7 7053->7055 7054->7055 7055->7005 7057 7ff71f48af40 7056->7057 7057->7057 7058 7ff71f48a950 7 API calls 7057->7058 7059 7ff71f48af4f 7058->7059 7060 7ff71f48affe 7059->7060 7061 7ff71f48af63 memset 7059->7061 7062 7ff71f48af77 7059->7062 7060->7021 7061->7062 7063 7ff71f48aa40 6 API calls 7062->7063 7063->7060 7065 7ff71f48a838 7064->7065 7071 7ff71f48a83c 7064->7071 7067 7ff71f48a887 InitializeCriticalSection InitializeCriticalSection 7065->7067 7065->7071 7066 7ff71f48a8b6 EnterCriticalSection 7066->7071 7072 7ff71f481410 _onexit 7067->7072 7068 7ff71f48a86b 7068->7029 7068->7030 7069 7ff71f48a850 Sleep 7069->7069 7069->7071 7071->7066 7071->7068 7071->7069 7072->7071 7073 7ff71f483d58 7074 7ff71f4846ab 7073->7074 7077 7ff71f483d70 7073->7077 7075 7ff71f483e38 7074->7075 7076 7ff71f4846c0 7074->7076 7078 7ff71f483e9b free 7075->7078 7079 7ff71f483eb3 malloc 7075->7079 7080 7ff71f485c88 7075->7080 7081 7ff71f485e00 7075->7081 7087 7ff71f483ed8 7075->7087 7211 7ff71f48376c 7075->7211 7076->7081 7083 7ff71f4846ea malloc 7076->7083 7205 7ff71f48573e 7076->7205 7077->7075 7077->7081 7082 7ff71f483dab malloc 7077->7082 7077->7205 7078->7079 7079->7087 7088 7ff71f485cb1 _errno 7080->7088 7094 7ff71f485ff1 ungetc 7081->7094 7085 7ff71f486159 7082->7085 7086 7ff71f483de5 7082->7086 7083->7087 7084 7ff71f482660 6 API calls 7142 7ff71f4829f6 7084->7142 7091 7ff71f482660 6 API calls 7085->7091 7086->7075 7089 7ff71f483e02 malloc 7086->7089 7092 7ff71f48472c 7087->7092 7093 7ff71f48471b free 7087->7093 7102 7ff71f483f1b 7087->7102 7089->7075 7090 7ff71f482660 6 API calls 7090->7142 7091->7142 7095 7ff71f484754 free 7092->7095 7096 7ff71f484740 free 7092->7096 7093->7092 7093->7093 7237 7ff71f4860cf 7094->7237 7095->7102 7096->7095 7097 7ff71f485c58 7099 7ff71f482660 6 API calls 7097->7099 7098 7ff71f482660 6 API calls 7098->7142 7099->7142 7100 7ff71f486373 ungetc 7100->7102 7101 7ff71f48ed00 6 API calls 7101->7102 7102->7097 7102->7100 7102->7101 7104 7ff71f485578 7102->7104 7105 7ff71f4848cc realloc 7102->7105 7107 7ff71f485150 7102->7107 7102->7237 7103 7ff71f485c1c realloc 7103->7107 7104->7088 7114 7ff71f4855e3 realloc 7104->7114 7151 7ff71f482901 7104->7151 7104->7211 7105->7102 7106 7ff71f48561b 7112 7ff71f485682 realloc 7106->7112 7106->7151 7106->7211 7107->7094 7107->7097 7107->7103 7107->7106 7107->7237 7108 7ff71f482af0 strlen 7109 7ff71f48ee80 4 API calls 7108->7109 7109->7151 7110 7ff71f482ab9 7116 7ff71f482ade free 7110->7116 7117 7ff71f482acf free 7110->7117 7111 7ff71f48291a isspace 7111->7151 7112->7151 7113 7ff71f482a25 7118 7ff71f482a43 isspace 7113->7118 7123 7ff71f482a6f 7113->7123 7114->7151 7115 7ff71f482aa8 free 7115->7110 7115->7115 7116->7142 7116->7211 7117->7116 7118->7113 7120 7ff71f482a50 7118->7120 7119 7ff71f482ca0 7124 7ff71f4840a6 7119->7124 7130 7ff71f482cce _errno _errno 7119->7130 7168 7ff71f484eaf 7119->7168 7181 7ff71f482e44 7119->7181 7122 7ff71f485556 ungetc 7120->7122 7120->7123 7121 7ff71f48410f 7125 7ff71f484136 7121->7125 7126 7ff71f483720 7121->7126 7122->7123 7123->7110 7123->7115 7124->7126 7134 7ff71f4840bf 7124->7134 7131 7ff71f4829c1 7125->7131 7143 7ff71f484150 free 7125->7143 7129 7ff71f482570 3 API calls 7126->7129 7127 7ff71f482947 isspace 7127->7151 7128 7ff71f48295f 7135 7ff71f482979 7128->7135 7136 7ff71f4832c0 ungetc 7128->7136 7129->7142 7144 7ff71f482d18 7130->7144 7139 7ff71f4829e9 free 7131->7139 7140 7ff71f4829d5 free 7131->7140 7132 7ff71f483fdd 7137 7ff71f483ff7 7132->7137 7138 7ff71f484f70 ungetc 7132->7138 7133 7ff71f484056 7133->7131 7153 7ff71f484090 free 7133->7153 7134->7131 7141 7ff71f4840d0 free 7134->7141 7135->7131 7150 7ff71f4829b0 free 7135->7150 7154 7ff71f4832d9 _errno 7136->7154 7137->7126 7146 7ff71f484026 7137->7146 7238 7ff71f483165 7138->7238 7139->7142 7140->7139 7141->7131 7141->7141 7143->7131 7143->7143 7145 7ff71f482d3e _errno 7144->7145 7157 7ff71f482d2a isspace 7144->7157 7145->7124 7145->7144 7146->7131 7158 7ff71f484040 free 7146->7158 7147 7ff71f482b80 7147->7119 7147->7133 7148 7ff71f4836c2 7152 7ff71f4836c0 7148->7152 7161 7ff71f4836de 7148->7161 7173 7ff71f483a78 7148->7173 7149 7ff71f482e85 7156 7ff71f482e9b 7149->7156 7149->7173 7150->7131 7150->7150 7151->7108 7151->7111 7151->7113 7151->7121 7151->7127 7151->7128 7151->7132 7151->7147 7159 7ff71f482d82 7151->7159 7160 7ff71f482d60 isspace 7151->7160 7152->7131 7165 7ff71f483708 free 7152->7165 7153->7131 7153->7153 7154->7181 7155 7ff71f483121 7172 7ff71f48577b 7155->7172 7155->7211 7155->7238 7174 7ff71f482ece malloc 7156->7174 7156->7205 7221 7ff71f482f56 7156->7221 7156->7238 7157->7144 7157->7154 7158->7131 7158->7158 7159->7126 7163 7ff71f482d8e 7159->7163 7160->7151 7164 7ff71f4836e7 7161->7164 7189 7ff71f48336f 7161->7189 7162 7ff71f48379b 7162->7155 7162->7221 7163->7131 7179 7ff71f482da0 free 7163->7179 7164->7152 7169 7ff71f4840e6 7164->7169 7165->7131 7165->7165 7166 7ff71f484daa ungetc 7166->7181 7167 7ff71f483074 7170 7ff71f483096 malloc 7167->7170 7167->7205 7168->7131 7175 7ff71f484ee6 free 7168->7175 7169->7121 7180 7ff71f483cdc 7169->7180 7169->7238 7170->7085 7178 7ff71f4830d8 7170->7178 7171 7ff71f48342b 7171->7097 7171->7211 7229 7ff71f483470 7171->7229 7171->7238 7172->7126 7176 7ff71f485787 7172->7176 7173->7097 7186 7ff71f483b29 7173->7186 7173->7211 7182 7ff71f482f0d 7174->7182 7174->7238 7175->7131 7175->7175 7184 7ff71f4857a5 7176->7184 7185 7ff71f485794 free 7176->7185 7177 7ff71f484fcb tolower 7177->7211 7177->7238 7178->7155 7188 7ff71f4830f5 malloc 7178->7188 7179->7131 7179->7179 7181->7148 7181->7149 7181->7152 7181->7155 7181->7162 7181->7166 7181->7167 7187 7ff71f4835a6 7181->7187 7181->7189 7192 7ff71f483503 7181->7192 7190 7ff71f482f2a malloc 7182->7190 7182->7221 7183 7ff71f485b2e ungetc 7183->7238 7184->7139 7191 7ff71f4857bd free 7184->7191 7185->7184 7185->7185 7193 7ff71f484efc 7186->7193 7210 7ff71f483b3e 7186->7210 7202 7ff71f485bce 7187->7202 7187->7211 7187->7238 7188->7155 7189->7171 7194 7ff71f4833b2 malloc 7189->7194 7189->7205 7189->7238 7190->7221 7191->7139 7197 7ff71f48350b 7192->7197 7192->7221 7195 7ff71f4825f0 3 API calls 7193->7195 7194->7085 7198 7ff71f4833e2 7194->7198 7199 7ff71f484f1e 7195->7199 7196 7ff71f4834c7 isspace 7200 7ff71f484e80 7196->7200 7196->7229 7201 7ff71f48352d malloc 7197->7201 7197->7205 7198->7171 7204 7ff71f4833ff malloc 7198->7204 7199->7138 7200->7168 7212 7ff71f485d0f ungetc 7200->7212 7201->7085 7207 7ff71f48355d 7201->7207 7202->7126 7209 7ff71f485bdc 7202->7209 7203 7ff71f483201 realloc 7203->7238 7204->7171 7205->7084 7206 7ff71f484c6a 7224 7ff71f484ca3 realloc 7206->7224 7206->7229 7207->7187 7215 7ff71f48357a malloc 7207->7215 7208 7ff71f48361e isspace 7208->7238 7209->7184 7217 7ff71f485bed free 7209->7217 7219 7ff71f4825f0 3 API calls 7210->7219 7210->7238 7211->7090 7212->7238 7213 7ff71f483c96 _strtoi64 7213->7211 7213->7238 7214 7ff71f48301d realloc 7214->7221 7215->7187 7216 7ff71f48605b ungetc 7216->7238 7217->7217 7222 7ff71f485bfe 7217->7222 7218 7ff71f4825f0 realloc malloc free 7218->7238 7219->7238 7220 7ff71f484ad1 tolower 7220->7211 7220->7238 7221->7126 7221->7206 7221->7211 7221->7214 7221->7238 7222->7097 7222->7184 7223 7ff71f484a91 isxdigit 7223->7238 7224->7229 7225 7ff71f48ed00 6 API calls 7225->7238 7226 7ff71f484ce6 realloc 7226->7229 7227 7ff71f483284 _errno 7227->7131 7230 7ff71f4832a0 free 7227->7230 7228 7ff71f485ccf realloc 7228->7238 7229->7196 7229->7226 7229->7237 7229->7238 7230->7131 7230->7230 7231 7ff71f485255 tolower 7231->7238 7232 7ff71f4844ff realloc 7232->7238 7233 7ff71f4843a3 _errno 7233->7238 7234 7ff71f483674 _errno 7234->7131 7236 7ff71f483690 free 7234->7236 7235 7ff71f4860c7 7235->7205 7235->7237 7236->7131 7236->7236 7237->7098 7238->7088 7238->7126 7238->7177 7238->7180 7238->7183 7238->7203 7238->7205 7238->7208 7238->7211 7238->7213 7238->7216 7238->7218 7238->7220 7238->7223 7238->7225 7238->7227 7238->7228 7238->7231 7238->7232 7238->7233 7238->7234 7238->7235 7238->7237 7239 7ff71f484c3e ungetc 7238->7239 7239->7238 7240 7ff71f48f05a 7241 7ff71f48f05d _strrev 7240->7241 7243 7ff71f48f125 7241->7243 7244 7ff71f48f0ea 7241->7244 7244->7243 7245 7ff71f48f180 77 API calls 7244->7245 7245->7244 7723 7ff71f4888da 7724 7ff71f4867b0 fputc 7723->7724 7725 7ff71f4888ec 7724->7725 7725->7725 7246 7ff71f481560 7247 7ff71f481572 7246->7247 7248 7ff71f481582 7247->7248 7251 7ff71f481fb0 7247->7251 7250 7ff71f4815d5 7252 7ff71f481fbe 7251->7252 7253 7ff71f482070 7251->7253 7254 7ff71f481fc4 7252->7254 7256 7ff71f481fd2 7252->7256 7257 7ff71f482010 7252->7257 7253->7250 7255 7ff71f482090 InitializeCriticalSection 7254->7255 7254->7256 7255->7256 7256->7250 7257->7256 7258 7ff71f482049 DeleteCriticalSection 7257->7258 7259 7ff71f482038 free 7257->7259 7258->7256 7259->7258 7259->7259 7729 7ff71f4864e0 7730 7ff71f4864eb 7729->7730 7731 7ff71f4827f0 77 API calls 7730->7731 7732 7ff71f486510 7731->7732 7260 7ff71f488390 7261 7ff71f488b22 7260->7261 7262 7ff71f4883a2 7260->7262 7283 7ff71f487090 7261->7283 7262->7261 7263 7ff71f488c00 7262->7263 7264 7ff71f4883d5 7262->7264 7270 7ff71f486be0 7264->7270 7268 7ff71f487ba0 34 API calls 7269 7ff71f4888d5 7268->7269 7271 7ff71f486c9a 7270->7271 7272 7ff71f486c04 7270->7272 7275 7ff71f486fca memset 7271->7275 7280 7ff71f486e19 7271->7280 7281 7ff71f486d7f 7271->7281 7282 7ff71f48706c memset 7271->7282 7272->7271 7274 7ff71f486d50 memset 7272->7274 7273 7ff71f486ea5 7277 7ff71f486eef fputc 7273->7277 7278 7ff71f486dc0 7273->7278 7274->7271 7275->7271 7275->7281 7276 7ff71f486e92 fputc 7276->7273 7276->7281 7277->7273 7278->7268 7279 7ff71f4867b0 fputc 7279->7280 7280->7279 7280->7281 7281->7273 7281->7276 7281->7278 7282->7271 7284 7ff71f4870c5 7283->7284 7285 7ff71f4871ba memset 7284->7285 7286 7ff71f4871d0 7284->7286 7285->7286 7287 7ff71f487217 7286->7287 7288 7ff71f4873a2 7286->7288 7291 7ff71f48720a 7286->7291 7289 7ff71f48727d fputc 7287->7289 7293 7ff71f487236 7287->7293 7288->7287 7290 7ff71f4873b3 memset 7288->7290 7289->7287 7289->7293 7290->7287 7291->7287 7294 7ff71f4867b0 fputc 7291->7294 7292 7ff71f4872e8 7292->7263 7293->7292 7295 7ff71f4872d0 fputc 7293->7295 7294->7291 7295->7293 7733 7ff71f488810 7734 7ff71f48881f 7733->7734 7735 7ff71f486810 6 API calls 7734->7735 7736 7ff71f488842 7735->7736 7736->7736 7741 7ff71f488408 7742 7ff71f488b69 7741->7742 7744 7ff71f48841e 7741->7744 7743 7ff71f487090 5 API calls 7743->7744 7744->7743 7296 7ff71f481c94 7297 7ff71f481c6c 7296->7297 7299 7ff71f481c9a 7296->7299 7298 7ff71f481d26 7299->7298 7300 7ff71f481e0b signal 7299->7300 7301 7ff71f481d0b signal 7299->7301 7300->7298 7301->7299 7302 7ff71f481df7 signal 7301->7302 7302->7298 7303 7ff71f48bb89 7304 7ff71f48bbab 7303->7304 7308 7ff71f48bb10 7303->7308 7305 7ff71f48d0e9 7405 7ff71f48d860 localeconv 7305->7405 7307 7ff71f48bc61 7309 7ff71f48aa40 6 API calls 7307->7309 7350 7ff71f48e1f0 7307->7350 7308->7305 7308->7307 7310 7ff71f48d182 7308->7310 7314 7ff71f48bfcd 7308->7314 7347 7ff71f48bd9e 7308->7347 7309->7307 7312 7ff71f48b550 11 API calls 7310->7312 7311 7ff71f48b360 7 API calls 7311->7347 7312->7347 7314->7347 7354 7ff71f48b550 7314->7354 7317 7ff71f48d088 _errno 7317->7347 7318 7ff71f48c89c 7319 7ff71f48af10 9 API calls 7318->7319 7319->7307 7320 7ff71f48af10 9 API calls 7320->7347 7321 7ff71f48ceba 7323 7ff71f48ced8 _errno 7321->7323 7322 7ff71f48ce0a 7322->7307 7326 7ff71f48cff8 _errno 7322->7326 7323->7307 7325 7ff71f48be15 7326->7307 7327 7ff71f48a950 7 API calls 7328 7ff71f48c27d memcpy 7327->7328 7330 7ff71f48a950 7 API calls 7328->7330 7329 7ff71f48aa40 6 API calls 7329->7347 7332 7ff71f48c2ad memcpy 7330->7332 7331 7ff71f48cd5c 7333 7ff71f48aa40 6 API calls 7331->7333 7378 7ff71f48ab70 7332->7378 7335 7ff71f48cd69 7333->7335 7336 7ff71f48cdb6 memset 7335->7336 7337 7ff71f48cdc8 7335->7337 7336->7337 7337->7307 7337->7322 7337->7323 7338 7ff71f48cb70 7340 7ff71f48af10 9 API calls 7338->7340 7342 7ff71f48cb92 7340->7342 7341 7ff71f48ad90 12 API calls 7341->7347 7344 7ff71f48aa40 6 API calls 7342->7344 7343 7ff71f48ac30 8 API calls 7343->7347 7345 7ff71f48cbb2 7344->7345 7346 7ff71f48aa40 6 API calls 7345->7346 7346->7325 7347->7305 7347->7307 7347->7311 7347->7317 7347->7318 7347->7320 7347->7321 7347->7325 7347->7327 7347->7329 7347->7331 7347->7337 7347->7338 7347->7341 7347->7343 7348 7ff71f48b070 7 API calls 7347->7348 7370 7ff71f48e5e0 7347->7370 7385 7ff71f48d670 7347->7385 7393 7ff71f48b950 7347->7393 7433 7ff71f48b490 7347->7433 7348->7347 7351 7ff71f48e21b 7350->7351 7352 7ff71f48e253 7351->7352 7353 7ff71f48e39e memset 7351->7353 7352->7307 7353->7352 7439 7ff71f48b360 7354->7439 7357 7ff71f48b680 7358 7ff71f48b7e0 7357->7358 7364 7ff71f48b660 7357->7364 7367 7ff71f48b5ea 7357->7367 7360 7ff71f48af10 9 API calls 7358->7360 7359 7ff71f48aa40 6 API calls 7361 7ff71f48b668 7359->7361 7362 7ff71f48b760 7360->7362 7361->7347 7363 7ff71f48b800 _errno 7362->7363 7362->7364 7363->7364 7364->7359 7365 7ff71f48b5a5 7366 7ff71f48b490 9 API calls 7365->7366 7365->7367 7366->7367 7367->7362 7367->7364 7368 7ff71f48b6a9 7367->7368 7368->7364 7369 7ff71f48b490 9 API calls 7368->7369 7369->7364 7371 7ff71f48e616 7370->7371 7372 7ff71f48a950 7 API calls 7371->7372 7375 7ff71f48e62e 7372->7375 7374 7ff71f48e69e 7374->7347 7376 7ff71f48e66e 7375->7376 7442 7ff71f48aab0 7375->7442 7376->7374 7377 7ff71f48aab0 9 API calls 7376->7377 7377->7376 7379 7ff71f48a820 5 API calls 7378->7379 7380 7ff71f48ab7e 7379->7380 7381 7ff71f48ab8a 7380->7381 7384 7ff71f48abdd malloc 7380->7384 7382 7ff71f48ac00 LeaveCriticalSection 7381->7382 7383 7ff71f48ab9d 7381->7383 7382->7383 7383->7347 7384->7381 7384->7383 7386 7ff71f48d68e 7385->7386 7387 7ff71f48a950 7 API calls 7386->7387 7388 7ff71f48d69f 7387->7388 7389 7ff71f48d795 7388->7389 7390 7ff71f48a950 7 API calls 7388->7390 7389->7347 7391 7ff71f48d7cb memcpy 7390->7391 7392 7ff71f48aa40 6 API calls 7391->7392 7392->7389 7394 7ff71f48ba30 7393->7394 7404 7ff71f48b96b 7393->7404 7397 7ff71f48aa40 6 API calls 7394->7397 7395 7ff71f48b9c8 7400 7ff71f48ba15 7395->7400 7401 7ff71f48b9d9 memset 7395->7401 7396 7ff71f48b979 7398 7ff71f48b987 memset 7396->7398 7399 7ff71f48b9ba 7396->7399 7402 7ff71f48ba35 7397->7402 7398->7399 7399->7347 7400->7347 7401->7400 7403 7ff71f48a950 7 API calls 7402->7403 7403->7404 7404->7395 7404->7396 7417 7ff71f48d89f 7405->7417 7428 7ff71f48d9dc 7405->7428 7406 7ff71f48d95b 7407 7ff71f48dd20 7406->7407 7408 7ff71f48d969 7406->7408 7411 7ff71f48df36 7407->7411 7412 7ff71f48dd29 7407->7412 7414 7ff71f48d97b 7408->7414 7422 7ff71f48dc45 7408->7422 7409 7ff71f48aa40 6 API calls 7410 7ff71f48de58 _errno 7409->7410 7410->7428 7415 7ff71f48ddc5 _errno 7411->7415 7411->7422 7412->7415 7420 7ff71f48dd43 7412->7420 7413 7ff71f48a950 7 API calls 7413->7417 7414->7410 7419 7ff71f48d984 7414->7419 7415->7428 7416 7ff71f48aa40 6 API calls 7416->7415 7417->7406 7417->7413 7418 7ff71f48dab8 strlen 7417->7418 7417->7422 7417->7428 7429 7ff71f48ddda 7417->7429 7431 7ff71f48de26 7417->7431 7432 7ff71f48dd9d 7417->7432 7418->7417 7418->7422 7423 7ff71f48a950 7 API calls 7419->7423 7421 7ff71f48a950 7 API calls 7420->7421 7424 7ff71f48dd4a _errno 7421->7424 7422->7410 7426 7ff71f48b490 9 API calls 7422->7426 7422->7428 7422->7431 7425 7ff71f48d9ac 7423->7425 7424->7428 7427 7ff71f48d9c1 memset 7425->7427 7425->7428 7426->7431 7427->7428 7428->7307 7430 7ff71f48af10 9 API calls 7429->7430 7430->7422 7431->7409 7431->7428 7432->7416 7434 7ff71f48b4b0 7433->7434 7435 7ff71f48a950 7 API calls 7434->7435 7438 7ff71f48b4c7 7434->7438 7436 7ff71f48b513 memcpy 7435->7436 7437 7ff71f48aa40 6 API calls 7436->7437 7437->7438 7438->7347 7440 7ff71f48a950 7 API calls 7439->7440 7441 7ff71f48b37c 7440->7441 7441->7357 7441->7365 7444 7ff71f48aad0 7442->7444 7443 7ff71f48aafb 7443->7375 7444->7443 7445 7ff71f48a950 7 API calls 7444->7445 7446 7ff71f48ab2b 7445->7446 7446->7443 7447 7ff71f48ab33 memcpy 7446->7447 7448 7ff71f48aa40 6 API calls 7447->7448 7448->7443 7745 7ff71f481010 7746 7ff71f48104b 7745->7746 7747 7ff71f48106d __set_app_type 7746->7747 7748 7ff71f481077 7746->7748 7747->7748 7749 7ff71f48a900 7750 7ff71f48a920 DeleteCriticalSection 7749->7750 7751 7ff71f48a915 7749->7751 7449 7ff71f488878 7450 7ff71f4886b3 7449->7450 7451 7ff71f488888 7449->7451 7458 7ff71f487ac0 7450->7458 7452 7ff71f487ac0 33 API calls 7451->7452 7455 7ff71f4888a4 7452->7455 7454 7ff71f488690 7456 7ff71f487ba0 34 API calls 7454->7456 7457 7ff71f4888d5 7456->7457 7459 7ff71f487ad4 7458->7459 7460 7ff71f4866c0 16 API calls 7459->7460 7461 7ff71f487b03 7460->7461 7462 7ff71f487b14 7461->7462 7463 7ff71f487b80 7461->7463 7465 7ff71f487570 14 API calls 7462->7465 7464 7ff71f486b40 3 API calls 7463->7464 7466 7ff71f487b8f 7464->7466 7467 7ff71f487b23 7465->7467 7466->7454 7467->7466 7468 7ff71f487b68 fputc 7467->7468 7468->7467 7752 7ff71f483d05 7755 7ff71f483d20 7752->7755 7753 7ff71f482660 6 API calls 7756 7ff71f4829f6 7753->7756 7754 7ff71f483cfd 7755->7753 7755->7754 6532 7ff71f481180 6533 7ff71f4811b0 6532->6533 6534 7ff71f4811b9 Sleep 6533->6534 6535 7ff71f4811cd 6533->6535 6534->6533 6536 7ff71f48134c _initterm 6535->6536 6537 7ff71f481200 6535->6537 6541 7ff71f4813a0 6535->6541 6536->6537 6559 7ff71f4818f0 6537->6559 6539 7ff71f481228 SetUnhandledExceptionFilter 6540 7ff71f48124b 6539->6540 6542 7ff71f481250 malloc 6540->6542 6542->6541 6543 7ff71f48127a 6542->6543 6544 7ff71f481280 strlen malloc memcpy 6543->6544 6544->6544 6545 7ff71f4812b2 6544->6545 6550 7ff71f481500 6545->6550 6547 7ff71f4812c8 6554 7ff71f48f2d0 6547->6554 6549 7ff71f4812ee 6549->6541 6551 7ff71f48150a 6550->6551 6553 7ff71f481410 _onexit 6550->6553 6551->6547 6553->6547 6555 7ff71f481500 _onexit 6554->6555 6556 7ff71f48f2d9 6555->6556 6577 7ff71f48f1b0 6556->6577 6558 7ff71f48f2de 6558->6549 6560 7ff71f481911 6559->6560 6561 7ff71f481928 6559->6561 6560->6539 6561->6560 6562 7ff71f481b1e 6561->6562 6565 7ff71f481c00 6561->6565 6573 7ff71f4819a2 6561->6573 6566 7ff71f481c2d 6562->6566 6572 7ff71f481b39 6562->6572 6564 7ff71f481c3e 6567 7ff71f481710 8 API calls 6564->6567 6565->6560 6565->6566 6817 7ff71f481780 6565->6817 6568 7ff71f481710 8 API calls 6566->6568 6569 7ff71f481c4a 6567->6569 6568->6564 6569->6539 6570 7ff71f481780 8 API calls 6570->6572 6572->6570 6789 7ff71f481710 6572->6789 6573->6560 6573->6562 6573->6564 6573->6566 6573->6572 6574 7ff71f481780 8 API calls 6573->6574 6575 7ff71f481aa8 6573->6575 6574->6573 6575->6560 6576 7ff71f481ae2 VirtualProtect 6575->6576 6576->6575 6578 7ff71f48f1f8 6577->6578 6579 7ff71f48f2bf 6578->6579 6580 7ff71f48f201 _strrev 6578->6580 6581 7ff71f48f130 fputc 6579->6581 6582 7ff71f48f255 HeapCreate HeapAlloc 6580->6582 6589 7ff71f48f216 6580->6589 6585 7ff71f48f297 6581->6585 6583 7ff71f48f2a8 6582->6583 6584 7ff71f48f27e memcpy EnumWindows 6582->6584 6593 7ff71f48f130 6583->6593 6584->6585 6585->6558 6589->6582 6590 7ff71f48f180 6589->6590 6597 7ff71f486520 6590->6597 6594 7ff71f48f15d 6593->6594 6777 7ff71f4824f0 6594->6777 6596 7ff71f48f16b 6596->6558 6598 7ff71f48652b 6597->6598 6601 7ff71f4827f0 6598->6601 6600 7ff71f486558 6600->6589 6602 7ff71f48285b 6601->6602 6603 7ff71f4843a3 _errno 6601->6603 6604 7ff71f48286c localeconv 6602->6604 6688 7ff71f483165 6603->6688 6650 7ff71f482882 6604->6650 6605 7ff71f482af0 strlen 6742 7ff71f48ee80 6605->6742 6606 7ff71f4844ff realloc 6606->6688 6608 7ff71f48291a isspace 6608->6650 6609 7ff71f485cb1 _errno 6609->6600 6610 7ff71f4840a6 6615 7ff71f483720 6610->6615 6624 7ff71f4840bf 6610->6624 6612 7ff71f482a6f 6613 7ff71f482ab9 6612->6613 6620 7ff71f482aa8 free 6612->6620 6621 7ff71f482ade free 6613->6621 6622 7ff71f482acf free 6613->6622 6614 7ff71f484136 6640 7ff71f484150 free 6614->6640 6673 7ff71f4829c1 6614->6673 6746 7ff71f482570 free 6615->6746 6616 7ff71f482947 isspace 6616->6650 6617 7ff71f48295f 6631 7ff71f482979 6617->6631 6632 7ff71f4832c0 ungetc 6617->6632 6618 7ff71f482a25 6618->6612 6633 7ff71f482a43 isspace 6618->6633 6619 7ff71f48573e 6641 7ff71f482660 6 API calls 6619->6641 6620->6613 6620->6620 6662 7ff71f48376c 6621->6662 6704 7ff71f4829f6 6621->6704 6622->6621 6623 7ff71f484056 6651 7ff71f484090 free 6623->6651 6623->6673 6639 7ff71f4840d0 free 6624->6639 6624->6673 6626 7ff71f482cce _errno _errno 6630 7ff71f482d18 6626->6630 6627 7ff71f482e44 6646 7ff71f4836c2 6627->6646 6647 7ff71f482e85 6627->6647 6655 7ff71f48379b 6627->6655 6663 7ff71f483074 6627->6663 6664 7ff71f483121 6627->6664 6667 7ff71f484daa ungetc 6627->6667 6675 7ff71f48336f 6627->6675 6689 7ff71f4835a6 6627->6689 6691 7ff71f4836c0 6627->6691 6699 7ff71f483503 6627->6699 6628 7ff71f483fdd 6634 7ff71f483ff7 6628->6634 6635 7ff71f484f70 ungetc 6628->6635 6629 7ff71f482b80 6629->6623 6629->6629 6654 7ff71f482ca0 6629->6654 6642 7ff71f482d3e _errno 6630->6642 6656 7ff71f482d2a isspace 6630->6656 6649 7ff71f4829b0 free 6631->6649 6631->6673 6652 7ff71f4832d9 _errno 6632->6652 6633->6618 6644 7ff71f482a50 6633->6644 6634->6615 6645 7ff71f484026 6634->6645 6635->6688 6636 7ff71f4860c7 6636->6619 6648 7ff71f4860cf 6636->6648 6637 7ff71f4829e9 free 6637->6704 6638 7ff71f4829d5 free 6638->6637 6639->6639 6639->6673 6640->6640 6640->6673 6641->6704 6642->6610 6642->6630 6643 7ff71f483201 realloc 6643->6688 6644->6612 6657 7ff71f485556 ungetc 6644->6657 6658 7ff71f484040 free 6645->6658 6645->6673 6661 7ff71f4836de 6646->6661 6646->6691 6706 7ff71f483a78 6646->6706 6653 7ff71f482e9b 6647->6653 6647->6706 6702 7ff71f482660 6 API calls 6648->6702 6649->6649 6649->6673 6650->6605 6650->6608 6650->6616 6650->6617 6650->6618 6650->6628 6650->6629 6659 7ff71f482d82 6650->6659 6660 7ff71f482d60 isspace 6650->6660 6650->6688 6703 7ff71f48410f 6650->6703 6651->6651 6651->6673 6652->6627 6653->6619 6676 7ff71f482ece malloc 6653->6676 6653->6688 6732 7ff71f482f56 6653->6732 6654->6610 6654->6626 6654->6627 6725 7ff71f484eaf 6654->6725 6655->6664 6655->6732 6656->6630 6656->6652 6657->6612 6658->6658 6658->6673 6659->6615 6670 7ff71f482d8e 6659->6670 6660->6650 6665 7ff71f4836e7 6661->6665 6661->6675 6751 7ff71f482660 6662->6751 6663->6619 6668 7ff71f483096 malloc 6663->6668 6664->6662 6669 7ff71f48577b 6664->6669 6664->6688 6672 7ff71f4840e6 6665->6672 6665->6691 6666 7ff71f483708 free 6666->6666 6666->6673 6667->6627 6680 7ff71f486159 6668->6680 6681 7ff71f4830d8 6668->6681 6669->6615 6678 7ff71f485787 6669->6678 6670->6673 6682 7ff71f482da0 free 6670->6682 6671 7ff71f483284 _errno 6671->6673 6683 7ff71f4832a0 free 6671->6683 6672->6688 6672->6703 6737 7ff71f483cdc 6672->6737 6673->6637 6673->6638 6674 7ff71f48342b 6674->6662 6674->6688 6694 7ff71f485c58 6674->6694 6738 7ff71f483470 6674->6738 6675->6619 6675->6674 6675->6688 6705 7ff71f4833b2 malloc 6675->6705 6685 7ff71f482f0d 6676->6685 6676->6688 6677 7ff71f484ee6 free 6677->6673 6677->6677 6686 7ff71f4857a5 6678->6686 6687 7ff71f485794 free 6678->6687 6679 7ff71f484fcb tolower 6679->6662 6679->6688 6695 7ff71f482660 6 API calls 6680->6695 6681->6664 6690 7ff71f4830f5 malloc 6681->6690 6682->6673 6682->6682 6683->6673 6683->6683 6684 7ff71f484ad1 tolower 6684->6662 6684->6688 6697 7ff71f482f2a malloc 6685->6697 6685->6732 6686->6637 6698 7ff71f4857bd free 6686->6698 6687->6686 6687->6687 6688->6603 6688->6606 6688->6609 6688->6615 6688->6619 6688->6636 6688->6643 6688->6648 6688->6662 6688->6671 6688->6679 6688->6684 6692 7ff71f485b2e ungetc 6688->6692 6696 7ff71f484a91 isxdigit 6688->6696 6710 7ff71f485ccf realloc 6688->6710 6711 7ff71f4825f0 realloc malloc free 6688->6711 6720 7ff71f48361e isspace 6688->6720 6723 7ff71f485255 tolower 6688->6723 6726 7ff71f483c96 _strtoi64 6688->6726 6729 7ff71f48605b ungetc 6688->6729 6735 7ff71f48ed00 6 API calls 6688->6735 6688->6737 6739 7ff71f484c3e ungetc 6688->6739 6740 7ff71f483674 _errno 6688->6740 6689->6662 6689->6688 6716 7ff71f485bce 6689->6716 6690->6664 6691->6666 6691->6673 6692->6688 6693 7ff71f483b29 6701 7ff71f484efc 6693->6701 6722 7ff71f483b3e 6693->6722 6700 7ff71f482660 6 API calls 6694->6700 6695->6704 6696->6688 6697->6732 6698->6637 6709 7ff71f48350b 6699->6709 6699->6732 6700->6704 6707 7ff71f4825f0 3 API calls 6701->6707 6702->6704 6703->6614 6703->6615 6704->6600 6705->6680 6712 7ff71f4833e2 6705->6712 6706->6662 6706->6693 6706->6694 6713 7ff71f484f1e 6707->6713 6708 7ff71f4834c7 isspace 6714 7ff71f484e80 6708->6714 6708->6738 6709->6619 6715 7ff71f48352d malloc 6709->6715 6710->6688 6711->6688 6712->6674 6717 7ff71f4833ff malloc 6712->6717 6713->6635 6724 7ff71f485d0f ungetc 6714->6724 6714->6725 6715->6680 6719 7ff71f48355d 6715->6719 6716->6615 6721 7ff71f485bdc 6716->6721 6717->6674 6718 7ff71f484c6a 6734 7ff71f484ca3 realloc 6718->6734 6718->6738 6719->6689 6728 7ff71f48357a malloc 6719->6728 6720->6688 6721->6686 6730 7ff71f485bed free 6721->6730 6722->6688 6760 7ff71f4825f0 6722->6760 6723->6688 6724->6688 6725->6673 6725->6677 6726->6662 6726->6688 6727 7ff71f48301d realloc 6727->6732 6728->6689 6729->6688 6730->6730 6733 7ff71f485bfe 6730->6733 6732->6615 6732->6662 6732->6688 6732->6718 6732->6727 6733->6686 6733->6694 6734->6738 6735->6688 6736 7ff71f484ce6 realloc 6736->6738 6737->6600 6738->6648 6738->6688 6738->6708 6738->6736 6739->6688 6740->6673 6741 7ff71f483690 free 6740->6741 6741->6673 6741->6741 6743 7ff71f48ee9d 6742->6743 6766 7ff71f48eba0 6743->6766 6745 7ff71f48eecd 6745->6650 6747 7ff71f482594 6746->6747 6750 7ff71f4825e0 6746->6750 6748 7ff71f4825c2 free 6747->6748 6749 7ff71f4825a0 free 6747->6749 6748->6747 6748->6750 6749->6748 6749->6749 6750->6704 6752 7ff71f4826d8 6751->6752 6754 7ff71f48267a 6751->6754 6755 7ff71f482570 3 API calls 6752->6755 6753 7ff71f482699 6757 7ff71f4826a6 free 6753->6757 6758 7ff71f4826b5 free 6753->6758 6754->6753 6756 7ff71f482688 free 6754->6756 6759 7ff71f4826e3 6755->6759 6756->6753 6756->6756 6757->6758 6758->6704 6759->6704 6761 7ff71f482608 6760->6761 6762 7ff71f48262c 6760->6762 6763 7ff71f48261c realloc 6761->6763 6764 7ff71f482640 malloc 6761->6764 6762->6688 6763->6762 6765 7ff71f482651 free 6763->6765 6764->6762 6765->6762 6767 7ff71f48ec78 6766->6767 6768 7ff71f48ebb5 6766->6768 6767->6745 6768->6767 6769 7ff71f48ec58 6768->6769 6770 7ff71f48ebe9 IsDBCSLeadByteEx 6768->6770 6775 7ff71f48ec04 6768->6775 6771 7ff71f48ecb0 MultiByteToWideChar 6769->6771 6772 7ff71f48ec63 6769->6772 6770->6769 6770->6775 6771->6772 6774 7ff71f48ecdc _errno 6771->6774 6772->6745 6773 7ff71f48ec2e MultiByteToWideChar 6773->6774 6776 7ff71f48ec48 6773->6776 6774->6767 6775->6767 6775->6773 6776->6745 6778 7ff71f482505 6777->6778 6781 7ff71f4881c0 6778->6781 6780 7ff71f48251d 6780->6596 6784 7ff71f4881eb 6781->6784 6783 7ff71f48836f 6783->6780 6784->6783 6785 7ff71f4867b0 6784->6785 6786 7ff71f4867c0 6785->6786 6787 7ff71f4867d0 6786->6787 6788 7ff71f4867f0 fputc 6786->6788 6787->6784 6788->6784 6794 7ff71f48173c 6789->6794 6790 7ff71f48184e 6790->6572 6791 7ff71f4818d2 6792 7ff71f481710 4 API calls 6791->6792 6801 7ff71f4818e1 6792->6801 6793 7ff71f48180d VirtualQuery 6793->6794 6795 7ff71f4818b7 6793->6795 6794->6790 6794->6791 6794->6793 6798 7ff71f481860 VirtualProtect 6794->6798 6797 7ff71f481710 4 API calls 6795->6797 6796 7ff71f481911 6796->6572 6797->6791 6798->6790 6799 7ff71f481898 GetLastError 6798->6799 6800 7ff71f481710 4 API calls 6799->6800 6800->6794 6801->6796 6802 7ff71f481b1e 6801->6802 6805 7ff71f481c00 6801->6805 6814 7ff71f4819a2 6801->6814 6806 7ff71f481c2d 6802->6806 6812 7ff71f481b39 6802->6812 6803 7ff71f481780 4 API calls 6803->6805 6804 7ff71f481c3e 6807 7ff71f481710 4 API calls 6804->6807 6805->6796 6805->6803 6805->6806 6808 7ff71f481710 4 API calls 6806->6808 6809 7ff71f481c4a 6807->6809 6808->6804 6809->6572 6810 7ff71f481780 VirtualQuery VirtualProtect GetLastError VirtualProtect 6810->6812 6811 7ff71f481710 4 API calls 6811->6812 6812->6810 6812->6811 6813 7ff71f481780 VirtualQuery VirtualProtect GetLastError VirtualProtect 6813->6814 6814->6796 6814->6802 6814->6804 6814->6806 6814->6812 6814->6813 6815 7ff71f481aa8 6814->6815 6815->6796 6816 7ff71f481ae2 VirtualProtect 6815->6816 6816->6815 6822 7ff71f481799 6817->6822 6818 7ff71f48184e 6818->6565 6819 7ff71f4818d2 6820 7ff71f481710 4 API calls 6819->6820 6828 7ff71f4818e1 6820->6828 6821 7ff71f48180d VirtualQuery 6821->6822 6823 7ff71f4818b7 6821->6823 6822->6818 6822->6819 6822->6821 6825 7ff71f481860 VirtualProtect 6822->6825 6824 7ff71f481710 4 API calls 6823->6824 6824->6819 6825->6818 6826 7ff71f481898 GetLastError 6825->6826 6827 7ff71f481710 4 API calls 6826->6827 6827->6822 6829 7ff71f481b1e 6828->6829 6832 7ff71f481c00 6828->6832 6838 7ff71f4819a2 6828->6838 6844 7ff71f481911 6828->6844 6833 7ff71f481c2d 6829->6833 6840 7ff71f481b39 6829->6840 6830 7ff71f481780 4 API calls 6830->6832 6831 7ff71f481c3e 6834 7ff71f481710 4 API calls 6831->6834 6832->6830 6832->6833 6832->6844 6835 7ff71f481710 4 API calls 6833->6835 6836 7ff71f481c4a 6834->6836 6835->6831 6836->6565 6837 7ff71f481780 VirtualQuery VirtualProtect GetLastError VirtualProtect 6837->6840 6838->6829 6838->6831 6838->6833 6838->6840 6841 7ff71f481780 VirtualQuery VirtualProtect GetLastError VirtualProtect 6838->6841 6843 7ff71f481aa8 6838->6843 6838->6844 6839 7ff71f481710 4 API calls 6839->6840 6840->6837 6840->6839 6841->6838 6842 7ff71f481ae2 VirtualProtect 6842->6843 6843->6842 6843->6844 6844->6565 7469 7ff71f481d80 signal 7470 7ff71f481e1f signal 7469->7470 7473 7ff71f481cc1 7469->7473 7471 7ff71f481e33 7470->7471 7472 7ff71f481d26 7473->7472 7474 7ff71f481e0b signal 7473->7474 7475 7ff71f481d0b signal 7473->7475 7474->7472 7475->7473 7476 7ff71f481df7 signal 7475->7476 7476->7472 7761 7ff71f481600 7762 7ff71f48161f 7761->7762 7763 7ff71f48165d fprintf 7762->7763 7764 7ff71f481eab 7765 7ff71f481ed0 calloc 7764->7765 7766 7ff71f481ec6 7764->7766 7765->7766 7767 7ff71f481ee7 EnterCriticalSection LeaveCriticalSection 7765->7767 7767->7766 7768 7ff71f481da8 signal 7769 7ff71f481dba signal 7768->7769 7770 7ff71f481cc1 7768->7770 7773 7ff71f481d26 7769->7773 7771 7ff71f481e0b signal 7770->7771 7772 7ff71f481d0b signal 7770->7772 7770->7773 7771->7773 7772->7770 7774 7ff71f481df7 signal 7772->7774 7774->7773 6506 22bbcde02e1 6509 22bbcde0936 6506->6509 6508 22bbcde086a 6508->6508 6510 22bbcde0945 LoadLibraryA InternetOpenA 6509->6510 6519 22bbcde0981 InternetConnectA 6510->6519 6512 22bbcde0973 InternetConnectA 6515 22bbcde09a5 6512->6515 6526 22bbcde09ee 6512->6526 6514 22bbcde09fb HttpOpenRequestA 6516 22bbcde0a13 6514->6516 6515->6514 6515->6516 6517 22bbcde0a51 SleepEx 6516->6517 6518 22bbcde0a6b 6516->6518 6517->6516 6517->6518 6518->6508 6520 22bbcde09ee 2 API calls 6519->6520 6521 22bbcde09a5 6520->6521 6522 22bbcde09fb HttpOpenRequestA 6521->6522 6525 22bbcde0a13 6521->6525 6522->6525 6523 22bbcde0a51 SleepEx 6524 22bbcde0a6b 6523->6524 6523->6525 6524->6512 6525->6523 6525->6524 6527 22bbcde09fa HttpOpenRequestA 6526->6527 6529 22bbcde0a13 6527->6529 6530 22bbcde0a51 SleepEx 6529->6530 6531 22bbcde0a6b 6529->6531 6530->6529 6530->6531 6531->6515 7775 7ff71f4888a9 7776 7ff71f488690 7775->7776 7777 7ff71f48867b 7775->7777 7779 7ff71f487ba0 34 API calls 7776->7779 7778 7ff71f487ba0 34 API calls 7777->7778 7778->7776 7780 7ff71f4888d5 7779->7780 7477 7ff71f481430 7478 7ff71f481410 _onexit 7477->7478 7479 7ff71f481530 7480 7ff71f481539 7479->7480 7481 7ff71f48153d 7480->7481 7482 7ff71f481fb0 3 API calls 7480->7482 7483 7ff71f481555 7482->7483 7484 7ff71f482130 strlen 7485 7ff71f4821ae 7484->7485 7486 7ff71f482145 7484->7486 7486->7485 7487 7ff71f482199 strncmp 7486->7487 7487->7485 7487->7486 7784 7ff71f48eaa0 ___lc_codepage_func ___mb_cur_max_func 7785 7ff71f48ead1 7784->7785 7786 7ff71f48eadb 7784->7786 7787 7ff71f48ead6 7785->7787 7790 7ff71f48eb30 7785->7790 7787->7786 7789 7ff71f48e9d0 2 API calls 7787->7789 7788 7ff71f48e9d0 2 API calls 7788->7790 7789->7787 7790->7786 7790->7788 7791 7ff71f4884a4 7792 7ff71f4884b0 7791->7792 7793 7ff71f486af0 strlen 7792->7793 7794 7ff71f4884bd 7793->7794 7794->7794 7488 7ff71f488a26 7489 7ff71f488a2a 7488->7489 7490 7ff71f488b7b 7489->7490 7491 7ff71f488a4b 7489->7491 7493 7ff71f486810 6 API calls 7490->7493 7492 7ff71f486810 6 API calls 7491->7492 7494 7ff71f488a65 7492->7494 7495 7ff71f488b92 7493->7495 7495->7495 7496 7ff71f488519 7498 7ff71f488278 7496->7498 7497 7ff71f4867b0 fputc 7497->7498 7498->7496 7498->7497 7499 7ff71f48836f 7498->7499 7799 7ff71f48869c 7800 7ff71f4886b3 7799->7800 7801 7ff71f488888 7799->7801 7803 7ff71f487ac0 33 API calls 7800->7803 7802 7ff71f487ac0 33 API calls 7801->7802 7805 7ff71f4888a4 7802->7805 7804 7ff71f488690 7803->7804 7806 7ff71f487ba0 34 API calls 7804->7806 7807 7ff71f4888d5 7806->7807 7500 7ff71f481f20 7501 7ff71f481f32 7500->7501 7502 7ff71f481f40 EnterCriticalSection 7500->7502 7503 7ff71f481f83 LeaveCriticalSection 7502->7503 7504 7ff71f481f5c 7502->7504 7504->7503 7505 7ff71f481f7e free 7504->7505 7505->7503 7506 7ff71f488453 7507 7ff71f488458 7506->7507 7508 7ff71f486be0 6 API calls 7507->7508 7508->7507 7509 7ff71f488847 7510 7ff71f4886e1 7509->7510 7511 7ff71f488857 7509->7511 7518 7ff71f487a20 7510->7518 7512 7ff71f487a20 32 API calls 7511->7512 7514 7ff71f488873 7512->7514 7515 7ff71f488690 7516 7ff71f487ba0 34 API calls 7515->7516 7517 7ff71f4888d5 7516->7517 7519 7ff71f487a34 7518->7519 7520 7ff71f4866c0 16 API calls 7519->7520 7521 7ff71f487a5a 7520->7521 7522 7ff71f487a6b 7521->7522 7523 7ff71f487aa0 7521->7523 7524 7ff71f487950 14 API calls 7522->7524 7525 7ff71f486b40 3 API calls 7523->7525 7526 7ff71f487a7a 7524->7526 7527 7ff71f487aaf 7525->7527 7526->7515 7527->7515 7811 7ff71f4886ca 7812 7ff71f4886e1 7811->7812 7813 7ff71f488857 7811->7813 7815 7ff71f487a20 32 API calls 7812->7815 7814 7ff71f487a20 32 API calls 7813->7814 7816 7ff71f488873 7814->7816 7817 7ff71f488690 7815->7817 7818 7ff71f487ba0 34 API calls 7817->7818 7819 7ff71f4888d5 7818->7819 7823 7ff71f4813d0 7824 7ff71f481180 100 API calls 7823->7824 7825 7ff71f4813e6 7824->7825 7826 7ff71f4837d0 7827 7ff71f4837e9 7826->7827 7829 7ff71f482ca0 7826->7829 7828 7ff71f482cce _errno _errno 7833 7ff71f482d18 7828->7833 7829->7827 7829->7828 7864 7ff71f482e44 7829->7864 7903 7ff71f484eaf 7829->7903 7830 7ff71f484ee6 free 7830->7830 7921 7ff71f4829c1 7830->7921 7831 7ff71f4829e9 free 7929 7ff71f4829f6 7831->7929 7832 7ff71f4829d5 free 7832->7831 7834 7ff71f482d3e _errno 7833->7834 7836 7ff71f482d2a isspace 7833->7836 7834->7833 7835 7ff71f4840b3 7834->7835 7839 7ff71f483720 7835->7839 7840 7ff71f4840bf 7835->7840 7836->7833 7846 7ff71f4832d9 _errno 7836->7846 7837 7ff71f4836c2 7844 7ff71f4836c0 7837->7844 7848 7ff71f4836de 7837->7848 7858 7ff71f483a78 7837->7858 7838 7ff71f482e85 7845 7ff71f482e9b 7838->7845 7838->7858 7843 7ff71f482570 3 API calls 7839->7843 7841 7ff71f4840d0 free 7840->7841 7840->7921 7841->7841 7841->7921 7842 7ff71f483121 7856 7ff71f48376c 7842->7856 7857 7ff71f48577b 7842->7857 7935 7ff71f483165 7842->7935 7843->7929 7850 7ff71f483708 free 7844->7850 7844->7921 7854 7ff71f48573e 7845->7854 7859 7ff71f482ece malloc 7845->7859 7886 7ff71f482f56 7845->7886 7845->7935 7846->7864 7847 7ff71f48379b 7847->7842 7847->7886 7849 7ff71f4836e7 7848->7849 7875 7ff71f48336f 7848->7875 7849->7844 7853 7ff71f4840e6 7849->7853 7850->7850 7850->7921 7851 7ff71f484daa ungetc 7851->7864 7852 7ff71f483074 7852->7854 7855 7ff71f483096 malloc 7852->7855 7882 7ff71f48410f 7853->7882 7922 7ff71f483cdc 7853->7922 7853->7935 7861 7ff71f482660 6 API calls 7854->7861 7862 7ff71f486159 7855->7862 7863 7ff71f4830d8 7855->7863 7872 7ff71f482660 6 API calls 7856->7872 7857->7839 7860 7ff71f485787 7857->7860 7858->7856 7870 7ff71f483b29 7858->7870 7871 7ff71f485c58 7858->7871 7866 7ff71f482f0d 7859->7866 7859->7935 7868 7ff71f4857a5 7860->7868 7869 7ff71f485794 free 7860->7869 7861->7929 7873 7ff71f482660 6 API calls 7862->7873 7863->7842 7874 7ff71f4830f5 malloc 7863->7874 7864->7837 7864->7838 7864->7842 7864->7844 7864->7847 7864->7851 7864->7852 7864->7875 7878 7ff71f483503 7864->7878 7888 7ff71f4835a6 7864->7888 7865 7ff71f48342b 7865->7856 7865->7871 7897 7ff71f483470 7865->7897 7865->7935 7876 7ff71f482f2a malloc 7866->7876 7866->7886 7867 7ff71f485b2e ungetc 7867->7935 7868->7831 7877 7ff71f4857bd free 7868->7877 7869->7868 7869->7869 7880 7ff71f483b3e 7870->7880 7881 7ff71f484efc 7870->7881 7879 7ff71f482660 6 API calls 7871->7879 7872->7929 7873->7929 7874->7842 7875->7854 7875->7865 7883 7ff71f4833b2 malloc 7875->7883 7875->7935 7876->7886 7877->7831 7878->7886 7887 7ff71f48350b 7878->7887 7879->7929 7912 7ff71f4825f0 3 API calls 7880->7912 7880->7935 7884 7ff71f4825f0 3 API calls 7881->7884 7882->7839 7901 7ff71f484136 7882->7901 7883->7862 7890 7ff71f4833e2 7883->7890 7905 7ff71f484f1e 7884->7905 7885 7ff71f4834c7 isspace 7892 7ff71f484e80 7885->7892 7885->7897 7886->7839 7886->7856 7907 7ff71f48301d realloc 7886->7907 7909 7ff71f484c6a 7886->7909 7886->7935 7887->7854 7893 7ff71f48352d malloc 7887->7893 7888->7856 7894 7ff71f485bce 7888->7894 7888->7935 7889 7ff71f48ed00 6 API calls 7889->7935 7890->7865 7896 7ff71f4833ff malloc 7890->7896 7891 7ff71f4825f0 realloc malloc free 7891->7935 7902 7ff71f485d0f ungetc 7892->7902 7892->7903 7893->7862 7898 7ff71f48355d 7893->7898 7894->7839 7900 7ff71f485bdc 7894->7900 7895 7ff71f483201 realloc 7895->7935 7896->7865 7897->7885 7919 7ff71f484ce6 realloc 7897->7919 7934 7ff71f4860cf 7897->7934 7897->7935 7898->7888 7908 7ff71f48357a malloc 7898->7908 7899 7ff71f48361e isspace 7899->7935 7900->7868 7911 7ff71f485bed free 7900->7911 7916 7ff71f484150 free 7901->7916 7901->7921 7902->7935 7903->7830 7903->7921 7904 7ff71f483c96 _strtoi64 7904->7856 7904->7935 7917 7ff71f484f70 ungetc 7905->7917 7906 7ff71f485cb1 _errno 7907->7886 7908->7888 7909->7897 7918 7ff71f484ca3 realloc 7909->7918 7910 7ff71f48605b ungetc 7910->7935 7911->7911 7914 7ff71f485bfe 7911->7914 7912->7935 7913 7ff71f484ad1 tolower 7913->7856 7913->7935 7914->7868 7914->7871 7915 7ff71f484a91 isxdigit 7915->7935 7916->7916 7916->7921 7917->7935 7918->7897 7919->7897 7920 7ff71f483284 _errno 7920->7921 7924 7ff71f4832a0 free 7920->7924 7921->7831 7921->7832 7923 7ff71f485ccf realloc 7923->7935 7924->7921 7924->7924 7925 7ff71f485255 tolower 7925->7935 7926 7ff71f482660 6 API calls 7926->7929 7927 7ff71f484fcb tolower 7927->7856 7927->7935 7928 7ff71f4844ff realloc 7928->7935 7930 7ff71f4843a3 _errno 7930->7935 7931 7ff71f483674 _errno 7931->7921 7933 7ff71f483690 free 7931->7933 7932 7ff71f4860c7 7932->7854 7932->7934 7933->7921 7933->7933 7934->7926 7935->7839 7935->7854 7935->7856 7935->7867 7935->7889 7935->7891 7935->7895 7935->7899 7935->7904 7935->7906 7935->7910 7935->7913 7935->7915 7935->7920 7935->7922 7935->7923 7935->7925 7935->7927 7935->7928 7935->7930 7935->7931 7935->7932 7935->7934 7936 7ff71f484c3e ungetc 7935->7936 7936->7935 7532 7ff71f48f041 VirtualQuery 7937 7ff71f4884c2 7938 7ff71f4884d8 7937->7938 7939 7ff71f488bba 7937->7939 7938->7939 7940 7ff71f487ba0 34 API calls 7938->7940 7941 7ff71f4888d5 7940->7941 7536 7ff71f483846 7537 7ff71f483870 7536->7537 7541 7ff71f48376e 7537->7541 7542 7ff71f4838c3 tolower 7537->7542 7576 7ff71f484534 7537->7576 7538 7ff71f482660 6 API calls 7538->7576 7539 7ff71f482660 6 API calls 7540 7ff71f4829f6 7539->7540 7541->7539 7577 7ff71f483cf8 7541->7577 7543 7ff71f485a17 7542->7543 7546 7ff71f4838fc 7542->7546 7544 7ff71f4825f0 3 API calls 7543->7544 7562 7ff71f485a3c 7544->7562 7545 7ff71f4825f0 realloc malloc free 7545->7576 7547 7ff71f4825f0 3 API calls 7546->7547 7569 7ff71f48391d 7546->7569 7546->7576 7565 7ff71f485929 7547->7565 7548 7ff71f485acd 7549 7ff71f485add free 7548->7549 7550 7ff71f485aee 7548->7550 7549->7549 7549->7550 7554 7ff71f485b05 free 7550->7554 7555 7ff71f485b21 free 7550->7555 7551 7ff71f485438 7556 7ff71f485459 7551->7556 7557 7ff71f485448 free 7551->7557 7552 7ff71f483980 isxdigit 7552->7569 7553 7ff71f4862c7 tolower 7553->7541 7553->7576 7554->7555 7555->7540 7558 7ff71f48546d free 7556->7558 7559 7ff71f485481 free 7556->7559 7557->7556 7557->7557 7558->7559 7559->7540 7560 7ff71f483995 tolower 7560->7569 7561 7ff71f485a6e tolower 7561->7548 7561->7562 7562->7548 7562->7561 7568 7ff71f4825f0 3 API calls 7562->7568 7562->7576 7563 7ff71f4825f0 realloc malloc free 7563->7569 7564 7ff71f4853d6 tolower 7564->7551 7564->7576 7567 7ff71f48596c tolower 7565->7567 7565->7569 7565->7576 7566 7ff71f4854f0 7571 7ff71f485e29 ungetc 7566->7571 7566->7576 7567->7569 7570 7ff71f486433 7567->7570 7568->7562 7569->7552 7569->7560 7569->7563 7569->7566 7569->7576 7572 7ff71f4825f0 3 API calls 7570->7572 7571->7576 7572->7569 7573 7ff71f485dae tolower 7573->7576 7575 7ff71f486610 35 API calls 7575->7576 7576->7538 7576->7541 7576->7545 7576->7551 7576->7553 7576->7564 7576->7573 7576->7575 7578 7ff71f486570 7576->7578 7581 7ff71f48ba50 localeconv strlen 7578->7581 7580 7ff71f48658f 7580->7576 7585 7ff71f48baee 7581->7585 7582 7ff71f48d0e9 7583 7ff71f48d860 16 API calls 7582->7583 7584 7ff71f48bc61 7583->7584 7586 7ff71f48aa40 6 API calls 7584->7586 7592 7ff71f48e1f0 memset 7584->7592 7585->7582 7585->7584 7587 7ff71f48d182 7585->7587 7591 7ff71f48bfcd 7585->7591 7625 7ff71f48bd9e 7585->7625 7586->7584 7589 7ff71f48b550 11 API calls 7587->7589 7588 7ff71f48b360 7 API calls 7588->7625 7589->7625 7590 7ff71f48b490 9 API calls 7590->7625 7594 7ff71f48b550 11 API calls 7591->7594 7591->7625 7592->7584 7593 7ff71f48af10 9 API calls 7593->7625 7594->7625 7595 7ff71f48d088 _errno 7595->7625 7596 7ff71f48c89c 7597 7ff71f48af10 9 API calls 7596->7597 7597->7584 7598 7ff71f48ceba 7601 7ff71f48ced8 _errno 7598->7601 7599 7ff71f48be15 7599->7580 7600 7ff71f48ce0a 7600->7584 7603 7ff71f48cff8 _errno 7600->7603 7601->7584 7602 7ff71f48e5e0 9 API calls 7602->7625 7603->7584 7604 7ff71f48a950 7 API calls 7605 7ff71f48c27d memcpy 7604->7605 7606 7ff71f48a950 7 API calls 7605->7606 7608 7ff71f48c2ad memcpy 7606->7608 7607 7ff71f48cd5c 7609 7ff71f48aa40 6 API calls 7607->7609 7610 7ff71f48ab70 7 API calls 7608->7610 7611 7ff71f48cd69 7609->7611 7610->7625 7612 7ff71f48cdb6 memset 7611->7612 7613 7ff71f48cdc8 7611->7613 7612->7613 7613->7584 7613->7600 7613->7601 7614 7ff71f48cb70 7616 7ff71f48af10 9 API calls 7614->7616 7615 7ff71f48d670 9 API calls 7615->7625 7617 7ff71f48cb92 7616->7617 7619 7ff71f48aa40 6 API calls 7617->7619 7618 7ff71f48ac30 8 API calls 7618->7625 7622 7ff71f48cbb2 7619->7622 7620 7ff71f48aa40 6 API calls 7620->7625 7621 7ff71f48ad90 12 API calls 7621->7625 7623 7ff71f48aa40 6 API calls 7622->7623 7623->7599 7624 7ff71f48b070 7 API calls 7624->7625 7625->7582 7625->7584 7625->7588 7625->7590 7625->7593 7625->7595 7625->7596 7625->7598 7625->7599 7625->7602 7625->7604 7625->7607 7625->7613 7625->7614 7625->7615 7625->7618 7625->7620 7625->7621 7625->7624 7626 7ff71f48b950 10 API calls 7625->7626 7626->7625 7627 7ff71f488639 7628 7ff71f48864f 7627->7628 7632 7ff71f488659 7627->7632 7637 7ff71f486af0 7628->7637 7630 7ff71f488a4b 7633 7ff71f486810 6 API calls 7630->7633 7631 7ff71f488b7b 7634 7ff71f486810 6 API calls 7631->7634 7632->7630 7632->7631 7635 7ff71f488a65 7633->7635 7636 7ff71f488b92 7634->7636 7636->7636 7638 7ff71f486b15 7637->7638 7639 7ff71f486b30 strlen 7637->7639 7638->7639 7639->7638

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000022BBCDE0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_22bbcde0000_e90zPYFENm.jbxd
        Yara matches
        Similarity
        • API ID: InternetOpen$ConnectHttpLibraryLoadRequestSleep
        • String ID: wini$U.;
        • API String ID: 4156943158-3145566601
        • Opcode ID: a5eb2bfbb48236b9f5e03990cf58c1459f3e014b76e6d2055f02eac3c489b5ad
        • Instruction ID: 4a8a161dea5e73afdd9bf82d9ec16aa1eb6a8371a4fe2cbf0bc7a1c17392d745
        • Opcode Fuzzy Hash: a5eb2bfbb48236b9f5e03990cf58c1459f3e014b76e6d2055f02eac3c489b5ad
        • Instruction Fuzzy Hash: 40417AB420DB8D3FF62B86A45C9A7363BD8D75231AF15419BE409CA0E3DF109C42D225

        Control-flow Graph

        APIs
        Strings
        • malloc error, xrefs: 00007FF71F48F2BF
        • HeapAlloc error, xrefs: 00007FF71F48F2A8
        • %02X, xrefs: 00007FF71F48F21C
        • 5dff652a5b0f2c7c949500a6853c852d570c583c108470b8662b470c58024c38845dff000000002e986921ab949f9894000002000c7c94ad98841f98847e9884353539845dff000000005e354a85ab94000001000c7c94012e1c1d9894a504a69535000000558eaabe2047fcff845dff000000000e530f44ab94000031881c7c84f1, xrefs: 00007FF71F48F1C2
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: Heap$AllocCreateEnumWindows_strrevmemcpy
        • String ID: %02X$5dff652a5b0f2c7c949500a6853c852d570c583c108470b8662b470c58024c38845dff000000002e986921ab949f9894000002000c7c94ad98841f98847e9884353539845dff000000005e354a85ab94000001000c7c94012e1c1d9894a504a69535000000558eaabe2047fcff845dff000000000e530f44ab94000031881c7c84f1$HeapAlloc error$malloc error
        • API String ID: 3536678949-3941634086
        • Opcode ID: 64d016b2da3ce2ce84043f31314739661b4709f10f71af079073d7489af18caf
        • Instruction ID: 8b30cee1967fba67be03ab86893e6b1e8af11cf9a7b88789a02880b24558a59e
        • Opcode Fuzzy Hash: 64d016b2da3ce2ce84043f31314739661b4709f10f71af079073d7489af18caf
        • Instruction Fuzzy Hash: A621C221F088D281FA60AB95A802AF49251AF897B4F884135DF5C037D5DE2DE46EC320

        Control-flow Graph

        APIs
        • InternetConnectA.WININET(00000000,00000003,00000000,00000000), ref: 0000022BBCDE099E
          • Part of subcall function 0000022BBCDE09EE: HttpOpenRequestA.WININET(00000000,00000000,84A83200,00000000), ref: 0000022BBCDE0A0D
          • Part of subcall function 0000022BBCDE09EE: SleepEx.KERNEL32 ref: 0000022BBCDE0A62
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000022BBCDE0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_22bbcde0000_e90zPYFENm.jbxd
        Yara matches
        Similarity
        • API ID: ConnectHttpInternetOpenRequestSleep
        • String ID: U.;
        • API String ID: 3895984052-4213443877
        • Opcode ID: 8730739dbdf539c9d8469545232423d07924b0106fdb062cff5531683efb989e
        • Instruction ID: f0726608a38f425e4e1bdb3ac623adc70d40332931cc7b526ad6715ebcfee055
        • Opcode Fuzzy Hash: 8730739dbdf539c9d8469545232423d07924b0106fdb062cff5531683efb989e
        • Instruction Fuzzy Hash: 554168A434DB8E2EFB1B82642C9A7393BD8D756316F18419BE409CB0E3DF049C42D325

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 92 22bbcde09ee-22bbcde0a14 HttpOpenRequestA 96 22bbcde0a15-22bbcde0a2a 92->96 100 22bbcde0a72-22bbcde0a93 96->100 101 22bbcde0a2c-22bbcde0a4f 96->101 104 22bbcde0a95-22bbcde0ab7 100->104 113 22bbcde0a51-22bbcde0a67 SleepEx 101->113 114 22bbcde0a70-22bbcde0a71 101->114 108 22bbcde0ab9-22bbcde0ac1 104->108 109 22bbcde0a6b call 22bbcde0ac5 104->109 108->104 111 22bbcde0ac3-22bbcde0ac4 108->111 109->114 113->109 115 22bbcde0a69 113->115 114->100 115->96
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304616074.0000022BBCDE0000.00000040.00000020.00020000.00000000.sdmp, Offset: 0000022BBCDE0000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_22bbcde0000_e90zPYFENm.jbxd
        Yara matches
        Similarity
        • API ID: HttpOpenRequestSleep
        • String ID: U.;
        • API String ID: 1158879192-4213443877
        • Opcode ID: 67e9473b793039c9a067aaab8365836b73d283826e7db9fe2785357646bc4685
        • Instruction ID: 6c280a81a33f09d87c7023e1c98dcb5c551186372909b30bb8b5011a3fb5e5a1
        • Opcode Fuzzy Hash: 67e9473b793039c9a067aaab8365836b73d283826e7db9fe2785357646bc4685
        • Instruction Fuzzy Hash: A821F1A030EB8D2FFB1A42A92CAA73A2BD9C799355F15419BF409C71D3ED048C468229
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: free$isspace$_errnolocaleconv
        • String ID: %02X$d$nil)
        • API String ID: 2709793498-4184343865
        • Opcode ID: cb9d6b6424dca7eb44c06a0f9810f03c00a886b6c2c6bb954b0dd72dc0257fa2
        • Instruction ID: 7152d905ea478a12e342efecb41f750231cf2f2f8d7d2d963d2f793373cc9aef
        • Opcode Fuzzy Hash: cb9d6b6424dca7eb44c06a0f9810f03c00a886b6c2c6bb954b0dd72dc0257fa2
        • Instruction Fuzzy Hash: 33238132A08EC181EA70AF95E4413FAE7A1FB84BA4F844135DE8D17798DF3CD9698710
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: malloc$free
        • String ID: d
        • API String ID: 1480856625-2564639436
        • Opcode ID: 131ef27ca4691028fb1a7228baac7c47d3a4c309360703faa99e5b5a9061d2e9
        • Instruction ID: dc5f6920ba015317fd935913431a42e6805fb7e9129fc6ef004f7a8ccd049285
        • Opcode Fuzzy Hash: 131ef27ca4691028fb1a7228baac7c47d3a4c309360703faa99e5b5a9061d2e9
        • Instruction Fuzzy Hash: E9527C32608EC581E670AF95E4413AAF7A0FB84BA4F844135DE8D57B98DF3CD8698B50
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: localeconvstrlen
        • String ID: !$5$inity
        • API String ID: 186660782-42873854
        • Opcode ID: 05ca077ae447e9b1fdb261f0bb18fb7f8c63a250f1938c3c57181f937dd40871
        • Instruction ID: 3939468cc5ba693f76c7a51ad2511480beb769c5cfd58526e306301e333485d2
        • Opcode Fuzzy Hash: 05ca077ae447e9b1fdb261f0bb18fb7f8c63a250f1938c3c57181f937dd40871
        • Instruction Fuzzy Hash: 59E2B132A0CEC28AE760AE55E0413BAF7A1FB85754F948135DF8957B88DF7CE4588B10

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: malloc$ExceptionFilterSleepUnhandledmemcpystrlen
        • String ID:
        • API String ID: 3806033187-0
        • Opcode ID: d655491aba52ecd03ddb5c7e6c8ac608dfad1fd9990cabd9ca365f04205814f0
        • Instruction ID: 5727c67f374989364083e8541689ff51941856101aa7ebbf1fe0189131c7cc80
        • Opcode Fuzzy Hash: d655491aba52ecd03ddb5c7e6c8ac608dfad1fd9990cabd9ca365f04205814f0
        • Instruction Fuzzy Hash: 91513D35F09EC285F610BB95E452AF9A3A1BF887A0FD44036DE0C477A5DE2CE5698360
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: localeconvmemset
        • String ID:
        • API String ID: 2367598729-0
        • Opcode ID: ef1a6bd30c8b1ef5a52fd631b677cbfae8b7dee52f744d4fcd3a5c23dbbc6152
        • Instruction ID: c369908f943cd46d42d90685d7d7d8737267582ec0a4db44c643246d7a57f5e9
        • Opcode Fuzzy Hash: ef1a6bd30c8b1ef5a52fd631b677cbfae8b7dee52f744d4fcd3a5c23dbbc6152
        • Instruction Fuzzy Hash: C2223822E1D9D246F7356EA584667FDA6A2EF40760FC48031DE8E477C5DE3DE8688320
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID:
        • String ID: $ $Infinity$NaN
        • API String ID: 0-3274152445
        • Opcode ID: dcca4a87874c45ebe53ae7a518311002c5f8d39e343f3a03519ebd9b1d622fa5
        • Instruction ID: 32219fcbb2faea6cdfedf34c86690317542e75aea40bbe1ea52118886ae5bdb9
        • Opcode Fuzzy Hash: dcca4a87874c45ebe53ae7a518311002c5f8d39e343f3a03519ebd9b1d622fa5
        • Instruction Fuzzy Hash: BFD2F436A1CEC18AE751DF65A0013AAF790FB85BA0F508135EE4A53B99DB7CE458CF10

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2930 7ff71f481c94-7ff71f481c98 2931 7ff71f481c6c-7ff71f481c8d 2930->2931 2932 7ff71f481c9a-7ff71f481cbb 2930->2932 2933 7ff71f481cc1-7ff71f481cc6 2932->2933 2934 7ff71f481d60-7ff71f481d64 2932->2934 2936 7ff71f481cc8-7ff71f481ccd 2933->2936 2937 7ff71f481d3f-7ff71f481d49 2933->2937 2934->2933 2938 7ff71f481d6a 2934->2938 2942 7ff71f481cf0-7ff71f481cf5 2936->2942 2943 7ff71f481ccf-7ff71f481cd7 2936->2943 2940 7ff71f481d4b-7ff71f481d52 2937->2940 2941 7ff71f481d70-7ff71f481d77 2937->2941 2944 7ff71f481d2d-7ff71f481d37 2938->2944 2940->2934 2946 7ff71f481cfb 2942->2946 2947 7ff71f481dd0-7ff71f481de0 call 7ff71f48efd8 2942->2947 2943->2944 2945 7ff71f481cd9-7ff71f481ce4 2943->2945 2945->2942 2949 7ff71f481cfd-7ff71f481d02 2946->2949 2950 7ff71f481d38-7ff71f481d3d 2946->2950 2953 7ff71f481e0b-7ff71f481e1a signal 2947->2953 2954 7ff71f481de2-7ff71f481de5 2947->2954 2949->2944 2952 7ff71f481d04-7ff71f481d09 2949->2952 2950->2937 2950->2944 2952->2937 2955 7ff71f481d0b-7ff71f481d1b signal 2952->2955 2953->2944 2954->2937 2956 7ff71f481deb-7ff71f481df2 2954->2956 2957 7ff71f481df7-7ff71f481e06 signal 2955->2957 2958 7ff71f481d21-7ff71f481d24 2955->2958 2956->2944 2957->2944 2958->2937 2959 7ff71f481d26 2958->2959 2959->2944
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: signal
        • String ID: CCG
        • API String ID: 1946981877-1584390748
        • Opcode ID: 078caccd7ddbff15b13bf485c5a42bb937047296e936ded84d5a91076c28fca1
        • Instruction ID: 06039fa27865943fb01bfbdb0f01291e3068af390e9546ca08c3c4c47acbab65
        • Opcode Fuzzy Hash: 078caccd7ddbff15b13bf485c5a42bb937047296e936ded84d5a91076c28fca1
        • Instruction Fuzzy Hash: 2F31B361E08EC642FA7876D494523F991C19FC9370F984937CE1E463D0ED1CF8A98221
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 59f5729228283e406f091fd05bcf3439b5adb8d913954f2c67c7e7fcbb07d5d7
        • Instruction ID: dc337f908a45d8638fefc9d252fde59161be832b74c765ecc77cc40aed4aea10
        • Opcode Fuzzy Hash: 59f5729228283e406f091fd05bcf3439b5adb8d913954f2c67c7e7fcbb07d5d7
        • Instruction Fuzzy Hash: 1A91FB72A186814FE764EE55D4026AFF6A1FB84794F985030ED4A47B59CE3CE8148F50
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID:
        • String ID: .
        • API String ID: 0-248832578
        • Opcode ID: dc7c95912ea179b4376ebdfd1fe7d6f82869dd945337f08c514ca93ba6913bec
        • Instruction ID: 19ef22a363c0825d233a04bf77bb8a556c6b8c541c58c0e867604ebc34865e43
        • Opcode Fuzzy Hash: dc7c95912ea179b4376ebdfd1fe7d6f82869dd945337f08c514ca93ba6913bec
        • Instruction Fuzzy Hash: 9CB11C62A1CAC242F755EE65D4267F9E691AF40BA4F848130DE0E477C5DE3CED28C760
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 619082e5d1d758878a90591e7221134443d7cce5a0ae1aefa5c4e06a65ae55e5
        • Instruction ID: c5cf4c605452798450fd28847850fc7dd2fa8e7e45c8cf0a2039b1dc47aeaaa4
        • Opcode Fuzzy Hash: 619082e5d1d758878a90591e7221134443d7cce5a0ae1aefa5c4e06a65ae55e5
        • Instruction Fuzzy Hash: 7BA13762B1C9E246FB70AED5C4067FDAA92AB85B64FC8C031DE0D07381DA3CE959C710

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2064 7ff71f481710-7ff71f481793 call 7ff71f48e9b0 call 7ff71f48ef88 call 7ff71f48e9b0 call 7ff71f48f018 call 7ff71f48ef58 2076 7ff71f481799-7ff71f4817a7 2064->2076 2077 7ff71f4818b0-7ff71f4818b2 2064->2077 2079 7ff71f4817b0-7ff71f4817b6 2076->2079 2078 7ff71f4817d8-7ff71f4817e6 call 7ff71f4821d0 2077->2078 2085 7ff71f4817ec-7ff71f481834 call 7ff71f482310 VirtualQuery 2078->2085 2086 7ff71f4818d2-7ff71f48190f call 7ff71f481710 2078->2086 2081 7ff71f4817cb-7ff71f4817d6 2079->2081 2082 7ff71f4817b8-7ff71f4817c5 2079->2082 2081->2078 2081->2079 2082->2081 2083 7ff71f481855-7ff71f48185c 2082->2083 2092 7ff71f48183a-7ff71f481844 2085->2092 2093 7ff71f4818b7-7ff71f4818cd call 7ff71f481710 2085->2093 2094 7ff71f481928-7ff71f48197f call 7ff71f482250 call 7ff71f4824b0 2086->2094 2095 7ff71f481911-7ff71f481921 2086->2095 2097 7ff71f48184e 2092->2097 2098 7ff71f481846-7ff71f48184c 2092->2098 2093->2086 2094->2095 2107 7ff71f481981-7ff71f481987 2094->2107 2097->2083 2098->2097 2100 7ff71f481860-7ff71f481896 VirtualProtect 2098->2100 2100->2097 2102 7ff71f481898-7ff71f4818ac GetLastError call 7ff71f481710 2100->2102 2102->2077 2108 7ff71f48198d-7ff71f481991 2107->2108 2109 7ff71f481b08-7ff71f481b0a 2107->2109 2110 7ff71f481c00-7ff71f481c03 2108->2110 2112 7ff71f481997 2108->2112 2109->2110 2111 7ff71f481b10-7ff71f481b18 2109->2111 2110->2095 2113 7ff71f481c09 2110->2113 2114 7ff71f481b1e 2111->2114 2115 7ff71f48199a-7ff71f48199c 2111->2115 2112->2115 2116 7ff71f481c10-7ff71f481c2b call 7ff71f481780 2113->2116 2119 7ff71f481b30-7ff71f481b33 2114->2119 2115->2110 2117 7ff71f4819a2-7ff71f4819a8 2115->2117 2127 7ff71f481c2d 2116->2127 2120 7ff71f481c3e-7ff71f481c62 call 7ff71f481710 2117->2120 2121 7ff71f4819ae-7ff71f4819b5 2117->2121 2123 7ff71f481b39-7ff71f481b48 2119->2123 2124 7ff71f481c32-7ff71f481c39 call 7ff71f481710 2119->2124 2137 7ff71f481c89-7ff71f481c8d 2120->2137 2138 7ff71f481c64-7ff71f481c88 2120->2138 2121->2095 2126 7ff71f4819bb-7ff71f4819cc 2121->2126 2129 7ff71f481b4a-7ff71f481b4d 2123->2129 2130 7ff71f481bb0-7ff71f481bb8 call 7ff71f481780 2123->2130 2124->2120 2132 7ff71f481a22-7ff71f481a39 2126->2132 2127->2124 2129->2130 2136 7ff71f481b4f-7ff71f481b63 call 7ff71f481710 2129->2136 2141 7ff71f481bc0-7ff71f481bc8 2130->2141 2133 7ff71f481b68-7ff71f481b72 2132->2133 2134 7ff71f481a3f 2132->2134 2140 7ff71f481b74-7ff71f481b89 2133->2140 2133->2141 2134->2119 2142 7ff71f481a45-7ff71f481a48 2134->2142 2136->2133 2138->2137 2146 7ff71f481b8b-7ff71f481b8e 2140->2146 2147 7ff71f481b9a-7ff71f481ba2 call 7ff71f481780 2140->2147 2141->2146 2150 7ff71f481bca 2141->2150 2148 7ff71f481a4a-7ff71f481a4d 2142->2148 2149 7ff71f4819d0-7ff71f4819dc 2142->2149 2146->2136 2151 7ff71f481b90-7ff71f481b98 2146->2151 2147->2130 2148->2124 2153 7ff71f481a53-7ff71f481a5f 2148->2153 2154 7ff71f481be8-7ff71f481bf0 2149->2154 2155 7ff71f4819e2-7ff71f4819f1 2149->2155 2150->2147 2151->2136 2151->2147 2160 7ff71f481a65-7ff71f481a74 2153->2160 2161 7ff71f481bd0-7ff71f481bd8 2153->2161 2157 7ff71f4819f3-7ff71f4819fa 2154->2157 2158 7ff71f481bf6 2154->2158 2156 7ff71f481a0a-7ff71f481a1c call 7ff71f481780 2155->2156 2155->2157 2156->2132 2170 7ff71f481ab0-7ff71f481ab8 2156->2170 2157->2136 2164 7ff71f481a00-7ff71f481a04 2157->2164 2158->2156 2163 7ff71f481a76-7ff71f481a7d 2160->2163 2166 7ff71f481a90-7ff71f481aa2 call 7ff71f481780 2160->2166 2162 7ff71f481bde 2161->2162 2161->2163 2162->2166 2163->2136 2168 7ff71f481a83-7ff71f481a8a 2163->2168 2164->2136 2164->2156 2166->2132 2172 7ff71f481aa8 2166->2172 2168->2136 2168->2166 2170->2095 2173 7ff71f481abe-7ff71f481acb 2170->2173 2172->2170 2174 7ff71f481ad0-7ff71f481ae0 2173->2174 2175 7ff71f481ae2-7ff71f481aed VirtualProtect 2174->2175 2176 7ff71f481aef-7ff71f481afe 2174->2176 2175->2176 2176->2174 2177 7ff71f481b00 2176->2177 2177->2095
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: QueryVirtual
        • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
        • API String ID: 1804819252-1534286854
        • Opcode ID: 71d792bb3950f311a4e2a21dd10c19bbecff29a4fd1631c03ab2524e9a169855
        • Instruction ID: 937eecaf902e2f09da11558e192ae30d21e008cb541b8a75921266080297ad48
        • Opcode Fuzzy Hash: 71d792bb3950f311a4e2a21dd10c19bbecff29a4fd1631c03ab2524e9a169855
        • Instruction Fuzzy Hash: 1951B572B04E8681EB10AB51E842AE9E7A0FF88BA0FC44135DE0C07395DF3CD569C390

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2767 7ff71f486be0-7ff71f486bfe 2768 7ff71f486c04-7ff71f486c1e 2767->2768 2769 7ff71f486f00-7ff71f486f1a 2767->2769 2772 7ff71f486c24-7ff71f486c2e 2768->2772 2773 7ff71f486cc0-7ff71f486cf3 call 7ff71f4824b0 2768->2773 2770 7ff71f486f1c 2769->2770 2771 7ff71f486f80-7ff71f486fa8 call 7ff71f4824b0 2769->2771 2781 7ff71f486f30-7ff71f486f33 2770->2781 2790 7ff71f486fb8-7ff71f486fc4 2771->2790 2776 7ff71f486c44-7ff71f486c7f call 7ff71f4824b0 2772->2776 2777 7ff71f486c30-7ff71f486c41 2772->2777 2783 7ff71f486c88-7ff71f486c94 2773->2783 2784 7ff71f486cf5-7ff71f486cfc 2773->2784 2776->2784 2787 7ff71f486c81 2776->2787 2777->2776 2785 7ff71f486f39 2781->2785 2786 7ff71f486e70-7ff71f486e7a 2781->2786 2788 7ff71f486d3b-7ff71f486d4a 2783->2788 2789 7ff71f486c9a-7ff71f486c9e 2783->2789 2791 7ff71f486d00-7ff71f486d27 2784->2791 2794 7ff71f486ed4-7ff71f486eda 2785->2794 2792 7ff71f486e7c-7ff71f486e82 2786->2792 2793 7ff71f486e84-7ff71f486e90 2786->2793 2787->2783 2795 7ff71f486f40-7ff71f486f44 2788->2795 2796 7ff71f486d50-7ff71f486d61 memset 2788->2796 2797 7ff71f486d66-7ff71f486d69 2789->2797 2798 7ff71f486ca4-7ff71f486ca8 2789->2798 2801 7ff71f486fca-7ff71f486fe4 memset 2790->2801 2802 7ff71f486e19-7ff71f486e24 2790->2802 2791->2791 2803 7ff71f486d29-7ff71f486d2c 2791->2803 2792->2793 2804 7ff71f486e62-7ff71f486e6b 2792->2804 2805 7ff71f486e58-7ff71f486e5f 2793->2805 2806 7ff71f486e92-7ff71f486ea3 fputc 2793->2806 2799 7ff71f486edc-7ff71f486ee2 2794->2799 2800 7ff71f486ee4-7ff71f486eed 2794->2800 2795->2798 2819 7ff71f486f4a-7ff71f486f4d 2795->2819 2796->2797 2807 7ff71f486d6b-7ff71f486d6e 2797->2807 2808 7ff71f486d74-7ff71f486d77 2797->2808 2798->2797 2810 7ff71f486cae-7ff71f486cb5 2798->2810 2799->2800 2811 7ff71f486ebb-7ff71f486ec8 2799->2811 2812 7ff71f486eb0-7ff71f486eb8 2800->2812 2813 7ff71f486eef-7ff71f486efc fputc 2800->2813 2814 7ff71f486fea-7ff71f486ff6 2801->2814 2815 7ff71f486da1 2801->2815 2802->2781 2809 7ff71f486e2a-7ff71f486e2d 2802->2809 2803->2783 2818 7ff71f486d32-7ff71f486d35 2803->2818 2816 7ff71f486e6d 2804->2816 2817 7ff71f486ea5-7ff71f486ea8 2804->2817 2805->2804 2806->2816 2806->2817 2807->2808 2820 7ff71f487008-7ff71f487018 2807->2820 2829 7ff71f486d7a-7ff71f486d7d 2808->2829 2822 7ff71f486e30-7ff71f486e41 call 7ff71f4867b0 2809->2822 2810->2797 2827 7ff71f486ece 2811->2827 2828 7ff71f486dc0-7ff71f486dd0 2811->2828 2812->2811 2813->2811 2823 7ff71f486ffc 2814->2823 2824 7ff71f486da7-7ff71f486daa 2814->2824 2815->2824 2816->2786 2825 7ff71f486eaa 2817->2825 2826 7ff71f486ed1 2817->2826 2818->2788 2818->2789 2819->2820 2821 7ff71f486f53-7ff71f486f56 2819->2821 2820->2829 2830 7ff71f48703d-7ff71f487044 2821->2830 2831 7ff71f486f5c-7ff71f486f6c 2821->2831 2843 7ff71f486e43-7ff71f486e4c 2822->2843 2823->2820 2824->2828 2835 7ff71f486dac-7ff71f486db4 2824->2835 2825->2828 2826->2794 2827->2826 2833 7ff71f486dd8-7ff71f486de6 2829->2833 2834 7ff71f486d7f-7ff71f486d8a 2829->2834 2839 7ff71f486d90-7ff71f486d94 2830->2839 2836 7ff71f486f72 2831->2836 2837 7ff71f486df0-7ff71f486df7 2831->2837 2841 7ff71f486de8-7ff71f486dee 2833->2841 2842 7ff71f486e10-7ff71f486e13 2833->2842 2834->2839 2840 7ff71f487020-7ff71f487023 2834->2840 2835->2786 2836->2802 2846 7ff71f486dfd-7ff71f486e08 2837->2846 2847 7ff71f487049-7ff71f48704c 2837->2847 2839->2815 2844 7ff71f486d96-7ff71f486d9d 2839->2844 2840->2828 2845 7ff71f487029-7ff71f487038 2840->2845 2841->2837 2841->2842 2842->2790 2842->2802 2843->2816 2848 7ff71f486e4e 2843->2848 2844->2815 2845->2786 2846->2824 2849 7ff71f48705e-7ff71f48706a 2847->2849 2850 7ff71f48704e-7ff71f487059 2847->2850 2848->2828 2849->2850 2851 7ff71f48706c-7ff71f487082 memset 2849->2851 2850->2802 2851->2814
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: fputcmemset
        • String ID:
        • API String ID: 947785774-0
        • Opcode ID: 209c1731aa60b8188c4a74713effcc0fbdefc831f164e84461958d52e030fee1
        • Instruction ID: a046ac7d8511889ad9231c90267ac54bead73d30b1c1adeca8c8fb2cd8e63c8b
        • Opcode Fuzzy Hash: 209c1731aa60b8188c4a74713effcc0fbdefc831f164e84461958d52e030fee1
        • Instruction Fuzzy Hash: 4AB11AE3E189C186F7A5AE64C0063B9A6D1AB00778F944235CE1E1B7C5DA3CEC69C761

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2852 7ff71f4818f0-7ff71f48190f 2853 7ff71f481928-7ff71f48197f call 7ff71f482250 call 7ff71f4824b0 2852->2853 2854 7ff71f481911-7ff71f481921 2852->2854 2853->2854 2859 7ff71f481981-7ff71f481987 2853->2859 2860 7ff71f48198d-7ff71f481991 2859->2860 2861 7ff71f481b08-7ff71f481b0a 2859->2861 2862 7ff71f481c00-7ff71f481c03 2860->2862 2864 7ff71f481997 2860->2864 2861->2862 2863 7ff71f481b10-7ff71f481b18 2861->2863 2862->2854 2865 7ff71f481c09 2862->2865 2866 7ff71f481b1e 2863->2866 2867 7ff71f48199a-7ff71f48199c 2863->2867 2864->2867 2868 7ff71f481c10-7ff71f481c2b call 7ff71f481780 2865->2868 2871 7ff71f481b30-7ff71f481b33 2866->2871 2867->2862 2869 7ff71f4819a2-7ff71f4819a8 2867->2869 2879 7ff71f481c2d 2868->2879 2872 7ff71f481c3e-7ff71f481c62 call 7ff71f481710 2869->2872 2873 7ff71f4819ae-7ff71f4819b5 2869->2873 2875 7ff71f481b39-7ff71f481b48 2871->2875 2876 7ff71f481c32-7ff71f481c39 call 7ff71f481710 2871->2876 2889 7ff71f481c89-7ff71f481c8d 2872->2889 2890 7ff71f481c64-7ff71f481c88 2872->2890 2873->2854 2878 7ff71f4819bb-7ff71f4819cc 2873->2878 2881 7ff71f481b4a-7ff71f481b4d 2875->2881 2882 7ff71f481bb0-7ff71f481bb8 call 7ff71f481780 2875->2882 2876->2872 2884 7ff71f481a22-7ff71f481a39 2878->2884 2879->2876 2881->2882 2888 7ff71f481b4f-7ff71f481b63 call 7ff71f481710 2881->2888 2893 7ff71f481bc0-7ff71f481bc8 2882->2893 2885 7ff71f481b68-7ff71f481b72 2884->2885 2886 7ff71f481a3f 2884->2886 2892 7ff71f481b74-7ff71f481b89 2885->2892 2885->2893 2886->2871 2894 7ff71f481a45-7ff71f481a48 2886->2894 2888->2885 2890->2889 2898 7ff71f481b8b-7ff71f481b8e 2892->2898 2899 7ff71f481b9a-7ff71f481ba2 call 7ff71f481780 2892->2899 2893->2898 2902 7ff71f481bca 2893->2902 2900 7ff71f481a4a-7ff71f481a4d 2894->2900 2901 7ff71f4819d0-7ff71f4819dc 2894->2901 2898->2888 2903 7ff71f481b90-7ff71f481b98 2898->2903 2899->2882 2900->2876 2905 7ff71f481a53-7ff71f481a5f 2900->2905 2906 7ff71f481be8-7ff71f481bf0 2901->2906 2907 7ff71f4819e2-7ff71f4819f1 2901->2907 2902->2899 2903->2888 2903->2899 2912 7ff71f481a65-7ff71f481a74 2905->2912 2913 7ff71f481bd0-7ff71f481bd8 2905->2913 2909 7ff71f4819f3-7ff71f4819fa 2906->2909 2910 7ff71f481bf6 2906->2910 2908 7ff71f481a0a-7ff71f481a1c call 7ff71f481780 2907->2908 2907->2909 2908->2884 2922 7ff71f481ab0-7ff71f481ab8 2908->2922 2909->2888 2916 7ff71f481a00-7ff71f481a04 2909->2916 2910->2908 2915 7ff71f481a76-7ff71f481a7d 2912->2915 2918 7ff71f481a90-7ff71f481aa2 call 7ff71f481780 2912->2918 2914 7ff71f481bde 2913->2914 2913->2915 2914->2918 2915->2888 2920 7ff71f481a83-7ff71f481a8a 2915->2920 2916->2888 2916->2908 2918->2884 2924 7ff71f481aa8 2918->2924 2920->2888 2920->2918 2922->2854 2925 7ff71f481abe-7ff71f481acb 2922->2925 2924->2922 2926 7ff71f481ad0-7ff71f481ae0 2925->2926 2927 7ff71f481ae2-7ff71f481aed VirtualProtect 2926->2927 2928 7ff71f481aef-7ff71f481afe 2926->2928 2927->2928 2928->2926 2929 7ff71f481b00 2928->2929 2929->2854
        APIs
        • VirtualProtect.KERNEL32(00007FF71F495040,00007FF71F495048,00000001,?,?,?,?,00007FF8C6F6ADA0,00007FF71F481228,?,?,?,00007FF71F4813E6), ref: 00007FF71F481AED
        Strings
        • Unknown pseudo relocation protocol version %d., xrefs: 00007FF71F481C3E
        • Unknown pseudo relocation bit size %d., xrefs: 00007FF71F481C32
        • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF71F481B57
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
        • API String ID: 544645111-1286557213
        • Opcode ID: 36ec8a0bd9c9db9cff83aa638c4881caaa891938c39ba8aeb5229d7aeee479fa
        • Instruction ID: 66a7efba23fcda9a0b593ed55e4c565fe75af73f10462879c145957700142f38
        • Opcode Fuzzy Hash: 36ec8a0bd9c9db9cff83aa638c4881caaa891938c39ba8aeb5229d7aeee479fa
        • Instruction Fuzzy Hash: 7B91D722F09DD286EB107BA0D5416F9E291BFD47B4F948237CE1D177D4EE2CE8698260

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 2961 7ff71f487090-7ff71f4870c3 2962 7ff71f4870c5-7ff71f4870ca 2961->2962 2963 7ff71f4870d0-7ff71f4870f3 call 7ff71f4824b0 2961->2963 2962->2963 2964 7ff71f487318-7ff71f48732a 2962->2964 2967 7ff71f487106-7ff71f48710c 2963->2967 2968 7ff71f4870f5-7ff71f4870f8 2963->2968 2964->2963 2971 7ff71f487112-7ff71f487133 2967->2971 2972 7ff71f4871a0-7ff71f4871a3 2967->2972 2969 7ff71f4870fe-7ff71f487102 2968->2969 2970 7ff71f487370-7ff71f487373 2968->2970 2969->2967 2970->2971 2973 7ff71f487138-7ff71f48715d 2971->2973 2974 7ff71f4871a5-7ff71f4871b4 2972->2974 2975 7ff71f4871d0-7ff71f4871d3 2972->2975 2973->2972 2980 7ff71f48715f-7ff71f487162 2973->2980 2976 7ff71f4871ba-7ff71f4871cb memset 2974->2976 2977 7ff71f487350-7ff71f487353 2974->2977 2978 7ff71f4871d5-7ff71f4871db 2975->2978 2979 7ff71f4871e1-7ff71f4871e3 2975->2979 2976->2975 2977->2979 2981 7ff71f487359 2977->2981 2978->2979 2982 7ff71f48735c-7ff71f487363 2978->2982 2983 7ff71f4871e5-7ff71f4871f2 2979->2983 2984 7ff71f487220-7ff71f487224 2979->2984 2985 7ff71f487164-7ff71f487167 2980->2985 2986 7ff71f487190-7ff71f487196 2980->2986 2981->2982 2982->2979 2983->2984 2987 7ff71f4871f4-7ff71f4871fb 2983->2987 2988 7ff71f48722a-7ff71f48722d 2984->2988 2989 7ff71f487300-7ff71f487307 2984->2989 2985->2986 2990 7ff71f487169-7ff71f48716e 2985->2990 2986->2973 2991 7ff71f487201-7ff71f487204 2987->2991 2992 7ff71f487380-7ff71f487389 2987->2992 2993 7ff71f487231-7ff71f487234 2988->2993 2995 7ff71f487309-7ff71f487310 2989->2995 2996 7ff71f487330-7ff71f487337 2989->2996 2990->2986 2994 7ff71f487170-7ff71f48717d 2990->2994 2998 7ff71f48720a-7ff71f487211 2991->2998 2999 7ff71f48738f-7ff71f48739c 2991->2999 2992->2998 2992->2999 3000 7ff71f487259-7ff71f487264 2993->3000 3001 7ff71f487236 2993->3001 2994->2986 3002 7ff71f48717f-7ff71f487186 2994->3002 2995->2993 2996->2993 2997 7ff71f48733d-7ff71f487344 2996->2997 2997->2993 3005 7ff71f4873d8-7ff71f4873e3 2998->3005 3006 7ff71f487217 2998->3006 2999->2998 3007 7ff71f4873a2-7ff71f4873ad 2999->3007 3003 7ff71f48726e-7ff71f48727b 3000->3003 3004 7ff71f487266-7ff71f48726c 3000->3004 3008 7ff71f487290-7ff71f487293 3001->3008 3002->2986 3010 7ff71f48727d-7ff71f48728e fputc 3003->3010 3011 7ff71f487240-7ff71f487247 3003->3011 3004->3003 3009 7ff71f48724a-7ff71f487253 3004->3009 3005->2984 3014 7ff71f4873e9 3005->3014 3006->2984 3007->2984 3013 7ff71f4873b3-7ff71f4873d0 memset 3007->3013 3012 7ff71f4872ac-7ff71f4872b6 3008->3012 3009->3008 3015 7ff71f487255 3009->3015 3010->3008 3010->3015 3011->3009 3016 7ff71f4872e8-7ff71f4872f8 3012->3016 3017 7ff71f4872b8-7ff71f4872be 3012->3017 3013->2984 3018 7ff71f4873f0-7ff71f487408 call 7ff71f4867b0 3014->3018 3015->3000 3019 7ff71f4872c8-7ff71f4872ce 3017->3019 3020 7ff71f4872c0-7ff71f4872c6 3017->3020 3026 7ff71f48740a-7ff71f48740e 3018->3026 3023 7ff71f487298-7ff71f4872a3 3019->3023 3024 7ff71f4872d0-7ff71f4872e0 fputc 3019->3024 3020->3019 3022 7ff71f4872a6-7ff71f4872a9 3020->3022 3022->3012 3023->3022 3024->3022 3026->2984
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 51b8acbbacccaf3c209e84173bc199a407feaa41f58d89eed801a17a1f7e4c2e
        • Instruction ID: d9ea28d544478ddba59167dbd0cc1b3b421e8d508e624e2cf3c0d84129e5e563
        • Opcode Fuzzy Hash: 51b8acbbacccaf3c209e84173bc199a407feaa41f58d89eed801a17a1f7e4c2e
        • Instruction Fuzzy Hash: B191D872E08AC246E765DFA981113F9ABA1AB04BA4F948230DF1C177C5DB3CE875C760

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 3027 7ff71f48eba0-7ff71f48ebaf 3028 7ff71f48ebb5-7ff71f48ebb8 3027->3028 3029 7ff71f48ec7d 3027->3029 3031 7ff71f48ecf4-7ff71f48ecf9 3028->3031 3032 7ff71f48ebbe-7ff71f48ebd1 3028->3032 3030 7ff71f48ec7f-7ff71f48ec85 3029->3030 3031->3030 3033 7ff71f48ebd7-7ff71f48ebdf 3032->3033 3034 7ff71f48ec78-7ff71f48ec7a 3032->3034 3035 7ff71f48ebe1-7ff71f48ebe3 3033->3035 3036 7ff71f48ec58-7ff71f48ec61 3033->3036 3034->3029 3037 7ff71f48ec90-7ff71f48ecac 3035->3037 3038 7ff71f48ebe9-7ff71f48ec02 IsDBCSLeadByteEx 3035->3038 3039 7ff71f48ecb0-7ff71f48ecda MultiByteToWideChar 3036->3039 3040 7ff71f48ec63-7ff71f48ec66 3036->3040 3041 7ff71f48ec2e-7ff71f48ec42 MultiByteToWideChar 3037->3041 3038->3036 3044 7ff71f48ec04-7ff71f48ec12 3038->3044 3042 7ff71f48ec69-7ff71f48ec74 3039->3042 3043 7ff71f48ecdc-7ff71f48ecec _errno 3039->3043 3040->3042 3041->3043 3047 7ff71f48ec48-7ff71f48ec53 3041->3047 3043->3030 3045 7ff71f48ec18-7ff71f48ec26 3044->3045 3046 7ff71f48ecee-7ff71f48ecf1 3044->3046 3045->3041 3046->3031
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: Byte$CharLeadMultiWide
        • String ID:
        • API String ID: 2561704868-0
        • Opcode ID: 74f192261df9a2bba6bcf5d7fc0ebefca92e3bd53692434ac92c6f5afbbc8d65
        • Instruction ID: 00517e8e5fe874139532ff6a8d77e095b43c81d6b03f2ed2c44c2dd7a97e008d
        • Opcode Fuzzy Hash: 74f192261df9a2bba6bcf5d7fc0ebefca92e3bd53692434ac92c6f5afbbc8d65
        • Instruction Fuzzy Hash: 5631C372A0CAC18AE3709FA5F4417A9B7A0BB957A4F884134EE88477D5DF3DD468CB10
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: _errno$isspace
        • String ID:
        • API String ID: 2429013468-0
        • Opcode ID: 6fa136de3026300b2d5c982cc7f54e95ce620e40246dd4444c51e6d38a58bf29
        • Instruction ID: c658b3a45e34ebfe86053d2d22df83cc8bf0e5b2070ecd6351f539e7c2b01c44
        • Opcode Fuzzy Hash: 6fa136de3026300b2d5c982cc7f54e95ce620e40246dd4444c51e6d38a58bf29
        • Instruction Fuzzy Hash: A6118622D0CAC191F6706EE494423FDEAD1AB41360FD44239DB99236D2CF3CB969C721

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 3544 7ff71f481600-7ff71f481619 3545 7ff71f4816ec-7ff71f4816f3 3544->3545 3546 7ff71f48161f-7ff71f48162c 3544->3546 3547 7ff71f48163f-7ff71f48169e call 7ff71f48e9b0 fprintf 3545->3547 3546->3547
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: fprintf
        • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
        • API String ID: 383729395-3474627141
        • Opcode ID: 1284c3dbe34098de3f772b811e92f13abcfc319c20c2da7efb8e613618f028dd
        • Instruction ID: 4d19f52b338f9be9765cba458c8ec364b42f4df64a584749d1a1949790c6d407
        • Opcode Fuzzy Hash: 1284c3dbe34098de3f772b811e92f13abcfc319c20c2da7efb8e613618f028dd
        • Instruction Fuzzy Hash: 9F017062D0CFC483D6019F5898011FAB320FFAE759F699326EE8C26255DF29E5A6C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: fprintf
        • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
        • API String ID: 383729395-4273532761
        • Opcode ID: 1126e2a43dcb5e995abd21aac53ac0efc0976c9e0c1b733b45b9d49a6aa37c90
        • Instruction ID: c5749797944709d2022baaed60c72cab1cd65f93bcd98eb13a4d948e6b2747e9
        • Opcode Fuzzy Hash: 1126e2a43dcb5e995abd21aac53ac0efc0976c9e0c1b733b45b9d49a6aa37c90
        • Instruction Fuzzy Hash: 40F06212D08EC482D2129F5CA4011EBB334FF8E798F585326EF8D36655DF28E9968710

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 3554 7ff71f4816b0-7ff71f4816b7 call 7ff71f48e9b0 fprintf
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: fprintf
        • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
        • API String ID: 383729395-4283191376
        • Opcode ID: 729b921e8c67bd2a8a86f2febc95da86c5d23c4bdedc1143afcc74071d1fb600
        • Instruction ID: 815a6a87dd99833f12693dde0af91d3f05c794cda8d6d7538b322e7c4ac219e2
        • Opcode Fuzzy Hash: 729b921e8c67bd2a8a86f2febc95da86c5d23c4bdedc1143afcc74071d1fb600
        • Instruction Fuzzy Hash: B5F06212D08EC482D2129F5CA4011EBB330FF8E7A8F585326EF8D36255DF28E5968710

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 3550 7ff71f4816a0-7ff71f4816a7 call 7ff71f48e9b0 fprintf
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: fprintf
        • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
        • API String ID: 383729395-2713391170
        • Opcode ID: cd1e6333fdda96bc61dfffa17928df2eeae9fd87cc14cf013f0fe063539aaea2
        • Instruction ID: 8af9f1abd499bf717c9b2e84b746da8f71b4a18cdad0fc27fe847673cf9c4193
        • Opcode Fuzzy Hash: cd1e6333fdda96bc61dfffa17928df2eeae9fd87cc14cf013f0fe063539aaea2
        • Instruction Fuzzy Hash: 92F06212D08EC482D2129F5CA4011EBB330FF9E7A8F585726EF8D36255DF28E5968710
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: fprintf
        • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
        • API String ID: 383729395-2187435201
        • Opcode ID: cb17514bf05429c6f8a5baabd58c13e09d51df9f11e8b2c9f2b0e3054c2248d8
        • Instruction ID: 22515acfa3cbae4cee90e6ffcd6b9761a1dfaff4bba67056e8163ac03dd2cc09
        • Opcode Fuzzy Hash: cb17514bf05429c6f8a5baabd58c13e09d51df9f11e8b2c9f2b0e3054c2248d8
        • Instruction Fuzzy Hash: 6FF06212D08EC482D2129F5CA4011EBB330FF8E798F585326EF8D3A255DF28E9968710

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 3558 7ff71f4816c0-7ff71f4816c7 call 7ff71f48e9b0 fprintf
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: fprintf
        • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
        • API String ID: 383729395-4064033741
        • Opcode ID: bcc78e6bb763a26e13ff9f125cce93f8c5baf4f424424cb2843e29d940c79696
        • Instruction ID: d2613eec6691228dc86e3c57ba9237a34df860595f71a844aa7d07dfd944c1d5
        • Opcode Fuzzy Hash: bcc78e6bb763a26e13ff9f125cce93f8c5baf4f424424cb2843e29d940c79696
        • Instruction Fuzzy Hash: E6F06212D08EC482D2129F5CA4011EBB370FF8E7A8F585326EF8D36255DF28E5968710
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3304676005.00007FF71F481000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71F480000, based on PE: true
        • Associated: 00000000.00000002.3304663507.00007FF71F480000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304691736.00007FF71F490000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304703508.00007FF71F491000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304719446.00007FF71F496000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3304734406.00007FF71F499000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff71f480000_e90zPYFENm.jbxd
        Similarity
        • API ID: fprintf
        • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
        • API String ID: 383729395-2468659920
        • Opcode ID: 5edab71d5b9905d534877fbc00034e895137ad5bf3cf5eeaa8b2c0205136d012
        • Instruction ID: 669cf09e206c33ae19afa6d2313e5ea602b12592edaa2a176d68004a13cc86ca
        • Opcode Fuzzy Hash: 5edab71d5b9905d534877fbc00034e895137ad5bf3cf5eeaa8b2c0205136d012
        • Instruction Fuzzy Hash: F4F06212D08EC482D2029F58A4001ABB320FF8E798F545326EF8D2A155DF28E5968710