Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
P2jWhX7B3B.exe

Overview

General Information

Sample name:P2jWhX7B3B.exe
renamed because original name is a hash value
Original sample name:aa25d7c3077df8436843b7bda71b75a21d26364b433a785b6ef7fee32e685cd6.exe
Analysis ID:1502381
MD5:45b0d7e39737d84cda9fe98e63c950a9
SHA1:2e00d9dca0fb42e29b14141e6e2229f7818bbcf2
SHA256:aa25d7c3077df8436843b7bda71b75a21d26364b433a785b6ef7fee32e685cd6
Tags:exe
Infos:

Detection

Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
AI detected suspicious sample
Contains functionality to inject code into remote processes
Found direct / indirect Syscall (likely to bypass EDR)
Hides threads from debuggers
Machine Learning detection for sample
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)

Classification

  • System is w10x64
  • P2jWhX7B3B.exe (PID: 4928 cmdline: "C:\Users\user\Desktop\P2jWhX7B3B.exe" MD5: 45B0D7E39737D84CDA9FE98E63C950A9)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
Source: P2jWhX7B3B.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B721E1 FindFirstFileW,FindClose,0_2_00007FF787B721E1
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B721F5 FindFirstFileW,FindClose,0_2_00007FF787B721F5
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B721CC FindFirstFileW,FindClose,0_2_00007FF787B721CC
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B721D4 FindFirstFileW,FindClose,0_2_00007FF787B721D4
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B755C2 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,GetLastError,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00007FF787B755C2
Source: P2jWhX7B3B.exeString found in binary or memory: https://enigmaprotector.com/taggant/spv.crl0
Source: P2jWhX7B3B.exeString found in binary or memory: https://enigmaprotector.com/taggant/user.crl0
Source: P2jWhX7B3B.exe, 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://gcc.gnu.org/bugs/):

System Summary

barindex
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B758B00_2_00007FF787B758B0
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B7492C0_2_00007FF787B7492C
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B78F520_2_00007FF787B78F52
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B71E4B0_2_00007FF787B71E4B
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B7A9EA0_2_00007FF787B7A9EA
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B7159A0_2_00007FF787B7159A
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B789720_2_00007FF787B78972
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B749530_2_00007FF787B74953
Source: P2jWhX7B3B.exeStatic PE information: Number of sections : 12 > 10
Source: P2jWhX7B3B.exeStatic PE information: Section: ZLIB complexity 0.9947643119747899
Source: classification engineClassification label: mal80.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B7492C GetEnvironmentVariableW,GetFileAttributesW,GetEnvironmentVariableW,GetFileAttributesW,CreateToolhelp32Snapshot,Process32FirstW,_wcsicmp,Process32NextW,_wcsicmp,0_2_00007FF787B7492C
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 6
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 5
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 8
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 7
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 9
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 0
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 10
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 2
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 1
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 4
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeMutant created: \Sessions\1\BaseNamedObjects\Mutex object: Unique: -45918899--1129030014. Number: 3
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeFile read: C:\Users\user\Desktop\P2jWhX7B3B.exeJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{76A64158-CB41-11D1-8B02-00600806D9B6}\InProcServer32Jump to behavior
Source: P2jWhX7B3B.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: P2jWhX7B3B.exeStatic file information: File size 3659776 > 1048576
Source: P2jWhX7B3B.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x321600

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeUnpacked PE file: 0.2.P2jWhX7B3B.exe.7ff787b70000.0.unpack Unknown_Section0:EW;Unknown_Section1:EW;Unknown_Section2:EW;Unknown_Section3:EW;Unknown_Section4:EW;Unknown_Section5:W;Unknown_Section6:EW;Unknown_Section7:EW;Unknown_Section8:EW;Unknown_Section9:EW;Unknown_Section10:EW;Unknown_Section11:EW; vs Unknown_Section0:ER;Unknown_Section1:W;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:R;Unknown_Section5:W;Unknown_Section6:W;Unknown_Section7:W;Unknown_Section8:W;Unknown_Section9:R;Unknown_Section10:EW;Unknown_Section11:EW;
Source: P2jWhX7B3B.exeStatic PE information: real checksum: 0x3960e should be: 0x37e3d5
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name:
Source: P2jWhX7B3B.exeStatic PE information: section name: entropy: 7.991448404720813
Source: P2jWhX7B3B.exeStatic PE information: section name: entropy: 7.887538885458545
Source: P2jWhX7B3B.exeStatic PE information: section name: entropy: 7.8223568056302195
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeSystem information queried: FirmwareTableInformationJump to behavior
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIECTRL.EXE
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XENSERVICE.EXE1
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $SANDBOXIERPCSS.EXE
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDBG.EXE
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIESVC.EXE
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXEN
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXEO
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NETSNIFFER.EXE\CUT
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXED
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HOOKEXPLORER.EXEES$
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEO
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNS.EXES\PICTURES\\)
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXEC
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE%
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXE
Source: P2jWhX7B3B.exe, 00000000.00000002.1667669140.0000021CBA2A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE?<
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $BEHAVIORDUMPER.EXED
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CFF EXPLORER.EXE(
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IMPORTREC.EXEP
Source: P2jWhX7B3B.exe, 00000000.00000002.1667573301.0000021CBA155000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE)
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGMON.EXE
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XENSERVICE.EXEN
Source: P2jWhX7B3B.exe, 00000000.00000002.1667573301.0000021CBA155000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXEC
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .SANDBOXIEDCOMLAUNCH.EXE
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $APIMONITOR-X86.EXEURES\
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $FAKEHTTPSERVER.EXE8
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "PROC_ANALYZER.EXE
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667573301.0000021CBA155000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMUSRVC.EXEZ
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXE
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXE\X
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE@
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: XENSERVICE.EXE
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: QEMU-GA.EXEJ
Source: P2jWhX7B3B.exe, 00000000.00000002.1667573301.0000021CBA155000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AUTORUNSC.EXEE
Source: P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA301000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA2FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: :FRIDA-WINJECTOR-HELPER-64.EXEB3B.EXE\WINDOWS\INETCACHE\\
Source: P2jWhX7B3B.exe, 00000000.00000002.1667573301.0000021CBA155000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "PROCESSHACKER.EXE
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE"
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeWindow / User API: threadDelayed 422Jump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeAPI coverage: 8.2 %
Source: C:\Users\user\Desktop\P2jWhX7B3B.exe TID: 5004Thread sleep count: 422 > 30Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B721E1 FindFirstFileW,FindClose,0_2_00007FF787B721E1
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B721F5 FindFirstFileW,FindClose,0_2_00007FF787B721F5
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B721CC FindFirstFileW,FindClose,0_2_00007FF787B721CC
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B721D4 FindFirstFileW,FindClose,0_2_00007FF787B721D4
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 2012 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 11 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: #Windows 10 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 11 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 2016 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 11 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmscsi.exe,
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: (Windows 2012 R2 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 11 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 6Windows 2012 R2 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtools8
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 0Windows 8 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 6Windows 8.1 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vmwareVBoxService.exe
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vmware
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: "Windows 8 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 11 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.exe
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 11 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Hyper-V (guest)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qemu-ga.exeJ
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareuser.exeB
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxserviceh
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: /Windows 2012 R2 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 11 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: )Windows 8 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareuser.exe'
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 11 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 11 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxtray.exeB
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %Windows 2012 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: $Windows 8.1 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ,Windows 2012 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxtray.exeD
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exe/
Source: P2jWhX7B3B.exe, 00000000.00000003.1661631025.0000021CBAA6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Exchange ServicevmickvpexchangeHyper-V Heartbeat ServicevmicheartbeatHyper-V Gue
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmsrvc.exe=
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exeB
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exe>
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 7Windows 2012 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000003.1662019646.0000021CBAA60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Fvmware physical disk helper service
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareuser.exeC
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %Windows 2016 Microsoft Hyper-V Server
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2012 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 11 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exeM
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qemu-ga
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwaretray.exeB
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 7Windows 2016 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxtray.exe)
Source: P2jWhX7B3B.exe, 00000000.00000003.1661631025.0000021CBAA6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: l Direct ServicevmicvmsessionHyper-V Time Synchronization ServicevmictimesyncHyp
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: +Windows 8.1 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmusrvc.exez
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 11 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwaretray.exe2
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 11 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 2016 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA2FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Fvmware physical disk helper servicee\windows\inetcache\
Source: P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmmemctl.exev
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: :Windows 2012 R2 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 11 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwaretray.exe
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000003.1661631025.0000021CBAA6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hutdown ServicevmicshutdownHyper-V Remote Desktop Virtualization ServicevmicrdvH
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 5Windows 10 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 8Windows 2012 R2 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 3Windows 10 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: *Windows 11 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 R2 Essential Server Solutions without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ,Windows 2016 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2016 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxtray.exeb
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VBoxService.exe
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 8.1 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: *Windows 10 Server Standard without Hyper-V
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 1Windows 11 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668040510.0000021CBAA5C000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000003.1662036173.0000021CBAA5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .new tab - google chromehyper-v
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 1Windows 10 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668080657.0000021CBAA63000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000003.1662019646.0000021CBAA60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: :hyper-v data exchange servicecs)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: VMWare
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 2012 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000003.1661631025.0000021CBAA6C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: meW32TimeVolume Shadow CopyVSSHyper-V Volume Shadow Copy RequestorvmicvssHyper
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Enterprise without Hyper-V (core)
Source: P2jWhX7B3B.exe, P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Windows 10 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8.1 Server Standard without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Datacenter without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 4Windows 8.1 Server Datacenter without Hyper-V (core)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: 2Windows 8 Server Enterprise without Hyper-V (full)
Source: P2jWhX7B3B.exe, 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: #Windows 11 Microsoft Hyper-V Server
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging

barindex
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeThread information set: HideFromDebuggerJump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeProcess queried: DebugPortJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B71131 Sleep,Sleep,_amsg_exit,_initterm,_initterm,SetUnhandledExceptionFilter,_malloc_dbg,strlen,_malloc_dbg,_cexit,0_2_00007FF787B71131
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787BA1690 SetUnhandledExceptionFilter,0_2_00007FF787BA1690
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787BA1530 RtlAddVectoredExceptionHandler,0_2_00007FF787BA1530

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B758B0 ExitProcess,CreateMutexA,GetLastError,CreateProcessA,CreateProcessA,VirtualAllocEx,WriteProcessMemory,VirtualProtect,QueueUserAPC,ResumeThread,0_2_00007FF787B758B0
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeNtProtectVirtualMemory: Indirect: 0x7FF787C3BD37Jump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeNtSetInformationThread: Indirect: 0x7FF787BEACC1Jump to behavior
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeNtProtectVirtualMemory: Indirect: 0x7FF7887890CAJump to behavior
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA415000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000003.1661992608.0000021CBA420000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667924766.0000021CBA423000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: progmanion
Source: P2jWhX7B3B.exe, 00000000.00000002.1668040510.0000021CBAA5C000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000003.1662036173.0000021CBAA5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program manager chromeB
Source: P2jWhX7B3B.exe, 00000000.00000002.1668040510.0000021CBAA57000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000003.1662036173.0000021CBAA57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shell_traywndxe
Source: C:\Users\user\Desktop\P2jWhX7B3B.exeCode function: 0_2_00007FF787B82030 GetSystemTimeAsFileTime,0_2_00007FF787B82030
Source: P2jWhX7B3B.exe, 00000000.00000002.1667600109.0000021CBA160000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procdump.exe
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procmon.exe
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tcpview.exe
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1668134400.0000021CBAD96000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wireshark.exe
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: spideragent.exe
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: fsaua.exe
Source: P2jWhX7B3B.exe, 00000000.00000003.1661845360.0000021CBA344000.00000004.00000020.00020000.00000000.sdmp, P2jWhX7B3B.exe, 00000000.00000002.1667730826.0000021CBA344000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regmon.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
11
Process Injection
23
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Abuse Elevation Control Mechanism
11
Process Injection
LSASS Memory331
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Abuse Elevation Control Mechanism
Security Account Manager23
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS3
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
Software Packing
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
P2jWhX7B3B.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://enigmaprotector.com/taggant/spv.crl00%Avira URL Cloudsafe
https://gcc.gnu.org/bugs/):0%Avira URL Cloudsafe
https://enigmaprotector.com/taggant/user.crl00%Avira URL Cloudsafe
https://enigmaprotector.com/taggant/user.crl00%VirustotalBrowse
https://gcc.gnu.org/bugs/):0%VirustotalBrowse
https://enigmaprotector.com/taggant/spv.crl00%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://gcc.gnu.org/bugs/):P2jWhX7B3B.exe, 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://enigmaprotector.com/taggant/spv.crl0P2jWhX7B3B.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://enigmaprotector.com/taggant/user.crl0P2jWhX7B3B.exefalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502381
Start date and time:2024-09-01 03:16:08 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 56s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:P2jWhX7B3B.exe
renamed because original name is a hash value
Original Sample Name:aa25d7c3077df8436843b7bda71b75a21d26364b433a785b6ef7fee32e685cd6.exe
Detection:MAL
Classification:mal80.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
Entropy (8bit):7.97091124677834
TrID:
  • Win64 Executable (generic) (12005/4) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:P2jWhX7B3B.exe
File size:3'659'776 bytes
MD5:45b0d7e39737d84cda9fe98e63c950a9
SHA1:2e00d9dca0fb42e29b14141e6e2229f7818bbcf2
SHA256:aa25d7c3077df8436843b7bda71b75a21d26364b433a785b6ef7fee32e685cd6
SHA512:59791454b5d45fa3bdf1ec610b9d91ede1da70c7758d36be331954b1af20788b2b4d3ab2db993e6a869aa7bb67f42a6b0499bd411c17cc8654c428bc6d959fc8
SSDEEP:49152:bghim7RwVhwZwwXAXKrDLGijjpLHIU7u4s1F1BkVxcDfagZ7PzYvF9xIjteqgJUL:ZqRVwqEyjjNHIZkref1YvrxIjlngwic
TLSH:C3063343F62F62DCE145A1F2C6049114DB6B15E13EBE08428F0A839E65D76BAD3CF6C9
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......................(............l..........@.............................@............`...@...... ........ ...... .....
Icon Hash:90cececece8e8eb0
Entrypoint:0x14102ed6c
Entrypoint Section:
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE
Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:c1fbf380722f62e9d13f77bc10915a89
Instruction
jmp 00007F942CBC070Ah
add dl, al
add eax, 00000000h
add byte ptr [eax+51h], dl
push edx
push ebx
push ebp
push esi
push edi
inc ecx
push eax
inc ecx
push ecx
inc ecx
push edx
inc ecx
push ebx
inc ecx
push esp
inc ecx
push ebp
inc ecx
push esi
inc ecx
push edi
dec eax
pushfd
dec eax
sub esp, 00000008h
stmxcsr dword ptr [esp]
call 00007F942CBC0705h
pop ebp
dec eax
sub ebp, 00000033h
dec eax
sub ebp, 0102ED6Ch
dec eax
sub esp, 00000020h
jmp 00007F942CBC0709h
cmp ebp, dword ptr [edi+3Fh]
aad 48h
mov eax, 0102ED6Ch
dec eax
add eax, ebp
dec eax
add eax, 00000084h
dec eax
mov ecx, 0000060Bh
dec eax
mov edx, 5747C0E1h
xor byte ptr [eax], dl
dec eax
inc eax
dec eax
dec ecx
jne 00007F942CBC06F8h
jmp 00007F942CBC0709h
int FDh
cdq
fsubr dword ptr [ecx+686A0868h]
fucom st(1), st(0)
loope 00007F942CBC06E3h
test eax, E0E92060h
loope 00007F942CBC06E3h
test eax, 26A908E0h
and ebx, ebp
loope 00007F942CBC06E3h
loope 00007F942CBC06ABh
and ecx, ecx
loope 00007F942CBC06E3h
loope 00007F942CBC06ABh
push ss
add ebp, dword ptr [ecx+606A20E0h]
in eax, dx
loope 00007F942CBC06E3h
loope 00007F942CBC06ABh
loopne 00007F942CBC070Bh
mov cl, B1h
test eax, CF1D1159h
loope 00007F942CBC06E3h
loope 00007F942CBC06E3h
loope 00007F942CBC06ABh
pop eax
call far 0000h : 00000011h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0xd150600xeb1
IMAGE_DIRECTORY_ENTRY_IMPORT0xd15f140x2e8
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xd16af80x28260
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xd150400x10
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0xd150000x28
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
0x10000x210000xee0082921cc774b08e34ce9392064dbd5d3eFalse0.9947643119747899data7.991448404720813IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x220000x20000x200c3c217f77fe21f9174003ad943486cd2False0.548828125data4.599463481632959IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x240000x50000x180073b7b7545ec40fb85bd5e2b3e0ea5c34False0.9724934895833334data7.887538885458545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x290000x40000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x2d0000x30000xa00d8ed81182984c1a5d7924b0294037f42False0.98125data7.8223568056302195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x300000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x310000x20000x2008ba7d2582ddefbcc19f091c56880526dFalse0.1796875data1.4888998962794857IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x330000x10000x2009cb5b7dae27f64e2678851f34675fb4bFalse0.087890625data0.6093502733147627IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x340000x10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x350000x10000x4008926b2563b3596513c089094eb3b6b60False0.8095703125data6.615977615533295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0x360000xcdc0000x4a4006d2624a5290d537eef7cac5b3f198685unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0xd120000x3220000x32160016c67f7303c6388fd5648e32ca325af7unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
DLLImport
kernel32.dllGetModuleHandleA, GetProcAddress, ExitProcess, LoadLibraryA
user32.dllMessageBoxA
advapi32.dllRegCloseKey
oleaut32.dllSysFreeString
gdi32.dllCreateFontA
shell32.dllShellExecuteA
version.dllGetFileVersionInfoA
ole32.dllOleInitialize
msvcrt.dll__C_specific_handler
WININET.dllInternetCloseHandle
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:21:16:55
Start date:31/08/2024
Path:C:\Users\user\Desktop\P2jWhX7B3B.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\P2jWhX7B3B.exe"
Imagebase:0x7ff787b70000
File size:3'659'776 bytes
MD5 hash:45B0D7E39737D84CDA9FE98E63C950A9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:4.1%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:24.2%
    Total number of Nodes:1383
    Total number of Limit Nodes:6
    execution_graph 8923 7ff787b7b7d8 8924 7ff787b7b7ea RtlAcquirePebLock 8923->8924 8925 7ff787b7b844 8923->8925 8927 7ff787b7b803 8924->8927 8926 7ff787b7b83b RtlLeaveCriticalSection 8926->8925 8927->8926 8928 7ff787b7b828 ??3@YAXPEAX 8927->8928 8928->8926 8929 7ff787b7d9d8 8930 7ff787b7d9e0 localeconv 8929->8930 8933 7ff787b7d402 8929->8933 8931 7ff787b7fa6c 6 API calls 8930->8931 8931->8933 8932 7ff787b7dae7 8933->8932 8934 7ff787b7c467 _fputchar 8933->8934 8934->8933 8176 7ff787b7fad7 8177 7ff787b7fafd ___lc_codepage_func ___mb_cur_max_func 8176->8177 8178 7ff787b7faf6 8176->8178 8179 7ff787b7fb58 8177->8179 8180 7ff787b7fb18 8177->8180 8178->8177 8180->8179 8181 7ff787b7fb23 8180->8181 8184 7ff787b7fb61 8180->8184 8181->8179 8185 7ff787b7f950 8181->8185 8182 7ff787b7f950 4 API calls 8182->8184 8184->8179 8184->8182 8186 7ff787b7f970 8185->8186 8193 7ff787b7f98c 8185->8193 8187 7ff787b7fa54 8186->8187 8189 7ff787b7f9aa 8186->8189 8190 7ff787b7f9df IsDBCSLeadByteEx 8186->8190 8186->8193 8188 7ff787b7fa1f MultiByteToWideChar 8187->8188 8187->8193 8191 7ff787b7fa44 _errno 8188->8191 8188->8193 8192 7ff787b7f9c6 MultiByteToWideChar 8189->8192 8189->8193 8190->8187 8190->8189 8191->8193 8192->8191 8192->8193 8193->8181 8194 7ff787b7fee0 8195 7ff787b7fef7 8194->8195 8197 7ff787b7ff04 8194->8197 8198 7ff787b82030 GetSystemTimeAsFileTime 8195->8198 8198->8197 8963 7ff787b7afe0 8964 7ff787b7afe9 8963->8964 8966 7ff787b7aff2 8964->8966 8967 7ff787b7b84d 8964->8967 8968 7ff787b7b85b 8967->8968 8971 7ff787b7b863 8967->8971 8969 7ff787b7b871 8968->8969 8968->8971 8972 7ff787b7b861 8968->8972 8970 7ff787b7b87b RtlInitializeCriticalSection 8969->8970 8969->8971 8970->8971 8971->8966 8972->8971 8973 7ff787b7b8b9 ??3@YAXPEAX 8972->8973 8974 7ff787b7b8c7 RtlDeleteCriticalSection 8972->8974 8973->8972 8974->8971 8975 7ff787b765ee 8976 7ff787b7665b 8975->8976 8978 7ff787b76615 8975->8978 8977 7ff787b7662d _realloc_dbg 8977->8976 8979 7ff787b7663d ??3@YAXPEAX 8977->8979 8978->8976 8978->8977 8979->8976 8204 7ff787b774e8 8205 7ff787b774f5 8204->8205 8217 7ff787b77544 8204->8217 8206 7ff787b77551 8205->8206 8210 7ff787b77506 8205->8210 8219 7ff787b78330 8206->8219 8208 7ff787b77561 8208->8217 8229 7ff787b78482 8208->8229 8218 7ff787b76366 strlen 8210->8218 8212 7ff787b775aa strcmp 8213 7ff787b775d0 8212->8213 8215 7ff787b775fa strcmp 8213->8215 8214 7ff787b77579 8214->8212 8214->8217 8216 7ff787b77649 strcmp 8215->8216 8215->8217 8216->8217 8220 7ff787b78353 8219->8220 8228 7ff787b78390 8219->8228 8221 7ff787b783de 8220->8221 8222 7ff787b78386 8220->8222 8234 7ff787b76366 strlen 8221->8234 8224 7ff787b78388 8222->8224 8225 7ff787b78395 8222->8225 8224->8228 8235 7ff787b76366 strlen 8224->8235 8225->8228 8233 7ff787b76366 strlen 8225->8233 8228->8208 8230 7ff787b78495 8229->8230 8232 7ff787b784f1 8230->8232 8236 7ff787b76366 strlen 8230->8236 8232->8214 8985 7ff787b767f6 8986 7ff787b76804 8985->8986 8989 7ff787b76366 strlen 8986->8989 8994 7ff787b7bbf1 8995 7ff787b7bbfa abort 8994->8995 8996 7ff787b7bbff 8994->8996 8995->8996 7656 7ff787b712fd 7658 7ff787b71306 7656->7658 7657 7ff787b712f8 7658->7657 7661 7ff787b71131 7658->7661 7662 7ff787b7115a 7661->7662 7663 7ff787b71172 7662->7663 7664 7ff787b71169 Sleep 7662->7664 7665 7ff787b71188 _amsg_exit 7663->7665 7666 7ff787b71194 7663->7666 7664->7662 7667 7ff787b711b5 7665->7667 7666->7667 7668 7ff787b7119a _initterm 7666->7668 7669 7ff787b711de 7667->7669 7670 7ff787b711c5 _initterm 7667->7670 7668->7667 7682 7ff787b7b2fb 7669->7682 7670->7669 7673 7ff787b7122e 7674 7ff787b71233 _malloc_dbg 7673->7674 7675 7ff787b71253 7674->7675 7676 7ff787b71258 strlen _malloc_dbg 7675->7676 7677 7ff787b71283 7675->7677 7676->7675 7693 7ff787b91d70 7677->7693 7683 7ff787b71208 SetUnhandledExceptionFilter 7682->7683 7684 7ff787b7b319 7682->7684 7683->7673 7685 7ff787b7b390 7684->7685 7687 7ff787b7b51f 7684->7687 7691 7ff787b7b3cf 7684->7691 7685->7687 7688 7ff787b7b3ae 7685->7688 7686 7ff787b7b547 VirtualProtect 7686->7687 7687->7683 7687->7686 7688->7685 7699 7ff787b7b1b4 7688->7699 7690 7ff787b7b43a 7692 7ff787b7b1b4 3 API calls 7690->7692 7691->7687 7691->7690 7692->7691 7698 7ff787b91d81 7693->7698 7694 7ff787b91d8e GetStartupInfoA 7696 7ff787b91e04 7694->7696 7697 7ff787b91d9f _ismbblead 7697->7698 7698->7694 7698->7697 7700 7ff787b7b1da 7699->7700 7701 7ff787b7b23f VirtualQuery 7700->7701 7703 7ff787b7b2e3 7700->7703 7702 7ff787b7b268 7701->7702 7702->7703 7704 7ff787b7b297 VirtualProtect 7702->7704 7703->7688 7704->7703 7705 7ff787b7b2cf GetLastError 7704->7705 7705->7703 8237 7ff787b714fd 8238 7ff787b71500 8237->8238 8241 7ff787b7bea8 RtlCaptureContext RtlUnwindEx abort 8238->8241 8997 7ff787b7affc 8998 7ff787b7b00e 8997->8998 8999 7ff787b7b84d 3 API calls 8998->8999 9000 7ff787b7b023 8998->9000 8999->9000 9001 7ff787b7a3f9 strcmp 9002 7ff787b7a42e 9001->9002 9008 7ff787b7a2be 9001->9008 9003 7ff787b7a458 9002->9003 9006 7ff787b7a50e 9002->9006 9004 7ff787b7a46b 9003->9004 9007 7ff787b7a45d 9003->9007 9005 7ff787b7a63c strcmp 9004->9005 9004->9008 9005->9008 9009 7ff787b7a64f strcmp 9005->9009 9010 7ff787b7a52a 9006->9010 9011 7ff787b7a534 strcmp 9006->9011 9015 7ff787b7a51b 9006->9015 9007->9008 9017 7ff787b7a76a strcmp 9007->9017 9009->9008 9012 7ff787b7a66c 9009->9012 9013 7ff787b79b50 memcmp 9010->9013 9014 7ff787b7a547 9011->9014 9011->9015 9012->9008 9016 7ff787b79b50 memcmp 9012->9016 9013->9015 9024 7ff787b79c8f 9014->9024 9018 7ff787b7a55e strcmp 9015->9018 9016->9008 9017->9008 9018->9008 9020 7ff787b7a586 strcmp 9018->9020 9021 7ff787b7a5ac 9020->9021 9022 7ff787b7a599 strcmp 9020->9022 9021->9008 9023 7ff787b79c8f 2 API calls 9021->9023 9022->9008 9022->9021 9023->9008 9044 7ff787b764a0 9024->9044 9027 7ff787b79cc4 9029 7ff787b7638d memcmp 9027->9029 9028 7ff787b79cd1 9030 7ff787b79cdd 9028->9030 9031 7ff787b79d65 9028->9031 9043 7ff787b79ccc 9029->9043 9033 7ff787b79b50 memcmp 9030->9033 9032 7ff787b79dc8 9031->9032 9042 7ff787b79d6a 9031->9042 9036 7ff787b7638d memcmp 9032->9036 9032->9043 9034 7ff787b79d02 9033->9034 9037 7ff787b79d1a strcmp 9034->9037 9034->9043 9035 7ff787b7638d memcmp 9035->9042 9036->9043 9039 7ff787b79d42 9037->9039 9037->9043 9038 7ff787b79f1d 9038->9015 9041 7ff787b7638d memcmp 9039->9041 9040 7ff787b7644b memcmp 9040->9038 9041->9043 9042->9035 9042->9043 9043->9038 9043->9040 9047 7ff787b764ad 9044->9047 9045 7ff787b764f9 9045->9027 9045->9028 9045->9038 9046 7ff787b7638d memcmp 9046->9047 9047->9045 9047->9046 9053 7ff787b71001 9055 7ff787b7103c __set_app_type 9053->9055 9056 7ff787b710a9 9055->9056 8242 7ff787b76f09 8243 7ff787b76f19 8242->8243 8246 7ff787b766ba 8243->8246 8251 7ff787b76691 8246->8251 8255 7ff787b7c320 8251->8255 8254 7ff787b76366 strlen 8258 7ff787b7d350 8255->8258 8261 7ff787b7d387 8258->8261 8259 7ff787b766b5 8259->8254 8260 7ff787b7c467 _fputchar 8260->8261 8261->8259 8261->8260 8262 7ff787b7af15 8263 7ff787b7af1e 8262->8263 8265 7ff787b7af28 8262->8265 8263->8265 8266 7ff787b7a9ea 8263->8266 8267 7ff787b7aa17 8266->8267 8268 7ff787b7aa22 _strncoll 8266->8268 8267->8268 8273 7ff787b7aa3d 8267->8273 8268->8273 8269 7ff787b7aa9b strlen 8269->8273 8274 7ff787b7acdd 8269->8274 8270 7ff787b78972 memcmp strcmp 8270->8273 8271 7ff787b7ac65 strlen 8271->8273 8272 7ff787b7aca3 strlen 8272->8273 8273->8269 8273->8270 8273->8271 8273->8272 8273->8274 8274->8265 8275 7ff787b7d914 8276 7ff787b7d402 8275->8276 8276->8275 8277 7ff787b7dae7 8276->8277 8278 7ff787b7c467 _fputchar 8276->8278 8278->8276 9075 7ff787b7ee14 9076 7ff787b7ee4d 9075->9076 9077 7ff787b7ee2b RtlDeleteCriticalSection 9075->9077 9077->9076 8283 7ff787b73910 8305 7ff787b8e680 8283->8305 8285 7ff787b73932 8286 7ff787b7c16f 41 API calls 8285->8286 8287 7ff787b73946 8286->8287 8288 7ff787b7c16f 41 API calls 8287->8288 8290 7ff787b73955 GetEnvironmentVariableW 8288->8290 8296 7ff787b73a33 8290->8296 8299 7ff787b73a3a 8290->8299 8291 7ff787b73ac0 8293 7ff787b7c16f 41 API calls 8291->8293 8294 7ff787b73acc 8293->8294 8295 7ff787b7c16f 41 API calls 8294->8295 8297 7ff787b73adb 8295->8297 8298 7ff787b907c0 21 API calls 8297->8298 8300 7ff787b73b9e 8298->8300 8299->8291 8299->8296 8309 7ff787b907c0 wcslen 8299->8309 8316 7ff787b721f5 FindFirstFileW 8299->8316 8302 7ff787b721f5 2 API calls 8300->8302 8303 7ff787b73ba6 8302->8303 8303->8296 8319 7ff787b72228 GetFileAttributesW 8303->8319 8306 7ff787b8e698 8305->8306 8308 7ff787b8e6a5 8305->8308 8307 7ff787b8f880 20 API calls 8306->8307 8307->8308 8308->8285 8321 7ff787b8f6c0 8309->8321 8311 7ff787b90805 8325 7ff787b8ee50 8311->8325 8313 7ff787b90813 8314 7ff787b8ee50 20 API calls 8313->8314 8315 7ff787b90821 8314->8315 8315->8299 8317 7ff787b72215 FindClose 8316->8317 8318 7ff787b72220 8316->8318 8317->8318 8318->8299 8320 7ff787b7223c 8319->8320 8320->8303 8322 7ff787b8f6d3 8321->8322 8323 7ff787b8f6ea 8322->8323 8324 7ff787b8f880 20 API calls 8322->8324 8323->8311 8324->8323 8326 7ff787b89070 20 API calls 8325->8326 8327 7ff787b8ee70 8326->8327 8328 7ff787b8f8e0 20 API calls 8327->8328 8329 7ff787b8f7c0 8327->8329 8328->8329 8329->8313 9078 7ff787b76810 9080 7ff787b76821 9078->9080 9081 7ff787b77c2f 9080->9081 9082 7ff787b76366 strlen 9080->9082 8330 7ff787b7b69e 8331 7ff787b7b6a3 signal 8330->8331 8332 7ff787b7b6b5 signal 8331->8332 8333 7ff787b7b631 8331->8333 8332->8333 8343 7ff787b79e9d 8344 7ff787b79ebb 8343->8344 8345 7ff787b7a05c 8344->8345 8347 7ff787b7644b 8344->8347 8350 7ff787b7645b 8347->8350 8348 7ff787b76492 8348->8345 8350->8348 8351 7ff787b7638d 8350->8351 8354 7ff787b7639c 8351->8354 8352 7ff787b763f7 8352->8350 8353 7ff787b763de memcmp 8353->8352 8354->8352 8354->8353 9083 7ff787b7d59b 9084 7ff787b7d5ad 9083->9084 9089 7ff787b7cc34 9084->9089 9086 7ff787b7dae7 9087 7ff787b7d402 9087->9086 9088 7ff787b7c467 _fputchar 9087->9088 9088->9087 9090 7ff787b7cc66 9089->9090 9092 7ff787b7cd86 9090->9092 9095 7ff787b7c467 _fputchar 9090->9095 9091 7ff787b7ce06 9094 7ff787b7ce22 9091->9094 9096 7ff787b7c467 _fputchar 9091->9096 9092->9091 9093 7ff787b7c467 _fputchar 9092->9093 9093->9092 9094->9087 9095->9090 9096->9091 9097 7ff787b78b99 9100 7ff787b78f52 9097->9100 9099 7ff787b78ba3 9101 7ff787b7910a 9100->9101 9102 7ff787b78f6f 9100->9102 9105 7ff787b79c8f 2 API calls 9101->9105 9103 7ff787b78f71 9102->9103 9104 7ff787b78f7f 9102->9104 9109 7ff787b78f75 9103->9109 9111 7ff787b78f8c 9103->9111 9106 7ff787b79002 9104->9106 9112 7ff787b78f7d 9104->9112 9115 7ff787b78fab 9105->9115 9122 7ff787b78972 9106->9122 9108 7ff787b79c8f 2 API calls 9108->9115 9109->9112 9153 7ff787b785ac 9109->9153 9111->9115 9117 7ff787b7a088 9111->9117 9112->9108 9112->9115 9113 7ff787b79010 9113->9115 9116 7ff787b78f52 2 API calls 9113->9116 9115->9099 9116->9115 9120 7ff787b7a096 9117->9120 9118 7ff787b7a0b3 9118->9115 9119 7ff787b79c8f 2 API calls 9119->9120 9120->9118 9120->9119 9121 7ff787b785ac memcmp 9120->9121 9121->9120 9123 7ff787b7898a 9122->9123 9124 7ff787b78993 9122->9124 9123->9124 9125 7ff787b78e1b 9123->9125 9126 7ff787b789b6 9124->9126 9130 7ff787b789a3 9124->9130 9127 7ff787b78f52 2 API calls 9125->9127 9128 7ff787b78c0b 9126->9128 9129 7ff787b78cd6 9126->9129 9151 7ff787b789b1 9126->9151 9127->9151 9132 7ff787b78c0d 9128->9132 9133 7ff787b78c3a 9128->9133 9134 7ff787b78d04 9129->9134 9138 7ff787b78cea 9129->9138 9131 7ff787b78a01 9130->9131 9142 7ff787b78a82 9130->9142 9130->9151 9147 7ff787b78ab1 9131->9147 9150 7ff787b78a09 9131->9150 9136 7ff787b78c8c 9132->9136 9137 7ff787b78c12 9132->9137 9141 7ff787b78f52 2 API calls 9133->9141 9133->9151 9135 7ff787b78972 2 API calls 9134->9135 9135->9151 9143 7ff787b764a0 memcmp 9136->9143 9139 7ff787b78c17 9137->9139 9140 7ff787b78c63 9137->9140 9144 7ff787b78972 2 API calls 9138->9144 9148 7ff787b78972 2 API calls 9139->9148 9139->9151 9146 7ff787b78f52 2 API calls 9140->9146 9141->9151 9145 7ff787b78972 2 API calls 9142->9145 9142->9151 9143->9151 9144->9151 9145->9151 9146->9151 9149 7ff787b78972 2 API calls 9147->9149 9147->9151 9148->9151 9149->9151 9150->9151 9152 7ff787b78972 2 API calls 9150->9152 9151->9113 9152->9151 9154 7ff787b785be 9153->9154 9156 7ff787b785f5 9153->9156 9155 7ff787b7644b memcmp 9154->9155 9154->9156 9155->9156 9156->9112 9162 7ff787b7ffa4 9163 7ff787b7fdc9 2 API calls 9162->9163 9164 7ff787b7ffaf 9163->9164 9165 7ff787b7ffe0 9164->9165 9166 7ff787b7ffda 9164->9166 9167 7ff787b7ffc9 9164->9167 9166->9165 9169 7ff787b7ffe7 GetCurrentThreadId 9166->9169 9167->9165 9168 7ff787b7ffcf GetCurrentThreadId 9167->9168 9168->9165 9169->9165 9174 7ff787b7fbab ___mb_cur_max_func ___lc_codepage_func 9175 7ff787b7fbda 9174->9175 9176 7ff787b7f950 4 API calls 9175->9176 9177 7ff787b7fbf9 9176->9177 8399 7ff787b7d4b6 8400 7ff787b7d50e 8399->8400 8401 7ff787b7d4cb 8399->8401 8419 7ff787b7c613 8400->8419 8404 7ff787b7d4f5 wcslen 8401->8404 8405 7ff787b7d4ee 8401->8405 8403 7ff787b7d402 8407 7ff787b7dae7 8403->8407 8408 7ff787b7c467 _fputchar 8403->8408 8404->8405 8409 7ff787b7c4a0 8405->8409 8408->8403 8423 7ff787b7f847 8409->8423 8411 7ff787b7c4cf 8417 7ff787b7c4e2 8411->8417 8428 7ff787b7c467 8411->8428 8413 7ff787b7c551 8414 7ff787b7c56d 8413->8414 8416 7ff787b7c467 _fputchar 8413->8416 8414->8403 8415 7ff787b7f847 4 API calls 8415->8417 8416->8413 8417->8413 8417->8415 8418 7ff787b7c467 _fputchar 8417->8418 8418->8417 8420 7ff787b7c623 8419->8420 8421 7ff787b7c641 strlen 8420->8421 8422 7ff787b7c63a 8420->8422 8421->8422 8424 7ff787b7f858 ___mb_cur_max_func ___lc_codepage_func 8423->8424 8425 7ff787b7f853 8423->8425 8432 7ff787b7f7d0 8424->8432 8425->8424 8429 7ff787b7c478 8428->8429 8430 7ff787b7c489 _fputchar 8429->8430 8431 7ff787b7c490 8429->8431 8430->8431 8431->8411 8433 7ff787b7f7f4 WideCharToMultiByte 8432->8433 8435 7ff787b7f7e4 8432->8435 8434 7ff787b7f834 _errno 8433->8434 8433->8435 8436 7ff787b7f7eb 8434->8436 8435->8434 8435->8436 8436->8411 9178 7ff787b78bb3 9179 7ff787b78f52 2 API calls 9178->9179 9180 7ff787b78bbd 9179->9180 8449 7ff787b7d6b1 8453 7ff787b7d6cd 8449->8453 8451 7ff787b7d748 8462 7ff787b7ce2f 8451->8462 8452 7ff787b7d743 8458 7ff787b7c65a 8452->8458 8453->8451 8453->8452 8455 7ff787b7dae7 8456 7ff787b7c467 _fputchar 8457 7ff787b7d402 8456->8457 8457->8455 8457->8456 8459 7ff787b7c670 8458->8459 8459->8459 8482 7ff787b7c57e 8459->8482 8463 7ff787b7ce46 8462->8463 8465 7ff787b7cfde 8463->8465 8470 7ff787b7c467 _fputchar 8463->8470 8464 7ff787b7d01d 8467 7ff787b7c467 _fputchar 8464->8467 8465->8464 8466 7ff787b7c467 _fputchar 8465->8466 8466->8464 8468 7ff787b7d02a 8467->8468 8469 7ff787b7c467 _fputchar 8468->8469 8471 7ff787b7d03b 8469->8471 8470->8463 8473 7ff787b7c467 _fputchar 8471->8473 8476 7ff787b7d041 8471->8476 8472 7ff787b7d088 8474 7ff787b7d0d4 8472->8474 8478 7ff787b7c467 _fputchar 8472->8478 8473->8471 8479 7ff787b7c467 _fputchar 8474->8479 8476->8472 8477 7ff787b7c467 _fputchar 8476->8477 8481 7ff787b7c4a0 5 API calls 8476->8481 8490 7ff787b7c6cc 8476->8490 8477->8476 8478->8472 8480 7ff787b7d0e8 8479->8480 8481->8476 8483 7ff787b7c596 8482->8483 8484 7ff787b7c5a3 8483->8484 8485 7ff787b7c467 _fputchar 8483->8485 8486 7ff787b7c5ee 8484->8486 8488 7ff787b7c467 _fputchar 8484->8488 8485->8483 8487 7ff787b7c60a 8486->8487 8489 7ff787b7c467 _fputchar 8486->8489 8487->8457 8488->8484 8489->8486 8491 7ff787b7c6e6 8490->8491 8498 7ff787b7c70f 8490->8498 8504 7ff787b7fa6c 8491->8504 8492 7ff787b7c727 8497 7ff787b7f847 4 API calls 8492->8497 8493 7ff787b7c786 8494 7ff787b7c467 _fputchar 8493->8494 8496 7ff787b7c772 8494->8496 8496->8476 8499 7ff787b7c755 8497->8499 8498->8492 8498->8493 8500 7ff787b7c75c 8499->8500 8501 7ff787b7c774 8499->8501 8500->8496 8503 7ff787b7c467 _fputchar 8500->8503 8502 7ff787b7c467 _fputchar 8501->8502 8502->8496 8503->8500 8505 7ff787b7fa7d 8504->8505 8506 7ff787b7fa82 ___mb_cur_max_func ___lc_codepage_func 8504->8506 8505->8506 8507 7ff787b7fabb 8506->8507 8508 7ff787b7f950 4 API calls 8507->8508 8509 7ff787b7facf 8508->8509 8509->8498 8059 7ff787b758b0 8060 7ff787b758c8 8059->8060 8061 7ff787b758ce ExitProcess 8060->8061 8062 7ff787b758d9 8060->8062 8095 7ff787b71d19 8062->8095 8067 7ff787b7c16f 41 API calls 8068 7ff787b758f6 8067->8068 8069 7ff787b75908 8068->8069 8070 7ff787b7c16f 41 API calls 8068->8070 8071 7ff787b7c16f 41 API calls 8069->8071 8070->8069 8076 7ff787b75932 CreateMutexA GetLastError 8071->8076 8073 7ff787b759ba 8074 7ff787b759c8 8075 7ff787b7c16f 41 API calls 8074->8075 8077 7ff787b759e6 8075->8077 8076->8073 8076->8074 8078 7ff787b7c16f 41 API calls 8077->8078 8079 7ff787b759f5 8078->8079 8144 7ff787b755c2 8079->8144 8082 7ff787b7c16f 41 API calls 8083 7ff787b75aca 8082->8083 8084 7ff787b7c16f 41 API calls 8083->8084 8087 7ff787b75ad9 8084->8087 8086 7ff787b75b8a 8088 7ff787b7c16f 41 API calls 8086->8088 8165 7ff787b713d6 strlen 8087->8165 8089 7ff787b75bcc 8088->8089 8090 7ff787b75be3 8089->8090 8091 7ff787b7c16f 41 API calls 8089->8091 8092 7ff787b7c16f 41 API calls 8090->8092 8091->8090 8094 7ff787b75c09 6 API calls 8092->8094 8094->8073 8096 7ff787b7c16f 41 API calls 8095->8096 8097 7ff787b71d2c 8096->8097 8098 7ff787b7c16f 41 API calls 8097->8098 8102 7ff787b71d3b RegOpenKeyExA 8098->8102 8100 7ff787b71e09 8103 7ff787b7159a 8100->8103 8101 7ff787b71df6 RegCloseKey exit 8101->8100 8102->8100 8102->8101 8104 7ff787b7c16f 41 API calls 8103->8104 8105 7ff787b715bc 8104->8105 8106 7ff787b7c16f 41 API calls 8105->8106 8110 7ff787b715cb 8106->8110 8107 7ff787b7c16f 41 API calls 8108 7ff787b71676 8107->8108 8109 7ff787b7c16f 41 API calls 8108->8109 8114 7ff787b71685 8109->8114 8110->8107 8111 7ff787b7c16f 41 API calls 8112 7ff787b71737 8111->8112 8113 7ff787b7c16f 41 API calls 8112->8113 8118 7ff787b71746 8113->8118 8114->8111 8115 7ff787b7c16f 41 API calls 8116 7ff787b717ff 8115->8116 8117 7ff787b7c16f 41 API calls 8116->8117 8121 7ff787b7180e 8117->8121 8118->8115 8119 7ff787b7c16f 41 API calls 8120 7ff787b718b4 8119->8120 8122 7ff787b7c16f 41 API calls 8120->8122 8121->8119 8126 7ff787b718c3 8122->8126 8123 7ff787b7c16f 41 API calls 8124 7ff787b7197d 8123->8124 8125 7ff787b7c16f 41 API calls 8124->8125 8130 7ff787b7198c 8125->8130 8126->8123 8127 7ff787b7c16f 41 API calls 8128 7ff787b71a46 8127->8128 8129 7ff787b7c16f 41 API calls 8128->8129 8134 7ff787b71a55 8129->8134 8130->8127 8131 7ff787b7c16f 41 API calls 8132 7ff787b71b00 8131->8132 8133 7ff787b7c16f 41 API calls 8132->8133 8138 7ff787b71b0f 8133->8138 8134->8131 8135 7ff787b7c16f 41 API calls 8136 7ff787b71be2 8135->8136 8137 7ff787b7c16f 41 API calls 8136->8137 8142 7ff787b71bf1 8137->8142 8138->8135 8139 7ff787b71c9d VirtualProtect 8140 7ff787b71d05 8139->8140 8141 7ff787b71cc3 VirtualProtect 8139->8141 8140->8067 8141->8142 8142->8139 8142->8140 8143 7ff787b71ce6 FlushInstructionCache 8142->8143 8143->8142 8145 7ff787b755d8 8144->8145 8146 7ff787b7c16f 41 API calls 8145->8146 8147 7ff787b755ed 8146->8147 8148 7ff787b7c16f 41 API calls 8147->8148 8152 7ff787b755fc InternetOpenW 8148->8152 8150 7ff787b7571d 8150->8073 8150->8082 8151 7ff787b756d6 InternetOpenUrlW 8153 7ff787b75712 InternetCloseHandle 8151->8153 8164 7ff787b756ff 8151->8164 8152->8150 8152->8151 8153->8150 8154 7ff787b75781 InternetReadFile 8155 7ff787b7579e 8154->8155 8154->8164 8156 7ff787b7587a GetLastError 8155->8156 8157 7ff787b75860 InternetCloseHandle InternetCloseHandle 8155->8157 8156->8157 8158 7ff787b75884 InternetCloseHandle InternetCloseHandle 8156->8158 8157->8150 8158->8150 8159 7ff787b8b8e0 memcpy 8159->8164 8160 7ff787b91990 20 API calls 8160->8164 8161 7ff787b908e0 17 API calls 8161->8164 8162 7ff787b8b920 memcpy 8162->8164 8164->8154 8164->8156 8164->8159 8164->8160 8164->8161 8164->8162 8169 7ff787b8b8e0 8164->8169 8166 7ff787b71411 8165->8166 8167 7ff787b71401 8165->8167 8166->8086 8172 7ff787b8dbb0 8167->8172 8170 7ff787b8b8f4 memcpy 8169->8170 8171 7ff787b8b907 8169->8171 8170->8171 8171->8154 8173 7ff787b8dbd2 8172->8173 8174 7ff787b8dbc6 8172->8174 8175 7ff787b91990 20 API calls 8174->8175 8175->8173 9186 7ff787b7b5b7 9188 7ff787b7b5de 9186->9188 9187 7ff787b7b5ff 9188->9187 9189 7ff787b7b66f signal 9188->9189 9190 7ff787b7b645 9188->9190 9189->9187 9189->9190 9190->9187 9191 7ff787b7b68b signal 9190->9191 9191->9187 9192 7ff787b795c1 9194 7ff787b795d9 9192->9194 9193 7ff787b79706 9194->9193 9195 7ff787b76691 _fputchar 9194->9195 9196 7ff787b7979f strlen 9195->9196 9196->9193 9197 7ff787b721bf 9198 7ff787b721ca 9197->9198 9204 7ff787b7bea8 RtlCaptureContext RtlUnwindEx abort 9198->9204 9205 7ff787b7bfbf RtlCaptureContext 9206 7ff787b7c040 RtlLookupFunctionEntry 9205->9206 9207 7ff787b7c06c RtlVirtualUnwind 9206->9207 9208 7ff787b7c0d7 9206->9208 9209 7ff787b7c0c4 9207->9209 9209->9206 9209->9208 9210 7ff787b779cb 9211 7ff787b779ee 9210->9211 9212 7ff787b779d9 9210->9212 9211->9212 9214 7ff787b76366 strlen 9211->9214 9215 7ff787b76fcc 9217 7ff787b77005 9215->9217 9216 7ff787b770bf 9217->9216 9219 7ff787b781de 9217->9219 9220 7ff787b78208 9219->9220 9224 7ff787b781f9 9219->9224 9221 7ff787b78230 9220->9221 9225 7ff787b76366 strlen 9220->9225 9226 7ff787b78080 9221->9226 9229 7ff787b78091 9226->9229 9227 7ff787b780e9 9241 7ff787b77f61 9227->9241 9229->9227 9230 7ff787b78103 9229->9230 9232 7ff787b78121 9229->9232 9238 7ff787b780f9 9229->9238 9231 7ff787b781de 2 API calls 9230->9231 9231->9238 9244 7ff787b76366 strlen 9232->9244 9238->9224 9242 7ff787b77ff2 9241->9242 9243 7ff787b78080 2 API calls 9242->9243 8539 7ff787b714d3 8540 7ff787b909f0 3 API calls 8539->8540 8541 7ff787b714db 8540->8541 8548 7ff787b90d20 8541->8548 8551 7ff787b90d2a 8548->8551 8549 7ff787b90d67 8550 7ff787b90570 3 API calls 8549->8550 8552 7ff787b90d6c 8550->8552 8551->8549 8556 7ff787b7bf68 8551->8556 8557 7ff787b7bf7a 8556->8557 8558 7ff787b7bf73 8556->8558 8564 7ff787b7bba0 RaiseException 8557->8564 8563 7ff787b7be68 RaiseException 8558->8563 8561 7ff787b7bf78 8562 7ff787b7bf7f abort 8561->8562 8563->8561 8565 7ff787b7bbe7 8564->8565 8565->8562 8571 7ff787b7d45c 8572 7ff787b7c467 _fputchar 8571->8572 8574 7ff787b7d402 8572->8574 8573 7ff787b7dae7 8574->8573 8575 7ff787b7c467 _fputchar 8574->8575 8575->8574 8595 7ff787b7b060 8596 7ff787b7b087 8595->8596 8597 7ff787b7b0f3 fprintf 8596->8597 8608 7ff787b7d86c 8610 7ff787b7d402 8608->8610 8609 7ff787b7dae7 8610->8609 8611 7ff787b7c467 _fputchar 8610->8611 8611->8610 9296 7ff787b7b768 9297 7ff787b7b7ce 9296->9297 9298 7ff787b7b783 _calloc_dbg 9296->9298 9298->9297 9299 7ff787b7b79d RtlAcquirePebLock RtlLeaveCriticalSection 9298->9299 9299->9297 9305 7ff787b7b971 strlen 9307 7ff787b7b9d3 9305->9307 9308 7ff787b7b989 9305->9308 9306 7ff787b7b9b6 _strncoll 9306->9307 9306->9308 9308->9306 9308->9307 8622 7ff787b7d470 8623 7ff787b7d497 8622->8623 8624 7ff787b7d4a3 8622->8624 8626 7ff787b7c4a0 5 API calls 8623->8626 8628 7ff787b7d402 8623->8628 8625 7ff787b7c57e _fputchar 8624->8625 8625->8623 8626->8628 8627 7ff787b7dae7 8628->8627 8629 7ff787b7c467 _fputchar 8628->8629 8629->8628 8630 7ff787b80477 8631 7ff787b7ff2f 4 API calls 8630->8631 8632 7ff787b80488 8631->8632 8638 7ff787b7d680 8639 7ff787b7d696 8638->8639 8644 7ff787b7d22e 8639->8644 8641 7ff787b7dae7 8642 7ff787b7d402 8642->8641 8643 7ff787b7c467 _fputchar 8642->8643 8643->8642 8645 7ff787b7d240 8644->8645 8646 7ff787b7d28d 8645->8646 8647 7ff787b7d29f 8645->8647 8648 7ff787b7c65a _fputchar 8646->8648 8649 7ff787b7d310 8647->8649 8650 7ff787b7d2b5 8647->8650 8654 7ff787b7d29a 8648->8654 8651 7ff787b7d31b strlen 8649->8651 8652 7ff787b7d314 8649->8652 8653 7ff787b7d2c1 strlen 8650->8653 8656 7ff787b7d2b9 8650->8656 8651->8652 8682 7ff787b7d10a 8652->8682 8653->8656 8688 7ff787b7db77 8654->8688 8662 7ff787b7c7a1 8656->8662 8660 7ff787b7d2f4 8660->8654 8661 7ff787b7c467 _fputchar 8660->8661 8661->8660 8664 7ff787b7c7bd 8662->8664 8663 7ff787b7c80e 8665 7ff787b7c467 _fputchar 8663->8665 8669 7ff787b7c8ab 8663->8669 8664->8663 8667 7ff787b7c467 _fputchar 8664->8667 8665->8669 8666 7ff787b7c8b1 8668 7ff787b7c8ba 8666->8668 8674 7ff787b7c8e7 8666->8674 8667->8664 8670 7ff787b7c467 _fputchar 8668->8670 8669->8666 8671 7ff787b7c467 _fputchar 8669->8671 8673 7ff787b7c93c 8670->8673 8671->8669 8672 7ff787b7c467 _fputchar 8672->8674 8675 7ff787b7c6cc 11 API calls 8673->8675 8677 7ff787b7c950 8673->8677 8674->8672 8674->8673 8678 7ff787b7c4a0 5 API calls 8674->8678 8675->8677 8676 7ff787b7c990 8676->8660 8679 7ff787b7c467 _fputchar 8677->8679 8681 7ff787b7c968 8677->8681 8678->8674 8679->8677 8680 7ff787b7c467 _fputchar 8680->8681 8681->8676 8681->8680 8683 7ff787b7d12c 8682->8683 8684 7ff787b7c7a1 11 API calls 8683->8684 8685 7ff787b7d177 8684->8685 8686 7ff787b7c467 _fputchar 8685->8686 8687 7ff787b7d198 8686->8687 8689 7ff787b7ef07 8688->8689 8690 7ff787b7d347 8689->8690 8692 7ff787b7ed50 8689->8692 8690->8642 8693 7ff787b7ed63 RtlAcquirePebLock 8692->8693 8696 7ff787b7ed81 8692->8696 8693->8696 8694 7ff787b7ed94 RtlInitializeCriticalSection RtlInitializeCriticalSection 8694->8696 8695 7ff787b7eddc Sleep 8695->8696 8696->8693 8696->8694 8696->8695 8697 7ff787b7edee 8696->8697 8697->8690 9334 7ff787b7f38a 9335 7ff787b7f39f 9334->9335 9336 7ff787b7f3a3 9335->9336 9337 7ff787b7f3c0 9335->9337 9338 7ff787b7ee53 5 API calls 9336->9338 9339 7ff787b7ee53 5 API calls 9337->9339 9340 7ff787b7f3aa 9338->9340 9339->9340 8698 7ff787b7f888 ___lc_codepage_func ___mb_cur_max_func 8699 7ff787b7f8b7 8698->8699 8704 7ff787b7f8f1 8698->8704 8700 7ff787b7f8bc 8699->8700 8703 7ff787b7f8c3 8699->8703 8701 7ff787b7f7d0 2 API calls 8700->8701 8700->8704 8701->8700 8702 7ff787b7f7d0 2 API calls 8702->8703 8703->8702 8703->8704 9346 7ff787b7f588 9347 7ff787b7ee53 5 API calls 9346->9347 9348 7ff787b7f5a4 9347->9348 8710 7ff787b79e95 8711 7ff787b79ebb 8710->8711 8712 7ff787b7a05c 8711->8712 8713 7ff787b7644b memcmp 8711->8713 8713->8712 8724 7ff787b7d61e 8725 7ff787b7d634 8724->8725 8730 7ff787b7d1b0 8725->8730 8727 7ff787b7dae7 8728 7ff787b7c467 _fputchar 8729 7ff787b7d402 8728->8729 8729->8727 8729->8728 8731 7ff787b7d1c1 8730->8731 8732 7ff787b7d206 8731->8732 8733 7ff787b7d213 8731->8733 8734 7ff787b7c65a _fputchar 8732->8734 8735 7ff787b7d10a 11 API calls 8733->8735 8736 7ff787b7d211 8734->8736 8735->8736 8737 7ff787b7db77 4 API calls 8736->8737 8738 7ff787b7d226 8737->8738 8738->8729 9349 7ff787b7d51e 9350 7ff787b7d527 9349->9350 9351 7ff787b7c613 strlen 9350->9351 9353 7ff787b7d402 9351->9353 9352 7ff787b7dae7 9353->9352 9354 7ff787b7c467 _fputchar 9353->9354 9354->9353 8739 7ff787b7b626 8740 7ff787b7b6a3 signal 8739->8740 8742 7ff787b7b631 8739->8742 8741 7ff787b7b6b5 signal 8740->8741 8740->8742 8741->8742 8748 7ff787b7ae21 8749 7ff787b7ae46 8748->8749 8754 7ff787b7ae39 8748->8754 8750 7ff787b7a9ea 6 API calls 8749->8750 8749->8754 8751 7ff787b7ae7a 8750->8751 8752 7ff787b7ae83 ??3@YAXPEAX 8751->8752 8753 7ff787b7ae8f 8751->8753 8752->8754 8753->8754 8755 7ff787b7aed1 strlen 8753->8755 8756 7ff787b7aedb 8755->8756 8757 7ff787b7aef3 ??3@YAXPEAX 8755->8757 8758 7ff787b7aee6 ??3@YAXPEAX 8756->8758 8757->8754 8758->8754 9363 7ff787b7492c 9366 7ff787b749a6 9363->9366 9364 7ff787b71362 20 API calls 9365 7ff787b74a6f 9364->9365 9367 7ff787b7c16f 41 API calls 9365->9367 9366->9364 9368 7ff787b74a87 9367->9368 9369 7ff787b7c16f 41 API calls 9368->9369 9370 7ff787b74a96 9369->9370 9371 7ff787b71362 20 API calls 9370->9371 9372 7ff787b74b76 9371->9372 9373 7ff787b7c16f 41 API calls 9372->9373 9374 7ff787b74b8e 9373->9374 9375 7ff787b7c16f 41 API calls 9374->9375 9376 7ff787b74b9d 9375->9376 9377 7ff787b71362 20 API calls 9376->9377 9378 7ff787b74c7d 9377->9378 9379 7ff787b7c16f 41 API calls 9378->9379 9380 7ff787b74c95 9379->9380 9381 7ff787b7c16f 41 API calls 9380->9381 9383 7ff787b74ca4 9381->9383 9382 7ff787b71362 20 API calls 9384 7ff787b74d85 9382->9384 9383->9382 9385 7ff787b7c16f 41 API calls 9384->9385 9386 7ff787b74d9d 9385->9386 9387 7ff787b7c16f 41 API calls 9386->9387 9389 7ff787b74dac 9387->9389 9388 7ff787b71362 20 API calls 9390 7ff787b74e8d 9388->9390 9389->9388 9391 7ff787b7c16f 41 API calls 9390->9391 9392 7ff787b74ea5 9391->9392 9393 7ff787b7c16f 41 API calls 9392->9393 9394 7ff787b74eb4 9393->9394 9395 7ff787b71362 20 API calls 9394->9395 9396 7ff787b74f95 9395->9396 9397 7ff787b71444 21 API calls 9396->9397 9398 7ff787b74fcb 9397->9398 9399 7ff787b7c16f 41 API calls 9398->9399 9400 7ff787b75002 9399->9400 9401 7ff787b7c16f 41 API calls 9400->9401 9405 7ff787b75011 GetEnvironmentVariableW 9401->9405 9403 7ff787b75109 9406 7ff787b7c16f 41 API calls 9403->9406 9404 7ff787b75460 CreateToolhelp32Snapshot 9407 7ff787b75479 Process32FirstW 9404->9407 9436 7ff787b7543d 9404->9436 9405->9403 9405->9404 9408 7ff787b75115 9406->9408 9409 7ff787b754a4 9407->9409 9407->9436 9410 7ff787b7c16f 41 API calls 9408->9410 9411 7ff787b754dc _wcsicmp 9409->9411 9412 7ff787b754c2 Process32NextW 9409->9412 9414 7ff787b75124 9410->9414 9411->9409 9411->9436 9412->9409 9412->9436 9413 7ff787b71362 20 API calls 9415 7ff787b751e1 9413->9415 9414->9413 9416 7ff787b8ee00 21 API calls 9415->9416 9417 7ff787b751ec 9416->9417 9418 7ff787b75204 GetFileAttributesW 9417->9418 9419 7ff787b75217 9418->9419 9418->9436 9420 7ff787b7c16f 41 API calls 9419->9420 9421 7ff787b75223 9420->9421 9422 7ff787b7c16f 41 API calls 9421->9422 9426 7ff787b75232 GetEnvironmentVariableW 9422->9426 9424 7ff787b75444 9424->9404 9425 7ff787b75306 9427 7ff787b7c16f 41 API calls 9425->9427 9426->9424 9426->9425 9428 7ff787b75312 9427->9428 9429 7ff787b7c16f 41 API calls 9428->9429 9431 7ff787b75321 9429->9431 9430 7ff787b71362 20 API calls 9432 7ff787b75408 9430->9432 9431->9430 9433 7ff787b8ee00 21 API calls 9432->9433 9434 7ff787b75413 9433->9434 9435 7ff787b7542b GetFileAttributesW 9434->9435 9435->9424 9435->9436 8773 7ff787b77a3d 8774 7ff787b77cd9 8773->8774 8775 7ff787b77a50 8773->8775 8780 7ff787b76366 strlen 8775->8780 9442 7ff787b7873d 9443 7ff787b78757 9442->9443 9447 7ff787b78750 9442->9447 9444 7ff787b7876c 9443->9444 9446 7ff787b7879e 9443->9446 9445 7ff787b78972 2 API calls 9444->9445 9444->9447 9445->9447 9446->9447 9448 7ff787b787c4 strcmp 9446->9448 9448->9447 9449 7ff787b7db3c 9452 7ff787b7db10 9449->9452 9453 7ff787b7db1c 9452->9453 9454 7ff787b7ee53 5 API calls 9453->9454 9455 7ff787b7db30 9454->9455 9456 7ff787b7c13b 9457 7ff787b7c14d 9456->9457 9462 7ff787b80aa9 9457->9462 9460 7ff787b7c16a 9461 7ff787b7c164 abort 9461->9460 9463 7ff787b80ac9 9462->9463 9471 7ff787b7c160 9462->9471 9472 7ff787b828f0 9463->9472 9465 7ff787b80b4a 9469 7ff787b82872 8 API calls 9465->9469 9466 7ff787b80b62 _realloc_dbg 9466->9465 9470 7ff787b80b0e 9466->9470 9469->9471 9485 7ff787b82872 9470->9485 9471->9460 9471->9461 9491 7ff787b82502 9472->9491 9474 7ff787b82902 9484 7ff787b80ad8 9474->9484 9495 7ff787b82264 9474->9495 9477 7ff787b8120c 26 API calls 9478 7ff787b82962 9477->9478 9479 7ff787b8120c 26 API calls 9478->9479 9481 7ff787b82972 9479->9481 9482 7ff787b82994 9481->9482 9502 7ff787b83567 9481->9502 9483 7ff787b8120c 26 API calls 9482->9483 9483->9484 9484->9465 9484->9466 9484->9470 9486 7ff787b82882 9485->9486 9487 7ff787b7fed8 6 API calls 9486->9487 9488 7ff787b828be 9486->9488 9490 7ff787b8289b 9487->9490 9488->9471 9489 7ff787b7ff2f 4 API calls 9489->9488 9490->9488 9490->9489 9492 7ff787b82530 9491->9492 9494 7ff787b82512 9491->9494 9523 7ff787b824b8 9492->9523 9494->9474 9496 7ff787b7fed8 6 API calls 9495->9496 9497 7ff787b8227a 9496->9497 9498 7ff787b82297 9497->9498 9499 7ff787b7fed8 6 API calls 9497->9499 9498->9477 9498->9484 9500 7ff787b82289 9499->9500 9500->9498 9501 7ff787b7ff2f 4 API calls 9500->9501 9501->9498 9503 7ff787b836e1 9502->9503 9504 7ff787b83585 9502->9504 9503->9481 9504->9503 9508 7ff787b8359f 9504->9508 9546 7ff787b82efa 9504->9546 9507 7ff787b835f5 RtlTryAcquirePebLock 9507->9508 9509 7ff787b83630 RtlLeaveCriticalSection 9507->9509 9508->9503 9508->9507 9550 7ff787b8319b RtlAcquirePebLock RtlLeaveCriticalSection 9508->9550 9557 7ff787b82bb0 RtlAcquirePebLock 9508->9557 9564 7ff787b83cb6 Sleep 9508->9564 9510 7ff787b82bb0 5 API calls 9509->9510 9512 7ff787b83653 9510->9512 9512->9503 9513 7ff787b8120c 26 API calls 9512->9513 9515 7ff787b8368e 9513->9515 9516 7ff787b8120c 26 API calls 9515->9516 9517 7ff787b8369e 9516->9517 9518 7ff787b7ff2f 4 API calls 9517->9518 9519 7ff787b836b1 9518->9519 9520 7ff787b836d8 9519->9520 9521 7ff787b8319b 51 API calls 9519->9521 9522 7ff787b8120c 26 API calls 9520->9522 9521->9520 9522->9503 9524 7ff787b824d0 9523->9524 9525 7ff787b824d6 9524->9525 9527 7ff787b823fd 9524->9527 9525->9494 9528 7ff787b824a2 9527->9528 9529 7ff787b82418 _calloc_dbg 9527->9529 9528->9525 9529->9528 9531 7ff787b82439 9529->9531 9530 7ff787b8247a ??3@YAXPEAX 9530->9528 9531->9530 9532 7ff787b82472 9531->9532 9537 7ff787b82def 9531->9537 9535 7ff787b80000 ??3@YAXPEAX 9532->9535 9535->9530 9536 7ff787b80000 ??3@YAXPEAX 9536->9532 9538 7ff787b82e07 9537->9538 9539 7ff787b8248f 9537->9539 9538->9539 9540 7ff787b82e1a _calloc_dbg 9538->9540 9539->9528 9539->9536 9540->9539 9541 7ff787b82e3a CreateSemaphoreA CreateSemaphoreA 9540->9541 9542 7ff787b82e8e 9541->9542 9545 7ff787b82e93 9541->9545 9543 7ff787b82ebf RtlInitializeCriticalSection RtlInitializeCriticalSection RtlInitializeCriticalSection 9542->9543 9542->9545 9543->9539 9544 7ff787b82eab ??3@YAXPEAX 9544->9539 9545->9544 9547 7ff787b82f18 9546->9547 9548 7ff787b82def 7 API calls 9547->9548 9549 7ff787b82f2f 9547->9549 9548->9549 9549->9508 9551 7ff787b8320d 9550->9551 9552 7ff787b831f0 9550->9552 9551->9508 9565 7ff787b82f43 9552->9565 9555 7ff787b83207 RtlLeaveCriticalSection 9555->9551 9556 7ff787b83204 9556->9555 9558 7ff787b82be9 RtlLeaveCriticalSection 9557->9558 9559 7ff787b82bf5 9557->9559 9560 7ff787b82c2b 9558->9560 9561 7ff787b82bfc RtlLeaveCriticalSection 9559->9561 9562 7ff787b82c05 ReleaseSemaphore 9559->9562 9560->9508 9561->9560 9562->9561 9563 7ff787b82c1c RtlLeaveCriticalSection 9562->9563 9563->9560 9564->9508 9566 7ff787b82fa5 9565->9566 9569 7ff787b82f5c 9565->9569 9592 7ff787b811de 9566->9592 9572 7ff787b82f8e WaitForSingleObject 9569->9572 9574 7ff787b82f87 RtlAcquirePebLock 9569->9574 9570 7ff787b83073 9571 7ff787b830ff 9570->9571 9576 7ff787b83082 9570->9576 9571->9574 9580 7ff787b8315a 9571->9580 9582 7ff787b813dc 26 API calls 9571->9582 9584 7ff787b83177 9571->9584 9572->9574 9573 7ff787b82fbd 9575 7ff787b82fe6 9573->9575 9579 7ff787b83001 ResetEvent 9573->9579 9587 7ff787b814d4 42 API calls 9573->9587 9574->9555 9574->9556 9575->9574 9578 7ff787b83038 WaitForSingleObject 9575->9578 9585 7ff787b83049 9575->9585 9577 7ff787b813dc 26 API calls 9576->9577 9581 7ff787b83011 9576->9581 9583 7ff787b830d3 9576->9583 9577->9576 9578->9574 9578->9585 9579->9573 9579->9581 9580->9584 9588 7ff787b83162 WaitForSingleObject 9580->9588 9581->9574 9595 7ff787b814d4 9581->9595 9582->9571 9583->9574 9589 7ff787b830e8 WaitForSingleObject 9583->9589 9584->9574 9590 7ff787b814d4 42 API calls 9584->9590 9585->9574 9606 7ff787b813dc 9585->9606 9587->9573 9588->9584 9589->9574 9590->9574 9593 7ff787b8067f 26 API calls 9592->9593 9594 7ff787b811e7 9593->9594 9594->9570 9594->9573 9596 7ff787b8067f 26 API calls 9595->9596 9598 7ff787b814df 9596->9598 9597 7ff787b81543 9597->9574 9598->9597 9599 7ff787b7fed8 6 API calls 9598->9599 9600 7ff787b81503 9599->9600 9600->9597 9601 7ff787b81536 9600->9601 9602 7ff787b81530 ResetEvent 9600->9602 9603 7ff787b7ff2f 4 API calls 9601->9603 9602->9601 9604 7ff787b8153e 9603->9604 9610 7ff787b81434 9604->9610 9607 7ff787b813ee 9606->9607 9608 7ff787b813ea 9606->9608 9609 7ff787b8067f 26 API calls 9607->9609 9608->9574 9609->9608 9611 7ff787b8067f 26 API calls 9610->9611 9612 7ff787b8143e 9611->9612 9627 7ff787b8140f 9612->9627 9615 7ff787b8140f 26 API calls 9616 7ff787b8147a 9615->9616 9630 7ff787b8130f 9616->9630 9628 7ff787b8067f 26 API calls 9627->9628 9629 7ff787b8141b 9628->9629 9629->9615 9631 7ff787b8067f 26 API calls 9630->9631 9632 7ff787b8131d 9631->9632 9640 7ff787b80de7 9632->9640 9635 7ff787b81348 TlsGetValue 9637 7ff787b8135c 9635->9637 9638 7ff787b813d3 _endthreadex 9635->9638 9636 7ff787b81336 longjmp 9636->9635 9637->9638 9639 7ff787b813c5 TlsSetValue 9637->9639 9639->9638 9641 7ff787b80eb7 9640->9641 9642 7ff787b80e00 9640->9642 9641->9635 9641->9636 9647 7ff787b808ec 9642->9647 9644 7ff787b80e05 9644->9641 9646 7ff787b82872 8 API calls 9644->9646 9653 7ff787b8261c 9644->9653 9646->9644 9648 7ff787b808fd 9647->9648 9649 7ff787b8091f 9647->9649 9650 7ff787b7fed8 6 API calls 9648->9650 9649->9644 9651 7ff787b8090c 9650->9651 9652 7ff787b7ff2f _malloc_dbg ??3@YAXPEAX GetCurrentThreadId SetEvent 9651->9652 9652->9649 9654 7ff787b82502 10 API calls 9653->9654 9655 7ff787b8262c 9654->9655 9656 7ff787b7fed8 6 API calls 9655->9656 9663 7ff787b82669 9655->9663 9657 7ff787b8263f 9656->9657 9658 7ff787b82684 9657->9658 9659 7ff787b82652 9657->9659 9657->9663 9660 7ff787b7ff2f _malloc_dbg ??3@YAXPEAX GetCurrentThreadId SetEvent 9658->9660 9661 7ff787b7fed8 6 API calls 9659->9661 9660->9663 9662 7ff787b8265b 9661->9662 9662->9663 9664 7ff787b7ff2f _malloc_dbg ??3@YAXPEAX GetCurrentThreadId SetEvent 9662->9664 9663->9644 9664->9663 8781 7ff787b76c39 8786 7ff787b76366 strlen 8781->8786 9665 7ff787b7d539 9670 7ff787b7d547 9665->9670 9666 7ff787b7d58e 9669 7ff787b7ca30 _fputchar 9666->9669 9667 7ff787b7d57e 9668 7ff787b7cc34 _fputchar 9667->9668 9673 7ff787b7d402 9668->9673 9669->9673 9670->9666 9670->9667 9671 7ff787b7dae7 9672 7ff787b7c467 _fputchar 9672->9673 9673->9671 9673->9672 9674 7ff787b7f139 9675 7ff787b7f14d 9674->9675 9676 7ff787b7f163 9674->9676 9677 7ff787b7ef53 5 API calls 9675->9677 9678 7ff787b7f239 9676->9678 9679 7ff787b7ed50 4 API calls 9676->9679 9682 7ff787b7f18e 9676->9682 9677->9676 9679->9682 9680 7ff787b7f019 RtlAcquirePebLock RtlInitializeCriticalSection RtlInitializeCriticalSection Sleep _malloc_dbg 9680->9682 9681 7ff787b7ed50 4 API calls 9681->9682 9682->9678 9682->9680 9682->9681 9683 7ff787b7ef07 4 API calls 9682->9683 9683->9682 8796 7ff787b7a44d 8797 7ff787b7a456 8796->8797 8805 7ff787b7a2be 8796->8805 8798 7ff787b7a46b 8797->8798 8804 7ff787b7a45d 8797->8804 8799 7ff787b7a63c strcmp 8798->8799 8798->8805 8800 7ff787b7a64f strcmp 8799->8800 8799->8805 8801 7ff787b7a66c 8800->8801 8800->8805 8801->8805 8806 7ff787b79b50 8801->8806 8803 7ff787b7a76a strcmp 8803->8805 8804->8803 8804->8805 8807 7ff787b79b64 8806->8807 8808 7ff787b7638d memcmp 8807->8808 8809 7ff787b79ba1 8807->8809 8808->8809 8809->8805 8810 7ff787b71e4b 8841 7ff787b71e11 GetModuleFileNameA 8810->8841 8813 7ff787b7c16f 41 API calls 8814 7ff787b71e78 8813->8814 8815 7ff787b71e88 8814->8815 8816 7ff787b7c16f 41 API calls 8814->8816 8817 7ff787b7c16f 41 API calls 8815->8817 8816->8815 8821 7ff787b71ea0 8817->8821 8818 7ff787b7c16f 41 API calls 8819 7ff787b71f19 8818->8819 8820 7ff787b7c16f 41 API calls 8819->8820 8826 7ff787b71f28 8820->8826 8821->8818 8822 7ff787b713d6 21 API calls 8823 7ff787b71fd3 8822->8823 8844 7ff787b8d220 8823->8844 8825 7ff787b71fde 8850 7ff787b8d190 strlen 8825->8850 8826->8822 8828 7ff787b71ffc 8829 7ff787b7c16f 41 API calls 8828->8829 8830 7ff787b72034 8829->8830 8831 7ff787b72044 8830->8831 8833 7ff787b7c16f 41 API calls 8830->8833 8832 7ff787b7c16f 41 API calls 8831->8832 8836 7ff787b72069 8832->8836 8833->8831 8834 7ff787b7c16f 41 API calls 8835 7ff787b720e8 8834->8835 8837 7ff787b7c16f 41 API calls 8835->8837 8836->8834 8840 7ff787b720f7 ShellExecuteA 8837->8840 8839 7ff787b721a8 8840->8839 8842 7ff787b713d6 21 API calls 8841->8842 8843 7ff787b71e3e 8842->8843 8843->8813 8845 7ff787b8d1e0 8844->8845 8855 7ff787b88590 8845->8855 8847 7ff787b8d200 8848 7ff787b8daf0 8847->8848 8859 7ff787b8dc10 8847->8859 8848->8825 8851 7ff787b88590 20 API calls 8850->8851 8852 7ff787b8d1bd 8851->8852 8853 7ff787b8daf0 8852->8853 8854 7ff787b8dc10 20 API calls 8852->8854 8853->8828 8854->8853 8856 7ff787b885b0 8855->8856 8857 7ff787b885b5 8855->8857 8858 7ff787b91990 20 API calls 8856->8858 8857->8847 8858->8857 8860 7ff787b8dc50 8859->8860 8861 7ff787b8dbb0 20 API calls 8860->8861 8862 7ff787b8dc60 8861->8862 8862->8848 9684 7ff787b75d4b 9685 7ff787b75d56 9684->9685 9686 7ff787b75d6b 9685->9686 9688 7ff787b7bea8 RtlCaptureContext RtlUnwindEx abort 9685->9688 8868 7ff787b7f247 8869 7ff787b7f270 8868->8869 8874 7ff787b7ee53 8869->8874 8871 7ff787b7f332 8872 7ff787b7f280 8872->8871 8872->8872 8879 7ff787b7ef07 8872->8879 8875 7ff787b7ed50 4 API calls 8874->8875 8876 7ff787b7ee63 8875->8876 8877 7ff787b7ee7b 8876->8877 8878 7ff787b7eedc _malloc_dbg 8876->8878 8877->8872 8878->8877 8880 7ff787b7ef2b 8879->8880 8881 7ff787b7ef14 8879->8881 8880->8871 8882 7ff787b7ed50 4 API calls 8881->8882 8882->8880 8883 7ff787b7bc56 RtlLookupFunctionEntry 8884 7ff787b7bc6d 8883->8884 7706 7ff787b74953 7787 7ff787b71362 7706->7787 7708 7ff787b74967 7791 7ff787b7c16f 7708->7791 7711 7ff787b7c16f 41 API calls 7713 7ff787b7498e 7711->7713 7712 7ff787b71362 20 API calls 7714 7ff787b74a6f 7712->7714 7713->7712 7715 7ff787b7c16f 41 API calls 7714->7715 7716 7ff787b74a87 7715->7716 7717 7ff787b7c16f 41 API calls 7716->7717 7718 7ff787b74a96 7717->7718 7719 7ff787b71362 20 API calls 7718->7719 7720 7ff787b74b76 7719->7720 7721 7ff787b7c16f 41 API calls 7720->7721 7722 7ff787b74b8e 7721->7722 7723 7ff787b7c16f 41 API calls 7722->7723 7724 7ff787b74b9d 7723->7724 7725 7ff787b71362 20 API calls 7724->7725 7726 7ff787b74c7d 7725->7726 7727 7ff787b7c16f 41 API calls 7726->7727 7728 7ff787b74c95 7727->7728 7729 7ff787b7c16f 41 API calls 7728->7729 7731 7ff787b74ca4 7729->7731 7730 7ff787b71362 20 API calls 7732 7ff787b74d85 7730->7732 7731->7730 7733 7ff787b7c16f 41 API calls 7732->7733 7734 7ff787b74d9d 7733->7734 7735 7ff787b7c16f 41 API calls 7734->7735 7737 7ff787b74dac 7735->7737 7736 7ff787b71362 20 API calls 7738 7ff787b74e8d 7736->7738 7737->7736 7739 7ff787b7c16f 41 API calls 7738->7739 7740 7ff787b74ea5 7739->7740 7741 7ff787b7c16f 41 API calls 7740->7741 7742 7ff787b74eb4 7741->7742 7743 7ff787b71362 20 API calls 7742->7743 7744 7ff787b74f95 7743->7744 7810 7ff787b71444 7744->7810 7746 7ff787b74fcb 7747 7ff787b7c16f 41 API calls 7746->7747 7748 7ff787b75002 7747->7748 7749 7ff787b7c16f 41 API calls 7748->7749 7753 7ff787b75011 GetEnvironmentVariableW 7749->7753 7751 7ff787b75109 7754 7ff787b7c16f 41 API calls 7751->7754 7752 7ff787b75460 CreateToolhelp32Snapshot 7755 7ff787b75479 Process32FirstW 7752->7755 7786 7ff787b7543d 7752->7786 7753->7751 7753->7752 7756 7ff787b75115 7754->7756 7757 7ff787b754a4 7755->7757 7755->7786 7758 7ff787b7c16f 41 API calls 7756->7758 7759 7ff787b754dc _wcsicmp 7757->7759 7760 7ff787b754c2 Process32NextW 7757->7760 7762 7ff787b75124 7758->7762 7759->7757 7759->7786 7760->7757 7760->7786 7761 7ff787b71362 20 API calls 7763 7ff787b751e1 7761->7763 7762->7761 7816 7ff787b8ee00 wcslen 7763->7816 7765 7ff787b751ec 7766 7ff787b75204 GetFileAttributesW 7765->7766 7767 7ff787b75217 7766->7767 7768 7ff787b75453 7766->7768 7769 7ff787b7c16f 41 API calls 7767->7769 7770 7ff787b75223 7769->7770 7771 7ff787b7c16f 41 API calls 7770->7771 7775 7ff787b75232 GetEnvironmentVariableW 7771->7775 7773 7ff787b75444 7773->7752 7774 7ff787b75306 7776 7ff787b7c16f 41 API calls 7774->7776 7775->7773 7775->7774 7777 7ff787b75312 7776->7777 7778 7ff787b7c16f 41 API calls 7777->7778 7781 7ff787b75321 7778->7781 7780 7ff787b71362 20 API calls 7782 7ff787b75408 7780->7782 7781->7780 7783 7ff787b8ee00 21 API calls 7782->7783 7784 7ff787b75413 7783->7784 7785 7ff787b7542b GetFileAttributesW 7784->7785 7785->7773 7785->7786 7786->7768 7788 7ff787b7137e 7787->7788 7790 7ff787b713a6 7788->7790 7821 7ff787b8f880 7788->7821 7790->7708 7792 7ff787b7c187 7791->7792 7793 7ff787b7c1d2 7791->7793 7949 7ff787b81223 7792->7949 7967 7ff787b80c9e GetLastError 7793->7967 7797 7ff787b7c1dd 7799 7ff787b7c1e5 _calloc_dbg 7797->7799 7800 7ff787b7c209 7797->7800 7798 7ff787b7fed8 6 API calls 7801 7ff787b7c1a9 7798->7801 7802 7ff787b7c204 7799->7802 7803 7ff787b7c1ff abort 7799->7803 7800->7802 7804 7ff787b7c21f _realloc_dbg 7800->7804 7806 7ff787b7ff2f 4 API calls 7801->7806 7807 7ff787b7c27b _malloc_dbg 7802->7807 7808 7ff787b7c296 _malloc_dbg 7802->7808 7809 7ff787b7497f 7802->7809 7971 7ff787b80cfd GetLastError 7802->7971 7803->7802 7804->7802 7804->7803 7806->7793 7807->7803 7807->7809 7808->7803 7808->7809 7809->7711 7811 7ff787b7147d 7810->7811 7813 7ff787b71489 7810->7813 7812 7ff787b91990 20 API calls 7811->7812 7812->7813 7815 7ff787b71496 7813->7815 8045 7ff787b908e0 7813->8045 7815->7746 8051 7ff787b89070 7816->8051 7818 7ff787b8ee2d 7819 7ff787b8f7c0 7818->7819 8055 7ff787b8f8e0 7818->8055 7819->7765 7822 7ff787b8f8a2 7821->7822 7823 7ff787b8f896 7821->7823 7825 7ff787b91990 7823->7825 7864 7ff787b909a0 _malloc_dbg 7825->7864 7827 7ff787b919a3 7870 7ff787b90d70 7827->7870 7829 7ff787b919c7 7880 7ff787b7bea8 RtlCaptureContext RtlUnwindEx abort 7829->7880 7865 7ff787b909d2 7864->7865 7866 7ff787b909bd 7864->7866 7865->7827 7881 7ff787b86c60 7866->7881 7871 7ff787b90d89 7870->7871 7941 7ff787b7be68 RaiseException 7871->7941 7873 7ff787b90db2 7874 7ff787b909f0 3 API calls 7873->7874 7875 7ff787b90dba 7874->7875 7876 7ff787b90570 3 API calls 7875->7876 7877 7ff787b90dbf 7876->7877 7942 7ff787b7bc85 7877->7942 7891 7ff787b870a0 7881->7891 7886 7ff787b90570 7887 7ff787b90579 7886->7887 7930 7ff787b86680 7887->7930 7890 7ff787b905bc 7890->7865 7905 7ff787b7fed8 7891->7905 7894 7ff787b86c78 7898 7ff787b870e0 7894->7898 7895 7ff787b909a0 16 API calls 7896 7ff787b870b7 7895->7896 7897 7ff787b90d70 7 API calls 7896->7897 7897->7894 7923 7ff787b7ff2f 7898->7923 7901 7ff787b909a0 16 API calls 7902 7ff787b870f7 7901->7902 7903 7ff787b90d70 7 API calls 7902->7903 7904 7ff787b86ce9 7903->7904 7904->7865 7904->7886 7906 7ff787b7fddc 7905->7906 7916 7ff787b7fdc9 7906->7916 7908 7ff787b7fded 7910 7ff787b7fe4d 7908->7910 7911 7ff787b7fe24 GetCurrentThreadId 7908->7911 7913 7ff787b7fe33 7908->7913 7915 7ff787b7fe06 7908->7915 7909 7ff787b7fe10 GetCurrentThreadId 7909->7913 7912 7ff787b7fe54 CreateEventA 7910->7912 7910->7915 7911->7910 7911->7913 7914 7ff787b7fe6c GetLastError 7912->7914 7912->7915 7913->7894 7913->7895 7914->7913 7915->7909 7915->7913 7917 7ff787b7fddb 7916->7917 7918 7ff787b7fd60 _malloc_dbg 7916->7918 7917->7908 7920 7ff787b7fd7e 7918->7920 7921 7ff787b7fdbf 7918->7921 7920->7921 7922 7ff787b7fdb7 ??3@YAXPEAX 7920->7922 7921->7908 7922->7921 7924 7ff787b7fdc9 2 API calls 7923->7924 7925 7ff787b7ff3a 7924->7925 7926 7ff787b7ff6b 7925->7926 7927 7ff787b7ff57 GetCurrentThreadId 7925->7927 7929 7ff787b7ff72 7925->7929 7928 7ff787b7ff8b SetEvent 7926->7928 7926->7929 7927->7926 7927->7929 7928->7929 7929->7901 7929->7904 7931 7ff787b86686 abort 7930->7931 7937 7ff787b909f0 7931->7937 7934 7ff787b866a6 7935 7ff787b90570 strlen 7934->7935 7936 7ff787b866ab strlen 7935->7936 7936->7890 7938 7ff787b909fd 7937->7938 7939 7ff787b90570 3 API calls 7938->7939 7940 7ff787b86693 abort 7938->7940 7939->7940 7940->7934 7941->7873 7943 7ff787b7bcb5 7942->7943 7947 7ff787b7bcc9 7942->7947 7943->7829 7944 7ff787b7be46 RtlUnwindEx 7945 7ff787b7be05 abort 7944->7945 7946 7ff787b7bcd0 7945->7946 7946->7943 7946->7944 7946->7945 7947->7943 7947->7945 7947->7946 7948 7ff787b7bd92 RaiseException 7947->7948 7948->7945 7950 7ff787b7c19a 7949->7950 7951 7ff787b81241 7949->7951 7950->7798 7951->7950 7952 7ff787b7fed8 6 API calls 7951->7952 7953 7ff787b81260 7952->7953 7954 7ff787b81268 7953->7954 7955 7ff787b812b0 7953->7955 7979 7ff787b8120c 7954->7979 7960 7ff787b812c6 fprintf 7955->7960 7966 7ff787b812a0 7955->7966 7958 7ff787b7ff2f 4 API calls 7961 7ff787b812e5 7958->7961 7959 7ff787b8120c 26 API calls 7962 7ff787b8128e 7959->7962 7960->7966 7982 7ff787b803d2 7961->7982 7965 7ff787b8120c 26 API calls 7962->7965 7965->7966 7966->7958 7968 7ff787b8067f 26 API calls 7967->7968 7969 7ff787b80cb9 7968->7969 7970 7ff787b80ce7 SetLastError 7969->7970 7970->7797 7972 7ff787b8067f 26 API calls 7971->7972 7973 7ff787b80d20 7972->7973 7974 7ff787b80d34 _realloc_dbg 7973->7974 7975 7ff787b80d77 7973->7975 7976 7ff787b80d54 _realloc_dbg 7974->7976 7978 7ff787b80d68 7974->7978 7977 7ff787b80dc2 SetLastError 7975->7977 7976->7975 7976->7978 7977->7978 7978->7802 7991 7ff787b8067f 7979->7991 7981 7ff787b81215 7981->7959 7984 7ff787b803e5 7982->7984 7987 7ff787b80460 7982->7987 7983 7ff787b80443 7985 7ff787b8044e fprintf 7983->7985 7984->7983 7986 7ff787b80415 7984->7986 7985->7987 7986->7987 8041 7ff787b80000 7986->8041 7987->7950 8005 7ff787b805e8 7991->8005 7994 7ff787b8078b 7994->7981 7995 7ff787b806a3 8013 7ff787b80495 7995->8013 7998 7ff787b806c2 GetCurrentThreadId CreateEventA 8026 7ff787b80541 7998->8026 8002 7ff787b80721 DuplicateHandle 8003 7ff787b80754 GetThreadPriority TlsSetValue 8002->8003 8004 7ff787b8074f abort 8002->8004 8003->7994 8003->8004 8004->8003 8006 7ff787b805f8 8005->8006 8012 7ff787b80668 TlsGetValue 8005->8012 8007 7ff787b7fed8 6 API calls 8006->8007 8008 7ff787b80616 8007->8008 8011 7ff787b80627 8008->8011 8032 7ff787b803b3 TlsAlloc 8008->8032 8010 7ff787b7ff2f 4 API calls 8010->8012 8011->8010 8012->7994 8012->7995 8014 7ff787b7fed8 6 API calls 8013->8014 8015 7ff787b804ab 8014->8015 8016 7ff787b804b7 _calloc_dbg 8015->8016 8017 7ff787b804f1 8015->8017 8018 7ff787b804ce 8016->8018 8025 7ff787b804db 8016->8025 8019 7ff787b8028a 2 API calls 8017->8019 8035 7ff787b8028a 8018->8035 8019->8025 8021 7ff787b7ff2f 4 API calls 8022 7ff787b80536 8021->8022 8022->7994 8022->7998 8024 7ff787b804e7 ??3@YAXPEAX 8024->8025 8025->8021 8027 7ff787b805d6 GetCurrentThread 8026->8027 8028 7ff787b80557 8026->8028 8027->8002 8028->8027 8029 7ff787b80560 GetCurrentThreadId _ultoa 8028->8029 8030 7ff787b805a4 OutputDebugStringA abort 8029->8030 8030->8027 8033 7ff787b803cd 8032->8033 8034 7ff787b803c7 abort 8032->8034 8033->8011 8034->8033 8036 7ff787b802a6 8035->8036 8039 7ff787b8029e 8035->8039 8037 7ff787b802be _malloc_dbg 8036->8037 8038 7ff787b802cd 8036->8038 8037->8038 8037->8039 8038->8039 8040 7ff787b8036b memcpy 8038->8040 8039->8024 8039->8025 8040->8039 8042 7ff787b80032 ??3@YAXPEAX 8041->8042 8044 7ff787b80016 8041->8044 8042->7987 8043 7ff787b80025 ??3@YAXPEAX 8043->8042 8044->8043 8046 7ff787b908f4 _malloc_dbg 8045->8046 8047 7ff787b9093d 8046->8047 8049 7ff787b90901 8046->8049 8047->7815 8048 7ff787b909a0 16 API calls 8048->8049 8049->8046 8049->8048 8050 7ff787b90d70 7 API calls 8049->8050 8050->8049 8052 7ff787b89090 8051->8052 8053 7ff787b89095 8051->8053 8054 7ff787b91990 20 API calls 8052->8054 8053->7818 8054->8053 8056 7ff787b8f920 8055->8056 8057 7ff787b8f880 20 API calls 8056->8057 8058 7ff787b8f930 8057->8058 8058->7819 8885 7ff787b7ea54 8895 7ff787b7ef53 8885->8895 8888 7ff787b7ea83 8890 7ff787b7ef53 5 API calls 8888->8890 8889 7ff787b7ea90 8891 7ff787b7ef53 5 API calls 8889->8891 8892 7ff787b7ea88 8890->8892 8893 7ff787b7ea95 8891->8893 8894 7ff787b7ef53 5 API calls 8893->8894 8894->8892 8897 7ff787b7ef6e 8895->8897 8896 7ff787b7ea70 8896->8888 8896->8889 8897->8896 8898 7ff787b7ee53 5 API calls 8897->8898 8899 7ff787b7efa5 8898->8899 8899->8896 8900 7ff787b7ef07 4 API calls 8899->8900 8900->8896 8906 7ff787b7d64f 8907 7ff787b7d665 8906->8907 8912 7ff787b7c999 8907->8912 8909 7ff787b7dae7 8910 7ff787b7c467 _fputchar 8911 7ff787b7d402 8910->8911 8911->8909 8911->8910 8913 7ff787b7c9aa 8912->8913 8914 7ff787b7c9ec 8913->8914 8915 7ff787b7c9f9 8913->8915 8916 7ff787b7c65a _fputchar 8914->8916 8917 7ff787b7c7a1 11 API calls 8915->8917 8918 7ff787b7c9f7 8916->8918 8921 7ff787b7ca04 8917->8921 8920 7ff787b7db77 4 API calls 8918->8920 8919 7ff787b7c467 _fputchar 8919->8921 8922 7ff787b7ca28 8920->8922 8921->8918 8921->8919 8922->8911

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff787b758b0-7ff787b758cc call 7ff787b73cfa 3 7ff787b758ce-7ff787b758d3 ExitProcess 0->3 4 7ff787b758d9-7ff787b758fc call 7ff787b71d19 call 7ff787b7159a call 7ff787b7c16f 0->4 11 7ff787b758fe-7ff787b75926 call 7ff787b7c16f 4->11 12 7ff787b7592a-7ff787b7593a call 7ff787b7c16f 4->12 11->12 17 7ff787b7593c-7ff787b7593f 12->17 18 7ff787b75999-7ff787b759b8 CreateMutexA GetLastError 12->18 21 7ff787b75942-7ff787b7594f 17->21 19 7ff787b759ba-7ff787b759c3 call 7ff787ba14d0 18->19 20 7ff787b759c8-7ff787b759fc call 7ff787b7c16f * 2 18->20 31 7ff787b75d6b-7ff787b75d80 19->31 40 7ff787b759fe-7ff787b75a24 20->40 41 7ff787b75a28-7ff787b75a2c 20->41 24 7ff787b75955-7ff787b7595c 21->24 25 7ff787b75951-7ff787b75953 21->25 29 7ff787b7595e-7ff787b75961 24->29 30 7ff787b75963-7ff787b75966 24->30 28 7ff787b75987-7ff787b7598b 25->28 28->21 29->28 33 7ff787b7596d-7ff787b75974 30->33 34 7ff787b75968-7ff787b7596b 30->34 37 7ff787b7597b-7ff787b75982 33->37 38 7ff787b75976-7ff787b75979 33->38 36 7ff787b7598d-7ff787b75997 34->36 36->18 36->21 37->36 39 7ff787b75984 37->39 38->28 39->28 40->41 42 7ff787b75a2e-7ff787b75a4c 41->42 43 7ff787b75aa1-7ff787b75ab8 call 7ff787b755c2 41->43 44 7ff787b75a50-7ff787b75a59 42->44 50 7ff787b75abe-7ff787b75ae3 call 7ff787b7c16f * 2 43->50 51 7ff787b75d3c 43->51 46 7ff787b75a5b-7ff787b75a61 44->46 47 7ff787b75a84-7ff787b75a96 44->47 46->47 49 7ff787b75a63-7ff787b75a66 46->49 47->44 52 7ff787b75a68-7ff787b75a72 49->52 53 7ff787b75a74-7ff787b75a7a 49->53 64 7ff787b75ae5-7ff787b75b0d 50->64 65 7ff787b75b10-7ff787b75b14 50->65 55 7ff787b75d41-7ff787b75d49 call 7ff787b8c860 51->55 56 7ff787b75a98-7ff787b75a9f 52->56 53->47 57 7ff787b75a7c-7ff787b75a7f 53->57 55->31 56->43 56->44 57->56 61 7ff787b75a81 57->61 61->47 64->65 66 7ff787b75b16-7ff787b75b19 65->66 67 7ff787b75b73-7ff787b75bd2 call 7ff787b713d6 call 7ff787b7224c call 7ff787b7c16f 65->67 69 7ff787b75b1c-7ff787b75b29 66->69 86 7ff787b75bd4-7ff787b75bfd call 7ff787b7c16f 67->86 87 7ff787b75c01-7ff787b75c14 call 7ff787b7c16f 67->87 71 7ff787b75b2b-7ff787b75b2d 69->71 72 7ff787b75b2f-7ff787b75b36 69->72 74 7ff787b75b61-7ff787b75b65 71->74 75 7ff787b75b3d-7ff787b75b40 72->75 76 7ff787b75b38-7ff787b75b3b 72->76 74->69 78 7ff787b75b47-7ff787b75b4e 75->78 79 7ff787b75b42-7ff787b75b45 75->79 76->74 82 7ff787b75b55-7ff787b75b5c 78->82 83 7ff787b75b50-7ff787b75b53 78->83 81 7ff787b75b67-7ff787b75b71 79->81 81->67 81->69 82->81 85 7ff787b75b5e 82->85 83->74 85->74 86->87 92 7ff787b75c16-7ff787b75c19 87->92 93 7ff787b75c73-7ff787b75d3a CreateProcessA VirtualAllocEx WriteProcessMemory VirtualProtect QueueUserAPC ResumeThread call 7ff787b8c890 87->93 95 7ff787b75c1c-7ff787b75c29 92->95 93->55 97 7ff787b75c2b-7ff787b75c2d 95->97 98 7ff787b75c2f-7ff787b75c36 95->98 99 7ff787b75c61-7ff787b75c65 97->99 100 7ff787b75c3d-7ff787b75c40 98->100 101 7ff787b75c38-7ff787b75c3b 98->101 99->95 102 7ff787b75c47-7ff787b75c4e 100->102 103 7ff787b75c42-7ff787b75c45 100->103 101->99 105 7ff787b75c55-7ff787b75c5c 102->105 106 7ff787b75c50-7ff787b75c53 102->106 104 7ff787b75c67-7ff787b75c71 103->104 104->93 104->95 105->104 107 7ff787b75c5e 105->107 106->99 107->99
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Process$CreateVirtual$AllocErrorExitLastMemoryMutexProtectQueueResumeThreadUserWrite
    • String ID: @
    • API String ID: 2997260034-2766056989
    • Opcode ID: f29c2bc2aa2f830e10a775610582b9c2f220351618a3ac35f01bf8f5afd253e8
    • Instruction ID: 2248eacef03f38b7b45add3931c48a79e519831d6a137752970869cefad7545b
    • Opcode Fuzzy Hash: f29c2bc2aa2f830e10a775610582b9c2f220351618a3ac35f01bf8f5afd253e8
    • Instruction Fuzzy Hash: FCE18E32A5828696E761EB19D40076AEF92FF50BC4FA48031DA0B1B791DF7DA946C720

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: _initterm_malloc_dbg$ExceptionFilterSleepUnhandled_amsg_exit_cexitstrlen
    • String ID:
    • API String ID: 4167734774-0
    • Opcode ID: 52d2e165cae7533f5d35e06507daed48006d0a113bdaa097266e701ad3bdc6ed
    • Instruction ID: 504f970cb9768771c03bc88aa311c7794270ce9a380e486e72a53a5c10b599fa
    • Opcode Fuzzy Hash: 52d2e165cae7533f5d35e06507daed48006d0a113bdaa097266e701ad3bdc6ed
    • Instruction Fuzzy Hash: B4510231A8964A86F751BF5AD850279ABA2BF44784FA44435DD1F8B391EF2CE443C370
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d5806a9513739e0fcdf13924d4085f4a5603eb7e9f3901940bf64cffec4b02f9
    • Instruction ID: 99b9a644233c99cbfa70dcc039898cdf6044a3e6d93eef8f119baad86c79d200
    • Opcode Fuzzy Hash: d5806a9513739e0fcdf13924d4085f4a5603eb7e9f3901940bf64cffec4b02f9
    • Instruction Fuzzy Hash: 9F72D572A4959686E720EB19C00066DFF92FB50FD8FB88134C61B0B790DE79E957C750
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: _malloc_dbg$_calloc_dbg_realloc_dbgabort
    • String ID:
    • API String ID: 1593204669-0
    • Opcode ID: 869f8d2a413c0a1fce99c2bfc34eb1bfd3a36a812d16f4bf316466595a5edf2b
    • Instruction ID: e0fafff3cd75273ade485a895c6ac039c7f23eefadad370a920727fad15174cf
    • Opcode Fuzzy Hash: 869f8d2a413c0a1fce99c2bfc34eb1bfd3a36a812d16f4bf316466595a5edf2b
    • Instruction Fuzzy Hash: E252E632A496C686EB10EB18C0007ADFF92FB40B98FA9C134C65B0B791DE79E947C750

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Thread$Current$Valueabort$CreateDebugDuplicateEventHandleOutputPriorityString_calloc_dbg_ultoa
    • String ID:
    • API String ID: 3003713025-0
    • Opcode ID: b07612aac89c5a200896f588b6e774118e018158538594add5f6ee2ffae56069
    • Instruction ID: a050d8bbddc85b0a5d3eb8504c046b91b8d3ddc2ee407307eaafe9d79811c9c5
    • Opcode Fuzzy Hash: b07612aac89c5a200896f588b6e774118e018158538594add5f6ee2ffae56069
    • Instruction Fuzzy Hash: 1831B53594975186EB51BF35A801369BAB2FF04BD4FA84239C92E43394EF3CD442C720

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: _malloc_dbg$CurrentThread_calloc_dbg_realloc_dbgabort
    • String ID:
    • API String ID: 4037631172-0
    • Opcode ID: c3c8b89245bc2a4d2558b95bde91a770513fa25e560faf1ffa902b861b91d2fa
    • Instruction ID: afc047553101b423d6845373d318b639a54d013c603acc62f297333935439887
    • Opcode Fuzzy Hash: c3c8b89245bc2a4d2558b95bde91a770513fa25e560faf1ffa902b861b91d2fa
    • Instruction Fuzzy Hash: 5B418331B86A0655EA45FF19D8041A9AB56BF44BC4FE88439DD0F0B795EE3CE847C320

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: fprintf
    • String ID: once %p is %d
    • API String ID: 383729395-95064319
    • Opcode ID: 13121847336affd19084199a4a3428cbcd27a1516d3c3a149cac98008e80f6c7
    • Instruction ID: ade0361dc8246237568abaa3f99e5e68cc81a4009843f2a74106a5c52d7f8d1d
    • Opcode Fuzzy Hash: 13121847336affd19084199a4a3428cbcd27a1516d3c3a149cac98008e80f6c7
    • Instruction Fuzzy Hash: 0A115071A99A0AC5E610BF25A400579BB66BB45BC0FE48138DE5F47795DE3CD443C720

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 732 7ff787b755c2-7ff787b75604 call 7ff787b7bb60 call 7ff787b7c16f * 2 739 7ff787b75606-7ff787b7562c 732->739 740 7ff787b75631-7ff787b75635 732->740 739->740 741 7ff787b756ab-7ff787b756d4 InternetOpenW 740->741 742 7ff787b75637-7ff787b75656 740->742 743 7ff787b7571d-7ff787b7571f 741->743 744 7ff787b756d6-7ff787b756fd InternetOpenUrlW 741->744 745 7ff787b7565a-7ff787b75663 742->745 748 7ff787b7589c-7ff787b758af 743->748 746 7ff787b75712-7ff787b75717 InternetCloseHandle 744->746 747 7ff787b756ff-7ff787b75710 744->747 749 7ff787b7568e-7ff787b756a0 745->749 750 7ff787b75665-7ff787b7566b 745->750 746->743 751 7ff787b75781-7ff787b7579c InternetReadFile 747->751 749->745 750->749 752 7ff787b7566d-7ff787b75670 750->752 755 7ff787b7579e-7ff787b7585e 751->755 756 7ff787b75724-7ff787b7572a 751->756 753 7ff787b7567e-7ff787b75684 752->753 754 7ff787b75672-7ff787b7567c 752->754 753->749 760 7ff787b75686-7ff787b75689 753->760 759 7ff787b756a2-7ff787b756a9 754->759 757 7ff787b7587a-7ff787b75882 GetLastError 755->757 762 7ff787b75860-7ff787b75878 InternetCloseHandle * 2 755->762 756->757 758 7ff787b75730-7ff787b7574b 756->758 757->762 763 7ff787b75884-7ff787b75897 InternetCloseHandle * 2 757->763 764 7ff787b7574d-7ff787b7577c call 7ff787b8b8e0 call 7ff787b8b920 call 7ff787b8b8e0 758->764 765 7ff787b757a3-7ff787b757b9 758->765 759->741 759->745 760->759 766 7ff787b7568b 760->766 762->748 763->743 764->751 768 7ff787b757bb-7ff787b757c2 call 7ff787b91990 765->768 769 7ff787b757c7-7ff787b757d1 765->769 766->749 768->769 771 7ff787b757ed 769->771 772 7ff787b757d3-7ff787b757d8 769->772 776 7ff787b757f7-7ff787b757ff call 7ff787b908e0 771->776 774 7ff787b757da-7ff787b757eb 772->774 775 7ff787b75802-7ff787b75834 call 7ff787b8b920 call 7ff787b8b8e0 call 7ff787b8b920 772->775 774->776 788 7ff787b75845-7ff787b75854 775->788 789 7ff787b75836-7ff787b75840 call 7ff787b908d0 775->789 776->775 788->751 789->788
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Internet$CloseHandle$Open_malloc_dbg$ErrorFileLastRead_calloc_dbg_realloc_dbgabort
    • String ID: vector::_M_range_insert
    • API String ID: 264723552-1989829942
    • Opcode ID: ac57245cf8a0e9345151f9a68c03df2d9206af70787a331661c67726fabd53dc
    • Instruction ID: 1cd79dea1b594bd6474bdd9e8065465f07bb7d7697da6cda6fa384f850004ba0
    • Opcode Fuzzy Hash: ac57245cf8a0e9345151f9a68c03df2d9206af70787a331661c67726fabd53dc
    • Instruction Fuzzy Hash: 74810832B5968686EB50EB1A940426AEB92FF44BD4FA48135DE1F0BBD4DE3CE543C710

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 964 7ff787b7a9ea-7ff787b7aa15 965 7ff787b7aa17-7ff787b7aa20 964->965 966 7ff787b7aa22-7ff787b7aa3b _strncoll 964->966 965->966 967 7ff787b7aa74-7ff787b7aa97 965->967 966->967 968 7ff787b7aa3d-7ff787b7aa45 966->968 969 7ff787b7aa9b-7ff787b7aaec strlen 967->969 968->967 970 7ff787b7aa47-7ff787b7aa55 968->970 972 7ff787b7ace8-7ff787b7acea 969->972 973 7ff787b7aaf2-7ff787b7ab2e call 7ff787b7bb60 * 2 969->973 970->967 971 7ff787b7aa57-7ff787b7aa5c 970->971 974 7ff787b7aa5e-7ff787b7aa60 971->974 975 7ff787b7aa62-7ff787b7aa68 971->975 977 7ff787b7ae0d-7ff787b7ae20 972->977 982 7ff787b7ab5e-7ff787b7ab61 973->982 983 7ff787b7ab30-7ff787b7ab34 973->983 974->967 974->975 975->967 978 7ff787b7aa6a-7ff787b7aa71 975->978 978->967 984 7ff787b7ab6b-7ff787b7ab73 982->984 985 7ff787b7ab63-7ff787b7ab66 982->985 986 7ff787b7ab4d-7ff787b7ab59 call 7ff787b791e3 983->986 987 7ff787b7ab36-7ff787b7ab42 983->987 984->985 989 7ff787b7ab75-7ff787b7ab95 call 7ff787b78972 984->989 988 7ff787b7acb9-7ff787b7acc0 985->988 986->988 990 7ff787b7ab48 987->990 991 7ff787b7ac5f-7ff787b7ac63 987->991 995 7ff787b7acc7-7ff787b7accb 988->995 996 7ff787b7acc2-7ff787b7acc5 988->996 989->988 1006 7ff787b7ab9b-7ff787b7aba2 989->1006 998 7ff787b7ac65-7ff787b7ac7c strlen call 7ff787b75ebe 990->998 997 7ff787b7ac7e-7ff787b7ac8c call 7ff787b78972 991->997 991->998 1002 7ff787b7acdd 995->1002 1003 7ff787b7accd-7ff787b7acd8 995->1003 996->995 1001 7ff787b7acef-7ff787b7ad6b call 7ff787b76182 996->1001 1005 7ff787b7ac91-7ff787b7acb5 call 7ff787b75dd1 strlen 997->1005 998->1005 1016 7ff787b7ad6d-7ff787b7ad70 1001->1016 1017 7ff787b7ad77-7ff787b7ae08 call 7ff787b7bb60 * 2 call 7ff787b77d5e call 7ff787b762a6 1001->1017 1007 7ff787b7acdf-7ff787b7ace3 1002->1007 1003->969 1005->988 1006->988 1011 7ff787b7aba8-7ff787b7abc0 1006->1011 1007->977 1014 7ff787b7ac4d-7ff787b7ac4f 1011->1014 1015 7ff787b7abc6-7ff787b7abce 1011->1015 1014->1015 1019 7ff787b7ac55-7ff787b7ac57 1014->1019 1020 7ff787b7abd7 1015->1020 1021 7ff787b7abd0-7ff787b7abd5 1015->1021 1016->1017 1017->1007 1019->1020 1023 7ff787b7ac5d 1019->1023 1025 7ff787b7abdb-7ff787b7abf4 1020->1025 1021->1020 1024 7ff787b7abff-7ff787b7ac03 1021->1024 1023->988 1026 7ff787b7ac05-7ff787b7ac0e 1024->1026 1027 7ff787b7ac23-7ff787b7ac48 call 7ff787b75ebe call 7ff787b75dd1 1024->1027 1029 7ff787b7abfb-7ff787b7abfd 1025->1029 1030 7ff787b7abf6-7ff787b7abf9 1025->1030 1026->1027 1031 7ff787b7ac10 1026->1031 1027->1006 1029->1024 1029->1030 1030->1025 1034 7ff787b7ac14-7ff787b7ac1c 1031->1034 1034->1024 1037 7ff787b7ac1e-7ff787b7ac21 1034->1037 1037->1034
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: strlen$_strncoll
    • String ID: _GLOBAL_
    • API String ID: 3979851410-770460502
    • Opcode ID: 2ba1fd3b5ce6628ed1eeb05d67322191957712e789b1a67369b739d9ce4267aa
    • Instruction ID: c3b18a44dfe00b44d74f6f1a80dc4cc9698a9a7ace9284a0a841b3f9b3194982
    • Opcode Fuzzy Hash: 2ba1fd3b5ce6628ed1eeb05d67322191957712e789b1a67369b739d9ce4267aa
    • Instruction Fuzzy Hash: A8C1C272A487819BF7A0AB7898503ED7BA2FB047C8FA44135DA5E0BB85DF389153D710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: ProtectVirtual_malloc_dbg$CacheFlushInstruction_calloc_dbg_realloc_dbgabort
    • String ID:
    • API String ID: 4203908447-0
    • Opcode ID: c07fb5fc05791a2d652626555140e2fc09cf288231f221f5d88f58047e82db52
    • Instruction ID: 076ae050d5610ef7ee268dc47214101a464449e68aa3c32f8b83efa35301a32c
    • Opcode Fuzzy Hash: c07fb5fc05791a2d652626555140e2fc09cf288231f221f5d88f58047e82db52
    • Instruction Fuzzy Hash: 7E32A732A5829A46E761AB18D400669FFA7FB91B80FF9C131D54B1B781DF78EC42C721
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Find$CaptureCloseContextFileFirstUnwindabort
    • String ID:
    • API String ID: 1173583122-0
    • Opcode ID: 647e7baf44c448dc3457adaf65a318fe10b0967cea75eac01cdfa436d7f6e220
    • Instruction ID: 27f9b5631989883374072c14661d9dc96b676e994fc16d7c224238f89aa8084a
    • Opcode Fuzzy Hash: 647e7baf44c448dc3457adaf65a318fe10b0967cea75eac01cdfa436d7f6e220
    • Instruction Fuzzy Hash: A5E03071EC940286EE55B779981837885A27B457E0FE40330D93F467D1ED1C9146C220
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Find$CaptureCloseContextFileFirstUnwindabort
    • String ID:
    • API String ID: 1173583122-0
    • Opcode ID: afa6338318a13f34c045cc96ae51508306a54df5c43521dea14304c708018e1b
    • Instruction ID: cbad093c3a666c9b13911c2df589065307ee45219995492099f3ec0eae241c11
    • Opcode Fuzzy Hash: afa6338318a13f34c045cc96ae51508306a54df5c43521dea14304c708018e1b
    • Instruction Fuzzy Hash: 94E06D62EC900286EE54B739A81837886A2BB89BF0FE40330D93F463D1ED2C9106C220
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Find$CaptureCloseContextFileFirstUnwindabort
    • String ID:
    • API String ID: 1173583122-0
    • Opcode ID: 24413b3b2bf8a5b7bc884de38493e337da70a3cc35f1d380b6d62bb285e2711d
    • Instruction ID: 3971b5a07537467f129a5306a13f13a00fb1d9664104c42e715a2b65060ec6f3
    • Opcode Fuzzy Hash: 24413b3b2bf8a5b7bc884de38493e337da70a3cc35f1d380b6d62bb285e2711d
    • Instruction Fuzzy Hash: 83E04F62E8940686EE557739A41837896A1BB99BB4FE40330D93F463D1ED2CD1068610
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: f9efa8c71b7c1bbc280a19ed6a234bfa44ba186f5dd84e4442255837bbb5284b
    • Instruction ID: f4bbaf2f881a2f66f6b1b18f3a01f6b11b9e0a1defb9ba4b8cc3d7881a97d605
    • Opcode Fuzzy Hash: f9efa8c71b7c1bbc280a19ed6a234bfa44ba186f5dd84e4442255837bbb5284b
    • Instruction Fuzzy Hash: 90D05E76E4940582EF617769E41833896B1BB547B4FE10330D53F822E0ED2CC24A8610
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID:
    • String ID: std$string literal
    • API String ID: 0-2980153874
    • Opcode ID: 462b6f8ad10999ab4834bc5d7bfa6675132a51d44ed354cb7906300ad11d44d0
    • Instruction ID: d092be73de1527a53ab86204d299298b171d7b4331505ff3aaa9b47b8ebcefb8
    • Opcode Fuzzy Hash: 462b6f8ad10999ab4834bc5d7bfa6675132a51d44ed354cb7906300ad11d44d0
    • Instruction Fuzzy Hash: A071C471E8864246FA64BA2D58452799E93BF61BC4FB88030C90F4F7C5DE2CE953C360
    APIs
      • Part of subcall function 00007FF787B71E11: GetModuleFileNameA.KERNEL32 ref: 00007FF787B71E2D
      • Part of subcall function 00007FF787B7C16F: _calloc_dbg.MSVCRT ref: 00007FF787B7C1F2
      • Part of subcall function 00007FF787B7C16F: abort.MSVCRT(?,?,00000000,?,00007FF787B715BC), ref: 00007FF787B7C1FF
      • Part of subcall function 00007FF787B7C16F: _malloc_dbg.MSVCRT ref: 00007FF787B7C27F
      • Part of subcall function 00007FF787B7C16F: _realloc_dbg.MSVCRT ref: 00007FF787B7C22A
      • Part of subcall function 00007FF787B7C16F: _malloc_dbg.MSVCRT ref: 00007FF787B7C29B
    • ShellExecuteA.SHELL32 ref: 00007FF787B7219A
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: _malloc_dbg$ExecuteFileModuleNameShell_calloc_dbg_realloc_dbgabort
    • String ID:
    • API String ID: 1988290971-0
    • Opcode ID: a86590a0b7bafda85bdafc32e0af200c94065561f631facfc687c2863a597ae3
    • Instruction ID: 89c15677ed2db8179d69d9aa8c11649f374ea06ef373f219c1fc9ce3815ad2a6
    • Opcode Fuzzy Hash: a86590a0b7bafda85bdafc32e0af200c94065561f631facfc687c2863a597ae3
    • Instruction Fuzzy Hash: F0B18572A8C18656E761AB19D4007B9EFA3BB91BC0FF59031D64B0B681DF7CA946C321
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Time$FileSystem
    • String ID:
    • API String ID: 2086374402-0
    • Opcode ID: 23804876058cb07679221c2903a1f25c786b03e55c65da52d24e59a27cdc965a
    • Instruction ID: c1aa169b2ec1ba24b03909281e9adab8b404fef9a7b0f8cfbdbcad9ace250bfd
    • Opcode Fuzzy Hash: 23804876058cb07679221c2903a1f25c786b03e55c65da52d24e59a27cdc965a
    • Instruction Fuzzy Hash: 82D05EAAF485448BDB20DB11E445016F763EBD83D9B848121EE4E02728DF3CD667CF00
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ba6a0131952158cd29b16643e9dd3944d8be7e52d71a24d3c29fe6db7b6efafa
    • Instruction ID: f3290afaca55c6972348ff9781860b46dab97591f2748a0f158d268e3650d08a
    • Opcode Fuzzy Hash: ba6a0131952158cd29b16643e9dd3944d8be7e52d71a24d3c29fe6db7b6efafa
    • Instruction Fuzzy Hash: 9AD15271A8964246F7A4AA2D54D16799E93BF91BC0FF88435CA4F0F7C5DE2CE843C260
    Memory Dump Source
    • Source File: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: af9eaba8913b5bb4ed26cfb2b649061c2a1b33fcda3960d05608301218ce0582
    • Instruction ID: 25d4b9067e50105163630cff3e7e96997a8f4822d04180d83608a57d00b81eb9
    • Opcode Fuzzy Hash: af9eaba8913b5bb4ed26cfb2b649061c2a1b33fcda3960d05608301218ce0582
    • Instruction Fuzzy Hash: A43179A7DCE7C55EE7536A690C2906CAFA2ABB2A0479D407BC786432D3FC4D5905C322
    Memory Dump Source
    • Source File: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 881578eabfbfffa7946b0a06e234dd643742ef944514ef788b83b882e2c7e22b
    • Instruction ID: c87f3b875b4ec10da070ca4047325f46ad64a836bb366e9118a83e75eb78e0d7
    • Opcode Fuzzy Hash: 881578eabfbfffa7946b0a06e234dd643742ef944514ef788b83b882e2c7e22b
    • Instruction Fuzzy Hash: C3E01297EDFEC946F2D3755D0C6D06CEEF3AA7251075D40B6CA89C6293EC0A2C068221

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 791 7ff787b7bc85-7ff787b7bcb3 792 7ff787b7bcc9-7ff787b7bcce 791->792 793 7ff787b7bcb5-7ff787b7bcc4 791->793 795 7ff787b7bcf4-7ff787b7bd25 792->795 796 7ff787b7bcd0-7ff787b7bcd4 792->796 794 7ff787b7be54-7ff787b7be67 793->794 797 7ff787b7bd27-7ff787b7bd52 795->797 798 7ff787b7bd54-7ff787b7bd59 795->798 796->794 799 7ff787b7bcda-7ff787b7bcef 796->799 806 7ff787b7bd6c-7ff787b7bd87 797->806 798->794 800 7ff787b7bd5f-7ff787b7bd65 798->800 801 7ff787b7be46-7ff787b7be52 RtlUnwindEx 799->801 803 7ff787b7bd67 800->803 804 7ff787b7bdc4-7ff787b7bde1 800->804 805 7ff787b7be05 abort 801->805 803->806 804->794 810 7ff787b7bde3-7ff787b7bde6 804->810 807 7ff787b7be0a-7ff787b7be41 805->807 806->794 811 7ff787b7bd8d-7ff787b7bd90 806->811 807->801 810->805 812 7ff787b7bde8-7ff787b7be03 810->812 811->805 813 7ff787b7bd92-7ff787b7bdc2 RaiseException 811->813 812->805 812->807 813->805
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Unwindabort
    • String ID: CCG $CCG!$CCG!$CCG"$basic_string::_M_create
    • API String ID: 2187188232-955483099
    • Opcode ID: bb328c6d7bdc18e29d892f8a8d7bde922b9d00a321234a47f533d7c8067adc48
    • Instruction ID: 4378688f237dc0190b964bbe1dda754c654e6398648bd72c40a46d9a7c6b45b7
    • Opcode Fuzzy Hash: bb328c6d7bdc18e29d892f8a8d7bde922b9d00a321234a47f533d7c8067adc48
    • Instruction Fuzzy Hash: 98518172608B4082D7609B59E48026AB7B5F748BD8F704536EF8E47B98DF3DD892C740

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Virtual$ErrorLastProtectQuery
    • String ID: Unknown pseudo relocation protocol version %d.$ VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
    • API String ID: 637304234-2693646698
    • Opcode ID: a13c80a3f8a784a93fa63c766381f3e7d7b49ac7c979711c887c2b3400285ffe
    • Instruction ID: 7011b995d6a75a68307fd0ae26071a0182ce530566e64a2e2e04de5ba45752db
    • Opcode Fuzzy Hash: a13c80a3f8a784a93fa63c766381f3e7d7b49ac7c979711c887c2b3400285ffe
    • Instruction Fuzzy Hash: E331D431B4AA0646EA11BF16E84017AEB63FF45B88FA48131DD1E4B354EE3CE447C760

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: CriticalInitializeSection$CreateSemaphore$??3@_calloc_dbg
    • String ID:
    • API String ID: 278339251-0
    • Opcode ID: ae1ebbd7d4b93f9417cc936a3a3e91b734c9fec0f231fa7f8469244b8c77df05
    • Instruction ID: ac7d2ecf0b701c590bd0e14d524a7c2d529fdc9565ddfdc99786f326b9dff2c4
    • Opcode Fuzzy Hash: ae1ebbd7d4b93f9417cc936a3a3e91b734c9fec0f231fa7f8469244b8c77df05
    • Instruction Fuzzy Hash: CD21D63170565286FB68AF79E4103B96A92BF547C5F64813ACD5E477C4DF3C9482C310

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 851 7ff787b7a3f9-7ff787b7a41f strcmp 852 7ff787b7a42e-7ff787b7a434 851->852 853 7ff787b7a421-7ff787b7a429 call 7ff787b791e3 851->853 855 7ff787b7a458-7ff787b7a45b 852->855 856 7ff787b7a436 852->856 864 7ff787b7a4fe-7ff787b7a509 853->864 858 7ff787b7a45d-7ff787b7a45f 855->858 859 7ff787b7a46b-7ff787b7a46e 855->859 856->855 860 7ff787b7a50e-7ff787b7a519 call 7ff787b76786 856->860 865 7ff787b7a479-7ff787b7a484 858->865 866 7ff787b7a461-7ff787b7a464 858->866 862 7ff787b7a474 859->862 863 7ff787b7a633-7ff787b7a636 859->863 873 7ff787b7a51b-7ff787b7a523 call 7ff787b791e3 860->873 874 7ff787b7a525-7ff787b7a528 860->874 868 7ff787b7a2be-7ff787b7a2c1 862->868 863->868 870 7ff787b7a63c-7ff787b7a64d strcmp 863->870 869 7ff787b7a758-7ff787b7a762 864->869 865->869 871 7ff787b7a4a8-7ff787b7a4ab 866->871 872 7ff787b7a466 866->872 877 7ff787b7a78e-7ff787b7a799 868->877 878 7ff787b7a662-7ff787b7a66a call 7ff787b7a19d 870->878 879 7ff787b7a64f-7ff787b7a660 strcmp 870->879 875 7ff787b7a4dd 871->875 876 7ff787b7a4ad-7ff787b7a4b1 871->876 872->868 900 7ff787b7a55e-7ff787b7a572 strcmp 873->900 884 7ff787b7a52a-7ff787b7a532 call 7ff787b79b50 874->884 885 7ff787b7a534-7ff787b7a545 strcmp 874->885 881 7ff787b7a4df-7ff787b7a4e2 call 7ff787b7a19d 875->881 882 7ff787b7a4bb-7ff787b7a4be 876->882 883 7ff787b7a4b3-7ff787b7a4b5 876->883 907 7ff787b7a67a-7ff787b7a693 call 7ff787b7a19d * 2 878->907 879->878 886 7ff787b7a66c-7ff787b7a670 879->886 901 7ff787b7a4e7-7ff787b7a4e9 881->901 890 7ff787b7a768 882->890 891 7ff787b7a4c4-7ff787b7a4cb 882->891 883->882 883->890 884->900 893 7ff787b7a547-7ff787b7a554 call 7ff787b79c8f 885->893 894 7ff787b7a556-7ff787b7a559 call 7ff787b7a19d 885->894 896 7ff787b7a69e-7ff787b7a6a0 886->896 897 7ff787b7a672-7ff787b7a675 call 7ff787b79b50 886->897 899 7ff787b7a76a-7ff787b7a77b strcmp 890->899 891->899 902 7ff787b7a4d1-7ff787b7a4d8 891->902 893->900 894->900 896->868 904 7ff787b7a6a6-7ff787b7a6ab 896->904 897->907 899->881 910 7ff787b7a781-7ff787b7a789 call 7ff787b788c3 899->910 908 7ff787b7a586-7ff787b7a597 strcmp 900->908 909 7ff787b7a574-7ff787b7a581 call 7ff787b7a95f 900->909 901->864 912 7ff787b7a4eb-7ff787b7a4f9 call 7ff787b75dd1 901->912 902->875 902->890 913 7ff787b7a6ad-7ff787b7a6af 904->913 914 7ff787b7a6b5-7ff787b7a6d9 call 7ff787b7a95f call 7ff787b791e3 904->914 938 7ff787b7a699 907->938 939 7ff787b7a727-7ff787b7a755 call 7ff787b75dd1 * 2 907->939 919 7ff787b7a5ac-7ff787b7a5b5 908->919 920 7ff787b7a599-7ff787b7a5aa strcmp 908->920 930 7ff787b7a60d 909->930 910->877 910->901 912->864 913->868 913->914 946 7ff787b7a6db-7ff787b7a6e4 914->946 947 7ff787b7a6e6-7ff787b7a6e9 914->947 927 7ff787b7a5bd-7ff787b7a5c0 919->927 928 7ff787b7a5b7-7ff787b7a5bb 919->928 920->919 926 7ff787b7a5c8-7ff787b7a5d0 call 7ff787b7a19d 920->926 926->930 933 7ff787b7a5d2-7ff787b7a5e9 call 7ff787b79c8f 927->933 934 7ff787b7a5c2 927->934 932 7ff787b7a5c6 928->932 937 7ff787b7a610-7ff787b7a62e call 7ff787b75dd1 930->937 932->926 932->933 933->937 948 7ff787b7a5eb-7ff787b7a608 call 7ff787b78955 call 7ff787b75dd1 933->948 934->932 937->869 938->868 939->869 946->939 949 7ff787b7a70c-7ff787b7a70f 947->949 950 7ff787b7a6eb-7ff787b7a6ef 947->950 948->930 949->868 955 7ff787b7a715-7ff787b7a719 949->955 950->868 954 7ff787b7a6f5-7ff787b7a70a call 7ff787b7a95f 950->954 954->939 955->868 959 7ff787b7a71f-7ff787b7a722 call 7ff787b7a19d 955->959 959->939
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: strcmp
    • String ID:
    • API String ID: 1004003707-0
    • Opcode ID: e84a4818de6d43e8536a5cedc54a3aed15e8386d73b1d9f88bbb9d8051837f3e
    • Instruction ID: 83a42f9e324a37d9f09b5f11b54a43a80a7b5d857f2b2c2f7078ea808b8465a1
    • Opcode Fuzzy Hash: e84a4818de6d43e8536a5cedc54a3aed15e8386d73b1d9f88bbb9d8051837f3e
    • Instruction Fuzzy Hash: A7915961ECC24647FAA4BA6D58112B9AA937F42BC0EF44031DD0F5E7C6ED1DE943E220

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1043 7ff787b7fed8-7ff787b7fedb call 7ff787b7fdc9 1047 7ff787b7fdf9-7ff787b7fe04 1043->1047 1048 7ff787b7fec8 1043->1048 1050 7ff787b7fe1e-7ff787b7fe22 1047->1050 1051 7ff787b7fe06-7ff787b7fe0a 1047->1051 1049 7ff787b7fecd-7ff787b7fed7 1048->1049 1054 7ff787b7fe4d-7ff787b7fe52 1050->1054 1055 7ff787b7fe24-7ff787b7fe31 GetCurrentThreadId 1050->1055 1052 7ff787b7fec4-7ff787b7fec6 1051->1052 1053 7ff787b7fe10-7ff787b7fe19 GetCurrentThreadId 1051->1053 1052->1049 1053->1052 1057 7ff787b7fe54-7ff787b7fe6a CreateEventA 1054->1057 1058 7ff787b7fe90 1054->1058 1055->1054 1056 7ff787b7fe33-7ff787b7fe42 1055->1056 1056->1049 1059 7ff787b7fe48-7ff787b7fe4b 1056->1059 1060 7ff787b7fe6c-7ff787b7fe7c GetLastError 1057->1060 1061 7ff787b7fe80-7ff787b7fe88 1057->1061 1062 7ff787b7fe95-7ff787b7fe9b 1058->1062 1059->1052 1060->1048 1063 7ff787b7fe7e 1060->1063 1061->1058 1064 7ff787b7fe8a call 7ff787ba14d0 1061->1064 1062->1051 1065 7ff787b7fea1-7ff787b7feae call 7ff787b820b1 1062->1065 1063->1049 1064->1058 1065->1062 1069 7ff787b7feb0-7ff787b7fec2 1065->1069 1069->1049
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: CurrentThread$??3@_malloc_dbg
    • String ID: basic_string::_M_create
    • API String ID: 581562805-3122258987
    • Opcode ID: 2bb92cf42e08eff2ff2dc53a9ef9ef7fa01df6db059675f466c958cb4e0d5d2e
    • Instruction ID: 33be181cfd4882e623f40610d6c46dbadd41337e82f938816c4e0adb1bdc113b
    • Opcode Fuzzy Hash: 2bb92cf42e08eff2ff2dc53a9ef9ef7fa01df6db059675f466c958cb4e0d5d2e
    • Instruction Fuzzy Hash: 2E318231E4920A8FFB657A299400339A993BF44795FB48435DA1B4A2C5DE3CE883C375

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1070 7ff787b80541-7ff787b80551 1071 7ff787b805dd-7ff787b805e7 1070->1071 1072 7ff787b80557-7ff787b8055e call 7ff787b82b6a 1070->1072 1075 7ff787b805d6 1072->1075 1076 7ff787b80560-7ff787b8059f GetCurrentThreadId _ultoa 1072->1076 1075->1071 1077 7ff787b805a4-7ff787b805a8 1076->1077 1078 7ff787b805aa-7ff787b805b1 1077->1078 1079 7ff787b805b5-7ff787b805b8 1077->1079 1078->1077 1080 7ff787b805b3 1078->1080 1081 7ff787b805cb-7ff787b805d1 OutputDebugStringA abort 1079->1081 1082 7ff787b805ba-7ff787b805c6 1079->1082 1080->1081 1081->1075 1082->1081
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: CurrentDebugOutputStringThread_ultoaabort
    • String ID: Error cleaning up spin_keys for thread
    • API String ID: 4191895893-2906507043
    • Opcode ID: 669e65e7f646c585453ca3f79ac09e731d9ed4effe2c1cdd6e2cdc8eff3b0697
    • Instruction ID: f951b67899ed90b64987dbf88181335a5e9772f9b184c9ba4397d5df525b1372
    • Opcode Fuzzy Hash: 669e65e7f646c585453ca3f79ac09e731d9ed4effe2c1cdd6e2cdc8eff3b0697
    • Instruction Fuzzy Hash: 2C11CE22B4DA0680FB61A724E4543BA9EA2FB453E5FE40334DA6F162D4CE3CD947C321
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: ObjectSingleWait$EventReset
    • String ID:
    • API String ID: 466820088-0
    • Opcode ID: a8e70bd7e119e29efdc805e4ea505b3ed105fc23f5571b86f251c967555772e6
    • Instruction ID: 2370d3964d47e2b7a805c706369c77e862fc7705fcc77286c10e2aa812ab831c
    • Opcode Fuzzy Hash: a8e70bd7e119e29efdc805e4ea505b3ed105fc23f5571b86f251c967555772e6
    • Instruction Fuzzy Hash: 86510531E8820345FAB5759A88853BEC8837F49BC0FB8403ED95F835D2DD7CA886D221
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: CriticalLeaveSection$AcquireLock
    • String ID:
    • API String ID: 602743569-0
    • Opcode ID: cd66c8ce581074a56e4715f6c9639c605397ae0235ab7073a0f9d5544064c705
    • Instruction ID: dc75a7e5dc5887b437b2bbf0fe3ff9e33947db959109b9ab1573641789a5c973
    • Opcode Fuzzy Hash: cd66c8ce581074a56e4715f6c9639c605397ae0235ab7073a0f9d5544064c705
    • Instruction Fuzzy Hash: 6501D431F4921686E715AF9B6D91738DA52BF99BE2FA88134CD0F82780DD3CA483C200
    APIs
    • VirtualProtect.KERNEL32(?,?,00007FF787BA0078,00000000,?,?,?,00007FF787BA0070,00007FF787B71208), ref: 00007FF787B7B552
    Strings
    • Unknown pseudo relocation bit size %d., xrefs: 00007FF787B7B47B
    • Unknown pseudo relocation protocol version %d., xrefs: 00007FF787B7B3F2
    • %d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p., xrefs: 00007FF787B7B4ED
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: ProtectVirtual
    • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$%d bit pseudo relocation at %p out of range, targeting %p, yielding the value %p.
    • API String ID: 544645111-1286557213
    • Opcode ID: 76b1fae69b79e615bf985ecfb9ee2fc66f485c8c679d56e2f472951ba7ad3302
    • Instruction ID: 6c9d84ff124a7ed6a882aee4c4d09fa9d627c465993bc1714a527bb7eb5b4c04
    • Opcode Fuzzy Hash: 76b1fae69b79e615bf985ecfb9ee2fc66f485c8c679d56e2f472951ba7ad3302
    • Instruction Fuzzy Hash: C5619271B8850687EB20AB19D54177AAB62BF407D8FA44131DA1E4B7D5DE3CE583CB20
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: ??3@$strlen
    • String ID:
    • API String ID: 4288758904-0
    • Opcode ID: 80384a1e9eb043a2554e420854658e9430b5bb7048745b7244e076016ca942ee
    • Instruction ID: 0f0b37a993cc75f9015b82c55980329e62674679c6bb8d35685586ce53433ebb
    • Opcode Fuzzy Hash: 80384a1e9eb043a2554e420854658e9430b5bb7048745b7244e076016ca942ee
    • Instruction Fuzzy Hash: D421E271A8D6528BEAE5BA1D5540679E952BF007D0FB44130EE8F4EBC4DF2CA443E620
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Byte$CharMultiWide$Lead_errno
    • String ID:
    • API String ID: 2766522060-0
    • Opcode ID: 3daecbf2e4752a949092cbb4212e443bd48329abac674dce0de80a1b29d1dfbc
    • Instruction ID: b08f0a8858eec179849787b0ce135e77c7024b19200c5cf99e048eb28a7d5900
    • Opcode Fuzzy Hash: 3daecbf2e4752a949092cbb4212e443bd48329abac674dce0de80a1b29d1dfbc
    • Instruction Fuzzy Hash: 5231F772A4C2854FE7306B29A440369EE62BB457C8FA45131DA8A4B7C5DB3CD547CB14
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Thread$CurrentErrorLastValue_realloc_dbg$CreateDuplicateEventHandlePriorityabort
    • String ID:
    • API String ID: 276713024-0
    • Opcode ID: f3401903f7e515f5ed7579b8af0a55e9d8dfb76e46882395f8414405495ecd27
    • Instruction ID: fdee396c06e460140b1798daa7dc34fd7939707415978d22ca7c3ee3c5fe5e72
    • Opcode Fuzzy Hash: f3401903f7e515f5ed7579b8af0a55e9d8dfb76e46882395f8414405495ecd27
    • Instruction Fuzzy Hash: 7D21A1327456859AEB09EF3E98846ACAB93FB48BD4F944534DE1A47345EE3CE482C350
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: Value$Thread$Current$CreateDuplicateEventHandlePriority_endthreadexabortlongjmp
    • String ID:
    • API String ID: 843818611-0
    • Opcode ID: 6204a6c491151568083560572d8fa4b87c9cef2b8e9d574bd77a1ebca2c6a721
    • Instruction ID: 4d54b8d6acc4b2c60f4ba799615882e21bc2976cbdb93d5dc9fd5af3bffc54d0
    • Opcode Fuzzy Hash: 6204a6c491151568083560572d8fa4b87c9cef2b8e9d574bd77a1ebca2c6a721
    • Instruction Fuzzy Hash: F521317595A64585FB55BF22D414338BBA2FF48B94FA94039C90F47354EF3CA846C360
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: AcquireCriticalLeaveLockSection
    • String ID:
    • API String ID: 1584331419-0
    • Opcode ID: c4819ef3cc784ac1fab3b226f1b2a17a67e287d5b2bc9a429561919b8490c2db
    • Instruction ID: f3fc01c5981f962c63e1e06ff968e7c1180ff3af6f89a85bd64259ccf30914fa
    • Opcode Fuzzy Hash: c4819ef3cc784ac1fab3b226f1b2a17a67e287d5b2bc9a429561919b8490c2db
    • Instruction Fuzzy Hash: 3801A233F462554ADA16EF5BBC0052AAB60BB98BD0F540135EE0A47351CE3CD892CBC0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: signal
    • String ID: CCG
    • API String ID: 1946981877-1584390748
    • Opcode ID: 61dc30c445af4839d008fff5af293256ad5fcbe135ead48f4e86def2fbe10760
    • Instruction ID: 71ef562af95b46bc5969bb6dcdc0daaed06eebd63fe67501e0be2b7ed71ea970
    • Opcode Fuzzy Hash: 61dc30c445af4839d008fff5af293256ad5fcbe135ead48f4e86def2fbe10760
    • Instruction Fuzzy Hash: 7B214A71E891064BFA643519444037AD983BF453ACFB4C936CA0FCA2D0DD5DE883CA21
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: ??3@fprintf
    • String ID: %p not found?!?!
    • API String ID: 4236183796-11085004
    • Opcode ID: 3d118f093288ef335176b8b2f41bad582a04bc912a6cc49a7415ee6ddb0e5998
    • Instruction ID: e252bc4a0f7271f2239c2ccaf16f2fa6f0c7cca4129e34c5deff1fe32679fb35
    • Opcode Fuzzy Hash: 3d118f093288ef335176b8b2f41bad582a04bc912a6cc49a7415ee6ddb0e5998
    • Instruction Fuzzy Hash: EB114F31ACE61681F925BB55E5111B49A62FF08BC4FEC0439DD2F0A395EE3CA883C260
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: ??3@CurrentEventThread_malloc_dbg
    • String ID: basic_string::_M_create
    • API String ID: 3602570239-3122258987
    • Opcode ID: 9b0731d52f42667028767ec104d0081a9df3961425e38e3d3f587fa9626590ee
    • Instruction ID: 5a8992cd4bd73aca161037dddb97096480db5ed9c8f0c4dc908bd9d26d97e6fe
    • Opcode Fuzzy Hash: 9b0731d52f42667028767ec104d0081a9df3961425e38e3d3f587fa9626590ee
    • Instruction Fuzzy Hash: 1B018432A461198FEB55AE3D9804369AAD2FB05754FA84531D91ACE1C8DE3CD883C725
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-3474627141
    • Opcode ID: 8f2869a0bec3eb6bdb8dd31dffd9e975c7f56a5bf17c4dbe48e23d3e77dad6a0
    • Instruction ID: ab5178587ddd18d3dad6424969c3dc517cb5b326643eb7181bfbbc28f2604657
    • Opcode Fuzzy Hash: 8f2869a0bec3eb6bdb8dd31dffd9e975c7f56a5bf17c4dbe48e23d3e77dad6a0
    • Instruction Fuzzy Hash: E9115166848E8482D6119F2CE0413EAB371FF9A39AF605726EBC91B264DF39D157CB00
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2713391170
    • Opcode ID: 6560deb312eab8fbef0511967d52465796192eadc400bd600f759e29496c9926
    • Instruction ID: 05bc69b58a2cb045de473dcc41204de5f475ac07abdf75a0fecb0b142ef6e5c5
    • Opcode Fuzzy Hash: 6560deb312eab8fbef0511967d52465796192eadc400bd600f759e29496c9926
    • Instruction Fuzzy Hash: B8F0FF66848F8482D211DF1CA4002ABB771FF9A789F605326EBC92A564DF29D553C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4064033741
    • Opcode ID: dc1c1972e6ed6f9f01668daa75542991bb63cfbe85ca8f13c73e9dc3af1e8904
    • Instruction ID: 33b786e12bd54385b0fdde7892880796f9e0129ba4fc7cce6d5a64e21c2c87ce
    • Opcode Fuzzy Hash: dc1c1972e6ed6f9f01668daa75542991bb63cfbe85ca8f13c73e9dc3af1e8904
    • Instruction Fuzzy Hash: 56F0FF66848F8482D211DF1CA4002ABB771FF9A789F605326EBC92A564DF29D553C714
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4283191376
    • Opcode ID: 3d9f7c9cfb58e8d76470f6d04f124dcd037a48f21f6d66412afe0f5f34f06697
    • Instruction ID: 4d72d4a2046447e62b296a129dac1e55ccd360a7a890ca8fbde63d63d962c7e7
    • Opcode Fuzzy Hash: 3d9f7c9cfb58e8d76470f6d04f124dcd037a48f21f6d66412afe0f5f34f06697
    • Instruction Fuzzy Hash: 2FF0FF66848F8482D211DF1CA4002ABB771FF9A789F705326EBC92A564DF29D553C714
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-4273532761
    • Opcode ID: 2a7b6e017ee675360d2da71c6383766dc1d5a924261e03a1081518193884f3eb
    • Instruction ID: b47c80163307a22f5b737e8f68b958164bea4e91f9c25773607bf217912b7f74
    • Opcode Fuzzy Hash: 2a7b6e017ee675360d2da71c6383766dc1d5a924261e03a1081518193884f3eb
    • Instruction Fuzzy Hash: 62F0FF66848F8882D211DF1CA4002ABB771FF9E789F605326EBC92A564DF29D553C750
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: fprintf
    • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2187435201
    • Opcode ID: 8a625faa8e70e326f375ef6abd37a4a19dbc90db46e8753d07aa9d3c24fe187b
    • Instruction ID: 3d02620871547c11e5ba2050fb6656868964a23a0d0f449bd5bb7e23d3af430f
    • Opcode Fuzzy Hash: 8a625faa8e70e326f375ef6abd37a4a19dbc90db46e8753d07aa9d3c24fe187b
    • Instruction Fuzzy Hash: 2FF0FF66848F8482D211DF1CA4002ABB771FF9A789F605326EBC92A564DF29D553C710
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1668256085.00007FF787B71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF787B70000, based on PE: true
    • Associated: 00000000.00000002.1668244261.00007FF787B70000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668274805.00007FF787B92000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B94000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668288119.00007FF787B9D000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668313339.00007FF787BA0000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668324665.00007FF787BA5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787BA6000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F1A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2A000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F2E000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F58000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF787F80000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788083000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788536000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1668338582.00007FF788885000.00000040.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff787b70000_P2jWhX7B3B.jbxd
    Similarity
    • API ID: fprintf
    • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
    • API String ID: 383729395-2468659920
    • Opcode ID: 652e02f30b91cc5c583a8b4add902bb54138a908352b6fd9808f5400c3f79f5b
    • Instruction ID: 63f205e1d317002ea8482d6a6d350d6d384fa91a4712fbee61451adbd006c579
    • Opcode Fuzzy Hash: 652e02f30b91cc5c583a8b4add902bb54138a908352b6fd9808f5400c3f79f5b
    • Instruction Fuzzy Hash: A8F01D66808F8482D211DF2CE4002ABB771FF9E789F605326EFC92A624DF29D153C700