Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe
Analysis ID:1521517
MD5:422bd6b228bc054bd1c22de49f706a0f
SHA1:4efd522c32541f1e9c60c0183424f28276d5fc02
SHA256:bb6c3e7f98d3b40cb754d80c1de0c7d630c7dafb49c5582740d40cf928ee094b
Tags:exe
Infos:

Detection

Metasploit
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cleanup
{"Type": "Metasploit Connect", "IP": "219.150.121.100", "Port": 4449}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
    • 0x33e3:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
    00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_91bc5d7dunknownunknown
    • 0x3439:$a: 49 BE 77 73 32 5F 33 32 00 00 41 56 49 89 E6 48 81 EC A0 01 00 00 49 89 E5
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeAvira: detected
    Source: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "219.150.121.100", "Port": 4449}
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeReversingLabs: Detection: 55%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1215740 FindFirstFileExW,0_2_00007FF6E1215740
    Source: global trafficTCP traffic: 192.168.2.5:49718 -> 219.150.121.100:4449
    Source: Joe Sandbox ViewASN Name: CHINANET-BACKBONENo31Jin-rongStreetCN CHINANET-BACKBONENo31Jin-rongStreetCN
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: unknownTCP traffic detected without corresponding DNS query: 219.150.121.100
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_0000025959553438 LoadLibraryA,WSASocketA,connect,recv,closesocket,0_2_0000025959553438

    System Summary

    barindex
    Source: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
    Source: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d Author: unknown
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E121A2C80_2_00007FF6E121A2C8
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1213E1C0_2_00007FF6E1213E1C
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E12155100_2_00007FF6E1215510
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe, 00000000.00000000.2141100714.00007FF6E1243000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamepython.exe. vs SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe, 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamepython.exe. vs SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeBinary or memory string: OriginalFilenamepython.exe. vs SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe
    Source: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
    Source: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_91bc5d7d reference_sample = 0dd993ff3917dc56ef02324375165f0d66506c5a9b9548eda57c58e041030987, os = windows, severity = x86, creation_date = 2021-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 8848a3de66a25dd98278761a7953f31b7995e48621dec258f3d92bd91a4a3aa3, id = 91bc5d7d-31e3-4c02-82b3-a685194981f3, last_modified = 2021-10-04
    Source: classification engineClassification label: mal84.troj.winEXE@1/0@0/1
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1211190 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,0_2_00007FF6E1211190
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1211310 FindResourceW,FindResourceExW,SizeofResource,LoadResource,LockResource,0_2_00007FF6E1211310
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeReversingLabs: Detection: 55%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeSection loaded: mswsock.dllJump to behavior
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1242A00 LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_00007FF6E1242A00
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1220F2D push rcx; retf 003Fh0_2_00007FF6E1220F2E
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1215740 FindFirstFileExW,0_2_00007FF6E1215740
    Source: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe, 00000000.00000002.3381181364.0000025959569000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeAPI call chain: ExitProcess graph end nodegraph_0-6734
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeAPI call chain: ExitProcess graph end nodegraph_0-7290
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1211D58 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6E1211D58
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1242A00 LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_00007FF6E1242A00
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1217540 GetProcessHeap,0_2_00007FF6E1217540
    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1211D58 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6E1211D58
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1215064 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6E1215064
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1219EA0 cpuid 0_2_00007FF6E1219EA0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exeCode function: 0_2_00007FF6E1211C34 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6E1211C34

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    11
    Obfuscated Files or Information
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Software Packing
    LSASS Memory21
    Security Software Discovery
    Remote Desktop ProtocolData from Removable Media1
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets12
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe55%ReversingLabsWin64.Trojan.Shelma
    SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe100%AviraTR/Kryptik.tyipy
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    219.150.121.100
    unknownChina
    4134CHINANET-BACKBONENo31Jin-rongStreetCNtrue
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1521517
    Start date and time:2024-09-28 20:35:09 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 1s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe
    Detection:MAL
    Classification:mal84.troj.winEXE@1/0@0/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 8
    • Number of non-executed functions: 19
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • VT rate limit hit for: SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CHINANET-BACKBONENo31Jin-rongStreetCNhttps://bronze-cat-cocoa.glitch.me/Onlineaccessprofile.HTMLGet hashmaliciousHTMLPhisherBrowse
    • 63.140.38.112
    http://alibinaadi.com/.well-known/alibaba/Alibaba/index.phpGet hashmaliciousUnknownBrowse
    • 123.183.232.65
    http://promo1.spik.ru/CN/Get hashmaliciousHTMLPhisherBrowse
    • 124.239.14.253
    https://oxbike-br.com/XRpb24t/zc2liaWx/Get hashmaliciousHTMLPhisherBrowse
    • 123.183.232.65
    SecuriteInfo.com.FileRepMalware.15272.21357.exeGet hashmaliciousUnknownBrowse
    • 218.91.199.54
    7fi7NmSbkN.elfGet hashmaliciousMiraiBrowse
    • 119.138.141.23
    rsJtZBgpwG.elfGet hashmaliciousMiraiBrowse
    • 49.73.137.94
    SecuriteInfo.com.Linux.Siggen.9999.1529.24643.elfGet hashmaliciousUnknownBrowse
    • 119.97.209.26
    SecuriteInfo.com.Linux.Siggen.9999.29695.14613.elfGet hashmaliciousUnknownBrowse
    • 219.141.122.103
    SecuriteInfo.com.Linux.Siggen.9999.31454.15725.elfGet hashmaliciousUnknownBrowse
    • 59.57.208.16
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):7.020158369072848
    TrID:
    • Win64 Executable GUI (202006/5) 81.26%
    • UPX compressed Win32 Executable (30571/9) 12.30%
    • Win64 Executable (generic) (12005/4) 4.83%
    • Generic Win/DOS Executable (2004/3) 0.81%
    • DOS Executable Generic (2002/1) 0.81%
    File name:SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe
    File size:139'264 bytes
    MD5:422bd6b228bc054bd1c22de49f706a0f
    SHA1:4efd522c32541f1e9c60c0183424f28276d5fc02
    SHA256:bb6c3e7f98d3b40cb754d80c1de0c7d630c7dafb49c5582740d40cf928ee094b
    SHA512:592e5a0a5d18e7c612355f9fac2e9a0a51b46a267620903ab201139ad9664927404c3adff51f3b99c8ff31983e391dba4293cb7ecbf5afd22055ae37b8918f45
    SSDEEP:3072:jV2cN0fKTM//iB/buAsKFNmhMn7Ihjj/IDRM:jVvN0fKyOaCQf
    TLSH:1CD3694A6A5F81A1D4749071437B97F62B2D1F62A9C7C68CA7C03F06E57E181F90AB33
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........3<.w]o.w]o.w]ok..o.w]ok..o.w]ok..o.w]o.)^n.w]o.)Xn.w]o.)Yn.w]o...o.w]o.w\o.w]oH)Tn.w]oM).o.w]oH)_n.w]oRich.w]o...............
    Icon Hash:116d663019252118
    Entrypoint:0x140032990
    Entrypoint Section:UPX1
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x5FC5DB9D [Tue Dec 1 05:58:53 2020 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:945415513a1d001a8c17a55e1a5cdfd0
    Instruction
    push ebx
    push esi
    push edi
    push ebp
    dec eax
    lea esi, dword ptr [FFFF2665h]
    dec eax
    lea edi, dword ptr [esi-00024000h]
    push edi
    xor ebx, ebx
    xor ecx, ecx
    dec eax
    or ebp, FFFFFFFFh
    call 00007F270540D925h
    add ebx, ebx
    je 00007F270540D8D4h
    rep ret
    mov ebx, dword ptr [esi]
    dec eax
    sub esi, FFFFFFFCh
    adc ebx, ebx
    mov dl, byte ptr [esi]
    rep ret
    dec eax
    lea eax, dword ptr [edi+ebp]
    cmp ecx, 05h
    mov dl, byte ptr [eax]
    jbe 00007F270540D8F3h
    dec eax
    cmp ebp, FFFFFFFCh
    jnbe 00007F270540D8EDh
    sub ecx, 04h
    mov edx, dword ptr [eax]
    dec eax
    add eax, 04h
    sub ecx, 04h
    mov dword ptr [edi], edx
    dec eax
    lea edi, dword ptr [edi+04h]
    jnc 00007F270540D8C1h
    add ecx, 04h
    mov dl, byte ptr [eax]
    je 00007F270540D8E2h
    dec eax
    inc eax
    mov byte ptr [edi], dl
    sub ecx, 01h
    mov dl, byte ptr [eax]
    dec eax
    lea edi, dword ptr [edi+01h]
    jne 00007F270540D8C2h
    rep ret
    cld
    inc ecx
    pop ebx
    jmp 00007F270540D8DAh
    dec eax
    inc esi
    mov byte ptr [edi], dl
    dec eax
    inc edi
    mov dl, byte ptr [esi]
    add ebx, ebx
    jne 00007F270540D8DCh
    mov ebx, dword ptr [esi]
    dec eax
    sub esi, FFFFFFFCh
    adc ebx, ebx
    mov dl, byte ptr [esi]
    jc 00007F270540D8B8h
    lea eax, dword ptr [ecx+01h]
    inc ecx
    call ebx
    adc eax, eax
    add ebx, ebx
    jne 00007F270540D8DCh
    mov ebx, dword ptr [esi]
    dec eax
    sub esi, FFFFFFFCh
    adc ebx, ebx
    mov dl, byte ptr [esi]
    jnc 00007F270540D8BDh
    sub eax, 03h
    jc 00007F270540D8E5h
    shl eax, 08h
    movzx edx, dl
    or eax, edx
    dec eax
    inc esi
    xor eax, FFFFFFFFh
    je 00007F270540D90Ch
    dec eax
    arpl ax, bp
    lea eax, dword ptr [ecx+01h]
    inc ecx
    call ebx
    adc ecx, ecx
    Programming Language:
    • [RES] VS2015 UPD3 build 24213
    • [LNK] VS2015 UPD3.1 build 24215
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x46c080xdc.rsrc
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x330000x13c08.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x160000xc9cUPX0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x46ce40x10.rsrc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x32bd80x94UPX1
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    UPX00x10000x240000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    UPX10x250000xe0000xde00de332000c5fce3ab59a448af66fb3532False0.9720931869369369data7.8824933311563585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x330000x140000x13e00162541faf4835773b5b585e8eb6a7972False0.5005159198113207data6.156013907001858IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x3338c0x3d97PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.985666264983827
    RT_ICON0x371280x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096, 256 important colorsEnglishUnited States0.30095204513399154
    RT_ICON0x387540xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.40911513859275056
    RT_ICON0x396000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.43772563176895307
    RT_ICON0x39eac0x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.4683179723502304
    RT_ICON0x3a5780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3800578034682081
    RT_ICON0x3aae40x30faPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9686552879247089
    RT_ICON0x3dbe40x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.13911195087387812
    RT_ICON0x41e100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.1908713692946058
    RT_ICON0x443bc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.2619606003752345
    RT_ICON0x454680x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.33852459016393444
    RT_ICON0x45df40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.375886524822695
    RT_RCDATA0x2b22c0x37eedata0.9610979187037296
    RT_GROUP_ICON0x462600xaedataEnglishUnited States0.632183908045977
    RT_VERSION0x463140x3a8dataEnglishUnited States0.4230769230769231
    RT_MANIFEST0x466c00x545XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4558932542624166
    DLLImport
    ADVAPI32.dllRegCloseKey
    KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Sep 28, 2024 20:36:12.132560015 CEST497184449192.168.2.5219.150.121.100
    Sep 28, 2024 20:36:12.137522936 CEST444949718219.150.121.100192.168.2.5
    Sep 28, 2024 20:36:12.137598991 CEST497184449192.168.2.5219.150.121.100
    Sep 28, 2024 20:36:33.522722006 CEST444949718219.150.121.100192.168.2.5
    Sep 28, 2024 20:36:33.523868084 CEST497184449192.168.2.5219.150.121.100
    Sep 28, 2024 20:36:33.524277925 CEST497184449192.168.2.5219.150.121.100
    Sep 28, 2024 20:36:33.525057077 CEST497284449192.168.2.5219.150.121.100
    Sep 28, 2024 20:36:33.529181004 CEST444949718219.150.121.100192.168.2.5
    Sep 28, 2024 20:36:33.529923916 CEST444949728219.150.121.100192.168.2.5
    Sep 28, 2024 20:36:33.531883001 CEST497284449192.168.2.5219.150.121.100
    Sep 28, 2024 20:36:54.900733948 CEST444949728219.150.121.100192.168.2.5
    Sep 28, 2024 20:36:54.900835991 CEST497284449192.168.2.5219.150.121.100
    Sep 28, 2024 20:36:54.918309927 CEST497284449192.168.2.5219.150.121.100
    Sep 28, 2024 20:36:54.923162937 CEST444949728219.150.121.100192.168.2.5
    Sep 28, 2024 20:36:54.931788921 CEST497314449192.168.2.5219.150.121.100
    Sep 28, 2024 20:36:54.936619043 CEST444949731219.150.121.100192.168.2.5
    Sep 28, 2024 20:36:54.936696053 CEST497314449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:16.356545925 CEST444949731219.150.121.100192.168.2.5
    Sep 28, 2024 20:37:16.356673956 CEST497314449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:16.357364893 CEST497314449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:16.358642101 CEST497364449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:16.362487078 CEST444949731219.150.121.100192.168.2.5
    Sep 28, 2024 20:37:16.363841057 CEST444949736219.150.121.100192.168.2.5
    Sep 28, 2024 20:37:16.363950014 CEST497364449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:37.789203882 CEST444949736219.150.121.100192.168.2.5
    Sep 28, 2024 20:37:37.789289951 CEST497364449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:37.789753914 CEST497364449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:37.790601969 CEST497384449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:37.794502974 CEST444949736219.150.121.100192.168.2.5
    Sep 28, 2024 20:37:37.795418024 CEST444949738219.150.121.100192.168.2.5
    Sep 28, 2024 20:37:37.795494080 CEST497384449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:59.168792963 CEST444949738219.150.121.100192.168.2.5
    Sep 28, 2024 20:37:59.168987989 CEST497384449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:59.169445038 CEST497384449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:59.170254946 CEST497404449192.168.2.5219.150.121.100
    Sep 28, 2024 20:37:59.178303003 CEST444949738219.150.121.100192.168.2.5
    Sep 28, 2024 20:37:59.179666996 CEST444949740219.150.121.100192.168.2.5
    Sep 28, 2024 20:37:59.179790020 CEST497404449192.168.2.5219.150.121.100

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:14:36:10
    Start date:28/09/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe"
    Imagebase:0x7ff6e1210000
    File size:139'264 bytes
    MD5 hash:422BD6B228BC054BD1C22DE49F706A0F
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Yara matches:
    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
    • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
    • Rule: Windows_Trojan_Metasploit_91bc5d7d, Description: unknown, Source: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:3.9%
      Dynamic/Decrypted Code Coverage:1%
      Signature Coverage:9.4%
      Total number of Nodes:1037
      Total number of Limit Nodes:11
      execution_graph 7904 7ff6e1213028 7905 7ff6e121422c 18 API calls 7904->7905 7906 7ff6e121302d 7905->7906 7907 7ff6e1213044 7906->7907 7908 7ff6e1213060 6 API calls 7906->7908 7908->7907 7482 7ff6e121156c 7483 7ff6e121157c 7482->7483 7501 7ff6e1213a80 7483->7501 7485 7ff6e1211588 7507 7ff6e1211a14 7485->7507 7487 7ff6e12115a1 7488 7ff6e1211611 7487->7488 7489 7ff6e12115a5 _RTC_Initialize 7487->7489 7490 7ff6e1211d58 __scrt_fastfail 6 API calls 7488->7490 7512 7ff6e1211c1c 7489->7512 7491 7ff6e121161b 7490->7491 7493 7ff6e1211d58 __scrt_fastfail 6 API calls 7491->7493 7495 7ff6e1211626 __scrt_initialize_default_local_stdio_options 7493->7495 7494 7ff6e12115b6 7515 7ff6e12135d0 7494->7515 7498 7ff6e12115c6 __C_specific_handler 7536 7ff6e1213b14 7498->7536 7500 7ff6e12115f6 7502 7ff6e1213a91 7501->7502 7503 7ff6e1213a99 7502->7503 7504 7ff6e12154dc _set_errno_from_matherr 7 API calls 7502->7504 7503->7485 7505 7ff6e1213aa8 7504->7505 7506 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7505->7506 7506->7503 7508 7ff6e1211ad2 7507->7508 7511 7ff6e1211a2c __scrt_initialize_onexit_tables __scrt_release_startup_lock 7507->7511 7509 7ff6e1211d58 __scrt_fastfail 6 API calls 7508->7509 7510 7ff6e1211adc 7509->7510 7511->7487 7543 7ff6e1211bcc 7512->7543 7514 7ff6e1211c25 7514->7494 7516 7ff6e12135ee 7515->7516 7517 7ff6e1213604 GetModuleFileNameW 7515->7517 7518 7ff6e12154dc _set_errno_from_matherr 7 API calls 7516->7518 7521 7ff6e1213631 7517->7521 7519 7ff6e12135f3 7518->7519 7520 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7519->7520 7522 7ff6e12115c2 7520->7522 7523 7ff6e121356c 7 API calls 7521->7523 7522->7491 7522->7498 7524 7ff6e1213671 7523->7524 7525 7ff6e1213679 7524->7525 7527 7ff6e121368a 7524->7527 7526 7ff6e12154dc _set_errno_from_matherr 7 API calls 7525->7526 7535 7ff6e121367e 7526->7535 7529 7ff6e12136d6 7527->7529 7530 7ff6e12136ef 7527->7530 7527->7535 7528 7ff6e121425c __vcrt_freefls 7 API calls 7528->7522 7531 7ff6e121425c __vcrt_freefls 7 API calls 7529->7531 7533 7ff6e121425c __vcrt_freefls 7 API calls 7530->7533 7532 7ff6e12136df 7531->7532 7534 7ff6e121425c __vcrt_freefls 7 API calls 7532->7534 7533->7535 7534->7522 7535->7528 7537 7ff6e1214ed0 abort 18 API calls 7536->7537 7538 7ff6e1213b21 7537->7538 7539 7ff6e1213b55 7538->7539 7540 7ff6e12154dc _set_errno_from_matherr 7 API calls 7538->7540 7539->7500 7541 7ff6e1213b4a 7540->7541 7542 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7541->7542 7542->7539 7544 7ff6e1211bfb 7543->7544 7546 7ff6e1211bf1 _onexit 7543->7546 7547 7ff6e1214084 7544->7547 7546->7514 7550 7ff6e1213c40 7547->7550 7549 7ff6e12140c6 7549->7546 7551 7ff6e1213c5c 7550->7551 7554 7ff6e1213e1c 7551->7554 7553 7ff6e1213c65 7553->7549 7555 7ff6e1213e51 7554->7555 7563 7ff6e1213e49 7554->7563 7562 7ff6e1213ecb 7555->7562 7555->7563 7564 7ff6e12174a0 7555->7564 7557 7ff6e12174a0 _onexit 9 API calls 7559 7ff6e1213ee5 7557->7559 7558 7ff6e1213ec1 7560 7ff6e121425c __vcrt_freefls 7 API calls 7558->7560 7561 7ff6e121425c __vcrt_freefls 7 API calls 7559->7561 7560->7562 7561->7563 7562->7557 7562->7563 7563->7553 7565 7ff6e12174a8 7564->7565 7566 7ff6e12174d8 7565->7566 7568 7ff6e12174e7 7565->7568 7567 7ff6e12154dc _set_errno_from_matherr 7 API calls 7566->7567 7570 7ff6e12174dd __scrt_get_show_window_mode 7567->7570 7571 7ff6e121863c 7568->7571 7570->7558 7572 7ff6e121865b 7571->7572 7573 7ff6e1218651 7571->7573 7575 7ff6e1218660 7572->7575 7581 7ff6e1218667 abort 7572->7581 7582 7ff6e121429c 7573->7582 7576 7ff6e121425c __vcrt_freefls 7 API calls 7575->7576 7580 7ff6e1218659 7576->7580 7577 7ff6e12186a6 7578 7ff6e12154dc _set_errno_from_matherr 7 API calls 7577->7578 7578->7580 7579 7ff6e1218690 RtlReAllocateHeap 7579->7580 7579->7581 7580->7570 7581->7577 7581->7579 7583 7ff6e12142e7 7582->7583 7584 7ff6e12142ab abort 7582->7584 7586 7ff6e12154dc _set_errno_from_matherr 7 API calls 7583->7586 7584->7583 7585 7ff6e12142ce RtlAllocateHeap 7584->7585 7585->7584 7587 7ff6e12142e5 7585->7587 7586->7587 7587->7580 7755 7ff6e121adf0 7758 7ff6e121319c 7755->7758 7757 7ff6e121ae06 7759 7ff6e1214f64 _invalid_parameter_noinfo 7 API calls 7758->7759 7760 7ff6e12131ba _invalid_parameter_noinfo 7759->7760 7760->7757 7271 7ff6e1212ef4 7273 7ff6e1212f64 _invalid_parameter_noinfo 7271->7273 7277 7ff6e1212f1a __scrt_is_managed_app 7271->7277 7272 7ff6e1212fe8 7274 7ff6e1213044 7272->7274 7284 7ff6e1213060 7272->7284 7273->7272 7281 7ff6e1214008 7273->7281 7277->7273 7279 7ff6e12130ac GetModuleHandleExW 7277->7279 7280 7ff6e12130d6 _invalid_parameter_noinfo try_get_function 7279->7280 7280->7273 7291 7ff6e1213c7c 7281->7291 7283 7ff6e121403d 7283->7272 7295 7ff6e1214a8c 7284->7295 7286 7ff6e121306d 7287 7ff6e1213099 7286->7287 7288 7ff6e1213088 GetCurrentProcess TerminateProcess 7286->7288 7289 7ff6e12130ac GetModuleHandleExW 7287->7289 7288->7287 7290 7ff6e12130a0 ExitProcess 7289->7290 7294 7ff6e1213ca5 _invalid_parameter_noinfo 7291->7294 7292 7ff6e121425c __vcrt_freefls 7 API calls 7293 7ff6e1213cb1 7292->7293 7293->7283 7294->7292 7294->7293 7296 7ff6e1214aaa 7295->7296 7298 7ff6e1214aa2 _invalid_parameter_noinfo 7295->7298 7297 7ff6e1214574 __vcrt_uninitialize_ptd 2 API calls 7296->7297 7297->7298 7298->7286 7588 7ff6e1214174 7589 7ff6e121418d 7588->7589 7593 7ff6e12141a5 7588->7593 7591 7ff6e121425c __vcrt_freefls 7 API calls 7589->7591 7589->7593 7590 7ff6e121425c __vcrt_freefls 7 API calls 7592 7ff6e12141b8 7590->7592 7591->7593 7594 7ff6e121425c __vcrt_freefls 7 API calls 7592->7594 7593->7590 7595 7ff6e12141cd 7594->7595 7596 7ff6e121425c __vcrt_freefls 7 API calls 7595->7596 7597 7ff6e12141e0 7596->7597 7598 7ff6e121425c __vcrt_freefls 7 API calls 7597->7598 7599 7ff6e12141f3 7598->7599 7761 7ff6e12181f4 7764 7ff6e12161d0 7761->7764 7765 7ff6e12161dd 7764->7765 7766 7ff6e12161e9 7764->7766 7768 7ff6e1216018 7765->7768 7769 7ff6e1214ed0 abort 18 API calls 7768->7769 7770 7ff6e1216031 7769->7770 7771 7ff6e12161f8 18 API calls 7770->7771 7772 7ff6e121603a 7771->7772 7788 7ff6e1215d24 7772->7788 7775 7ff6e1216054 7775->7766 7776 7ff6e121429c _onexit 8 API calls 7779 7ff6e1216065 7776->7779 7777 7ff6e1216100 7778 7ff6e121425c __vcrt_freefls 7 API calls 7777->7778 7778->7775 7779->7777 7795 7ff6e12162b8 7779->7795 7782 7ff6e12160fb 7783 7ff6e12154dc _set_errno_from_matherr 7 API calls 7782->7783 7783->7777 7784 7ff6e121615d 7784->7777 7805 7ff6e1215ad4 7784->7805 7785 7ff6e1216120 7785->7784 7786 7ff6e121425c __vcrt_freefls 7 API calls 7785->7786 7786->7784 7789 7ff6e121442c 18 API calls 7788->7789 7790 7ff6e1215d38 7789->7790 7791 7ff6e1215d56 7790->7791 7792 7ff6e1215d44 GetOEMCP 7790->7792 7793 7ff6e1215d6b 7791->7793 7794 7ff6e1215d5b GetACP 7791->7794 7792->7793 7793->7775 7793->7776 7794->7793 7796 7ff6e1215d24 20 API calls 7795->7796 7797 7ff6e12162e5 7796->7797 7798 7ff6e12162ed 7797->7798 7799 7ff6e121632f IsValidCodePage 7797->7799 7804 7ff6e1216355 __scrt_get_show_window_mode 7797->7804 7801 7ff6e1211540 _handle_error 3 API calls 7798->7801 7799->7798 7800 7ff6e1216340 GetCPInfo 7799->7800 7800->7798 7800->7804 7802 7ff6e12160f4 7801->7802 7802->7782 7802->7785 7809 7ff6e1215e34 GetCPInfo 7804->7809 7806 7ff6e1215af0 7805->7806 7874 7ff6e1215b0c 7806->7874 7808 7ff6e1215af9 7808->7777 7810 7ff6e1215e7d 7809->7810 7818 7ff6e1215f5d 7809->7818 7819 7ff6e1216ee0 7810->7819 7813 7ff6e1211540 _handle_error 3 API calls 7815 7ff6e1216001 7813->7815 7815->7798 7817 7ff6e1218568 23 API calls 7817->7818 7818->7813 7820 7ff6e121442c 18 API calls 7819->7820 7821 7ff6e1216f22 MultiByteToWideChar 7820->7821 7823 7ff6e1216f67 7821->7823 7824 7ff6e1216f60 7821->7824 7825 7ff6e121429c _onexit 8 API calls 7823->7825 7829 7ff6e1216f95 __scrt_get_show_window_mode 7823->7829 7826 7ff6e1211540 _handle_error 3 API calls 7824->7826 7825->7829 7828 7ff6e1215ef1 7826->7828 7827 7ff6e1217040 7827->7824 7832 7ff6e121425c __vcrt_freefls 7 API calls 7827->7832 7833 7ff6e1218568 7828->7833 7829->7827 7830 7ff6e1217005 MultiByteToWideChar 7829->7830 7830->7827 7831 7ff6e1217026 GetStringTypeW 7830->7831 7831->7827 7832->7824 7834 7ff6e121442c 18 API calls 7833->7834 7835 7ff6e121858d 7834->7835 7838 7ff6e121820c 7835->7838 7839 7ff6e121824e 7838->7839 7840 7ff6e1218272 MultiByteToWideChar 7839->7840 7841 7ff6e121851d 7840->7841 7842 7ff6e12182a4 7840->7842 7843 7ff6e1211540 _handle_error 3 API calls 7841->7843 7846 7ff6e121429c _onexit 8 API calls 7842->7846 7849 7ff6e12182dc 7842->7849 7844 7ff6e1215f24 7843->7844 7844->7817 7845 7ff6e1218340 MultiByteToWideChar 7847 7ff6e1218366 7845->7847 7851 7ff6e12183f1 7845->7851 7846->7849 7865 7ff6e12148fc 7847->7865 7849->7845 7849->7851 7850 7ff6e1218398 7850->7851 7853 7ff6e12183ae 7850->7853 7854 7ff6e1218400 7850->7854 7851->7841 7852 7ff6e121425c __vcrt_freefls 7 API calls 7851->7852 7852->7841 7853->7851 7857 7ff6e12148fc 3 API calls 7853->7857 7855 7ff6e121842b 7854->7855 7856 7ff6e121429c _onexit 8 API calls 7854->7856 7855->7851 7858 7ff6e12148fc 3 API calls 7855->7858 7856->7855 7857->7851 7859 7ff6e12184be 7858->7859 7860 7ff6e12184f4 7859->7860 7861 7ff6e12184e8 WideCharToMultiByte 7859->7861 7860->7851 7862 7ff6e121425c __vcrt_freefls 7 API calls 7860->7862 7861->7860 7863 7ff6e1218554 7861->7863 7862->7851 7863->7851 7864 7ff6e121425c __vcrt_freefls 7 API calls 7863->7864 7864->7851 7866 7ff6e1214574 __vcrt_uninitialize_ptd 2 API calls 7865->7866 7867 7ff6e121493f 7866->7867 7870 7ff6e1214947 _invalid_parameter_noinfo 7867->7870 7871 7ff6e12149ec 7867->7871 7869 7ff6e12149a8 LCMapStringW 7869->7870 7870->7850 7872 7ff6e1214574 __vcrt_uninitialize_ptd 2 API calls 7871->7872 7873 7ff6e1214a1f _invalid_parameter_noinfo 7872->7873 7873->7869 7875 7ff6e1215b78 __scrt_get_show_window_mode 7874->7875 7876 7ff6e1215b8f 7874->7876 7880 7ff6e12154dc _set_errno_from_matherr 7 API calls 7875->7880 7882 7ff6e1215bd0 __scrt_get_show_window_mode 7875->7882 7877 7ff6e12154dc _set_errno_from_matherr 7 API calls 7876->7877 7878 7ff6e1215ba3 7877->7878 7879 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7878->7879 7879->7875 7881 7ff6e1215c34 7880->7881 7883 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7881->7883 7884 7ff6e12154dc _set_errno_from_matherr 7 API calls 7882->7884 7885 7ff6e1215c5b 7882->7885 7883->7882 7887 7ff6e1215cb9 7884->7887 7886 7ff6e1215cef 7885->7886 7888 7ff6e121425c __vcrt_freefls 7 API calls 7885->7888 7886->7808 7889 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7887->7889 7888->7886 7889->7885 7376 7ff6e121af16 7377 7ff6e1217ce8 RtlLeaveCriticalSection 7376->7377 7378 7ff6e121af28 7377->7378 7890 7ff6e12123d8 7893 7ff6e1212416 _IsNonwritableInCurrentImage __C_specific_handler 7890->7893 7891 7ff6e12124f9 7892 7ff6e12124c4 RtlUnwindEx 7892->7893 7893->7891 7893->7892 7909 7ff6e1212018 7910 7ff6e12127e0 __std_exception_copy 8 API calls 7909->7910 7911 7ff6e1212044 7910->7911 7912 7ff6e121a21c 7913 7ff6e121a237 7912->7913 7914 7ff6e121a231 CloseHandle 7912->7914 7914->7913 7600 7ff6e1216560 GetCommandLineA GetCommandLineW 7601 7ff6e1216b60 7602 7ff6e1216b6c 7601->7602 7604 7ff6e1216b93 7602->7604 7605 7ff6e12166b8 7602->7605 7606 7ff6e12166f8 7605->7606 7607 7ff6e12166bd 7605->7607 7606->7602 7608 7ff6e12166de RtlDeleteCriticalSection 7607->7608 7609 7ff6e12166f0 7607->7609 7608->7608 7608->7609 7610 7ff6e121425c __vcrt_freefls 7 API calls 7609->7610 7610->7606 7611 7ff6e1217b60 7612 7ff6e1217b8a 7611->7612 7613 7ff6e12143b4 abort 7 API calls 7612->7613 7614 7ff6e1217ba9 7613->7614 7615 7ff6e121425c __vcrt_freefls 7 API calls 7614->7615 7616 7ff6e1217bb7 7615->7616 7617 7ff6e12143b4 abort 7 API calls 7616->7617 7621 7ff6e1217be1 7616->7621 7618 7ff6e1217bd3 7617->7618 7620 7ff6e121425c __vcrt_freefls 7 API calls 7618->7620 7619 7ff6e1214884 3 API calls 7619->7621 7620->7621 7621->7619 7622 7ff6e1217bea 7621->7622 7379 7ff6e1216b24 7380 7ff6e1216b34 7379->7380 7387 7ff6e1216708 7380->7387 7382 7ff6e1216b3d 7383 7ff6e1216b4b 7382->7383 7395 7ff6e121693c GetStartupInfoW 7382->7395 7388 7ff6e1216730 7387->7388 7394 7ff6e1216745 7387->7394 7389 7ff6e12154dc _set_errno_from_matherr 7 API calls 7388->7389 7390 7ff6e1216735 7389->7390 7391 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7390->7391 7392 7ff6e1216741 7391->7392 7392->7382 7394->7392 7406 7ff6e1216620 7394->7406 7396 7ff6e1216a09 7395->7396 7397 7ff6e1216971 7395->7397 7401 7ff6e1216a28 7396->7401 7397->7396 7398 7ff6e1216708 8 API calls 7397->7398 7399 7ff6e121699a 7398->7399 7399->7396 7400 7ff6e12169c4 GetFileType 7399->7400 7400->7399 7403 7ff6e1216a42 7401->7403 7402 7ff6e1216b0d 7402->7383 7403->7402 7404 7ff6e1216a9a GetStdHandle 7403->7404 7404->7403 7405 7ff6e1216aad GetFileType 7404->7405 7405->7403 7407 7ff6e12143b4 abort 7 API calls 7406->7407 7408 7ff6e1216640 7407->7408 7409 7ff6e1216693 7408->7409 7412 7ff6e1214884 3 API calls 7408->7412 7410 7ff6e121425c __vcrt_freefls 7 API calls 7409->7410 7411 7ff6e121669d 7410->7411 7411->7394 7412->7408 7894 7ff6e12129e4 7895 7ff6e12129ed 7894->7895 7896 7ff6e12129fe 7894->7896 7895->7896 7897 7ff6e121425c __vcrt_freefls 7 API calls 7895->7897 7897->7896 7915 7ff6e1218609 7916 7ff6e12154dc _set_errno_from_matherr 7 API calls 7915->7916 7917 7ff6e121860e 7916->7917 7918 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7917->7918 7919 7ff6e1218619 7918->7919 7302 7ff6e1213acc 7303 7ff6e1213afc 7302->7303 7304 7ff6e1213ae2 7302->7304 7306 7ff6e1217438 7304->7306 7307 7ff6e1217457 7306->7307 7308 7ff6e121744a Concurrency::details::SchedulerProxy::DeleteThis 7306->7308 7307->7303 7308->7307 7309 7ff6e1217120 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7308->7309 7309->7307 6723 7ff6e1242990 6726 7ff6e1242a00 6723->6726 6727 7ff6e1242a05 6726->6727 6728 7ff6e1242aed LoadLibraryA 6727->6728 6731 7ff6e1242b37 VirtualProtect VirtualProtect 6727->6731 6733 7ff6e1242b07 6728->6733 6729 7ff6e1242b10 GetProcAddress 6729->6733 6734 7ff6e1242b31 ExitProcess 6729->6734 6732 7ff6e1242bc5 6731->6732 6732->6732 6733->6727 6733->6729 7413 7ff6e1215510 7414 7ff6e1215546 7413->7414 7423 7ff6e121555c 7413->7423 7415 7ff6e12154dc _set_errno_from_matherr 7 API calls 7414->7415 7416 7ff6e121554b 7415->7416 7418 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7416->7418 7417 7ff6e12155c8 7443 7ff6e121356c 7417->7443 7431 7ff6e1215555 7418->7431 7420 7ff6e121563c 7424 7ff6e12156b6 7420->7424 7433 7ff6e121572a 7420->7433 7449 7ff6e1215340 7420->7449 7422 7ff6e1211540 _handle_error 3 API calls 7425 7ff6e121570f 7422->7425 7423->7417 7428 7ff6e12155bb 7423->7428 7434 7ff6e1215740 7423->7434 7426 7ff6e121425c __vcrt_freefls 7 API calls 7424->7426 7426->7428 7427 7ff6e12156f8 7430 7ff6e121425c __vcrt_freefls 7 API calls 7427->7430 7428->7427 7429 7ff6e121425c __vcrt_freefls 7 API calls 7428->7429 7429->7428 7430->7431 7431->7422 7435 7ff6e1215772 7434->7435 7435->7435 7436 7ff6e12143b4 abort 7 API calls 7435->7436 7437 7ff6e12157bd 7436->7437 7438 7ff6e1215340 7 API calls 7437->7438 7439 7ff6e12157ef __scrt_get_show_window_mode 7438->7439 7440 7ff6e121590e FindFirstFileExW 7439->7440 7441 7ff6e121597d 7440->7441 7442 7ff6e1215740 7 API calls 7441->7442 7444 7ff6e1213587 7443->7444 7445 7ff6e121358b 7443->7445 7444->7420 7445->7444 7446 7ff6e12143b4 abort 7 API calls 7445->7446 7447 7ff6e12135ba 7446->7447 7448 7ff6e121425c __vcrt_freefls 7 API calls 7447->7448 7448->7444 7454 7ff6e1215355 7449->7454 7450 7ff6e121535a 7451 7ff6e1215370 7450->7451 7452 7ff6e12154dc _set_errno_from_matherr 7 API calls 7450->7452 7451->7420 7453 7ff6e1215364 7452->7453 7455 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7453->7455 7454->7450 7454->7451 7456 7ff6e12153a1 7454->7456 7455->7451 7456->7451 7457 7ff6e12154dc _set_errno_from_matherr 7 API calls 7456->7457 7457->7453 7623 7ff6e1214d50 7624 7ff6e1214d6a 7623->7624 7625 7ff6e1214d55 7623->7625 7629 7ff6e1214d70 7625->7629 7628 7ff6e121425c __vcrt_freefls 7 API calls 7628->7624 7630 7ff6e1214dba 7629->7630 7631 7ff6e1214db2 7629->7631 7633 7ff6e121425c __vcrt_freefls 7 API calls 7630->7633 7632 7ff6e121425c __vcrt_freefls 7 API calls 7631->7632 7632->7630 7634 7ff6e1214dc7 7633->7634 7635 7ff6e121425c __vcrt_freefls 7 API calls 7634->7635 7636 7ff6e1214dd4 7635->7636 7637 7ff6e121425c __vcrt_freefls 7 API calls 7636->7637 7638 7ff6e1214de1 7637->7638 7639 7ff6e121425c __vcrt_freefls 7 API calls 7638->7639 7640 7ff6e1214dee 7639->7640 7641 7ff6e121425c __vcrt_freefls 7 API calls 7640->7641 7642 7ff6e1214dfb 7641->7642 7643 7ff6e121425c __vcrt_freefls 7 API calls 7642->7643 7644 7ff6e1214e08 7643->7644 7645 7ff6e121425c __vcrt_freefls 7 API calls 7644->7645 7646 7ff6e1214e15 7645->7646 7647 7ff6e121425c __vcrt_freefls 7 API calls 7646->7647 7648 7ff6e1214e25 7647->7648 7649 7ff6e121425c __vcrt_freefls 7 API calls 7648->7649 7650 7ff6e1214e35 7649->7650 7655 7ff6e1214b58 7650->7655 7652 7ff6e1214e4a 7659 7ff6e1214c40 7652->7659 7654 7ff6e1214d62 7654->7628 7657 7ff6e1214b74 7655->7657 7656 7ff6e1214ba4 7656->7652 7657->7656 7658 7ff6e121425c __vcrt_freefls 7 API calls 7657->7658 7658->7656 7660 7ff6e1214c5c 7659->7660 7661 7ff6e1214e68 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7660->7661 7662 7ff6e1214c6a 7661->7662 7662->7654 6746 7ff6e1211654 6761 7ff6e12119c8 6746->6761 6750 7ff6e1211676 __scrt_acquire_startup_lock 6751 7ff6e1211d58 __scrt_fastfail 6 API calls 6750->6751 6756 7ff6e121169b __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 6750->6756 6751->6756 6752 7ff6e12116c0 6753 7ff6e121174a 6767 7ff6e1211ea0 6753->6767 6755 7ff6e121174f 6770 7ff6e1211480 6755->6770 6756->6752 6756->6753 6785 7ff6e121314c 6756->6785 6759 7ff6e121176b __scrt_is_managed_app 6790 7ff6e1211ba0 6759->6790 6762 7ff6e12119ea __isa_available_init 6761->6762 6794 7ff6e12125d4 6762->6794 6764 7ff6e12119ef __scrt_initialize_crt 6766 7ff6e1211668 6764->6766 6802 7ff6e1212608 6764->6802 6766->6750 6777 7ff6e1211d58 IsProcessorFeaturePresent 6766->6777 6852 7ff6e1212640 6767->6852 6769 7ff6e1211eb7 GetStartupInfoW 6769->6755 6854 7ff6e1211310 FindResourceW 6770->6854 6773 7ff6e121151c 6773->6759 6774 7ff6e12114a0 VirtualAlloc 6870 7ff6e121a990 6774->6870 6778 7ff6e1211d7d __scrt_get_show_window_mode 6777->6778 6779 7ff6e1211d99 RtlCaptureContext 6778->6779 6780 7ff6e1211dbd capture_previous_context 6779->6780 6781 7ff6e1211dc2 RtlVirtualUnwind 6780->6781 6782 7ff6e1211dfe __scrt_get_show_window_mode 6780->6782 6781->6782 6783 7ff6e1211e30 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6782->6783 6784 7ff6e1211e82 6783->6784 6784->6750 6786 7ff6e1213178 6785->6786 6787 7ff6e121318a 6785->6787 6786->6753 7014 7ff6e121422c 6787->7014 6792 7ff6e1211bb1 __scrt_uninitialize_crt 6790->6792 6791 7ff6e1211bc3 6791->6752 6792->6791 6793 7ff6e1212608 __vcrt_uninitialize 4 API calls 6792->6793 6793->6791 6795 7ff6e12125dd __vcrt_initialize_pure_virtual_call_handler __vcrt_initialize_winapi_thunks 6794->6795 6808 7ff6e1212a68 6795->6808 6798 7ff6e12125eb 6798->6764 6803 7ff6e1212610 6802->6803 6804 7ff6e121261a __vcrt_uninitialize_winapi_thunks 6802->6804 6805 7ff6e1212a44 __vcrt_uninitialize_ptd 3 API calls 6803->6805 6804->6766 6806 7ff6e1212615 6805->6806 6807 7ff6e1212ab0 __vcrt_uninitialize_locks RtlDeleteCriticalSection 6806->6807 6807->6804 6809 7ff6e1212a70 6808->6809 6811 7ff6e1212aa1 6809->6811 6812 7ff6e12125e7 6809->6812 6825 7ff6e1212dc0 6809->6825 6813 7ff6e1212ab0 __vcrt_uninitialize_locks RtlDeleteCriticalSection 6811->6813 6812->6798 6814 7ff6e1212a04 6812->6814 6813->6812 6835 7ff6e1212cb0 6814->6835 6816 7ff6e1212a14 6817 7ff6e12125f4 6816->6817 6838 7ff6e1212d58 6816->6838 6817->6798 6821 7ff6e1212ab0 6817->6821 6819 7ff6e1212a31 6819->6817 6843 7ff6e1212a44 6819->6843 6822 7ff6e1212adb 6821->6822 6823 7ff6e1212abe RtlDeleteCriticalSection 6822->6823 6824 7ff6e1212adf 6822->6824 6823->6822 6824->6798 6830 7ff6e1212ae8 6825->6830 6827 7ff6e1212dfb 6828 7ff6e1212e17 InitializeCriticalSectionAndSpinCount 6827->6828 6829 7ff6e1212e03 6827->6829 6828->6829 6829->6809 6831 7ff6e1212b4e try_get_function 6830->6831 6834 7ff6e1212b49 try_get_function 6830->6834 6831->6827 6832 7ff6e1212b81 LoadLibraryExW 6832->6834 6833 7ff6e1212bb2 LoadLibraryExW 6833->6834 6834->6831 6834->6832 6834->6833 6836 7ff6e1212ae8 try_get_function 2 API calls 6835->6836 6837 7ff6e1212cdc __vcrt_FlsAlloc 6836->6837 6837->6816 6839 7ff6e1212ae8 try_get_function 2 API calls 6838->6839 6840 7ff6e1212d8b 6839->6840 6841 7ff6e1212da4 TlsSetValue 6840->6841 6842 7ff6e1212d93 6840->6842 6841->6842 6842->6819 6844 7ff6e1212a58 6843->6844 6845 7ff6e1212a53 6843->6845 6844->6817 6847 7ff6e1212d04 6845->6847 6848 7ff6e1212ae8 try_get_function 2 API calls 6847->6848 6849 7ff6e1212d2f 6848->6849 6850 7ff6e1212d45 TlsFree 6849->6850 6851 7ff6e1212d37 6849->6851 6850->6851 6851->6844 6853 7ff6e121265e 6852->6853 6853->6769 6853->6853 6855 7ff6e121134f SizeofResource 6854->6855 6869 7ff6e1211378 6854->6869 6856 7ff6e1211368 LoadResource 6855->6856 6855->6869 6858 7ff6e121137f LockResource 6856->6858 6856->6869 6860 7ff6e121139c 6858->6860 6858->6869 6859 7ff6e121146f 6859->6773 6859->6774 6861 7ff6e1211410 6860->6861 6872 7ff6e1211190 CreateToolhelp32Snapshot 6860->6872 6863 7ff6e1211419 6861->6863 6864 7ff6e1211414 6861->6864 6881 7ff6e1211564 6863->6881 6894 7ff6e1211250 6864->6894 6867 7ff6e1211428 6902 7ff6e1211000 6867->6902 6887 7ff6e1211540 6869->6887 6871 7ff6e12114d5 CreateEventW CreateThreadpoolWait TpSetWait WaitForSingleObject 6870->6871 6871->6773 6873 7ff6e12111bf __scrt_get_show_window_mode 6872->6873 6880 7ff6e1211214 6872->6880 6875 7ff6e12111e1 Process32FirstW 6873->6875 6874 7ff6e1211540 _handle_error 3 API calls 6876 7ff6e1211231 6874->6876 6877 7ff6e121123a 6875->6877 6878 7ff6e12111f5 6875->6878 6876->6861 6879 7ff6e1211200 Process32NextW 6878->6879 6879->6879 6879->6880 6880->6874 6880->6877 6883 7ff6e1211950 abort 6881->6883 6884 7ff6e1211986 6883->6884 6906 7ff6e1213c38 6883->6906 6912 7ff6e1212188 6883->6912 6916 7ff6e1212168 6883->6916 6884->6867 6888 7ff6e121154a 6887->6888 6889 7ff6e1211556 6888->6889 6890 7ff6e1211808 IsProcessorFeaturePresent 6888->6890 6889->6859 6891 7ff6e121181f 6890->6891 7010 7ff6e12118dc RtlCaptureContext 6891->7010 6893 7ff6e1211832 6893->6859 6895 7ff6e1212640 __scrt_get_show_window_mode 6894->6895 6896 7ff6e121127b GetModuleFileNameA RegCreateKeyA 6895->6896 6897 7ff6e12112ab RegSetValueExA RegCloseKey 6896->6897 6898 7ff6e12112f1 6896->6898 6897->6898 6899 7ff6e1211540 _handle_error 3 API calls 6898->6899 6900 7ff6e1211301 6899->6900 6900->6863 6904 7ff6e1211051 __scrt_get_show_window_mode 6902->6904 6903 7ff6e1211540 _handle_error 3 API calls 6905 7ff6e1211166 6903->6905 6904->6903 6905->6869 6910 7ff6e121429c abort 6906->6910 6907 7ff6e12142e7 6920 7ff6e12154dc 6907->6920 6908 7ff6e12142ce RtlAllocateHeap 6908->6910 6911 7ff6e12142e5 6908->6911 6910->6907 6910->6908 6911->6883 6913 7ff6e1212196 std::bad_alloc::bad_alloc 6912->6913 7005 7ff6e1212898 6913->7005 6915 7ff6e12121a7 6915->6883 6917 7ff6e1212176 std::bad_alloc::bad_alloc 6916->6917 6918 7ff6e1212898 _CxxThrowException 2 API calls 6917->6918 6919 7ff6e1212187 6918->6919 6923 7ff6e1214f64 6920->6923 6924 7ff6e1214f79 try_get_function 6923->6924 6925 7ff6e1214f8d 6924->6925 6942 7ff6e12147c4 6924->6942 6929 7ff6e1214fd6 6925->6929 6947 7ff6e12143b4 6925->6947 6932 7ff6e1214fdb SetLastError 6929->6932 6933 7ff6e1214fe5 SetLastError 6929->6933 6930 7ff6e1214fac 6953 7ff6e121425c 6930->6953 6935 7ff6e1214ff0 6932->6935 6933->6935 6934 7ff6e1214fc3 6934->6930 6938 7ff6e1214fca 6934->6938 6935->6911 6937 7ff6e1214fb3 6937->6932 6962 7ff6e1214c80 6938->6962 6941 7ff6e121425c __vcrt_freefls 5 API calls 6941->6929 6966 7ff6e1214574 6942->6966 6944 7ff6e12147ef 6945 7ff6e1214806 TlsGetValue 6944->6945 6946 7ff6e12147f7 _invalid_parameter_noinfo 6944->6946 6945->6946 6946->6925 6952 7ff6e12143c5 abort 6947->6952 6948 7ff6e1214416 6951 7ff6e12154dc _set_errno_from_matherr 6 API calls 6948->6951 6949 7ff6e12143fa RtlAllocateHeap 6950 7ff6e1214414 6949->6950 6949->6952 6950->6930 6957 7ff6e121481c 6950->6957 6951->6950 6952->6948 6952->6949 6954 7ff6e1214261 __vcrt_freefls 6953->6954 6956 7ff6e1214281 try_get_function __vcrt_freefls 6953->6956 6955 7ff6e12154dc _set_errno_from_matherr 7 API calls 6954->6955 6954->6956 6955->6956 6956->6937 6958 7ff6e1214574 __vcrt_uninitialize_ptd 2 API calls 6957->6958 6959 7ff6e121484f 6958->6959 6960 7ff6e1214869 TlsSetValue 6959->6960 6961 7ff6e1214857 _invalid_parameter_noinfo 6959->6961 6960->6961 6961->6934 6963 7ff6e1214d32 abort 6962->6963 6971 7ff6e1214bb8 6963->6971 6965 7ff6e1214d47 6965->6941 6968 7ff6e12145d5 try_get_function 6966->6968 6969 7ff6e12145d0 try_get_function 6966->6969 6967 7ff6e12145fd LoadLibraryExW 6967->6969 6968->6944 6969->6967 6969->6968 6970 7ff6e1214629 LoadLibraryExW 6969->6970 6970->6969 6972 7ff6e1214bd4 6971->6972 6975 7ff6e1214e68 6972->6975 6974 7ff6e1214bea 6974->6965 6976 7ff6e1214eb0 Concurrency::details::SchedulerProxy::DeleteThis 6975->6976 6977 7ff6e1214e84 Concurrency::details::SchedulerProxy::DeleteThis 6975->6977 6976->6974 6977->6976 6979 7ff6e1217120 6977->6979 6980 7ff6e12171bc 6979->6980 6984 7ff6e1217143 6979->6984 6981 7ff6e121720f 6980->6981 6985 7ff6e121425c __vcrt_freefls 7 API calls 6980->6985 6982 7ff6e12172c0 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6981->6982 6983 7ff6e121721b 6982->6983 6996 7ff6e121727a 6983->6996 7002 7ff6e121425c 7 API calls __vcrt_freefls 6983->7002 6984->6980 6987 7ff6e1217182 6984->6987 6992 7ff6e121425c __vcrt_freefls 7 API calls 6984->6992 6986 7ff6e12171e0 6985->6986 6988 7ff6e121425c __vcrt_freefls 7 API calls 6986->6988 6989 7ff6e12171a4 6987->6989 6995 7ff6e121425c __vcrt_freefls 7 API calls 6987->6995 6990 7ff6e12171f4 6988->6990 6991 7ff6e121425c __vcrt_freefls 7 API calls 6989->6991 6994 7ff6e121425c __vcrt_freefls 7 API calls 6990->6994 6997 7ff6e12171b0 6991->6997 6993 7ff6e1217176 6992->6993 6998 7ff6e1216ba0 __free_lconv_mon 7 API calls 6993->6998 6999 7ff6e1217203 6994->6999 7000 7ff6e1217198 6995->7000 7001 7ff6e121425c __vcrt_freefls 7 API calls 6997->7001 6998->6987 7003 7ff6e121425c __vcrt_freefls 7 API calls 6999->7003 7004 7ff6e1216cac __free_lconv_num 7 API calls 7000->7004 7001->6980 7002->6983 7003->6981 7004->6989 7006 7ff6e1212906 RtlPcToFileHeader 7005->7006 7008 7ff6e12128e4 7005->7008 7007 7ff6e1212946 RaiseException 7006->7007 7009 7ff6e121292b 7006->7009 7007->6915 7008->7006 7009->7007 7011 7ff6e12118f6 capture_previous_context 7010->7011 7012 7ff6e121190c RtlVirtualUnwind 7011->7012 7013 7ff6e1211945 7011->7013 7012->7011 7012->7013 7013->6893 7019 7ff6e1214ed0 7014->7019 7017 7ff6e1214237 _invalid_parameter_noinfo 7039 7ff6e121435c 7017->7039 7020 7ff6e1214ee0 try_get_function 7019->7020 7021 7ff6e1214ef2 7020->7021 7022 7ff6e12147c4 abort 3 API calls 7020->7022 7023 7ff6e12143b4 abort 7 API calls 7021->7023 7025 7ff6e1214f3b 7021->7025 7022->7021 7024 7ff6e1214f09 7023->7024 7026 7ff6e1214f11 7024->7026 7029 7ff6e121481c abort 3 API calls 7024->7029 7027 7ff6e1214f56 SetLastError 7025->7027 7028 7ff6e1214f40 SetLastError 7025->7028 7031 7ff6e121425c __vcrt_freefls 7 API calls 7026->7031 7030 7ff6e121435c abort 16 API calls 7027->7030 7028->7017 7032 7ff6e1214f28 7029->7032 7033 7ff6e1214f63 7030->7033 7034 7ff6e1214f18 7031->7034 7032->7026 7035 7ff6e1214f2f 7032->7035 7034->7027 7036 7ff6e1214c80 abort 7 API calls 7035->7036 7037 7ff6e1214f34 7036->7037 7038 7ff6e121425c __vcrt_freefls 7 API calls 7037->7038 7038->7025 7040 7ff6e1214365 abort 7039->7040 7041 7ff6e1214374 7040->7041 7047 7ff6e12176e4 7040->7047 7043 7ff6e121437d IsProcessorFeaturePresent 7041->7043 7045 7ff6e12143a6 abort 7041->7045 7044 7ff6e121438b 7043->7044 7064 7ff6e1215064 7044->7064 7048 7ff6e1217711 7047->7048 7054 7ff6e121778e abort 7047->7054 7049 7ff6e1214f64 _invalid_parameter_noinfo 7 API calls 7048->7049 7050 7ff6e1217729 7048->7050 7048->7054 7049->7050 7051 7ff6e1217736 7050->7051 7050->7054 7063 7ff6e1217745 7050->7063 7052 7ff6e12154dc _set_errno_from_matherr 7 API calls 7051->7052 7053 7ff6e1217781 7052->7053 7073 7ff6e1215270 7053->7073 7055 7ff6e121788d 7054->7055 7057 7ff6e1214ed0 abort 18 API calls 7054->7057 7058 7ff6e1214ed0 abort 18 API calls 7055->7058 7061 7ff6e1217918 7055->7061 7055->7063 7059 7ff6e121787a 7057->7059 7058->7061 7060 7ff6e1214ed0 abort 18 API calls 7059->7060 7060->7055 7062 7ff6e1214ed0 abort 18 API calls 7061->7062 7061->7063 7062->7063 7063->7041 7065 7ff6e121509e abort __scrt_get_show_window_mode 7064->7065 7066 7ff6e12150c6 RtlCaptureContext 7065->7066 7067 7ff6e12150fb capture_previous_context 7066->7067 7068 7ff6e1215136 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7067->7068 7069 7ff6e1215100 RtlVirtualUnwind 7067->7069 7072 7ff6e1215188 abort 7068->7072 7069->7068 7070 7ff6e1211540 _handle_error 3 API calls 7071 7ff6e12151a7 7070->7071 7071->7045 7072->7070 7076 7ff6e12151c8 7073->7076 7077 7ff6e1214f64 _invalid_parameter_noinfo 7 API calls 7076->7077 7078 7ff6e12151f2 _invalid_parameter_noinfo 7077->7078 7079 7ff6e12151c8 _invalid_parameter_noinfo 7 API calls 7078->7079 7080 7ff6e1215289 7079->7080 7080->7063 7081 7ff6e1211638 7082 7ff6e1211641 7081->7082 7083 7ff6e12154dc _set_errno_from_matherr 7 API calls 7082->7083 7086 7ff6e1213ba1 7082->7086 7084 7ff6e1213b96 7083->7084 7085 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7084->7085 7085->7086 7087 7ff6e1212078 7090 7ff6e12127e0 7087->7090 7089 7ff6e12120a4 7091 7ff6e1212801 7090->7091 7094 7ff6e1212836 __std_exception_copy 7090->7094 7092 7ff6e1213c38 __std_exception_copy 8 API calls 7091->7092 7091->7094 7093 7ff6e121281f 7092->7093 7093->7094 7096 7ff6e12142fc 7093->7096 7094->7089 7097 7ff6e1214309 7096->7097 7098 7ff6e1214313 7096->7098 7097->7098 7103 7ff6e121432e 7097->7103 7099 7ff6e12154dc _set_errno_from_matherr 7 API calls 7098->7099 7100 7ff6e121431a 7099->7100 7101 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7100->7101 7102 7ff6e1214326 7101->7102 7102->7094 7103->7102 7104 7ff6e12154dc _set_errno_from_matherr 7 API calls 7103->7104 7104->7100 7663 7ff6e1211f39 7664 7ff6e1211f6b 7663->7664 7665 7ff6e1211f4f 7663->7665 7665->7664 7666 7ff6e121422c 18 API calls 7665->7666 7667 7ff6e1211f77 7666->7667 7310 7ff6e12194bb 7311 7ff6e12194fb 7310->7311 7312 7ff6e1219760 7310->7312 7311->7312 7313 7ff6e1219742 7311->7313 7315 7ff6e121952f 7311->7315 7314 7ff6e1219756 7312->7314 7317 7ff6e1219f10 _log10_special 11 API calls 7312->7317 7318 7ff6e1219f10 7313->7318 7317->7314 7321 7ff6e1219f30 7318->7321 7322 7ff6e1219f4a 7321->7322 7323 7ff6e1219f2b 7322->7323 7325 7ff6e1219d70 7322->7325 7323->7314 7326 7ff6e1219db0 _ctrlfp _handle_error 7325->7326 7327 7ff6e1219e1c _handle_error 7326->7327 7336 7ff6e121a2a0 7326->7336 7329 7ff6e1219e59 7327->7329 7330 7ff6e1219e29 7327->7330 7343 7ff6e121a5d0 7329->7343 7339 7ff6e1219c4c 7330->7339 7333 7ff6e1219e57 _ctrlfp 7334 7ff6e1211540 _handle_error 3 API calls 7333->7334 7335 7ff6e1219e81 7334->7335 7335->7323 7349 7ff6e121a2c8 7336->7349 7340 7ff6e1219c90 _ctrlfp _handle_error 7339->7340 7341 7ff6e1219ca5 7340->7341 7342 7ff6e121a5d0 _set_errno_from_matherr 7 API calls 7340->7342 7341->7333 7342->7341 7344 7ff6e121a5d9 7343->7344 7345 7ff6e121a5ee 7343->7345 7346 7ff6e121a5e6 7344->7346 7348 7ff6e12154dc _set_errno_from_matherr 7 API calls 7344->7348 7347 7ff6e12154dc _set_errno_from_matherr 7 API calls 7345->7347 7346->7333 7347->7346 7348->7346 7350 7ff6e121a307 _raise_exc _clrfp 7349->7350 7351 7ff6e121a51a RaiseException 7350->7351 7352 7ff6e121a2c2 7351->7352 7352->7327 7353 7ff6e12144bc 7354 7ff6e12144c4 7353->7354 7356 7ff6e12144f5 7354->7356 7358 7ff6e12144f1 7354->7358 7359 7ff6e1214884 7354->7359 7364 7ff6e1214520 7356->7364 7360 7ff6e1214574 __vcrt_uninitialize_ptd 2 API calls 7359->7360 7361 7ff6e12148bf 7360->7361 7362 7ff6e12148dc InitializeCriticalSectionAndSpinCount 7361->7362 7363 7ff6e12148c7 _invalid_parameter_noinfo 7361->7363 7362->7363 7363->7354 7365 7ff6e121454b 7364->7365 7366 7ff6e121452e RtlDeleteCriticalSection 7365->7366 7367 7ff6e121454f 7365->7367 7366->7365 7367->7358 7105 7ff6e1217c80 7115 7ff6e12187e4 7105->7115 7107 7ff6e1217c8b 7121 7ff6e1218914 7107->7121 7109 7ff6e1217c90 7127 7ff6e12189c8 7109->7127 7112 7ff6e1217cc1 7113 7ff6e121425c __vcrt_freefls 7 API calls 7112->7113 7114 7ff6e1217ccd 7113->7114 7116 7ff6e12187f0 7115->7116 7118 7ff6e12188aa 7116->7118 7120 7ff6e1218798 36 API calls 7116->7120 7131 7ff6e1217cdc RtlEnterCriticalSection 7116->7131 7133 7ff6e1217ce8 RtlLeaveCriticalSection 7116->7133 7118->7107 7120->7116 7126 7ff6e121892d 7121->7126 7122 7ff6e12189ad 7122->7109 7123 7ff6e1218978 RtlDeleteCriticalSection 7125 7ff6e121425c __vcrt_freefls 7 API calls 7123->7125 7125->7126 7126->7122 7126->7123 7135 7ff6e1219b84 7126->7135 7128 7ff6e12189db 7127->7128 7129 7ff6e1217ca2 RtlDeleteCriticalSection 7127->7129 7128->7129 7130 7ff6e121425c __vcrt_freefls 7 API calls 7128->7130 7129->7109 7129->7112 7130->7129 7132 7ff6e121b130 7131->7132 7134 7ff6e121b138 7133->7134 7136 7ff6e1219bb7 7135->7136 7137 7ff6e1219ba2 7135->7137 7139 7ff6e1219bb2 7136->7139 7141 7ff6e1217cdc RtlEnterCriticalSection 7136->7141 7138 7ff6e12154dc _set_errno_from_matherr 7 API calls 7137->7138 7140 7ff6e1219ba7 7138->7140 7139->7126 7143 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7140->7143 7142 7ff6e1219bcd 7141->7142 7147 7ff6e1219b00 7142->7147 7143->7139 7145 7ff6e1219bd6 7146 7ff6e1217ce8 RtlLeaveCriticalSection 7145->7146 7146->7139 7148 7ff6e1219b27 7147->7148 7149 7ff6e1219b12 7147->7149 7161 7ff6e1219b22 7148->7161 7163 7ff6e1218720 7148->7163 7150 7ff6e12154dc _set_errno_from_matherr 7 API calls 7149->7150 7152 7ff6e1219b17 7150->7152 7154 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7152->7154 7154->7161 7155 7ff6e12189c8 7 API calls 7156 7ff6e1219b43 7155->7156 7169 7ff6e1217b38 7156->7169 7161->7145 7162 7ff6e121425c __vcrt_freefls 7 API calls 7162->7161 7164 7ff6e121873b 7163->7164 7168 7ff6e1218768 7163->7168 7165 7ff6e1217b38 7 API calls 7164->7165 7164->7168 7166 7ff6e121875b 7165->7166 7190 7ff6e12190e0 7166->7190 7168->7155 7170 7ff6e1217b51 7169->7170 7171 7ff6e1217b41 7169->7171 7175 7ff6e121a03c 7170->7175 7172 7ff6e12154dc _set_errno_from_matherr 7 API calls 7171->7172 7173 7ff6e1217b46 7172->7173 7174 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7173->7174 7174->7170 7176 7ff6e121a04c 7175->7176 7177 7ff6e121a061 7175->7177 7178 7ff6e12154bc 7 API calls 7176->7178 7179 7ff6e121a0bd 7177->7179 7182 7ff6e121a090 7177->7182 7181 7ff6e121a051 7178->7181 7180 7ff6e12154bc 7 API calls 7179->7180 7183 7ff6e121a0c2 7180->7183 7184 7ff6e12154dc _set_errno_from_matherr 7 API calls 7181->7184 7219 7ff6e1219fc8 7182->7219 7186 7ff6e12154dc _set_errno_from_matherr 7 API calls 7183->7186 7187 7ff6e1219b52 7184->7187 7188 7ff6e121a0ca 7186->7188 7187->7161 7187->7162 7189 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7188->7189 7189->7187 7191 7ff6e1219109 7190->7191 7192 7ff6e1219121 7190->7192 7214 7ff6e12154bc 7191->7214 7194 7ff6e1219199 7192->7194 7198 7ff6e1219154 7192->7198 7196 7ff6e12154bc 7 API calls 7194->7196 7197 7ff6e121919e 7196->7197 7200 7ff6e12154dc _set_errno_from_matherr 7 API calls 7197->7200 7217 7ff6e12167c0 RtlEnterCriticalSection 7198->7217 7199 7ff6e12154dc _set_errno_from_matherr 7 API calls 7204 7ff6e1219116 7199->7204 7202 7ff6e12191a6 7200->7202 7205 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7202->7205 7204->7168 7205->7204 7215 7ff6e1214f64 _invalid_parameter_noinfo 7 API calls 7214->7215 7216 7ff6e12154c5 7215->7216 7216->7199 7218 7ff6e121b130 7217->7218 7220 7ff6e12167c0 RtlEnterCriticalSection 7219->7220 7221 7ff6e1219fe4 7220->7221 7222 7ff6e121a017 7221->7222 7223 7ff6e121a00e 7221->7223 7225 7ff6e12154dc _set_errno_from_matherr 7 API calls 7222->7225 7229 7ff6e121a0e0 7223->7229 7226 7ff6e121a013 7225->7226 7243 7ff6e12167e4 RtlLeaveCriticalSection 7226->7243 7245 7ff6e12168c4 7229->7245 7231 7ff6e121a0fa try_get_function 7257 7ff6e1216808 7231->7257 7235 7ff6e12168c4 7 API calls 7238 7ff6e121a127 7235->7238 7236 7ff6e12168c4 7 API calls 7239 7ff6e121a140 CloseHandle 7236->7239 7237 7ff6e121a188 7237->7226 7241 7ff6e12168c4 7 API calls 7238->7241 7239->7231 7242 7ff6e121a134 7241->7242 7242->7231 7242->7236 7244 7ff6e121b138 7243->7244 7246 7ff6e12168cd 7245->7246 7247 7ff6e12168e2 7245->7247 7248 7ff6e12154bc 7 API calls 7246->7248 7249 7ff6e12154bc 7 API calls 7247->7249 7253 7ff6e12168da 7247->7253 7250 7ff6e12168d2 7248->7250 7251 7ff6e121691d 7249->7251 7252 7ff6e12154dc _set_errno_from_matherr 7 API calls 7250->7252 7254 7ff6e12154dc _set_errno_from_matherr 7 API calls 7251->7254 7252->7253 7253->7231 7253->7235 7253->7242 7255 7ff6e1216925 7254->7255 7256 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7255->7256 7256->7253 7258 7ff6e1216896 7257->7258 7260 7ff6e1216824 7257->7260 7259 7ff6e12154dc _set_errno_from_matherr 7 API calls 7258->7259 7261 7ff6e121689b 7259->7261 7260->7258 7265 7ff6e1216857 7260->7265 7262 7ff6e12154bc 7 API calls 7261->7262 7263 7ff6e1216888 7262->7263 7263->7237 7266 7ff6e121546c 7263->7266 7264 7ff6e1216880 SetStdHandle 7264->7263 7265->7263 7265->7264 7267 7ff6e1214f64 _invalid_parameter_noinfo 7 API calls 7266->7267 7268 7ff6e121547d 7267->7268 7269 7ff6e1214f64 _invalid_parameter_noinfo 7 API calls 7268->7269 7270 7ff6e1215496 __vcrt_freefls 7269->7270 7270->7237 7368 7ff6e1217ec0 7369 7ff6e1217eed 7368->7369 7370 7ff6e12154dc _set_errno_from_matherr 7 API calls 7369->7370 7375 7ff6e1217f02 _invalid_parameter_noinfo 7369->7375 7371 7ff6e1217ef7 7370->7371 7372 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7371->7372 7372->7375 7373 7ff6e1211540 _handle_error 3 API calls 7374 7ff6e12181e7 7373->7374 7375->7373 7668 7ff6e1217540 GetProcessHeap 7710 7ff6e1217980 7711 7ff6e12179aa 7710->7711 7714 7ff6e12179b4 7710->7714 7711->7714 7722 7ff6e121442c 7711->7722 7717 7ff6e1217a20 7719 7ff6e1217a5d 7717->7719 7721 7ff6e1217a33 MultiByteToWideChar 7717->7721 7718 7ff6e1217a71 MultiByteToWideChar 7718->7714 7718->7719 7719->7714 7720 7ff6e12154dc _set_errno_from_matherr 7 API calls 7719->7720 7720->7714 7721->7714 7721->7719 7723 7ff6e1214447 7722->7723 7729 7ff6e1214442 7722->7729 7724 7ff6e1214ed0 abort 18 API calls 7723->7724 7723->7729 7725 7ff6e1214464 7724->7725 7733 7ff6e1217ad0 7725->7733 7729->7714 7730 7ff6e12188d4 7729->7730 7731 7ff6e121442c 18 API calls 7730->7731 7732 7ff6e1217a17 7731->7732 7732->7717 7732->7718 7734 7ff6e1217ae5 7733->7734 7736 7ff6e1214488 7733->7736 7734->7736 7741 7ff6e12173c8 7734->7741 7737 7ff6e1217b04 7736->7737 7738 7ff6e1217b19 7737->7738 7739 7ff6e1217b2c 7737->7739 7738->7739 7748 7ff6e12161f8 7738->7748 7739->7729 7742 7ff6e1214ed0 abort 18 API calls 7741->7742 7744 7ff6e12173d7 7742->7744 7743 7ff6e1217429 7743->7736 7744->7743 7745 7ff6e1217438 7 API calls 7744->7745 7746 7ff6e1217412 7745->7746 7746->7743 7747 7ff6e121435c abort 18 API calls 7746->7747 7747->7743 7749 7ff6e1214ed0 abort 18 API calls 7748->7749 7753 7ff6e1216207 7749->7753 7750 7ff6e1216222 7751 7ff6e12162a8 7750->7751 7752 7ff6e121435c abort 18 API calls 7750->7752 7751->7739 7752->7751 7753->7750 7754 7ff6e121425c __vcrt_freefls 7 API calls 7753->7754 7754->7750 7898 7ff6e12117c0 7901 7ff6e1211c34 7898->7901 7902 7ff6e12117c9 7901->7902 7903 7ff6e1211c5c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7901->7903 7903->7902 6735 25959553362 6738 25959553438 LoadLibraryA 6735->6738 6737 2595955336c 6739 2595955347d 6738->6739 6740 25959553481 WSASocketA 6739->6740 6741 259595534a0 connect 6740->6741 6742 259595534c0 recv 6741->6742 6744 259595534b6 6741->6744 6743 2595955354f closesocket 6742->6743 6742->6744 6743->6740 6744->6741 6744->6742 6744->6743 6745 25959553569 6744->6745 6745->6737 7920 7ff6e1211803 7921 7ff6e1211808 IsProcessorFeaturePresent 7920->7921 7922 7ff6e121181f 7921->7922 7923 7ff6e12118dc capture_previous_context 2 API calls 7922->7923 7924 7ff6e1211832 7923->7924 7458 7ff6e1214104 7461 7ff6e121392c 7458->7461 7468 7ff6e12138f4 7461->7468 7469 7ff6e1213909 7468->7469 7470 7ff6e1213904 7468->7470 7472 7ff6e1213910 7469->7472 7471 7ff6e12138b0 7 API calls 7470->7471 7471->7469 7473 7ff6e1213920 7472->7473 7474 7ff6e1213925 7472->7474 7475 7ff6e12138b0 7 API calls 7473->7475 7476 7ff6e12138b0 7474->7476 7475->7474 7480 7ff6e12138b5 7476->7480 7481 7ff6e12138e6 7476->7481 7477 7ff6e12138de 7479 7ff6e121425c __vcrt_freefls 7 API calls 7477->7479 7478 7ff6e121425c __vcrt_freefls 7 API calls 7478->7480 7479->7481 7480->7477 7480->7478 7669 7ff6e1213744 7670 7ff6e121375d 7669->7670 7676 7ff6e1213759 7669->7676 7679 7ff6e1216588 GetEnvironmentStringsW 7670->7679 7673 7ff6e121376a 7675 7ff6e121425c __vcrt_freefls 7 API calls 7673->7675 7675->7676 7678 7ff6e121425c __vcrt_freefls 7 API calls 7678->7673 7680 7ff6e1213762 7679->7680 7682 7ff6e12165ac 7679->7682 7680->7673 7686 7ff6e12137ac 7680->7686 7681 7ff6e121429c _onexit 8 API calls 7683 7ff6e12165de 7681->7683 7682->7681 7682->7682 7684 7ff6e121425c __vcrt_freefls 7 API calls 7683->7684 7685 7ff6e12165fe FreeEnvironmentStringsW 7684->7685 7685->7680 7687 7ff6e12137cd 7686->7687 7688 7ff6e12143b4 abort 7 API calls 7687->7688 7692 7ff6e1213801 7688->7692 7689 7ff6e121425c __vcrt_freefls 7 API calls 7690 7ff6e1213777 7689->7690 7690->7678 7691 7ff6e12143b4 abort 7 API calls 7691->7692 7692->7691 7693 7ff6e1213865 7692->7693 7698 7ff6e1213874 7692->7698 7699 7ff6e121389c 7692->7699 7700 7ff6e121425c __vcrt_freefls 7 API calls 7692->7700 7701 7ff6e12152d8 7692->7701 7695 7ff6e12138b0 7 API calls 7693->7695 7696 7ff6e121386d 7695->7696 7697 7ff6e121425c __vcrt_freefls 7 API calls 7696->7697 7697->7698 7698->7689 7700->7692 7702 7ff6e12152ef 7701->7702 7703 7ff6e12152e5 7701->7703 7704 7ff6e12154dc _set_errno_from_matherr 7 API calls 7702->7704 7703->7702 7706 7ff6e121530b 7703->7706 7709 7ff6e12152f7 7704->7709 7705 7ff6e1215270 _invalid_parameter_noinfo 7 API calls 7707 7ff6e1215303 7705->7707 7706->7707 7708 7ff6e12154dc _set_errno_from_matherr 7 API calls 7706->7708 7707->7692 7708->7709 7709->7705 7925 7ff6e1215a04 7926 7ff6e1215a2c 7925->7926 7927 7ff6e1215a25 7925->7927 7928 7ff6e1215a33 7926->7928 7929 7ff6e1215a65 7926->7929 7930 7ff6e12143b4 abort 7 API calls 7928->7930 7929->7927 7931 7ff6e12174a0 _onexit 9 API calls 7929->7931 7932 7ff6e1215a3e 7930->7932 7933 7ff6e1215a90 7931->7933 7934 7ff6e121425c __vcrt_freefls 7 API calls 7932->7934 7935 7ff6e121425c __vcrt_freefls 7 API calls 7933->7935 7934->7927 7935->7927 7936 7ff6e1215004 7943 7ff6e1214714 7936->7943 7938 7ff6e1215014 7939 7ff6e121501f 7938->7939 7940 7ff6e1214f64 _invalid_parameter_noinfo 7 API calls 7938->7940 7941 7ff6e1215028 7940->7941 7941->7939 7946 7ff6e1215040 7941->7946 7944 7ff6e1214574 __vcrt_uninitialize_ptd 2 API calls 7943->7944 7945 7ff6e1214740 _invalid_parameter_noinfo __vcrt_FlsAlloc 7944->7945 7945->7938 7947 7ff6e1215054 7946->7947 7948 7ff6e121504f 7946->7948 7947->7939 7950 7ff6e121476c 7948->7950 7951 7ff6e1214574 __vcrt_uninitialize_ptd 2 API calls 7950->7951 7952 7ff6e1214797 7951->7952 7953 7ff6e12147ae TlsFree 7952->7953 7954 7ff6e121479f _invalid_parameter_noinfo 7952->7954 7953->7954 7954->7947

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3381166527.0000025959550000.00000040.00001000.00020000.00000000.sdmp, Offset: 0000025959550000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_25959550000_SecuriteInfo.jbxd
      Yara matches
      Similarity
      • API ID: LibraryLoadSocketclosesocketconnectrecv
      • String ID: unMa$ws2_
      • API String ID: 2974377591-4254217991
      • Opcode ID: cb24d9604c689bb7170bb12a1076ab3421b0b75cfaf156913e0f5abf0d90a634
      • Instruction ID: 9ded53fc5cb2acbc5a14d6374553c8b3b5dccf107a3de8d3abec487fb55856ee
      • Opcode Fuzzy Hash: cb24d9604c689bb7170bb12a1076ab3421b0b75cfaf156913e0f5abf0d90a634
      • Instruction Fuzzy Hash: F231E12175CD0C4BF61D61687C0B77632C5D799726F20503FEA8EC72C6ECA19CA3419A

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 82 7ff6e1242a00-7ff6e1242a03 83 7ff6e1242a0d-7ff6e1242a11 82->83 84 7ff6e1242a1d 83->84 85 7ff6e1242a13-7ff6e1242a1b 83->85 86 7ff6e1242a1f 84->86 87 7ff6e1242a05-7ff6e1242a0a 84->87 85->84 88 7ff6e1242a22-7ff6e1242a29 86->88 87->83 90 7ff6e1242a2b-7ff6e1242a33 88->90 91 7ff6e1242a35 88->91 90->91 91->88 92 7ff6e1242a37-7ff6e1242a3a 91->92 93 7ff6e1242a3c-7ff6e1242a4a 92->93 94 7ff6e1242a4f-7ff6e1242a5c 92->94 95 7ff6e1242a86-7ff6e1242aa1 93->95 96 7ff6e1242a4c 93->96 104 7ff6e1242a76-7ff6e1242a84 call 7ff6e12429c2 94->104 105 7ff6e1242a5e-7ff6e1242a60 94->105 97 7ff6e1242ad2-7ff6e1242ad5 95->97 96->94 99 7ff6e1242ad7-7ff6e1242ad8 97->99 100 7ff6e1242ada-7ff6e1242ae0 97->100 102 7ff6e1242ab9-7ff6e1242abd 99->102 103 7ff6e1242ae7-7ff6e1242aeb 100->103 106 7ff6e1242abf-7ff6e1242ac2 102->106 107 7ff6e1242aa3-7ff6e1242aa6 102->107 108 7ff6e1242b37-7ff6e1242b3f 103->108 109 7ff6e1242aed-7ff6e1242b05 LoadLibraryA 103->109 104->83 110 7ff6e1242a63-7ff6e1242a6a 105->110 106->100 111 7ff6e1242ac4-7ff6e1242ac8 106->111 107->100 114 7ff6e1242aa8 107->114 115 7ff6e1242b43-7ff6e1242b4c 108->115 113 7ff6e1242b07-7ff6e1242b0e 109->113 130 7ff6e1242a6c-7ff6e1242a72 110->130 131 7ff6e1242a74 110->131 116 7ff6e1242aa9-7ff6e1242aad 111->116 117 7ff6e1242aca-7ff6e1242ad1 111->117 113->103 119 7ff6e1242b10-7ff6e1242b26 GetProcAddress 113->119 114->116 120 7ff6e1242b71-7ff6e1242bc0 VirtualProtect * 2 115->120 121 7ff6e1242b4e-7ff6e1242b50 115->121 116->102 128 7ff6e1242aaf-7ff6e1242ab1 116->128 117->97 126 7ff6e1242b28-7ff6e1242b2f 119->126 127 7ff6e1242b31 ExitProcess 119->127 124 7ff6e1242bc5-7ff6e1242bca 120->124 122 7ff6e1242b63-7ff6e1242b6f 121->122 123 7ff6e1242b52-7ff6e1242b61 121->123 122->123 123->115 124->124 129 7ff6e1242bcc 124->129 126->113 128->102 132 7ff6e1242ab3-7ff6e1242ab7 128->132 130->131 131->104 131->110 132->102 132->106
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: ProtectVirtual$AddressLibraryLoadProc
      • String ID:
      • API String ID: 3300690313-0
      • Opcode ID: 71af97829dc1b3768d09a7e5e140eb809ec46152a69456782f420327e65a31b2
      • Instruction ID: 9bb7e377eaa622cf00a8555255b5a14e8171fe464c1208e05fd2ce3664acbcf9
      • Opcode Fuzzy Hash: 71af97829dc1b3768d09a7e5e140eb809ec46152a69456782f420327e65a31b2
      • Instruction Fuzzy Hash: CE510523F5816249EB254A66BE843BC6651DB147B4F084331CA7DC63C5EE5DA8C7E30A

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: Resource$FindLoadLockSizeof
      • String ID:
      • API String ID: 3473537107-0
      • Opcode ID: 9e65964bb416e236b3b7d70a88a3a5fbf7625587e6dd4c661d6cc9c035cdc378
      • Instruction ID: ee720049e3edb35f4efe3cefd28b56ad039409c52f8ce5ed1cf506ef39aa22b6
      • Opcode Fuzzy Hash: 9e65964bb416e236b3b7d70a88a3a5fbf7625587e6dd4c661d6cc9c035cdc378
      • Instruction Fuzzy Hash: 7F416522B087C585E7259B39A5063E963A1FF84784F089134DE8D93701EF3FE5C99705

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: Process32$CreateFirstNextSnapshotToolhelp32
      • String ID:
      • API String ID: 1238713047-0
      • Opcode ID: 6015cbb19716dfbfcea3d337943e2907d95da2efcbc128c95c4e7df92cf86521
      • Instruction ID: 6a5be1cfac0047ac2bbe781e51f6a6ed02641c366d9eecb2f69703bb84629e0d
      • Opcode Fuzzy Hash: 6015cbb19716dfbfcea3d337943e2907d95da2efcbc128c95c4e7df92cf86521
      • Instruction Fuzzy Hash: EE11EC22B0C68589E764DB21FE493BA22A1FB48794F444230C56DC36D5DF3FD58DA705

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandled__scrt_fastfail__scrt_is_nonwritable_in_current_image$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual__isa_available_init__scrt_acquire_startup_lock__scrt_get_show_window_mode__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock__scrt_uninitialize_crt__vcrt_initialize
      • String ID:
      • API String ID: 3844032932-0
      • Opcode ID: 112dd938ff98be07036a19e992a7063a994c538a80f3f62a988b63b62942f957
      • Instruction ID: 51cf3d77731cb7bc87513800243165d0c732099a4eb6f759a9f2e74dc269782a
      • Opcode Fuzzy Hash: 112dd938ff98be07036a19e992a7063a994c538a80f3f62a988b63b62942f957
      • Instruction Fuzzy Hash: 0331F823F081424DEB54EB71AF163B92291AF51384F444434E94E8B6D7DE3FA88DB64A

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: ResourceWait$Create$AllocEventFindLoadObjectSingleSizeofThreadpoolVirtual
      • String ID:
      • API String ID: 2703275367-0
      • Opcode ID: 000ac1c3887871e87f46af5951b2225afe0207abe74563ed7bd78aa52c01d603
      • Instruction ID: 1ffdd48894124ae1a14c26c4e3b69bc50c0999d99a84df793ee76e4d68a370c0
      • Opcode Fuzzy Hash: 000ac1c3887871e87f46af5951b2225afe0207abe74563ed7bd78aa52c01d603
      • Instruction Fuzzy Hash: E4010022B1865146EB24DB26BD1472AA3B1BF8DBD0F444034DE5E87B98DE3FC4888B04

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: AllocateHeap
      • String ID:
      • API String ID: 1279760036-0
      • Opcode ID: 1c55408638a20eb3f10755e302eea4cd17fa40e798ed360cc0c7e1325b2923f3
      • Instruction ID: 56bd34f10e043f3048ba8c6298b8f41512a93844a2a85a21a50bea34b1341289
      • Opcode Fuzzy Hash: 1c55408638a20eb3f10755e302eea4cd17fa40e798ed360cc0c7e1325b2923f3
      • Instruction Fuzzy Hash: 0AF05812F0928A4CFB24E6B15F103B821805F847B0F188630DC2EC62C2EF2FA4C8A11E

      Control-flow Graph

      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3d59cc0bd43f68e74b53bf1a81ca2c742249c8b616c6e6543909cd7c7a6f3deb
      • Instruction ID: 53ea80470a390d02f7d0ed30db50ee15cf2ab2f2a439988032afed09af08ab71
      • Opcode Fuzzy Hash: 3d59cc0bd43f68e74b53bf1a81ca2c742249c8b616c6e6543909cd7c7a6f3deb
      • Instruction Fuzzy Hash: 36E09242F4924B48FB64E1721E013B911460F15770E281B35E97E952C3AD2FA8CD7A1F

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
      • String ID:
      • API String ID: 1239891234-0
      • Opcode ID: 0a47b71e9118324e94598cc37c0a632eccfc9b33759a853d507765d532549240
      • Instruction ID: 3fb05e309b86e5bf7971130f6a375f658eb904e3589ffdc392c4fa24bf2323a2
      • Opcode Fuzzy Hash: 0a47b71e9118324e94598cc37c0a632eccfc9b33759a853d507765d532549240
      • Instruction Fuzzy Hash: 96314D33708B818ADB60CF25E9403AE63B0FB89754F500135EA9D83B94EF3AD5898B05
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: *$.$.
      • API String ID: 3215553584-2112782162
      • Opcode ID: 4a2ceb43c7c4a4b79e4ff399662f7096b0068dc55a64116b4634b1f3a21d2ffe
      • Instruction ID: 52ea6d6988edcc36f85dd54c557df924e37e828fd96229ff1322f316c88d13b4
      • Opcode Fuzzy Hash: 4a2ceb43c7c4a4b79e4ff399662f7096b0068dc55a64116b4634b1f3a21d2ffe
      • Instruction Fuzzy Hash: DE51E0A3F10A5589FB10CBB6AE002BD23A4BB45BD8F544535CE1D97B84EE3ED08A9345
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: .
      • API String ID: 0-248832578
      • Opcode ID: d813a9dc3aa72ffff3f1623bbd0d916beec7a42ec2b49695a1c4ad58e9c1fb05
      • Instruction ID: 372583c148fcddb171275cdee767fdd4e83f0c0d8abccbd581e81fb2e01dc382
      • Opcode Fuzzy Hash: d813a9dc3aa72ffff3f1623bbd0d916beec7a42ec2b49695a1c4ad58e9c1fb05
      • Instruction Fuzzy Hash: 3A313963B1469149EB20DF329D0477AA691FB81BE4F148631EE6D87BC4DE3ED0899305
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: ExceptionRaise_clrfp
      • String ID:
      • API String ID: 15204871-0
      • Opcode ID: 65c0fe079c3d7353ac1945783d528b6233b2de3e3663c56d968049e909d3a6a6
      • Instruction ID: ca2884d61f28cf7ceb80ec2ec98f2ffe22bca8eb4864b6e413ca2666ed6d5e2e
      • Opcode Fuzzy Hash: 65c0fe079c3d7353ac1945783d528b6233b2de3e3663c56d968049e909d3a6a6
      • Instruction Fuzzy Hash: 55B15973A04B898FEB15CF29C94636C3BA0F784B48F198921DA5D837A8CF3AD495D705
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID: @
      • API String ID: 0-2766056989
      • Opcode ID: 916872c06dbcd19925fdb321b3a114a7280f248fb315acf532229df95192d296
      • Instruction ID: e518ad15ee816392ae4a46a2c2073c6deb4e800b95e3392b358fa9e3bb40d776
      • Opcode Fuzzy Hash: 916872c06dbcd19925fdb321b3a114a7280f248fb315acf532229df95192d296
      • Instruction Fuzzy Hash: 3341C363714A448AEF04CF2AEA142A973A1F748FD4B49A032DE0DC7754EE3ED586D305
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: HeapProcess
      • String ID:
      • API String ID: 54951025-0
      • Opcode ID: a96208ff8ca38a716c9918a21e75bbf689f89357a6e64408a025bb707a4a3da1
      • Instruction ID: 4c3c82590f84dd8f31ec7f0ab1418408ebb3645082fcf5dc101b4cf6f79788a4
      • Opcode Fuzzy Hash: a96208ff8ca38a716c9918a21e75bbf689f89357a6e64408a025bb707a4a3da1
      • Instruction Fuzzy Hash: 33B09B11F17A05C5DB4457115D4135912747F48710F944034C00C82310ED2E10E95705
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 18289e1acefdda0465432ef0de08f411e6570b7ff559d50a95b8b8393e460d36
      • Instruction ID: b7a8e7ee42ac7adf4c2eade8aa315ba8a645655f6806035d0c9f5e71796a1b11
      • Opcode Fuzzy Hash: 18289e1acefdda0465432ef0de08f411e6570b7ff559d50a95b8b8393e460d36
      • Instruction Fuzzy Hash: A5F044B3B292599EDB948F28A9426697790F708380B808139D589C7A04EE3D90909F09

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: CloseCreateFileModuleNameValue
      • String ID: Software\Microsoft\Windows\CurrentVersion\Run$Windows Security
      • API String ID: 506456306-1092291550
      • Opcode ID: 1706450cfb42a747e30d0690b3b183250479d3b261c18282e5e20decbd21a9ad
      • Instruction ID: b569e44b0fd07ab58dca1d9a585d6d7817755f26003d77f5b25777f8c2e6807d
      • Opcode Fuzzy Hash: 1706450cfb42a747e30d0690b3b183250479d3b261c18282e5e20decbd21a9ad
      • Instruction Fuzzy Hash: E8116032B28A8189EB20DB21E8503A92370FB89790F901231D6AE836D4DF3FD149DB05

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: __scrt_fastfail$Initialize__scrt_initialize_default_local_stdio_options__scrt_initialize_onexit_tables_invalid_parameter_noinfo_onexit_set_fmode
      • String ID:
      • API String ID: 2236104978-0
      • Opcode ID: e6154013447ce6fea93112093fb24449f343d6a7f734459465fc7d2350ab4ca9
      • Instruction ID: 4a2ed1ae66931ad2c7aae46c922bdcf5d3c933ed43c641feb9a38c61814a707e
      • Opcode Fuzzy Hash: e6154013447ce6fea93112093fb24449f343d6a7f734459465fc7d2350ab4ca9
      • Instruction Fuzzy Hash: 47119902F091434DFB04F3B18E163F911825F90750F940434E90DD62C3AE2FA8D9766B

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressFreeHandleLibraryModuleProc
      • String ID: CorExitProcess$mscoree.dll
      • API String ID: 4061214504-1276376045
      • Opcode ID: d742f6420a41b4a4e3a5f91850512655ae4e3a1bd9242aac4bdde72dcaa8ad07
      • Instruction ID: ad2d1412d4ba7b764246a5d773b0c453ea2a7df9442a5f2ea31f7099b831695e
      • Opcode Fuzzy Hash: d742f6420a41b4a4e3a5f91850512655ae4e3a1bd9242aac4bdde72dcaa8ad07
      • Instruction Fuzzy Hash: 78F03C23B19A468AEB44CB21E9443792371BF88790F885035E91F87A68DE3FD4CC9605

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 292 7ff6e12191cc-7ff6e12191f1 293 7ff6e12191fa-7ff6e12191fd 292->293 294 7ff6e12191f3-7ff6e12191f5 292->294 296 7ff6e12191ff-7ff6e1219219 call 7ff6e12154bc call 7ff6e12154dc call 7ff6e1215270 293->296 297 7ff6e121921e-7ff6e1219249 293->297 295 7ff6e1219495-7ff6e12194ac 294->295 296->295 299 7ff6e121924b-7ff6e1219252 297->299 300 7ff6e1219254-7ff6e121925a 297->300 299->296 299->300 302 7ff6e121926a-7ff6e1219278 call 7ff6e12186c0 300->302 303 7ff6e121925c-7ff6e1219265 call 7ff6e1219af8 300->303 309 7ff6e121937f-7ff6e1219390 302->309 310 7ff6e121927e-7ff6e121928f 302->310 303->302 314 7ff6e12193df-7ff6e1219404 WriteFile 309->314 315 7ff6e1219392-7ff6e1219397 309->315 310->309 312 7ff6e1219295-7ff6e12192a8 call 7ff6e1214ed0 310->312 331 7ff6e12192aa-7ff6e12192ba 312->331 332 7ff6e12192c0-7ff6e12192dc GetConsoleMode 312->332 317 7ff6e1219406-7ff6e121940c call 7ff6e121b120 314->317 318 7ff6e121940f 314->318 319 7ff6e1219399-7ff6e121939c 315->319 320 7ff6e12193cb-7ff6e12193dd call 7ff6e1218d48 315->320 317->318 326 7ff6e1219412 318->326 321 7ff6e12193b7-7ff6e12193c9 call 7ff6e1218f6c 319->321 322 7ff6e121939e-7ff6e12193a1 319->322 340 7ff6e1219373-7ff6e121937a 320->340 321->340 328 7ff6e121941c-7ff6e1219426 322->328 329 7ff6e12193a3-7ff6e12193b5 call 7ff6e1218e50 322->329 327 7ff6e1219417 326->327 327->328 335 7ff6e1219428-7ff6e121942d 328->335 336 7ff6e1219490-7ff6e1219493 328->336 329->340 331->309 331->332 332->309 339 7ff6e12192e2-7ff6e12192e4 332->339 341 7ff6e121945c-7ff6e121946d 335->341 342 7ff6e121942f-7ff6e1219432 335->342 336->295 344 7ff6e12192e6-7ff6e12192eb 339->344 345 7ff6e1219361-7ff6e121936e call 7ff6e1218b40 339->345 340->327 350 7ff6e1219478-7ff6e1219488 call 7ff6e12154dc call 7ff6e12154bc 341->350 351 7ff6e121946f-7ff6e1219472 341->351 346 7ff6e121944f-7ff6e1219457 call 7ff6e121546c 342->346 347 7ff6e1219434-7ff6e1219444 call 7ff6e12154dc call 7ff6e12154bc 342->347 344->328 348 7ff6e12192f1-7ff6e1219303 344->348 345->340 346->341 347->346 348->326 355 7ff6e1219309-7ff6e121931a call 7ff6e1219bf0 348->355 350->336 351->294 351->350 365 7ff6e121931c-7ff6e1219327 355->365 366 7ff6e121934f-7ff6e1219355 call 7ff6e121b120 355->366 367 7ff6e1219329-7ff6e121933b call 7ff6e1219bf0 365->367 368 7ff6e1219344-7ff6e121934b 365->368 371 7ff6e1219358-7ff6e121935c 366->371 367->366 375 7ff6e121933d-7ff6e1219342 367->375 368->371 372 7ff6e121934d 368->372 371->326 372->355 375->368
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: 11432db8d19b07deaedf32f7bb39001863ed27899f833150321b852d9f438cae
      • Instruction ID: e6ed3da81e08ab0cfa4326b13da635c260d1d9387578ec19d6b8d9d68477d495
      • Opcode Fuzzy Hash: 11432db8d19b07deaedf32f7bb39001863ed27899f833150321b852d9f438cae
      • Instruction Fuzzy Hash: 81819B63F186028DFB20DB659E807BD26A0BB45B84F444135D90F936D1DF3BA489E71A

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
      • String ID:
      • API String ID: 3659116390-0
      • Opcode ID: 2e31065ed870a4fffc777339ae25bc2800ecb629e1cef6a7119377d44a28e519
      • Instruction ID: 8f2daab32a649886034ea5e5ecbcd18b1e0781b44116f28fb08c1ff15e4cce2f
      • Opcode Fuzzy Hash: 2e31065ed870a4fffc777339ae25bc2800ecb629e1cef6a7119377d44a28e519
      • Instruction Fuzzy Hash: 6D51EF33B18A5189E710CB35E9843BD3BB0FB48B88F548131CE4A97A98DF3AD189C705

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: AddressProc
      • String ID:
      • API String ID: 190572456-0
      • Opcode ID: 7e62b6aa7b7e25d12d1620684cbc820ed2222982765197eecca9324eaa541341
      • Instruction ID: 9fb1338765a4d70ef9609311993e6fe5fd1c959ef41f86b74dfb0aede8ab4fd3
      • Opcode Fuzzy Hash: 7e62b6aa7b7e25d12d1620684cbc820ed2222982765197eecca9324eaa541341
      • Instruction Fuzzy Hash: 5141C123F09AC2CDEB15CB02AE04B7562A5BB44BD4F094535DD1DCB684DF3FE488A209
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: b7664432e41ba77913d69028e7edc508c49d41399d74719a20a153286b896ad0
      • Instruction ID: c1b5a3b3a15cf55b380a3b9f6e7c742af1181b3bd583fb0fd1c44bce48f84e16
      • Opcode Fuzzy Hash: b7664432e41ba77913d69028e7edc508c49d41399d74719a20a153286b896ad0
      • Instruction Fuzzy Hash: C911E6B3F0C6820DFF18A125EE4537600517F593A1F980A34E96F865DACE2F54C8620F
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: ByteCharErrorFileLastMultiWideWrite
      • String ID: U
      • API String ID: 2456169464-4171548499
      • Opcode ID: 2179287ed7f1ab873a2529ff9442dffbf1259bba2b698eaf685a01ffb28638ce
      • Instruction ID: 1d19da527c932e0166f6b5da4ca72aa9ae80b299a9e7d1bfe92dfe668cdc4467
      • Opcode Fuzzy Hash: 2179287ed7f1ab873a2529ff9442dffbf1259bba2b698eaf685a01ffb28638ce
      • Instruction Fuzzy Hash: 0841B423B186818AEB20CF25E9443BA6761FB88794F814031EE4E87784EF3ED485D745
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: ErrorLast$abort
      • String ID:
      • API String ID: 1447195878-0
      • Opcode ID: 0adfb1b3142d0371f7369efa31b2b04567f3cc72e5dcbeb6d86b5a3fae334540
      • Instruction ID: c415205fef8dfe59e3d4b42f7d6e8584e7d220f04b2134f1885e9c4efe5a74e8
      • Opcode Fuzzy Hash: 0adfb1b3142d0371f7369efa31b2b04567f3cc72e5dcbeb6d86b5a3fae334540
      • Instruction Fuzzy Hash: 44016D22F092834EFB58E7616F5937811A15F48790F140134E82E8B7C6EE2FA4CDA60A
      APIs
      Strings
      • C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe, xrefs: 00007FF6E1213604
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: FileModuleName_invalid_parameter_noinfo
      • String ID: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.DownloaderNET.45.17732.20664.exe
      • API String ID: 3307058713-1082331174
      • Opcode ID: b2b95b37ed8accdb3b78b29ded18bd4a9faa55d733196014dedde3dd2189b0c1
      • Instruction ID: 8729ce78814eaaa43b7906c3c2326e5b28e8dd08c4a33724e377c688f26fa433
      • Opcode Fuzzy Hash: b2b95b37ed8accdb3b78b29ded18bd4a9faa55d733196014dedde3dd2189b0c1
      • Instruction Fuzzy Hash: 04418C73B08A528DEB14DF22AE402FC76A5EB44BA0B548031E90D87B45DE3FE4C99709
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: FileHandleType
      • String ID: @
      • API String ID: 3000768030-2766056989
      • Opcode ID: 801cc8740e010d7015796ea82be991388f0b578cc929ffbccc260e0f068cbb0e
      • Instruction ID: 2228143679343018012959cdacd3c6abfd20707a8409f18983e47f06df864d62
      • Opcode Fuzzy Hash: 801cc8740e010d7015796ea82be991388f0b578cc929ffbccc260e0f068cbb0e
      • Instruction Fuzzy Hash: 9921C423B0864248EB64CB2A9D9023C2650FB45B74F244335DA7E877D5CE7BD4C5E306
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3381275177.00007FF6E1211000.00000040.00000001.01000000.00000003.sdmp, Offset: 00007FF6E1210000, based on PE: true
      • Associated: 00000000.00000002.3381261154.00007FF6E1210000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E123B000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381275177.00007FF6E1241000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381325692.00007FF6E1242000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3381339156.00007FF6E1243000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6e1210000_SecuriteInfo.jbxd
      Similarity
      • API ID: Exception$FileHeaderRaiseThrowstd::bad_alloc::bad_alloc
      • String ID: Unknown exception
      • API String ID: 3561508498-410509341
      • Opcode ID: c2b696dc188fa958578d2762ca49bc212296567dc67b1e31af0a9eb282110cfd
      • Instruction ID: c00d0ded4faac729de2c16cd80ebd502eca8d69420aedc7afc308f0c170be6df
      • Opcode Fuzzy Hash: c2b696dc188fa958578d2762ca49bc212296567dc67b1e31af0a9eb282110cfd
      • Instruction Fuzzy Hash: 27D06763B28A8699DF20EB14DD853A96330FB94708FA04532E14C82575DF2FD68AE746